You can configure policy settings in the sections and subsections of the policy properties window. For information about configuring general policy settings and event settings, refer to Kaspersky Security Center Help section.
Policy settings
Section |
Subsections |
|---|---|
Essential Threat Protection |
File Threat Protection. In this subsection, you can manage File Threat Protection. File Threat Protection exclusions. In this subsection, you can configure exclusions that apply to the File Threat Protection component. Firewall Management. In this subsection, you can configure firewall management settings. Web Threat Protection. In this subsection, you can configure Web Threat Protection settings. Network Threat Protection. In this subsection, you can configure Network Threat Protection settings. |
Advanced Threat Protection |
Kaspersky Security Network. In this subsection, you can configure the use of Kaspersky Security Network in the operation of Kaspersky Industrial CyberSecurity for Linux Nodes. Anti-Cryptor. In this subsection, you can configure the settings for protection against remote malicious encryption. Behavior Detection. In this subsection, you can configure the settings for analyzing the behavior of applications. |
Detection and Response |
Integration with KICS for Networks. In this subsection, you can enable and disable integration with Kaspersky Industrial CyberSecurity for Networks and configure integration settings. Managed Detection and Response. In this subsection, you can enable and disable integration with Kaspersky Managed Detection and Response and upload the MDR BLOB file required for integration. |
Security Controls |
Application Control. In this subsection, you can configure Application Control settings. System Integrity Monitoring. In this subsection, you can configure System Integrity Monitoring settings. Device Control. In this subsection, you can configure Device Control settings. Web Control. In this subsection, you can configure Web Control settings. |
Local Tasks |
Task Management. In this subsection, you can configure permissions for users to manage tasks. Removable Drives Scan. In this subsection, you can configure the settings for scanning removable drives when they are connected to a protected device. |
General settings |
Proxy server settings. In this subsection, you can configure the proxy server settings if users access the internet from client devices through a proxy server. Application settings. In this subsection, you can configure the following settings:
Container Scan settings. In this subsection, you can manage the Container Monitoring component. Network settings In this subsection, you can configure the settings for scanning network traffic. Global exclusions. In this subsection, you can configure:
Process memory exclusion. In this subsection, you can configure exclusion of process memory from scans. Storage settings. In this subsection, you can configure: |