If this check box is selected, Kaspersky Embedded Systems Security uses the heuristic analyzer to detect abnormal activity on the protected device.
If this check box is cleared the heuristic analyzer is not used and Kaspersky Embedded Systems Security applies preset or custom rules to detect abnormal activity.
The check box is selected by default.
For the task to run, at least one Log Inspection rule must be selected.
Select the rules you want to apply from the list of predefined rules:
There are patterns of a possible brute-force attack in the system.
There are patterns of a possible Windows Event log abuse.
Atypical actions detected on behalf of a new service installed.
Atypical logon that uses explicit credentials detected.
There are patterns of a possible Kerberos forged PAC (MS14-068) attack in the system.
Atypical actions detected directed at a privileged built-in group Administrators.
There is an atypical activity detected during a network logon session.
To configure the selected rules, go to the Extended tab.
In the Brute-force attack detection section, set the number of attempts and time frame used as triggers by the heuristic analyzer.
In the Network logon section, indicate the start and end of the time interval during which Kaspersky Embedded Systems Security treats sign-in attempts as abnormal activity.
Select the Exclusions tab.
Perform the following actions to add trusted users:
Click the Browse button.
Select a user.
Click OK.
The selected user is added to the list of trusted users.
Perform the following actions to add trusted IP addresses:
Enter the IP address.
Click the Add button.
The entered IP address is added to the list of trusted IP addresses.
Select the Schedule and Advanced tabs to configure the task start schedule.