PRODUCT DESCRIPTION
-
<p>Support for Windows 10 20H2.</p>
<p>Updated application interface. Also updated the application icon in the notification area, application notifications, and dialog boxes.</p>
<p>Improved interface of the Kaspersky Endpoint Security web plug-in for the Application Control, Device Control, and Adaptive Anomaly Control components.</p>
<p>Added functionality for importing and exporting lists of rules and exclusions in XML format. The XML format allows you to edit lists after they are exported. You can manage lists only in the Kaspersky Security Center Console. The following lists are available for export/import:</p>
<ul>
<li>Behavior Detection (list of exclusions).</li>
<li>Web Threat Protection (list of trusted web addresses).</li>
<li>Mail Threat Protection (list of attachment filter extensions).</li>
<li>Network Threat Protection (list of exclusions).</li>
<li>Firewall (list of network packet rules).</li>
<li>Application Control (list of rules).</li>
<li>Web Control (list of rules).</li>
<li>Network ports monitoring (lists of ports and applications monitored by Kaspersky Endpoint Security).</li>
<li>Kaspersky Disk Encryption (list of exclusions).</li>
<li>Encryption of removable drives (list of rules).</li>
</ul>
<p></p>
<p>Object MD5 information was added to the threat detection report. In previous versions of the application, Kaspersky Endpoint Security showed only the SHA256 of an object.</p>
<p>Added capability to assign the priority for device access rules in Device Control settings. Priority assignment enables more flexible configuration of user access to devices. If a user has been added to multiple groups, Kaspersky Endpoint Security regulates device access based on the rule with the highest priority. For example, you can grant read-only permissions to the Everyone group and grant read/write permissions to the administrators group. To do this, assign the entries for the Admin group a priority of 0 and the Everyone group a priority of 1. You can only assign a priority to devices with a file system. This includes hard drives, removable drives, floppy drives, CD/DVD drives, and portable devices (MTP).</p>
<p>Added new functionality:</p>
<ul>
<li>Manage notification sounds.</li>
<li>Cost-aware networking. Kaspersky Endpoint Security limits its own network traffic if the Internet connection is limited (for example, through a mobile connection).</li>
<li>Manage Kaspersky Endpoint Security settings via trusted remote administration applications (such as TeamViewer, LogMeIn and RemotelyAnywhere). You can use remote administration applications to start Kaspersky Endpoint Security and manage settings in the application interface.</li>
<li>Manage the settings for scanning secure traffic in Firefox and Thunderbird. You can select the certificate storage that Mozilla will use: the Windows Certificate Store or the Mozilla Certificate Store. This functionality is available only for computers that do not have an applied policy. If a policy is being applied to a computer, Kaspersky Endpoint Security automatically enables use of the Windows certificate storage in Firefox and Thunderbird.</li>
</ul>
<p></p>
<p>We added a feature that allows to choose between 2 protected traffic scanning modes: Always scan traffic even if protection components are disabled, or scan traffic upon request from protection components.</p>
<p>Revised procedure for deleting information from reports. A user can only delete all reports. In previous versions of the application, a user could select specific application components whose information would be deleted from reports.</p>
<p>Revised procedure for importing a configuration file containing Kaspersky Endpoint Security settings, and revised procedure for restoring application settings. Prior to importing or restoring, Kaspersky Endpoint Security shows only a warning. In previous versions of the application, you could view the values of the new settings before they were applied.</p>
<p>Simplified procedure for restoring access to a drive that was encrypted by BitLocker. After completing the access recovery procedure, Kaspersky Endpoint Security prompts the user to set a new password or PIN code.</p>
<p>Users now have the capability to create their own local trusted zone for a specific computer. This way, users can create their own local lists of exclusions and trusted applications in addition to the overall trusted zone in a policy. An administrator can allow or block the use of local exclusions or local trusted applications. An administrator can use Kaspersky Security Center to view, add, edit, or delete list items in the computer properties.</p>
<p>Added capability to enter comments in the properties of trusted applications. Comments help simplify searches and sorting of trusted applications.</p>
<p>Now you can configure the settings of the Mail Threat Protection extension for Outlook using the REST API.</p>