Intrusion Detection

To detect intrusions in industrial network traffic, you can use Intrusion Detection rules and additional Intrusion Detection methods based on embedded algorithms. When signs of attacks are detected in traffic, Kaspersky Industrial CyberSecurity for Networks registers events based on Intrusion Detection technology.

Intrusion Detection rules and additional Intrusion Detection methods based on embedded algorithms are applied regardless of the security policy loaded in the Console or applied on the Server.

You can configure Intrusion Detection rules in the Kaspersky Industrial CyberSecurity for Networks Console on the Intrusion detection tab.

You can change the state of Intrusion Detection methods when connected to the Server through a web browser.

You can configure the settings for registration of Intrusion Detection events in the Application Console on the Configure events tab.

You can view Intrusion Detection events in the table of registered events.

In this section:

Intrusion Detection rules

Additional Intrusion Detection methods

Enabling and disabling rule-based Intrusion Detection

Enabling and disabling additional Intrusion Detection methods

Viewing the table containing sets of Intrusion Detection rules

Changing the state of sets of Intrusion Detection rules

Loading and replacing custom sets of Intrusion Detection rules

Removing custom sets of Intrusion Detection rules

Page top