Application functions that are available when connected to the Server through the web interface

This section presents the application functions that are available to users when connected to the Server through the web interface (see the table below).

Available application functions depending on the user role

Application function

Administrator

Operator

Monitoring the application state when connected through the web interface

Viewing application messages

Enabling and disabling the user activity audit

 

Viewing user activity audit entries

 

Viewing information about nodes with application components installed and about network interfaces on nodes

Managing nodes that have application components installed

 

Managing monitoring points on nodes

 

Viewing information about an added license key

Adding a license key

 

Removing a license key

 

Configuring automatic updates

 

Manually starting an update

 

Viewing information about update installation

Viewing information about application user accounts

 

Creating an application user account

 

Changing the role of an application user account

 

Deleting an application user account

 

Changing a user account password

Viewing the devices table

Viewing subnets for asset management

Viewing information about devices with IP addresses from the selected subnets

Exporting devices to a file

Exporting subnets to a file

Viewing device information

Viewing events associated with devices

Selecting sources for device vulnerability monitoring

 

Manually adding devices

 

Merging devices

 

Deleting devices

 

Changing the statuses of devices

 

Generating a list of subnets for asset management

 

Creating a device group tree

 

Automatic grouping of devices based on a specific criterion

 

Manually arranging devices into groups

 

Adding and removing labels for devices

 

Editing device information

 

Adding, editing and deleting custom fields for a device

 

Configuring Process Control

 

Viewing information about devices associated with tags

Viewing Process Control rules associated with tags

Viewing information about devices associated with Process Control rules

Monitoring process parameter values

Viewing Interaction Control rules in the table of allow rules

Manually creating Interaction Control rules

 

Editing Interaction Control rule settings

 

Enabling and disabling Interaction Control rules

 

Deleting Interaction Control rules

 

Viewing the table containing sets of Intrusion Detection rules

Enabling and disabling sets of Intrusion Detection rules

 

Loading and replacing custom sets of Intrusion Detection rules

 

Removing custom sets of Intrusion Detection rules

 

Managing the settings for storing log entries in the database

 

Managing the settings for saving traffic in the database

 

Changing the logging level for processes

 

Managing technologies

 

Configuring the receipt of data from EPP applications

 

Enabling and configuring interaction with Kaspersky Security Center

 

Managing connectors

 

Configuring event types

 

Exporting a security policy to a file

Importing a security policy from a file

 

Clearing the current security policy

 

System monitoring in online mode

Working with the network map

Moving nodes and groups to other groups on the network map

 

Monitoring events and incidents

Monitoring vulnerabilities of devices

Page top