Kaspersky Embedded Systems Security 3.x

Configuring the task protection scope

October 25, 2023

ID 202594

To configure a protection scope for Real-Time File Protection task:

  1. In the main window of the Kaspersky Security Center Web Console, select DevicesPolicies & profiles.
  2. Click the policy name you want to configure.
  3. In the <Policy name> window that opens select the Application settings tab.
  4. Select the Real-time computer protection section.
  5. Click Settings in the Real-Time File Protection subsection.
  6. Select the Protection scope section.
  7. Do one of the following:
    • Click the Add button to add a new rule.
    • Select an existing rule and click Edit button.

    The Edit scope window opens.

  8. Switch the toggle button to Active and select an object type.
  9. In the Objects protection section, configure the following settings:
    • Objects protection mode:
      • All objects
      • Objects scanned by format
      • Objects scanned according to list of extensions specified in anti-virus database
      • Objects scanned by specified list of extensions
    • Scan disk boot sectors and MBR
    • Scan alternate NTFS streams
  10. In the Objects protection section, select or clear the Protect only new and modified files check box.
  11. In the Compound objects protection section, specify the compound objects that you want to include in the scan scope:
    • Archives
    • SFX archives
    • Packed objects
    • Email databases
    • Plain email
    • Embedded OLE objects
    • Entirely remove compound file that cannot be modified by the application in case of embedded object detection
  12. Select the action to be performed on infected and other detected objects:
    • Notify only.
    • Block access.
    • Perform additional action.

      Select the action from the drop-down list:

      • Disinfect.
      • Disinfect. Remove if disinfection fails.Disinfect. Remove if disinfection fails.
      • Remove.
      • Recommended.
  13. Select the action to be performed on probably infected objects:
  14. Configure actions to be performed on objects depending on the type of object detected:
    1. Clear or select the Perform actions depending on the type of object detected check box.
    2. Click the Settings button.
    3. In the window that opens, select a primary action and a secondary action (to be performed if the primary action fails) for each type of detected object.
    4. Click the OK button.
  15. In the Exclusions section, configure the following settings:
    • Clear or select the Exclude files check box.
    • Clear or select the Do not detect check box.
  16. In the Performance section, configure the following settings:
    • Stop scanning if it takes longer than (sec)
    • Do not scan compound objects larger than (MB)
    • Use iSwift technology
    • Use iChecker technology
  17. Click the OK button.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.