At this step, the possibility of using various file operation interception mechanisms is determined. If the operating system of the device supports fanotify, the application uses fanotify to intercept system events.
If the operating system on the device does not support fanotify, the application uses the kernel module for File Threat Protection. If all the dependencies are available, the compilation of the kernel module is started automatically when File Threat Protection starts.
If any dependencies are not found on the device, the Kaspersky Industrial CyberSecurity for Linux Nodes application suggests installing the relevant packages. If the package download fails, an error message will be displayed.
Page top