Kaspersky Technical Support experts may request your logs from Kaspersky Industrial CyberSecurity for Networks and other system data.
Logs are located on computers that have components of Kaspersky Industrial CyberSecurity for Networks installed. Information about the folders used for storing logs is provided in the Folders for storing application data section.
Root privileges in the operating system are required for providing access to logs.
Kaspersky Technical Support experts may also request additional data on the application components. This data can be obtaining by using the application components centralized installation script named kics4net-deploy-<application version number>.bundle.sh or by locally running the kics4net-gather-artefacts.sh script, which is located on the computer with the installed application component in the /opt/kaspersky/kics4net/sbin/ folder.
To get information about application components by using the kics4net-deploy-<application version>.bundle.sh script:
gather-artefacts
parameter:bash kics4net-deploy-<
application version number
>.bundle.sh --gather-artefacts -<
parameter
> <
folder name
>
where:
<
parameter
>
– determines the data acquisition mode. The following parameters are provided:
a
– receive all data.c
– receive data on certificates.i
– receive data on the Intrusion Detection configuration.t
– receive traffic dump files.<
folder name
>
– name of the folder used for copying archived data files.Example:
|
SSH password
and BECOME password
prompts, enter the password for the user account that was used to run the installation of application components.Wait for completion of the script kics4net-deploy-<application version number>.bundle.sh. Upon successful completion, files will be created in the specified folder.
To obtain data on the application component installed on a computer by using the kics4net-gather-artefacts.sh script:
bash kics4net-gather-artefacts.sh -<
parameter
> <
folder name
>
where:
<
parameter
>
– determines the data acquisition mode. The following parameters are provided:
a
– receive all data.c
– receive data on certificates.i
– receive data on the Intrusion Detection configuration.t
– receive traffic dump files.<
folder name
>
– name of the folder used for copying archived data files.Example:
|
Wait for the kics4net-gather-artefacts.sh script to finish. Upon successful completion, files will be created in the specified folder.
Page top