Kaspersky Industrial CyberSecurity for Networks

Selecting sources of vulnerability data

March 22, 2024

ID 220694

When monitoring risks, the application detects vulnerabilities of devices by using information from the database of known vulnerabilities. Kaspersky experts upload vulnerability information to the database from various data sources.

By default, the application detects vulnerabilities of devices based on the information that has been uploaded to the database from all sources. If necessary, you can select relevant sources to detect vulnerabilities of devices based on the information from only these sources.

Only users with the Administrator role can select sources for device vulnerability detection.

To enable or disable use of sources for vulnerability detection:

  1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through the web interface using the Administrator account.
  2. In the Risks section, click the Sources of vulnerabilities button to open the window for selecting sources.
  3. Enable or disable the use of specific sources. The list contains all sources in the database of known vulnerabilities.
  4. Click the Apply button.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.