To add hosts showing any malicious or encrypting activity to the Blocked Hosts storage and block access to network file resources for those hosts, at least one of the following tasks must run in the active mode:
Real-Time File Protection
Network Threat Protection
Configure the Real-Time File Protection task:
In the Kaspersky Security Center Administration Console tree, expand the Managed devices node.
Select the Policies tab and open <Policy name> >Real-time computer protection > Settings in the Real-Time File Protection block.
The Real-time computer protection window opens.
In the Integration with other components section, select the List hosts showing malicious activity as untrusted check box if you want Kaspersky Embedded Systems Security to block access to network file resources for hosts on which malicious activity is detected while the Real-Time File Protection task is running.
If the task has not been started, open the Task management tab:
Select the Run by schedule check box.
Select the At application launch frequency in the drop-down list.
In the Real-time computer protection window, click OK.
The newly configured settings are saved.
Configure the Network Threat Protection task:
Expand the Managed devices node in the Kaspersky Security Center Administration Console tree.
Select the administration group for which you want to configure the task.
Select the Policies tab.
Double-click the policy name you want to configure.
In the Properties: <Policy name> window that opens, select the section.
Click the Settings button in the Network Threat Protection subsection.
The check box enables or disables adding hosts showing activity typical of network attacks to the list of blocked hosts.
If this mode is selected, Kaspersky Embedded Systems Security scans inbound network traffic for activity that is typical of network attacks, logs events about detected activity, and adds IP addresses of hosts showing activity typical of network attacks to the list of blocked hosts.
You can restore access to blocked hosts, and specify the number of days, hours and minutes after which hosts regain access to network file resources after being blocked by configuring the Blocked Hosts storage settings.
If the task has not been started, open the Task management tab:
Select the Run by schedule check box.
Select the At application launch frequency in the drop-down list.