Policy settings in the Web Console

You can configure policy settings on the Application settings tab of the policy properties window. For information about configuring general policy settings and event settings, refer to Kaspersky Security Center Help section.

Policy settings

Section

Subsection

Essential Threat Protection

File Threat Protection. In this subsection, you can manage File Threat Protection.

File Threat Protection exclusions. In this subsection, you can configure exclusions that apply to the File Threat Protection component.

Firewall Management. In this subsection, you can configure firewall management settings.

Web Threat Protection. In this subsection, you can configure Web Threat Protection settings.

Network Threat Protection. In this subsection, you can configure Network Threat Protection settings.

Advanced Threat Protection

Kaspersky Security Network. In this subsection, you can configure the use of Kaspersky Security Network in the operation of Kaspersky Industrial CyberSecurity for Linux Nodes.

Anti-Cryptor. In this subsection, you can configure the settings for protection against remote malicious encryption.

Behavior Detection. In this subsection, you can configure the settings for analyzing the behavior of applications.

Detection and Response

Managed Detection and Response. In this subsection, you can enable and disable integration with Kaspersky Managed Detection and Response and upload the MDR BLOB file required for integration.

Industrial CyberSecurity Endpoint Detection and Response. In this subsection, you can enable and disable the ICS EDR component and configure the settings for integration with Kaspersky Industrial CyberSecurity Endpoint Detection and Response.

Integration with KICS for Networks. In this subsection, you can enable and disable integration with Kaspersky Industrial CyberSecurity for Networks and configure integration settings.

Security Controls

Application Control. In this subsection, you can configure Application Control settings.

Device Control. In this subsection, you can configure Device Control settings.

System Integrity Monitoring. In this subsection, you can configure System Integrity Monitoring settings.

Web Control. In this subsection, you can configure Web Control settings.

Local Tasks

Task Management. In this subsection, you can configure permissions for users to manage tasks.

Removable Drives Scan. In this subsection, you can configure the settings for scanning removable drives when they are connected to a protected device.

General settings

Proxy server settings. In this subsection, you can configure the proxy server settings if users access the internet from client devices through a proxy server.

Application settings. In this subsection, you can configure the following settings:

Container Scan settings. In this subsection, you can manage the Container Monitoring component.

Network settings In this subsection, you can configure the settings for scanning network traffic.

Global exclusions. In this subsection, you can configure:

Storage settings. In this subsection, you can configure:

Page top