Kaspersky Embedded Systems Security 3.3 for Linux
8 July 2024
ID 251963
Kaspersky Embedded Systems Security 3.3 for Linux ("Kaspersky Embedded Systems Security", "Application") protects devices running Linux operating systems against various types of threats, including network and scam attacks.
The application is not intended for industrial processes that use automated control systems. To protect devices in these systems, we recommend using Kaspersky Industrial CyberSecurity for Linux Nodes.
The application is used to:
- Scan file system objects located on local disks of your device, as well as mounted and shared resources, which are accessed via SMB and NFS protocols.
- Scan objects in the file system both in real time using the File Threat Protection task and on demand using scan tasks.
- Scan startup objects, boot sectors, process memory, and kernel memory.
- Detect infected objects and neutralize threats detected in them.
- Automatically select an action to neutralize the threat.
- Save backup copies of files before disinfection or deletion and restore files from backups.
- Manage tasks and configure their settings.
- Add keys and activate the application using activation codes.
- Update the application with service packs.
- Update application databases from Kaspersky update servers, via the Administration Server, or from a user-specified source on schedule and on demand.
- Use application databases to detect and disinfect infected files. During the scan process, the application analyzes each file for the presence of a threat: it compares the file code with the code of a specific threat and looks for possible matches.
- Monitor the integrity of the system or specified files and report changes. System Integrity Monitoring can be performed in continuous monitoring mode and in on-demand scan mode.
- Manage the operating system firewall and restore the set of firewall rules if they were changed.
- Protect files in local directories with network access via SMB / NFS from remote malicious encryption.
- Analyze traffic sent to users' devices via HTTP / HTTPS and FTP and check if web addresses are malicious or phishing.
- Configure flexible restrictions on access to data storage devices (hard disks, removable disks, CD / DVD drives), data transfer equipment (modems), data conversion devices (printers) and interfaces for connecting devices (USB, FireWire).
- Check removable drives when connected to your device.
- Check incoming network traffic for activity typical of network attacks.
- Check containers, images and namespaces.
- Receive information about application actions on your device.
- Configure encrypted connections scan settings.
- Control the start of applications and restrict access to applications on user devices to help reduce the risk of client device infections.
- Get information about all executable files of the applications installed on client devices using the Inventory Scan task, which can be useful, for example, for creating Application Control rules.
- Use Kaspersky Security Network. The use of data from Kaspersky Security Network ensures faster responses by Kaspersky Embedded Systems Security to various threats, improves the performance of some protection components, and reduces the likelihood of false positives.
- Allow users without root permissions to manage the application functions.
- Notify the administrator about events that occurred while the application was running.
- Check the integrity of application components using the integrity check tool.
You can manage Kaspersky Embedded Systems Security using the following methods:
- Using control commands from the command line.
- Using Kaspersky Security Center Administration Console.
- Using Kaspersky Security Center Web Console and Kaspersky Security Center Cloud Console.
- Using a graphical user interface.
UPDATES FUNCTIONALITY (INCLUDING PROVIDING ANTI-VIRUS SIGNATURE UPDATES AND CODEBASE UPDATES), AS WELL AS KSN FUNCTIONALITY WILL NOT BE AVAILABLE IN THE SOFTWARE IN THE U.S. TERRITORY FROM 12:00AM EASTERN DAYLIGHT TIME (EDT) ON SEPTEMBER 10, 2024 IN ACCORDANCE WITH THE RESTRICTIVE MEASURES.