Configuring the Network Threat Protection component on Windows devices
The Network Threat Protection component monitors inbound network traffic of the Windows device for activity that is typical of network attacks. Upon detecting an attempted network attack on a user's computer, Network Threat Protection blocks network activity from the attacking computer.
To configure the Network Threat Protection component on Windows devices:
Select the Security management → Security profiles section.
The Security profiles section contains a list of security profiles configured in Kaspersky Next.
In the list, select the security profile for the devices on which you want to configure the Network Threat Protection component.
Click the link with the profile name to open the security profile properties window.
The security profile properties window displays settings available for all devices.
In the Windows group, select the Security settings section.
Set the toggle switch to Network Threat Protection is enabled.
Click the Settings link below the Network Threat Protection is enabled toggle switch.
The Network Threat Protection component settings page opens.
In the Network Threat Protection settings section, set the toggle switch to Add the attacking computer to the list of blocked computers.
In the Time to block attacking computer (min) field, specify a value for the number of minutes during which the network activity of the attacking computer will be blocked.
In the Network Threat Protection exclusions section, click Settings.
The Exclusions window opens.
Do any of the following:
To add an IP address that you want to be excluded from scanning:
Click the Add button.
The New record window opens.
In the Protocol list, select the protocol of the IP address to be excluded.
In the IP address field, enter the IP address to be excluded.
If permitted by the Protocol value, enter the port or ports. You can specify a single port, a range of ports, or a comma-separated list of ports and ranges.
Click OK to close the New record window.
The added IP address appears in the list of exclusions in the Exclusions window.
To modify an IP address that is excluded from scanning:
Select the check box next to the required IP address.
Click the Edit button.
The New record window opens. It contains the selected IP address.
Make the necessary changes.
Click OK to close the New record window.
The modified IP address is displayed in the list of exclusions in the Exclusions window.
To delete an IP address from the list of scanning exclusions:
Select the check box next to the required IP address.
Click the Delete button.
The deleted IP address disappears from the list of exclusions in the Exclusions window.
Click the Save button.
After the security profile is applied, the Network Threat Protection component is enabled on Windows devices.