Kaspersky Industrial CyberSecurity for Networks

Application functions that are available when connected to the Server through the web interface

March 22, 2024

ID 177330

This article presents the application functions that are available to users when connected to the Server through the web interface (see the table below).

Available application functions depending on the user role

Application function

Administrator

Operator

Monitoring the application state when connected through the web interface

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Viewing application messages

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Enabling and disabling the user activity audit

A check box indicating the availability of an item.

 

Viewing user activity audit entries

A check box indicating the availability of an item.

 

Viewing information about nodes with application components installed and about network interfaces on nodes

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Running an application module integrity check when connected to the Server through the web interface

A check box indicating the availability of an item.

 

Managing deployment settings on nodes

A check box indicating the availability of an item.

 

Viewing information about an added license key

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Adding a license key

A check box indicating the availability of an item.

 

Removing a license key

A check box indicating the availability of an item.

 

Configuring automatic updates

A check box indicating the availability of an item.

 

Manually starting an update

A check box indicating the availability of an item.

 

Viewing information about update installation

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Viewing information about application user accounts

A check box indicating the availability of an item.

 

Creating an application user account

A check box indicating the availability of an item.

 

Changing the role of an application user account

A check box indicating the availability of an item.

 

Deleting an application user account

A check box indicating the availability of an item.

 

Changing a user account password

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Viewing the devices table

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Viewing address space rules

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Viewing address space subnets

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Viewing information about devices with IP addresses from the selected subnets

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Viewing device information

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Selecting sources for device vulnerability monitoring

A check box indicating the availability of an item.

 

Configuring address spaces

A check box indicating the availability of an item.

 

Manually adding devices

A check box indicating the availability of an item.

 

Merging devices

A check box indicating the availability of an item.

 

Deleting devices

A check box indicating the availability of an item.

 

Changing the statuses of devices

A check box indicating the availability of an item.

 

Creating a device group tree

A check box indicating the availability of an item.

 

Automatic grouping of devices based on a specific criterion

A check box indicating the availability of an item.

 

Manually arranging devices into groups

A check box indicating the availability of an item.

 

Adding and removing labels for devices

A check box indicating the availability of an item.

 

Editing device information

A check box indicating the availability of an item.

 

Adding, editing and deleting custom fields for a device

A check box indicating the availability of an item.

 

Configuring Process Control

A check box indicating the availability of an item.

 

Monitoring process parameter values

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Viewing Interaction Control rules in the table of allow rules

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Manually creating Interaction Control rules

A check box indicating the availability of an item.

 

Editing Interaction Control rule settings

A check box indicating the availability of an item.

 

Enabling and disabling Interaction Control rules

A check box indicating the availability of an item.

 

Deleting Interaction Control rules

A check box indicating the availability of an item.

 

Enabling and disabling sets of Intrusion Detection rules

A check box indicating the availability of an item.

 

Loading and replacing user-defined sets of Intrusion Detection rules

A check box indicating the availability of an item.

 

Removing user-defined sets of Intrusion Detection rules

A check box indicating the availability of an item.

 

Managing the settings for storing log entries in the database

A check box indicating the availability of an item.

 

Managing the settings for saving traffic in the database

A check box indicating the availability of an item.

 

Managing the settings for saving traffic dump files

A check box indicating the availability of an item.

 

Managing the settings for storing risks

A check box indicating the availability of an item.

 

Managing the settings for storing report files

A check box indicating the availability of an item.

 

Changing the logging level for processes

A check box indicating the availability of an item.

 

Configuring operation with EPP applications

A check box indicating the availability of an item.

 

Managing response actions

A check box indicating the availability of an item.

 

Enabling and configuring interaction with Kaspersky Security Center

A check box indicating the availability of an item.

 

Managing connectors

A check box indicating the availability of an item.

 

Adding and deleting connector types

A check box indicating the availability of an item.

 

Performing active polling of devices

A check box indicating the availability of an item.

 

Managing sets of security audit rules

A check box indicating the availability of an item.

 

Managing security audit jobs

A check box indicating the availability of an item.

 

Viewing details on the runs of security audit jobs

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Managing account credentials secrets for remote connections

A check box indicating the availability of an item.

 

Configuring event types

A check box indicating the availability of an item.

 

Exporting a security policy to a file

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Importing a security policy from a file

A check box indicating the availability of an item.

 

Clearing the current security policy

A check box indicating the availability of an item.

 

System monitoring in online mode

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Working with the network interactions map

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Moving nodes and groups to other groups on the network interaction map

A check box indicating the availability of an item.

 

Downloading traffic when working with the network interaction map

A check box indicating the availability of an item.

 

Viewing network session details

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Downloading network session traffic

A check box indicating the availability of an item.

 

Forming a topology map

A check box indicating the availability of an item.

 

Viewing details about objects on the topology map

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Monitoring events and incidents

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Managing reports and report templates

A check box indicating the availability of an item.

 

Manually generating reports

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Exporting reports to a file

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Monitoring risks

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.