To create a list of trusted devices, you must conduct an audit of external devices in your organization. To add a trusted device, you must select a connected device and assign the trusted status to the device. You can get a list of devices in the following ways:
In the Kaspersky Embedded Systems Security Console tree, select Computer Control → Device Control.
In the results pane of the Device Control node, click Properties.
The Properties:Device Control window opens.
Select the Device Control check box.
Under Operating mode for blocking rules, select Inform.
Save your changes.
As a result, Kaspersky Embedded Systems Security will log external device connection and disconnection events. You can then generate an equipment report and, having analyzed the report, add trusted devices.
In the Kaspersky Embedded Systems Security Console tree, select Automatic Rule Generation → Rule Generator for Device Control.
In the results pane of the Rule Generator for Device Control node, click Properties.
The Properties:Rule Generator for Device Control window opens.
In the Mode section, select the mode of the task:
Consider system data about all external devices that have ever been connected.
The application gets information about all devices that have been connected to the computer from operating system memory.
Consider currently connected external devices only.
The application gets information about devices that are connected when the task is started.
In the After task completes section, select application actions after the task is completed:
Add allowing rules to the list of Device Control rules. The list of device control rules is available in the Device Control settings.
If this check box is selected, the application adds the rules generated by the task to the list of Device Control rules based on the selected principle for adding rules.
If this check box is cleared, the application does not add the newly generated allowing rules to the list of Device Control rules. The application only exports rules to a file.
Principle of adding. A method used to add the newly generated allowing rules to the list of Device Control rules:
Add to existing rules. The application adds a rule to the list of existing rules. In this case, the application duplicates identical rules.
Replace existing rules. The application adds new rules instead of existing rules.
Merge with existing rules. The application adds a rule to the list of existing rules. In this case, the application merges identical rules.
Export allowing rules to file. The application exports allowing rules to the file specified in the field below. You can then import the file in the application settings on other computers to distribute the allowing rules. The file can also be used to back up the allowing rules.
Add protected device details to the file name. In addition to the date and time, the application adds the computer name to the exported file name. It is convenient if you collect allowing rules from several computers.
Save your changes.
As a result, Kaspersky Embedded Systems Security conducts an audit of external devices and saves the information in the registry of Kaspersky Security Center. The external device list is available when adding trusted devices.