Security audit
Device security audit uses data requested and received by the following parts of the Kaspersky Industrial CyberSecurity for Networks functionality:
- Vulnerability and Compliance Audit to evaluate the compliance of device settings with security standards, and to search for vulnerabilities.
- Configuration Control to get and save detailed information about device configurations, and to compare changes in configurations.
- Active device polling for security audit purposes and to check devices for risks.
- Risk Control following vulnerability and compliance audit jobs and active device polling jobs.
You can watch the tutorial video (see below) to familiarize yourself with the functionality.
Security audit
Page top