About Kaspersky Industrial CyberSecurity for Linux Nodes 1.3
About Kaspersky Industrial CyberSecurity for Linux Nodes 1.3
Sep 7, 2023
ID 233544
Kaspersky Industrial CyberSecurity for Linux Nodes 1.3 provides malware protection for devices running Linux® operating systems. Threats can infiltrate the system via network data transfer channels or from removable drives.
The application is used to:
- Scan file system objects residing on local drives of a client device, as well as mounted and shared resources that are accessed via the SMB and NFS protocols.
- Scan objects in the file system both in real time using the File Threat Protection task and on demand using virus scan tasks.
- Scan startup objects, boot sectors, process memory, and kernel memory.
- Detect infected objects and neutralize detected threats.
- Automatically select an action to neutralize the threat.
- Save backup copies of files before disinfection or deletion and restore files from backups.
- Manage tasks and configure their settings.
- Add keys and activate the application using key files and activation codes.
- Update the application with service packs.
- Update application databases from Kaspersky Lab's update servers, via the Administration Server, or from a user-specified source on schedule and on demand.
- Use application databases to detect and disinfect infected files. During the scan process, the application analyzes each file for the presence of a threat: it compares the file code with the code of a specific threat and looks for possible matches.
- Monitor the integrity of the system or specified files and report changes. System Integrity Monitoring can be performed in continuous monitoring mode and in on-demand scan mode.
- Manage the operating system firewall and, if necessary, restore the set of firewall rules that have been changed.
- Protect files in local directories with network access via SMB / NFS from remote malicious encryption.
- Analyze traffic sent to users' computers via HTTP / HTTPS and FTP and check if web addresses are malicious or phishing.
- Configure flexible restrictions on access to data storage devices (hard disks, removable disks, CD / DVD drives), data transfer equipment (modems), data conversion devices (printers) and interfaces for connecting devices to computers (USB, FireWire).
- Scan removable drives when they are connected to a client device.
- Check incoming network traffic for activity typical of network attacks.
- Check containers, images and namespaces.
- Receive information about the actions of applications on a client device.
- Configure encrypted connections scan settings.
- Control the launch of programs on users' computers, which reduces the risk of computer infection by restricting access to programs.
- Get information about all executable files of the applications installed on computers using the Inventory Scan task, which can be useful, for example, for creating application control rules.
- Participate in Kaspersky Security Network. Using data from Kaspersky Security Network ensures a faster reaction of Kaspersky Industrial CyberSecurity for Linux Nodes to various threats, increases the efficiency of some protection components, and also reduces the likelihood of false positives.
- Configure the integration between Kaspersky Industrial CyberSecurity for Linux Nodes and Kaspersky Managed Detection and Response (MDR) to continuously search, detect, and remediate threats directed at your organization.
- Configure the integration between Kaspersky Industrial CyberSecurity for Linux Nodes and Kaspersky Industrial CyberSecurity for Networks to expand the capabilities for investigating and responding to threats in industrial enterprise networks.
- Allow users without root permissions to manage the application functions.
- Notify the administrator about events that occurred while the application was running.
- Check the integrity of application components using the integrity check tool.
You can manage Kaspersky Industrial CyberSecurity for Linux Nodes using the following methods:
- Using application control commands from the command line.
- Using Kaspersky Security Center Administration Console.
- Using Kaspersky Security Center Web Console.
- Using a graphical user interface.
Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.