The check box enables or disables adding hosts showing activity typical of network attacks to the list of blocked hosts.
If this mode is selected, Kaspersky Embedded Systems Security scans inbound network traffic for activity that is typical of network attacks, logs events about detected activity, and adds IP addresses of hosts showing activity typical of network attacks to the list of blocked hosts.
You can restore access to blocked hosts, and specify the number of days, hours and minutes after which hosts regain access to network file resources after being blocked by configuring the Blocked Hosts storage settings.
If this mode is selected, Kaspersky Embedded Systems Security scans inbound network traffic for activity that is typical of network attacks, logs events about detected activity, but doesn't block network activity from the attacking computer.
If this mode is selected, Kaspersky Embedded Systems Security scans inbound network traffic for activity that is typical of network attacks, but doesn't log events about detected activity and doesn't block network activity from the attacking computer.
For example, you can use this mode in case of a decrease in the protected device's performance.
Exclusions
The exclusion list is not applied.
Specify areas that you want to exclude from the task protection scope.
Schedule settings
By default, the Network Threat Protection task starts automatically when Kaspersky Embedded Systems Security starts.