If this check box is selected, Kaspersky Embedded Systems Security for Windows uses the heuristic analyzer to detect abnormal activity on the protected device.
If this check box is cleared the heuristic analyzer is not used and Kaspersky Embedded Systems Security for Windows applies preset or custom rules to detect abnormal activity.
By default, the check box is cleared.
For the task to run, at least one Log Inspection rule must be selected.
Select the rules you want to apply from the list of predefined rules:
There are patterns of a possible brute-force attack in the system.
There are patterns of a possible Windows Event log abuse.
Atypical actions detected on behalf of a new service installed.
Atypical logon that uses explicit credentials detected.
There are patterns of a possible Kerberos forged PAC (MS14-068) attack in the system.
Atypical actions detected directed at a privileged built-in group Administrators.
There is an atypical activity detected during a network logon session.
To configure the selected rules, click the Advanced settings button.
The Log Inspection window opens.
In the Brute-force attack detection section, set the number of attempts and time frame used as triggers by the heuristic analyzer.
In the Network logon detection section, specify the start and end of the time interval. Kaspersky Embedded Systems Security for Windows considers logon attempts made during this interval to be as anomalous activity.
Select the Exclusions tab.
Perform the following actions to add trusted users:
Click the Browse button.
Select a user.
Click the OK button.
The selected user is added to the list of trusted users.
Perform the following actions to add trusted IP addresses:
Enter the IP address.
Click the Add button.
The entered IP address is added to the list of trusted IP addresses.