The following application tasks are provided for managing Kaspersky Industrial CyberSecurity for Linux Nodes using the command line:
File Threat Protection. This task allows you to enable or disable File Threat Protection in real time and defines the settings for the File Threat Protection component. The task is started automatically at application startup if you selected the Only File Threat Protection in "Notify only" mode (PROTECTION_MODE=OAS_Notify) or Only File Threat Protection (PROTECTION_MODE=OAS_Block) operating mode is enabled.
Malware Scan. This task allows you to scan file system objects for malware on demand and defines the settings for the scan. You can use this task to perform a full or custom scan of the device.
Critical Areas Scan. This task allows you to run a critical areas scan of the operating system on demand and defines the settings for the scan.
Custom file scan. This task is designed for configuring and storing settings that are used when scanning the specified files and directories using the kics-control --scan-file command. As a result of the command execution, the application creates and starts a temporary file scan task.
Container Scan. This task allows you to scan containers and images on demand and defines the settings for the scan.
Custom Container Scan. This task is designed for configuring and storing settings that are used when scanning the specified containers and images using the kics-control [-T] --scan-container command. As a result of the command execution, the application creates and starts a temporary Container Scan task.
Removable Drives Scan. This task allows you to monitor the connection of removable media to the device in real time and defines the settings of the Removable Drives Scan and the scan of its boot sectors for malware.
Web Threat Protection. This task allows you to enable or disable Web Threat Protection and defines the settings for the Web Threat Protection component.
Network Threat Protection. This task allows you to enable or disable Network Threat Protection and defines the settings for the Network Threat Protection component.
Anti-Cryptor. This task allows you to enable or disable the protection of files from remote malicious encryption and defines the settings for the Anti-Cryptor component.
Firewall Management. This task allows you to enable or disable firewall management and defines the network connection control settings on the device.
Application Control. This task allows you to enable or disable Application Control and defines the settings of the Application Control component.
System Integrity Monitoring. This task allows you to perform real-time monitoring of the actions performed with objects from the monitoring scope specified in the System Integrity Monitoring component settings.
System Integrity Check. This task allows you to check for changes in files and directories that you have included in the monitoring scope, by comparing the current state of the monitored object with a previously recorded state.
Backup management. This task provides the capability to save backup copies of files to the Backup located on the device. The task starts automatically when the application starts, and it resides in the device operating memory. The task cannot be started, stopped, or deleted.
Licensing. This task provides the capability to activate an application installed on the device. The task starts automatically when the application starts, and it resides in the device operating memory. The task has no settings; license keys are managed using special management commands. The task cannot be started, stopped, or deleted.
Each application task has a name used on the command line, an ID, and a type (see the table below).
IDs are unique for all tasks, including deleted tasks. The application does not reuse the identifiers of the deleted tasks. The identifier of a new task is the next successive number to the identifier of the latest created task.
Task names are not case-sensitive.
During installation of the application, predefined tasks are created. These tasks cannot be deleted. Each predefined task has a name and ID.
Tasks that you create while working with the application are called user tasks. When you create the task, you specify the name for it. IDs for user tasks are defined and assigned by the application when the task is created. IDs for user tasks are starting from 100.
During operation, the application creates temporary scan tasks. Temporary task names and IDs are assigned by the application. Temporary tasks are automatically deleted when completed.