{"id":15021,"date":"2014-10-30T14:12:41","date_gmt":"2014-10-30T14:12:41","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2785"},"modified":"2020-02-26T10:56:59","modified_gmt":"2020-02-26T15:56:59","slug":"new-features-of-kaspersky-endpoint-security-10-service-pack-1-screenshots-gallery","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/new-features-of-kaspersky-endpoint-security-10-service-pack-1-screenshots-gallery\/15021\/","title":{"rendered":"New features of Kaspersky Endpoint Security 10 Service Pack 1: Screenshots gallery"},"content":{"rendered":"<p>As we <a href=\"https:\/\/business.kaspersky.com\/kesksc10-service-pack-1-beta-testing-opens\/2465\" target=\"_blank\" rel=\"noopener nofollow\">announced<\/a> earlier, Kaspersky Lab has launched public beta-testing of its enterprise security solution Kaspersky Endpoint Security 10 Service Pack 1. Below is the fresh gallery of screenshots, showcasing new features of our solution.<\/p>\n<p><strong>Application Startup Control<\/strong><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020154\/1-1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2786\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020154\/1-1.png\" alt=\"1\" width=\"470\" height=\"328\"><\/a><\/p>\n<p>The logic of processing Application Control Rules has changed: by default, the application denies application startup only to users that are expressly included in the deny list. The \u201cDeny for other users\u201d setting has been added to Application Startup Control rules to support the logic implemented in previous versions of the application.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>New features of #Kaspersky Endpoint Security 10 Service Pack 1 #KES<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F7Hsh&amp;text=New+features+of+%23Kaspersky+Endpoint+Security+10+Service+Pack+1+%23KES+\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020153\/2-1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2787\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020153\/2-1.png\" alt=\"2\" width=\"877\" height=\"560\"><\/a><\/p>\n<p>The option of generating a test verdict for the \u201cBlock by default\u201d implicit rule was added.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020152\/3-1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2788\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020152\/3-1.png\" alt=\"3\" width=\"804\" height=\"578\"><\/a><\/p>\n<p><strong>Device Control<\/strong><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020152\/4-1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2789\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020152\/4-1.png\" alt=\"4\" width=\"700\" height=\"502\"><\/a><\/p>\n<p>It is now possible to create rules for trusted devices based on a device ID mask. Possible masks: the \u201c*\u201d symbol represents any number of symbols; the \u201c?\u201d symbol represents any one symbol.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020151\/5-1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2790\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020151\/5-1.png\" alt=\"5\" width=\"874\" height=\"560\"><\/a><\/p>\n<p>The interface for managing trusted devices has been improved: the \u201cDevice ID\u201d and \u201cComment\u201d fields have been added.<\/p>\n<p><strong>Full Disk Encryption<\/strong><\/p>\n<p><strong>New Authentication (<\/strong>Pre-Boot<strong>) agent interface with mouse support<\/strong><\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020150\/6-1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2791\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020150\/6-1.png\" alt=\"6\" width=\"800\" height=\"600\"><\/a><\/p>\n<p>More languages and keyboard layouts are now supported by an authentication agent.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020150\/7-1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2792\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020150\/7-1.png\" alt=\"7\" width=\"774\" height=\"580\"><\/a><\/p>\n<p>The authentication agent authorization using tokens and smart-cards is now supported.<\/p>\n<p><strong>Application installer<\/strong><\/p>\n<p>The size of the application distribution package has been reduced by 30% through combining MSI files for installation on 32-bit and 64-bit operating systems.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020149\/8-1-1024x317.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2793\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020149\/8-1.png\" alt=\"8\" width=\"1402\" height=\"434\"><\/a><\/p>\n<p><strong>New application modules update mechanism<\/strong><\/p>\n<p>Updates are installed \/ rolled back without shutting down the application or interrupting computer protection.<\/p>\n<p>Both critical fixes and new functionality can be installed via module updates.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020149\/9-1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2794\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020149\/9-1.png\" alt=\"9\" width=\"762\" height=\"561\"><\/a><\/p>\n<p>Improved integration with Kaspersky Security Center: notifications about available updates, management of update installation, support of phased installation of updates, possibility to apply critical fixes automatically.<\/p>\n<p>\u00a0<\/p>\n<p><strong>Beta-testing<\/strong> is now ongoing. Second build \u2013 Beta-2 was released on October 15, and the third build is expected on November 15.<\/p>\n<p>Additional info, a full list of new features and system requirements are available\u00a0<a href=\"https:\/\/www.kaspersky.com\/trials\/beta_testing_information_KES10KSC10SP1\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab has launched public beta-testing of its enterprise security solution, Kaspersky Endpoint Security 10 Service Pack 1. Take a look at the screenshots showcasing the new features.<\/p>\n","protected":false},"author":209,"featured_media":15889,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2161,2041],"class_list":{"0":"post-15021","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-beta-testing","10":"tag-kaspersky-endpoint-security"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/new-features-of-kaspersky-endpoint-security-10-service-pack-1-screenshots-gallery\/15021\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/new-features-of-kaspersky-endpoint-security-10-service-pack-1-screenshots-gallery\/15021\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/new-features-of-kaspersky-endpoint-security-10-service-pack-1-screenshots-gallery\/15021\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/beta-testing\/","name":"beta testing"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15021"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15021\/revisions"}],"predecessor-version":[{"id":33363,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15021\/revisions\/33363"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15889"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}