Security audit
Device security audit uses data requested and received by the following parts of the Kaspersky Industrial CyberSecurity for Networks functionality:
- Vulnerability and Compliance Audit to evaluate the compliance of device settings with security standards, and to search for vulnerabilities.
- Configuration Control to get and save detailed information about device configurations, and to compare changes in configurations.
- Active device polling for security audit purposes and to check devices for risks.
- Risk Control following vulnerability and compliance audit jobs and active device polling jobs.
Page top