General
In the General section, you can configure the following policy settings:
Event configuration
In the Event configuration section, you can configure settings for the following event categories:
You can use the Properties button to configure the following settings for the selected events:
Application settings
Settings of the Application Settings section
Section |
Options |
Scalability and interface |
In the Scalability and interface subsection, you can click the Settings button to configure the following settings:
|
Security |
In the Security subsection, you can click the Settings button to configure the following settings:
|
Connections |
In the Connections subsection, you can use the Settings button to configure the following proxy server settings for connecting with update servers, activation servers, and KSN:
|
Run system tasks |
In the Run system tasks subsection, you can use the Settings button to allow or block the start of the following system tasks according to a schedule configured on protected devices:
|
Supplementary
Settings of the Supplementary section
Section |
Options |
Trusted Zone |
Click the Settings button on the Trusted Zone subsection to configure the following Trusted Zone application settings:
|
Removable Drives Scan |
In the Removable Drives Scan subsection, you can use the Settings button to configure scan settings for removable drives. |
User access permissions for application management |
In the User access permissions for application management subsection, you can configure user rights and user group rights to manage Kaspersky Embedded Systems Security. |
User access permissions for Security Service management |
In the User access permissions for Security Service management subsection, you can configure user rights and user group rights to manage the Kaspersky Security Service. |
Storages |
In the Storages subsection, click the Settings button to configure the following Quarantine, Backup and Blocked Hosts settings:
|
Real-Time Computer Protection
Settings of the Real-Time Server Protection section
Section |
Options |
Real-Time File Protection |
In the Real-Time File Protection subsection, you can click the Settings button to configure the following task settings:
|
KSN Usage |
In the KSN Usage subsection, you can click the Settings button to configure the following task settings:
|
Exploit Prevention |
In the Exploit Prevention subsection, you can click the Settings button to configure the following task settings:
|
Local activity control
Settings of the Local Activity Control section
Section |
Options |
Applications Launch Control |
In the Applications Launch Control subsection, you can use the Settings button to configure the following task settings:
|
Device control |
In the Device control subsection, you can click the Settings button to configure the following task settings:
|
Network activity control
Settings of the Network activity control section
Section |
Options |
Firewall Management |
In the Firewall Management subsection, you can click the Settings button to configure the following task settings:
|
System Inspection
Settings of the System Inspection section
Section |
Options |
File Integrity Monitor |
In the File Integrity Monitor subsection, you can configure control over changes in files that can signify a security breach on a protected device. |
Log Inspection |
In the Log Inspection section, you can configure a protected device integrity monitoring based on the results of an analysis of the Windows Event Log. |
Logs and notifications
Settings of the Logs and Notifications section
Section |
Options |
Task logs |
In the Task logs subsection, you can click the Settings button to configure the following settings:
|
Event notifications |
In the Event notifications subsection, you can click the Settings button to configure the following settings:
|
Interaction with Administration Server |
In the Interaction with Administration Server subsection, you can click the Settings button to select the types of objects that Kaspersky Embedded Systems Security will report to Administration Server. |
Revision history
In the Revision history section, you can manage revisions: compare with the current revision or other policy, add descriptions of revisions, save revisions to a file or perform a rollback.
Page top