Configuring industrial software exclusions

To optimize the performance of Kaspersky Industrial CyberSecurity for Linux Nodes and reduce the impact on the performance of industrial applications running on hosts, we recommend configuring exclusions for industrial applications (hereinafter also referred to as "industrial software"). You can use industrial software exclusion profiles to add industrial software processes and files to the lists of trusted processes and exclusions from scanning.

The application distribution kit includes predefined exclusion profiles for industrial software. Each profile contains a number of settings that allow configuring exclusions for a certain type of industrial applications. A profile can contain exclusions for processes, files, and directories associated with applications of this type.

As a result of importing a predefined profile, mount point exclusions, File Threat Protection, and Behavior Detection exclusions may be added to the application settings (depending on the exclusions specified in the profile).

The application comes with predefined exclusion profiles for the following industrial software.

Profile code

Profile name

Industrial software name

Siemens-Spectrum-Power-7

Siemens Spectrum Power 7

Siemens Spectrum Power 7 on Oracle

Sirius-IS

Sirius-IS

Sirius-IS

KOTMI-14

SP "KOTMI-14"

KOTMI 14 v.2.3

S-Platform

SP "S-Platform"

S-Platform v.2.3

Incont-SCADA

Incont SCADA

Incont SCADA based on the Alpha platform, v1.00

SP-Comita-Digital-Platform

SP Comita Digital Platform

SP Comita Digital Platform

SP-Extremum

SP Extremum

SP Extremum

Monitor-Electric-SK-11

Monitor Electric SK-11

SK 11 v11.7.1.6

SuperSCADA-2024

SuperSCADA 2024

SuperSCADA 2024

KASKAD-Digital-318

KASKAD Digital 3.18

KASKAD Digital v3.18

ARBITR

ARBITR

ARBITR

EliCont-CS

EliCont-CS

EliCont-CS v2.5.0

A-SOFT-SCADA

A-SOFT SCADA

A-SOFT

NaftaProcess-DCS

NaftaProcess DCS

NaftaProcess

WebScadaMT

WebScadaMT

WebScadaMT (v4.8.1.37493)

TREI

TREI

TREI

KRUG-2000

KRUG-2000

KRUG-2000

EKRA-ASMIU

EKRA (ASMIU)

EKRA (ASMIU)

EKRA-SMS

EKRA (EKRASMS, EKRASMS-SP_Linux)

EKRA (EKRASMS, EKRASMS-SP_Linux)

You can import a predefined exclusion profile during the initial configuration of the application in one of the following ways:

You can also import predefined exclusion profiles after installing the application. Import is performed in policy settings using the Web Console or the Administration Console.

If the exclusion profile being imported contains mount point exclusions, you need to ensure that the excluded mount points exist, or add new mount point settings to the /etc/fstab configuration file. The list of mount points added to exclusions is displayed only when importing an exclusion profile during the initial configuration of the application in interactive mode. If you import a predefined exclusion profile in any other way, after adding exclusions to the application, you can view the added mount point exclusions in the policy using the Web Console or Administration Console or in the general application settings on the command line (the ExcludedMountPoint.item_# parameter).

You can also configure industrial software exclusions using custom industrial software exclusion profiles. If you have exclusions configured for processes, files, and directories associated with industrial applications on your devices, you can export this exclusion profile to a file. A custom exclusion profile can be saved in a JSON file using the Web Console or Administration Console. You can then import the saved exclusion profile into Kaspersky Industrial CyberSecurity for Linux Nodes settings on other devices using the Web Console, Administration Console, or the command line.

In this section

Importing a predefined exclusion profile

Exporting or importing a custom exclusion profile

Importing exclusions on the command line

Page top