About data provision

In the course of operation, the application uses data that requires the permission of the Kaspersky Web Traffic Security administrator to transmit or process.

You can view the list of data and the terms on which it is used as well as give consent to data processing in the following agreements between your organization and Kaspersky Lab:

Kaspersky Lab protects any information received in this way as prescribed by law and applicable rules of Kaspersky Lab.

Kaspersky Lab uses any received information in anonymized form and as general statistics only. General statistics are automatically generated using original collected information and do not contain any personal data or other confidential information. The original information received is destroyed as new information is accumulated (once a year). General statistics are stored indefinitely.

RAM of Kaspersky Web Traffic Security may contain any processed data of application users. The Kaspersky Web Traffic Security administrator must independently ensure the security of such data.

The following table contains the complete list of user data that can be stored by Kaspersky Web Traffic Security.

User data that can be stored in Kaspersky Web Traffic Security

Data type

Where data is used

Storage duration

Data protection measures

Information from requests to access Internet resources:

  • IP addresses of users.
  • User account name and domain of users.
  • URLs of requested Internet resources.
  • Downloaded files.

    Names of application web interface user accounts.

  • Trace files and logs.
  • RAM.
  • Dump files.

The traffic processing event log is stored for three days by default. When 1 GB of storage volume is reached, rotation is initiated and deletion of old records begins.

By default, the application event log is stored indefinitely and contains 100 thousand events. When the defined number of records is reached, rotation is initiated and deletion of old records begins.

Trace files are stored indefinitely. When 1 GB of storage volume is reached, rotation is initiated and deletion of old records begins.

The system log storage period is determined by the operating system settings.

Information in RAM is stored until the application is restarted.

Dump files are stored indefinitely.

By default, only the root superuser account of operating systems and the Kaspersky Web Traffic Security Administrator account have access to personal data of users.

The ability to limit access rights of administrators and other users of servers and operating systems that have Kaspersky Web Traffic Security installed using features of Kaspersky Web Traffic Security is not available.

The administrator of Kaspersky Web Traffic Security should use any system measures at the administrator's discretion to control access of administrators and other users of servers and operating systems that have Kaspersky Web Traffic Security installed to personal data of other users.

LDAP:

  • Names of LDAP accounts.
  • DN.
  • Inclusion into a user group.
  • Trace files and logs.
  • LDAP cache.
  • RAM.
  • Dump files.

The traffic processing event log is stored for three days by default. When 1 GB of storage volume is reached, rotation is initiated and deletion of old records begins.

By default, the application event log is stored indefinitely and contains 100 thousand events. When the defined number of records is reached, rotation is initiated and deletion of old records begins.

Trace files are stored indefinitely. When 1 GB of storage volume is reached, rotation is initiated and deletion of old records begins.

The system log storage period is determined by the operating system settings.

The LDAP cache is stored indefinitely.

Information in RAM is stored until the application is restarted.

Dump files are stored indefinitely.

Traffic processing rules:

  • Names of LDAP accounts, DN, inclusion into a user group.
  • IP addresses of users.
  • Comments.
  • Configuration files.
  • RAM.
  • Dump files.

Configuration files are stored indefinitely.

Information in RAM is stored until the application is restarted.

Dump files are stored indefinitely.

Application configuration:

  • Names of administrator accounts and application user accounts.
  • Application accounts access permissions.
  • Hash of the administrator password.
  • User account name and password for connecting the application to the proxy server.
  • Keytab files.

Data on application updates:

  • IP addresses used for downloading updates.
  • IP addresses of update sources.
  • Information about downloaded files and download speed, and IP addresses of users.

Trace files and logs.

The traffic processing event log is stored for three days by default. When 1 GB of storage volume is reached, rotation is initiated and deletion of old records begins.

By default, the application event log is stored indefinitely and contains 100 thousand events. When the defined number of records is reached, rotation is initiated and deletion of old records begins.

Trace files are stored indefinitely. When 1 GB of storage volume is reached, rotation is initiated and deletion of old records begins.

The system log storage period is determined by the operating system settings.

Data in Storage

  • Traffic processing event log.
  • Application event log.
  • Trace files.
  • System log.
  • RAM.
  • Dump files.
  • LDAP cache.
  • Application configuration files.
  • KSN statistics.
  • Information about the installed application.

The traffic processing event log is stored for three days by default. When 1 GB of storage volume is reached, rotation is initiated and deletion of old records begins.

By default, the application event log is stored indefinitely and contains 100 thousand events. When the defined number of records is reached, rotation is initiated and deletion of old records begins.

Trace files are stored indefinitely. When 1 GB of storage volume is reached, rotation is initiated and deletion of old records begins.

The system log storage period is determined by the operating system settings.

Information in RAM is stored until the application is restarted.

Dump files are stored indefinitely.

The LDAP cache is stored indefinitely.

Configuration files are stored indefinitely.

KSN statistics and information about the installed application are stored indefinitely on Kaspersky Lab servers.

Managing the application from the management console of the server on which Kaspersky Web Traffic Security is installed using a superuser account allows you to manage the dump settings. A dump is generated during application crashes and may be needed to analyze the causes of the crash. The dump may include any data, including fragments of content of email messages and analyzed files.

By default, dump generation in Kaspersky Web Traffic Security is disabled.

Such data can be accessed from the Management Console of the server on which Kaspersky Web Traffic Security is installed, using an account with super-user privileges.

The Kaspersky Web Traffic Security administrator must independently ensure the security of such data.

The administrator of Kaspersky Web Traffic Security is responsible for access to this information.

See also

Application licensing

About the End User License Agreement

About the license

About the license certificate

About the key

About the activation code

Viewing information about the license and application activation

Activating the application

Removing a key

Page top