Kaspersky Industrial CyberSecurity for Nodes policy settings sections
3 August 2023
ID 193230
General
In the General section, you can configure the following policy settings:
- Indicate the policy status.
- Configure the inheritance settings for parent and child policies.
Event configuration
In the Event configuration section, you can configure settings for the following event categories:
- Critical event
- Functional failure
- Warning
- Info
You can use the Properties button to configure the following settings for the selected events:
- Indicate the storage location and retention period for information about logged events.
- Indicate the notification method for logged events.
Application settings
Application Settings
Section | Options |
Scalability, interface and scan settings | In the Scalability, interface and scan settings subsection, you can click the Settings button to configure the following settings:
|
Security and reliability | In the Security and reliability subsection, you can click the Settings button to configure the following settings:
|
Connections | In the Connections subsection, you can use the Settings button to configure the following proxy server settings for connecting with update servers, activation servers, and KSN:
|
Run local system tasks | In the Run local system tasks subsection, you can use the Settings button to allow or block the start of the following local system tasks according to a schedule configured on protected devices:
|
Supplementary
Supplementary settings
Section | Options |
Trusted Zone | In the Settings subsection, you can click the Trusted Zone button to configure the following Trusted Zone settings:
|
Removable Drives Scan | In the Removable Drives Scan subsection, you can use the Settings button to configure scan settings for removable drives. |
User access permissions for application management | In the User access permissions for application management subsection, you can configure user rights and user group rights to manage Kaspersky Industrial CyberSecurity for Nodes. |
User access permissions for Kaspersky Security Service management | In the User access permissions for Kaspersky Security Service management subsection, you can configure user rights and user group rights to manage the Kaspersky Security Service. |
Storages | In the Storages subsection, click the Settings button to configure the following settings for Quarantine, Backup and List of blocked network sessions:
|
Real-time computer protection
Real-Time Computer Protection settings
Section | Options |
Real-Time File Protection | In the Real-Time File Protection subsection, you can click the Settings button to configure the following settings:
|
KSN Usage | In the KSN Usage subsection, you can click the Settings button to configure the following task settings:
|
Traffic Security | In the Traffic Security subsection, you can click the Settings button to configure the following task settings:
|
Exploit Prevention | In the Exploit Prevention subsection, you can click the Settings button to configure the following task settings:
|
AMSI Scanner | In the AMSI Scanner subsection, click the Settings button to configure the following task run settings:
|
Local activity control
Local Activity Control settings
Section | Options |
Applications Launch Control | In the Applications Launch Control subsection, you can use the Settings button to configure the following task settings:
|
Device control | In the Device control subsection, you can click the Settings button to configure the following task settings:
|
Network activity control
Network activity control settings
Section | Options |
Firewall Management | In the Firewall Management subsection, you can click the Settings button to configure the following task settings:
|
Anti-Cryptor | In the Anti-Cryptor subsection, you can click the Settings button to configure the following task settings:
|
System Inspection
System Inspection settings
Section | Options |
File Integrity Monitor | In the File Integrity Monitor subsection, you can configure control over changes in files that can signify a security breach on a protected device. |
Log Inspection | In the Log Inspection subsection, you can configure monitoring of the integrity of the protected device based on the results of an analysis of the Windows Event Log. |
Logs and notifications
Logs and Notifications settings
Section | Options |
Task logs | In the Task logs subsection, you can click the Settings button to configure the following settings:
|
Event notifications | In the Event notifications subsection, you can click the Settings button to configure the following settings:
|
Interaction with Administration Server | In the Interaction with Administration Server subsection, you can click the Settings button to select the types of objects that Kaspersky Industrial CyberSecurity for Nodes will report to the Administration Server. |
To view detailed information about Network Attached Storage Protection tasks, see Kaspersky Industrial CyberSecurity for Nodes Implementation Guide for Network Storages Protection.
Malfunction diagnosis
Crash diagnostics settings
Section | Options |
Troubleshooting settings | In the Troubleshooting settings section, you can configure the following settings:
For details on settings and their limitations, please see the description of how to configure local settings. You can set different values for the settings on a local device and in a group policy for multiple devices. Local settings inherit the group policy settings configured on the Kaspersky Security Center server. |
Dump file settings | In the Dump file settings section, you can configure the following settings:
For details on settings and their limitations, please see the description of how to configure local settings. You can set different values for the settings on a local device and in a group policy for multiple devices. Local settings inherit the values of group policy settings specified on the Kaspersky Security Center server. |
Revision history
In the Revision history section, you can manage revisions: compare with the current revision or other policy, add descriptions of revisions, save revisions to a file or perform a rollback.