General
In the General section, you can configure the following policy settings:
Event notification
In the Event notification section, you can configure settings for the following event categories:
You can use the Properties button to configure the following settings for the selected events:
Application settings
Settings of the Application Settings section
Section |
Options |
Scalability and interface |
In the Scalability and interface subsection, you can click the Settings button to configure the following settings:
|
Security |
In the Security subsection, you can click the Settings button to configure the following settings:
|
Connections |
In the Connections subsection, you can use the Settings button to configure the following proxy server settings for connecting with update servers, activation servers, and KSN:
|
Run system tasks |
In the Run system tasks subsection, you can use the Settings button to allow or block the start of the following system tasks according to a schedule configured on protected devices:
|
Supplementary
Settings of the Supplementary section
Section |
Options |
Trusted Zone |
Click the Settings button on the Trusted Zone subsection to configure the following Trusted Zone application settings:
|
Removable Drives Scan |
In the Removable Drives Scan subsection, you can use the Settings button to configure scan settings for removable drives. |
User access permissions for application management |
In the User access permissions for application management subsection, you can configure user rights and user group rights to manage Kaspersky Embedded Systems Security. |
User access permissions for Security Service management |
In the User access permissions for Security Service management subsection, you can configure user rights and user group rights to manage the Kaspersky Security Service. |
Storages |
In the Storages subsection, click the Settings button to configure the following Quarantine, Backup and Blocked Hosts settings:
|
Real-time computer protection
Settings of the Real-Time Computer Protection section
Section |
Options |
Real-Time File Protection |
In the Real-Time File Protection subsection, you can click the Settings button to configure the following task settings:
|
KSN Usage |
In the KSN Usage subsection, you can click the Settings button to configure the following task settings:
|
Exploit Prevention |
In the Exploit Prevention subsection, you can click the Settings button to configure the following task settings:
|
Local activity control
Settings of the Local Activity Control section
Section |
Options |
Applications Launch Control |
In the Applications Launch Control subsection, you can use the Settings button to configure the following task settings:
|
Device Control |
In the Device Control subsection, you can click the Settings button to configure the following task settings:
|
Network activity control
Settings of the Network activity control section
Section |
Options |
Firewall Management |
In the Firewall Management subsection, you can click the Settings button to configure the following task settings:
|
System inspection
Settings of the System Inspection section
Section |
Options |
File Integrity Monitor |
In the File Integrity Monitor subsection, you can configure control over changes in files that can signify a security breach on a protected device. |
Log Inspection |
In the Log Inspection section, you can configure protected device integrity monitoring based on the results of an analysis of the Windows Event Log. |
Logs and notifications
Settings of the Logs and Notifications section
Section |
Options |
Task logs |
In the Task logs subsection, you can click the Settings button to configure the following settings:
|
Event notifications |
In the Event notifications subsection, you can click the Settings button to configure the following settings:
|
Interaction with Administration Server |
In the Interaction with Administration Server section, you can click the Settings button to select the types of objects (including Quarantine and Backup objects) that Kaspersky Embedded Systems Security will report to Administration Server. |
Revision history
In the Revision history section, you can manage revisions: compare with the current revision or other policy, add descriptions of revisions, save revisions to a file or perform a rollback.
Page top