About Kaspersky Industrial CyberSecurity for Linux Nodes 1.3
Sep 7, 2023
Kaspersky Industrial CyberSecurity for Linux Nodes 1.3 provides malware protection for devices running Linux® operating systems. Threats can infiltrate the system via network data transfer channels or from removable drives.
The application is used to:
- Scan file system objects residing on local drives of a client device, as well as mounted and shared resources that are accessed via the SMB and NFS protocols.
- Scan objects in the file system both in real time using the File Threat Protection task and on demand using virus scan tasks.
- Scan startup objects, boot sectors, process memory, and kernel memory.
- Detect infected objects and neutralize detected threats.
- Automatically select an action to neutralize the threat.
- Save backup copies of files before disinfection or deletion and restore files from backups.
- Manage tasks and configure their settings.
- Add keys and activate the application using key files and activation codes.
- Update the application with service packs.
- Update application databases from Kaspersky Lab's update servers, via the Administration Server, or from a user-specified source on schedule and on demand.
- Use application databases to detect and disinfect infected files. During the scan process, the application analyzes each file for the presence of a threat: it compares the file code with the code of a specific threat and looks for possible matches.
- Monitor the integrity of the system or specified files and report changes. System Integrity Monitoring can be performed in continuous monitoring mode and in on-demand scan mode.
- Manage the operating system firewall and, if necessary, restore the set of firewall rules that have been changed.
- Protect files in local directories with network access via SMB / NFS from remote malicious encryption.
- Analyze traffic sent to users' computers via HTTP / HTTPS and FTP and check if web addresses are malicious or phishing.
- Configure flexible restrictions on access to data storage devices (hard disks, removable disks, CD / DVD drives), data transfer equipment (modems), data conversion devices (printers) and interfaces for connecting devices to computers (USB, FireWire).
- Scan removable drives when they are connected to a client device.
- Check incoming network traffic for activity typical of network attacks.
- Check containers, images and namespaces.
- Receive information about the actions of applications on a client device.
- Configure encrypted connections scan settings.
- Control the launch of programs on users' computers, which reduces the risk of computer infection by restricting access to programs.
- Get information about all executable files of the applications installed on computers using the Inventory Scan task, which can be useful, for example, for creating application control rules.
- Participate in Kaspersky Security Network. Using data from Kaspersky Security Network ensures a faster reaction of Kaspersky Industrial CyberSecurity for Linux Nodes to various threats, increases the efficiency of some protection components, and also reduces the likelihood of false positives.
- Configure the integration between Kaspersky Industrial CyberSecurity for Linux Nodes and Kaspersky Managed Detection and Response (MDR) to continuously search, detect, and remediate threats directed at your organization.
- Configure the integration between Kaspersky Industrial CyberSecurity for Linux Nodes and Kaspersky Industrial CyberSecurity for Networks to expand the capabilities for investigating and responding to threats in industrial enterprise networks.
- Allow users without root permissions to manage the application functions.
- Notify the administrator about events that occurred while the application was running.
- Check the integrity of application components using the integrity check tool.
You can manage Kaspersky Industrial CyberSecurity for Linux Nodes using the following methods:
- Using application control commands from the command line.
- Using Kaspersky Security Center Administration Console.
- Using Kaspersky Security Center Web Console.
- Using a graphical user interface.