In the Properties: <Policy name> window of an existing policy, you can configure:
General Kaspersky Embedded Systems Security settings.
Quarantine and Backup settings.
Trusted Zone, Real-Time Computer Protection, and Local Activity Control settings.
Level of detail for task logs.
User and administrator notifications about Kaspersky Embedded Systems Security events.
Access privileges for managing the application and the Kaspersky Security Service.
To configure the policy settings:
Expand the Managed devices node in the tree of the Administration Console of Kaspersky Security Center.
Expand the administration group for which you want to configure the associated policy settings, and open the Policies tab in the details pane.
Select the policy you want to configure and open the Properties: <Policy name> window using one of the following methods:
Selecting the Properties option in the policy context menu.
Clicking the Configure policy link in the right details pane of the selected policy.
Double-clicking the selected policy.
On the General tab in the Policy status section, enable or disable the policy. To do so, select one of the options below:
Active policy, if you want the policy to be applied on all protected devices within the selected administration group.
Inactive policy, if you want to activate the policy later on all protected devices within the selected administration group.
The Out-of-office policy setting is not available when you manage Kaspersky Embedded Systems Security.
In the Event configuration, Application settings, Supplementary, Logs and notifications, and Revision history sections, you can modify the application configuration (see table below).
In the Real-Time Computer Protection, Local activity control, Network activity control, and System inspection sections, configure the application settings and application launch settings (see the table below).
You can enable or disable the execution of any task on all protected devices within the administration group by means of a Kaspersky Security Center policy.
You can configure the application of policy settings on all network protected devices for each individual software component.
The configured settings are applied in the policy.