Creating the Find vulnerabilities and required updates task

Expand all | Collapse all

Through the Find vulnerabilities and required updates task, Kaspersky Security Center Linux receives lists of detected vulnerabilities and required updates for the third-party software installed on the managed devices.

You can create the Find vulnerabilities and required updates task only for Windows devices. You cannot create this task for devices running on other operating systems.

The Find vulnerabilities and required updates task is created automatically when the quick start wizard is running. If you did not run the wizard, you can create the task manually.

To create the Find vulnerabilities and required updates task:

  1. In the main menu, go to Assets (Devices)Tasks.
  2. Click Add.

    The New task wizard starts. Proceed through the wizard by using the Next button.

  3. For the Kaspersky Security Center application, select the Find vulnerabilities and required updates task type.
  4. Specify the name for the task that you are creating. A task name cannot be more than 100 characters long and cannot include any special characters ("*<>?\:|).
  5. Select the devices to which the task will be assigned.
  6. Specify the methods to scan for vulnerabilities and applications that require updating:
    • Search for vulnerabilities and updates listed by Microsoft
      • Connect to the update server to update data
    • Search for third-party vulnerabilities and updates listed by Kaspersky

    You can disable these options after task creation on the Application settings tab of the task properties window.

  7. Specify paths for advanced search of applications across the file system

    You can change the specified paths after task creation on the Application settings tab of the task properties window.

  8. If required, Enable advanced diagnostics

    You can disable this option after task creation on the Application settings tab of the task properties window.

  9. Specify the Maximum size, in MB, of advanced diagnostics files

    You have to specify this value if you enabled advanced diagnostics in the previous step. You can change this value after task creation on the Application settings tab of the task properties window.

  10. If you want to modify the default task settings, enable the Open task details when creation is complete option on the Finish task creation page. If you do not enable this option, the task is created with the default settings. You can modify the default settings later, at any time.
  11. Click the Finish button.

    The wizard creates the task. If you enabled the Open task details when creation is complete option, the task properties window automatically opens. In this window, you can specify the general task settings and, if required, change the settings specified during task creation.

    You can also open the task properties window by clicking the name of the created task in the list of tasks.

The task is created and configured. To run the task, select it in the task list and click the Start button.

Recommendations for the task schedule

When scheduling the Find vulnerabilities and required updates task, make sure that two options—Run missed tasks and Use automatically randomized delay for task starts—are enabled.

By default, the Find vulnerabilities and required updates task is set to start manually.

You can also schedule the Find vulnerabilities and required updates task to start at a particular time. For example, you can select the Every N hours scheduled start from the Start task drop-down list on the Schedule tab of the task properties window. In this case, note that if the organization's workplace rules provide for shutting down all devices at this time, the Find vulnerabilities and required updates task will run after the devices are turned on again. Such activity may be undesirable because a vulnerability scan may increase the load on CPUs and disk subsystems. You should set up the most convenient schedule for the task based on the workplace rules adopted by the organization.

For a detailed description of scheduled start settings, refer to the general task settings.

See also:

Scenario: Finding and fixing third-party software vulnerabilities

Scenario: Updating third-party software

Page top