Configuring Network Activity Scanner for virtual machines

25 March 2022

ID 67112

The suspicious network activity detection functionality is available only if you are using the application under an enterprise license.

To configure the Network Activity Scanner settings for protected virtual machines:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the console tree, perform one of the following actions:
    • If you want to configure the operating settings of SVMs of one KSC cluster, in the Managed devices folder of the console tree select the administration group containing the KSC cluster.
    • If you want to configure the operating settings of SVMs of all KSC clusters, select the Managed devices folder.
  3. In the workspace, select the Policies tab.
  4. Select a policy in the list of policies and double-click the policy to open the Properties: <Policy name> window.
  5. In the policy properties window, select the Intrusion Prevention section and click the Settings button.

    The Network activity scanner parameters window opens.

  6. Specify the application categories whose signs of network activity should be detected by Kaspersky Security:
    • Adware
    • Other programs

    Kaspersky Security always detects network activity that is typical of such malware as viruses, worms and Trojans in the traffic of protected virtual machines.

  7. If Kaspersky Security detects network activity that you believe is not a sign of an intrusion into the protected infrastructure, you can configure a list of rules that Kaspersky Security will not apply to detect suspicious network activity in the traffic of protected virtual machines.

    To add a network activity detection rule to the list, click the Add button located above the list, and in the string of the list enter the rule ID in the following format: <number>:<number>:<number>.

    You can view information about an applied rule in the text of the event that was sent to Kaspersky Security Center when it detected the suspicious network activity.

  8. In the Network activity scanner parameters window, click OK.
  9. Select an action in the Action upon detecting suspicious activity list.

    If network protection is deployed in monitoring mode, the Ignore action is applied when suspicious network activity is detected, regardless of the selected action.

  10. If required, change the value of the setting On detection of a network attack or suspicious network activity, block traffic from IP address for N minutes.
  11. If necessary, configure network threat protection exclusion rules that Kaspersky Security will use to exclude traffic of specific IP addresses from scans or apply special actions when processing such traffic.
  12. In the Properties: <Policy name> window, click OK.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.