Configuration control jobs

Using the configuration control jobs, you can conduct a security audit of monitored devices in terms of receiving, saving, and comparing device configurations. Configuration control jobs additionally let you upload data to Kaspersky Industrial CyberSecurity for Networks for device user control, device application and patch monitoring, and OT device hardware monitoring.

The application can monitor the following configuration types on devices:

You can manually run security audit jobs or configure a schedule to automatically run each job.

When a job is started, the application initiates a scan of devices covered by this job. If a device scan detects configuration changes for the device, the application registers an event. Depending on the configuration processing mode selected for the job, the event contains the comparison results of the received configuration with the previous configuration of the device or with its benchmark configuration.

The following configuration processing modes are provided for configuration control jobs:

You can scan devices to get the PLC configuration type only if you use Active Poll connectors. The following device polling methods are provided for getting the remaining configuration types:

On devices running Linux operating systems, scans are performed using the commands to run standard diagnostic utilities for Linux devices.

To receive the PLC configuration type, the application must scan devices using the Active poll connector added to the application. In the job for the PLC configuration type, specify the data for connecting the connector (account credentials secret and other necessary data). The built-in Active Poll connector type supports receiving the configurations of Siemens SIMATIC S7-300 and S7-400 series devices and Schneider Electric Modicon series devices: M580, M340.

You can manage configuration control jobs on the Configuration control tab in the Security audit section. If the Active poll connector or the Remote connection method is used to scan devices, you can create secrets with the necessary credentials under SettingsSecrets.

After the jobs are run and the device scans are completed, you can view information about the received device configurations in the device details area on the Configurations tab. The options for comparing configurations and assigning a benchmark configuration are also available on this tab.

You can view information about registered events when connected to the Server through the web interface.

In this section:

Adding a configuration control job

Editing a configuration control job

Viewing the table of configuration control jobs

Manually starting and stopping configuration control jobs

Viewing general information about the configuration control job runs

Assigning a device benchmark configuration

Stopping a device scan in a configuration control job

Deleting configuration control jobs

Page top