Selecting sources for device vulnerability monitoring

When monitoring device vulnerabilities, the application detects vulnerabilities whose information has been uploaded to the vulnerabilities database from various sources. You can select specific sources of vulnerability information for the purpose of detecting vulnerabilities from only those selected sources.

Only users with the Administrator role can select sources for device vulnerability detection.

To enable or disable use of sources of vulnerability information:

  1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through the web interface using the Administrator account.
  2. In the Vulnerabilities section, click the Sources link to open the window for selecting sources.
  3. Enable or disable the use of specific sources. The list contains all sources available in the database of known vulnerabilities.
  4. Click the Apply button.
Page top