You can enable or disable the use of technologies for the Server, sensors, and monitoring points. Enabling or disabling technologies on sensors and monitoring points is available if technology inheritance is disabled for these objects.
Some technologies include methods that can be enabled or disabled separately. If a technology or method is disabled, the application does not monitor communications of devices using this technology or method. You can configure the application settings related to the disabled technologies or methods (for example, add or edit rules).
The following technologies and methods can be enabled and disabled:
Not all technologies and methods are enabled by default after the application is installed. To enhance the protection of the application, you need to enable the Brute-force Attack and Scan Detection method if this method is disabled. Use of this method must be enabled for the Server and for all sensors and monitoring points in the application. Together with other technologies and methods, the Brute-force Attack and Scan Detection method also ensures that the application is operating in its certified state after installing current updates to application modules and databases.
This article describes the procedure of enabling and disabling technologies on a Server node. The actions for enabling or disabling technologies on sensor nodes and monitoring points are performed in the same way after the technology inheritance is disabled for these objects.
To change the state of technologies and methods on the Server node:
The details area appears in the right part of the web interface window. The Manage technologies tab displays the list of technologies and methods that can be enabled or disabled.
If the states of technologies and methods cannot be currently changed, the switches in the list are disabled. In this case, it is recommended to check the status of the kics4net service on the Server computer. If the service is not active, you must start it.