Scan scopes window
The table contains the scan scopes. The application will scan files and directories located in the paths specified in the table. By default, the table contains one scan scope that includes all directories of the local file system.
Scan scope settings
Setting
|
Description
|
Scope name
|
Scan scope name.
|
Path
|
Path to the directory that the application scans.
|
Status
|
The status indicates whether the application scans this scope.
|
You can add, edit, delete, move up, and move down items in the table.
Clicking the Move down button moves the selected item down in the table.
Kaspersky Industrial CyberSecurity for Linux Nodes scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.
This button is available if a scope is selected in the table.
Clicking the Move up button moves the selected item up in the table.
Kaspersky Industrial CyberSecurity for Linux Nodes scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.
This button is available if a scope is selected in the table.
Clicking the Delete button excludes the selected scope from scans.
This button is available if at least one scan scope is selected in the table.
The selected element's settings are changed in a separate window.
Clicking the Add button opens a window where you can specify the new item settings.
Kaspersky Industrial CyberSecurity for Linux Nodes scans objects in the specified scopes in the order they appear in the list of scopes. If necessary, place the subdirectory higher in the list than its parent directory, to configure security settings for a subdirectory that are different from the security settings of the parent directory.
Page top