Network isolation

When integrated with Detection and Response solutions, a device can be isolated from the network as part of a threat response action.

Special considerations involved with network isolation

After enabling network isolation, the application severs all active network connections on the device and blocks all new TCP/IP network connections, except for the connections listed below:

Network isolation can be applied when the following conditions are met:

When integrating with Kaspersky Industrial CyberSecurity for Networks, a security officer can use the data sent to Kaspersky Industrial CyberSecurity for Networks to send a command to isolate a device from the network to Kaspersky Industrial CyberSecurity for Linux Nodes using the Kaspersky Industrial CyberSecurity for Networks console. The security officer can also send a command to Kaspersky Industrial CyberSecurity for Linux Nodes to disable network isolation of the device.

When integrated with Kaspersky Industrial CyberSecurity Endpoint Detection and Response, network isolation can be applied in one of the following modes:

You can check the device network isolation status and disable device network isolation on the command line.

An isolated device is automatically assigned the ISOLATED FROM NETWORK tag. This tag is automatically removed when network isolation is disabled. For general information on getting a list of isolated devices by tag, see the Kaspersky Industrial CyberSecurity Endpoint Detection and Response Help.

Manually disabling network isolation is possible regardless of whether integration with Detection and Response solutions is enabled, and regardless of whether a policy is applied to the device.

Network isolation limitations

When you use network isolation, we strongly recommended that you familiarize yourself with the relevant limitations.

For network isolation to work, the Kaspersky Industrial CyberSecurity for Linux Nodes application must be running. If Kaspersky Industrial CyberSecurity for Linux Nodes malfunctions (the application is not running), traffic blocking is not guaranteed when network isolation is enabled by Kaspersky Industrial CyberSecurity Endpoint Detection and Response.

DHCP and DNS are not automatically added to network isolation exclusions, so if the network address of a resource changes during network isolation, Kaspersky Industrial CyberSecurity for Linux Nodes cannot gain access to it.

Excluding a process from network isolation by name is supported on devices with kernel versions from 4.18 to 6.6 that support eBPF with BTF.

When using network isolation, it is recommended to:

In this section

Manually enabling or disabling the network isolation of the device in the Web Console

Configuring the duration of automatic network isolation

Manually configuring network isolation

Configuring exclusions from network isolation in the Web Console

Managing the network isolation of a device on the command line

Page top