When integrated with Detection and Response solutions, a device can be isolated from the network as part of a threat response action.
Special considerations involved with network isolation
After enabling network isolation, the application severs all active network connections on the device and blocks all new TCP/IP network connections, except for the connections listed below:
Network isolation can be applied when the following conditions are met:
When integrating with Kaspersky Industrial CyberSecurity for Networks, a security officer can use the data sent to Kaspersky Industrial CyberSecurity for Networks to send a command to isolate a device from the network to Kaspersky Industrial CyberSecurity for Linux Nodes using the Kaspersky Industrial CyberSecurity for Networks console. The security officer can also send a command to Kaspersky Industrial CyberSecurity for Linux Nodes to disable network isolation of the device.
When integrated with Kaspersky Industrial CyberSecurity Endpoint Detection and Response, network isolation can be applied in one of the following modes:
You can manage the following automatic network isolation settings:
If a device that is being isolated automatically is subject to a policy, the settings specified in the policy are applied. If a policy is not applied, the settings specified in the device properties are applied.
You can manage the following manual network isolation settings:
You can check the device network isolation status and disable device network isolation on the command line.
An isolated device is automatically assigned the ISOLATED FROM NETWORK tag. This tag is automatically removed when network isolation is disabled. For general information on getting a list of isolated devices by tag, see the Kaspersky Industrial CyberSecurity Endpoint Detection and Response Help.
Manually disabling network isolation is possible regardless of whether integration with Detection and Response solutions is enabled, and regardless of whether a policy is applied to the device.
Network isolation limitations
When you use network isolation, we strongly recommended that you familiarize yourself with the relevant limitations.
For network isolation to work, the Kaspersky Industrial CyberSecurity for Linux Nodes application must be running. If Kaspersky Industrial CyberSecurity for Linux Nodes malfunctions (the application is not running), traffic blocking is not guaranteed when network isolation is enabled by Kaspersky Industrial CyberSecurity Endpoint Detection and Response.
DHCP and DNS are not automatically added to network isolation exclusions, so if the network address of a resource changes during network isolation, Kaspersky Industrial CyberSecurity for Linux Nodes cannot gain access to it.
Excluding a process from network isolation by name is supported on devices with kernel versions from 4.18 to 6.6 that support eBPF with BTF.
When using network isolation, it is recommended to:
If it is impossible to use Kaspersky Security Center as a proxy server, you must configure the proxy server that you want to use and add it to exclusions.