To optimize the performance of Kaspersky Industrial CyberSecurity for Linux Nodes and reduce the impact on the performance of industrial applications running on hosts, we recommend configuring exclusions for industrial applications (hereinafter also referred to as "industrial software"). You can use industrial software exclusion profiles to add industrial software processes and files to the lists of trusted processes and exclusions from scanning.
The application distribution kit includes predefined exclusion profiles for industrial software. Each profile contains a number of settings that allow configuring exclusions for a certain type of industrial applications. A profile can contain exclusions for processes, files, and directories associated with applications of this type.
As a result of importing a predefined profile, mount point exclusions, File Threat Protection, and Behavior Detection exclusions may be added to the application settings (depending on the exclusions specified in the profile).
The application comes with predefined exclusion profiles for the following industrial software.
Profile code |
Profile name |
Industrial software name |
|---|---|---|
Siemens-Spectrum-Power-7 |
Siemens Spectrum Power 7 |
Siemens Spectrum Power 7 on Oracle |
Sirius-IS |
Sirius-IS |
Sirius-IS |
KOTMI-14 |
SP "KOTMI-14" |
KOTMI 14 v.2.3 |
S-Platform |
SP "S-Platform" |
S-Platform v.2.3 |
Incont-SCADA |
Incont SCADA |
Incont SCADA based on the Alpha platform, v1.00 |
SP-Comita-Digital-Platform |
SP Comita Digital Platform |
SP Comita Digital Platform |
SP-Extremum |
SP Extremum |
SP Extremum |
Monitor-Electric-SK-11 |
Monitor Electric SK-11 |
SK 11 v11.7.1.6 |
SuperSCADA-2024 |
SuperSCADA 2024 |
SuperSCADA 2024 |
KASKAD-Digital-318 |
KASKAD Digital 3.18 |
KASKAD Digital v3.18 |
ARBITR |
ARBITR |
ARBITR |
EliCont-CS |
EliCont-CS |
EliCont-CS v2.5.0 |
A-SOFT-SCADA |
A-SOFT SCADA |
A-SOFT |
NaftaProcess-DCS |
NaftaProcess DCS |
NaftaProcess |
WebScadaMT |
WebScadaMT |
WebScadaMT (v4.8.1.37493) |
TREI |
TREI |
TREI |
KRUG-2000 |
KRUG-2000 |
KRUG-2000 |
EKRA-ASMIU |
EKRA (ASMIU) |
EKRA (ASMIU) |
EKRA-SMS |
EKRA (EKRASMS, EKRASMS-SP_Linux) |
EKRA (EKRASMS, EKRASMS-SP_Linux) |
You can import a predefined exclusion profile during the initial configuration of the application in one of the following ways:
You can also import predefined exclusion profiles after installing the application. Import is performed in policy settings using the Web Console or the Administration Console.
If the exclusion profile being imported contains mount point exclusions, you need to ensure that the excluded mount points exist, or add new mount point settings to the /etc/fstab configuration file. The list of mount points added to exclusions is displayed only when importing an exclusion profile during the initial configuration of the application in interactive mode. If you import a predefined exclusion profile in any other way, after adding exclusions to the application, you can view the added mount point exclusions in the policy using the Web Console or Administration Console or in the general application settings on the command line (the ExcludedMountPoint.item_# parameter).
You can also configure industrial software exclusions using custom industrial software exclusion profiles. If you have exclusions configured for processes, files, and directories associated with industrial applications on your devices, you can export this exclusion profile to a file. A custom exclusion profile can be saved in a JSON file using the Web Console or Administration Console. You can then import the saved exclusion profile into Kaspersky Industrial CyberSecurity for Linux Nodes settings on other devices using the Web Console, Administration Console, or the command line.