Kaspersky Industrial CyberSecurity for Networks

Application functions that are available when connected to the Server through the web interface

March 22, 2024

ID 177330

This section presents the application functions that are available to users when connected to the Server through the web interface (see the table below).

Available application functions depending on the user role

Application function

Administrator

Operator

Monitoring the application state when connected through the web interface

Yes

Yes

Viewing application messages

Yes

Yes

Enabling and disabling the user activity audit

Yes

 

Viewing user activity audit entries

Yes

 

Viewing information about nodes with application components installed and about network interfaces on nodes

Yes

Yes

Managing nodes that have application components installed

Yes

 

Managing monitoring points on nodes

Yes

 

Viewing information about an added license key

Yes

Yes

Adding a license key

Yes

 

Removing a license key

Yes

 

Configuring automatic updates

Yes

 

Manually starting an update

Yes

 

Viewing information about update installation

Yes

Yes

Viewing information about application user accounts

Yes

 

Creating an application user account

Yes

 

Changing the role of an application user account

Yes

 

Deleting an application user account

Yes

 

Changing a user account password

Yes

Yes

Viewing the devices table

Yes

Yes

Viewing address space rules

Yes

Yes

Viewing address space subnets

Yes

Yes

Viewing information about devices with IP addresses from the selected subnets

Yes

Yes

Viewing device information

Yes

Yes

Viewing events associated with devices

Yes

Yes

Selecting sources for device vulnerability monitoring

Yes

 

Configuring address spaces

Yes

 

Manually adding devices

Yes

 

Merging devices

Yes

 

Deleting devices

Yes

 

Changing the statuses of devices

Yes

 

Creating a device group tree

Yes

 

Automatic grouping of devices based on a specific criterion

Yes

 

Manually arranging devices into groups

Yes

 

Adding and removing labels for devices

Yes

 

Editing device information

Yes

 

Adding, editing and deleting custom fields for a device

Yes

 

Configuring Process Control

Yes

 

Viewing information about devices associated with tags

Yes

Yes

Viewing Process Control rules associated with tags

Yes

Yes

Viewing information about devices associated with Process Control rules

Yes

Yes

Monitoring process parameter values

Yes

Yes

Viewing Interaction Control rules in the table of allow rules

Yes

Yes

Manually creating Interaction Control rules

Yes

 

Editing Interaction Control rule settings

Yes

 

Enabling and disabling Interaction Control rules

Yes

 

Deleting Interaction Control rules

Yes

 

Enabling and disabling sets of Intrusion Detection rules

Yes

 

Loading and replacing user-defined sets of Intrusion Detection rules

Yes

 

Removing user-defined sets of Intrusion Detection rules

Yes

 

Managing the settings for storing log entries in the database

Yes

 

Managing the settings for saving traffic in the database

Yes

 

Managing the settings for saving traffic dump files

Icon Yes

 

Managing the settings for storing risks

Icon Yes

 

Managing the settings for storing report files

Icon Yes

 

Changing the logging level for processes

Yes

 

Managing technologies

Yes

 

Configuring the receipt of data from EPP applications

Yes

 

Enabling and configuring interaction with Kaspersky Security Center

Yes

 

Managing connectors

Yes

 

Adding and deleting connector types

Icon Yes

 

Performing active polling of devices

Icon Yes

 

Configuring event types

Yes

 

Exporting a security policy to a file

Yes

Yes

Importing a security policy from a file

Yes

 

Clearing the current security policy

Yes

 

System monitoring in online mode

Yes

Yes

Working with the network interactions map

Yes

Yes

Moving nodes and groups to other groups on the network interaction map

Yes

 

Forming a topology map

Icon Yes

 

Viewing details about objects on the topology map

Icon Yes

Icon Yes

Viewing objects related to nodes on the topology map

Icon Yes

Icon Yes

Monitoring events and incidents

Yes

Yes

Managing reports and report templates

Icon Yes

 

Manually generating reports

Icon Yes

Icon Yes

Exporting reports to a file

Icon Yes

Icon Yes

Monitoring risks

Yes

Yes

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.