To configure general File Integrity Monitor task settings:
Expand the Managed devices node in the Kaspersky Security Center Administration Console tree.
Select the administration group for which you want to configure application settings.
Perform one of the following actions in the details pane of the selected administration group:
To configure application settings for a group of protected devices, select the Policies tab and open the Properties: <Policy name> window.
To configure the application for a single protected device, select the Devices tab and open the Application settings window.
If an active Kaspersky Security Center policy is applied to a device and blocks changes to application settings, then these settings cannot be edited in the Application settings window.
In the System inspection section in the File Integrity Monitor subsection, click the Settings button.
The File Integrity Monitor window opens.
In the File operations monitoring settings tab in the window that appears, configure the following settings:
The check box enables or disables monitoring of the file operations specified in the File Integrity Monitor task settings when the task is not running for any reason (removal of a hard disk, task stopped by user, software error).
If the check box is selected, Kaspersky Embedded Systems Security will record events in all monitoring scopes when the File Integrity Monitor task is not running.
If the check box is cleared, the application will not log file operations in monitoring scopes when the task is not running.
If the Apply Trusted Zone check box is selected, the Exclusions and Trusted processes configured in the Trusted Zone are applied to the monitoring scope in addition to the configured rule.
If the Apply Trusted Zone check box is cleared, the Exclusions and Trusted processes configured in the Trusted Zone are not applied to the monitoring scope.
On the Task management tab, configure the task settings for starting the task on a schedule.
Click OK to save the changes.
Kaspersky Embedded Systems Security immediately applies the new settings to the running task. Information about the date and time of settings modification are saved in the system audit log.