Kaspersky Industrial CyberSecurity for Networks

Obtaining reports

March 22, 2024

ID 236181

In Kaspersky Industrial CyberSecurity for Networks, you can generate reports based on templates to obtain information about devices, the statuses of devices and system security, monitored technological process parameters and system commands, and information about detected risks and interactions with third-party devices.

The application has two types of report templates:

  • System templates are created automatically during installation of the application. In the report templates table, system templates are displayed with the Shield icon. icon. You cannot delete system templates.

    Kaspersky Industrial CyberSecurity for Networks supports the following system templates for generating reports:

    • Inventory report.

      Report containing information about devices, monitored technological process parameters and system commands, utilized protocols, and detected risks on devices.

    • System security report.

      Report containing information about the security status of devices, registered events, detected risks, and interactions with devices of external networks.

    • Executive summary.

      Report containing concise information about devices and the security status of the system.

    • Full report.

      Report containing comprehensive information about devices and the security status of the system.

  • User-defined templates are created manually by duplicating templates. System templates and user-defined templates can be duplicated. Only users with the Administrator role can duplicate templates.

Data in reports is presented in separate information blocks. For each report, Kaspersky Industrial CyberSecurity for Networks uses a fixed set and layout of information blocks. The information blocks used in reports and their descriptions are presented in the table below.

Use of information blocks in reports

Name of information block

Inventory report

System security report

Executive summary

Full report

Device categories

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Device vendors

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Device operating systems

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Monitored technological process parameters

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

Devices with the most risks

A check box indicating the availability of an item.

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

Most vulnerable industrial devices

A check box indicating the availability of an item.

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

System command sources

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

Situational awareness

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A check box indicating the availability of an item.

A check box indicating the availability of an item.

New devices in the network

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

Protocols with the most traffic

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

Devices with the most connections to other nodes

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

Network traffic volume

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Common protocols

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Industrial protocols

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A check box indicating the availability of an item.

System command recipients

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

Device security statuses

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A check box indicating the availability of an item.

A check box indicating the availability of an item.

Distribution of devices by status

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

Statistics on events

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

Distribution of events by detection technologies

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

Devices with the most events

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

Most critical events

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

Most frequently triggered malicious activity detection rules

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

Unusual protocols in the industrial network

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

Devices with signs of access to public resources

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

Connections via remote control protocols

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

Modification of industrial device programs

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A dash indicating the absence of an item.

A check box indicating the availability of an item.

Active risks

A dash indicating the absence of an item.

A check box indicating the availability of an item.

A check box indicating the availability of an item.

A check box indicating the availability of an item.

You can manually start generating reports based on templates in the Reports section on the Report templates tab of the application web interface. Kaspersky Industrial CyberSecurity for Networks can also start generating reports according to a schedule. Only users with the Administrator role can configure template schedule settings.

Kaspersky Industrial CyberSecurity for Networks generates reports in PDF files that are no more than 10 MB in size, and sends the report files to the email addresses indicated in the report templates. You can view information about generated reports and export them to files on the Generated reports tab.

The Generated reports tab also displays the reports generated when working with security audit jobs. A user with the Administrator role starts generation of reports with the results of device scans as part of a security audit job, as well as reports on the starts of the security audit job in the Security audit section.

In this section:

Viewing the report templates table

Viewing report template details

Manually generating a report

Viewing the reports table

Exporting a report to a file

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.