For the existing sets of security audit rules, you can add and edit jobs that the application uses to perform device scans.
Only users with the Administrator role can add and edit security audit jobs.
The security audit job is configured using the Wizard. The Wizard guides you step by step through the configuration of all required job settings. After the configuration is complete, you can wait for the scheduled scans to start on devices or start the scan job manually.
You can invoke the Security Audit Job Configuration Wizard in the following ways:
In the Configuration Wizard settings, the selected rule set is specified as default.
The Configuration Wizard settings do not have the default values.
The default values of the Configuration Wizard settings are set to the values of the existing job settings.
In the Configuration Wizard settings, a list of devices consisting of the selected devices is generated by default.
The default values of the Configuration Wizard settings are set to the values of the selected job settings.
To configure job settings in the Configuration Wizard window:
You can create a list of devices using the Add to job and Delete from job buttons. When you add devices, the application opens a window with a table of devices for selection. You can filter and sort the table to display the desired devices.
You can use letters, numerals, a space, and the following special characters: ! @ # № $ % ^ & ( ) [ ] { } / \ : ; , . - _
. The job name must begin and end with any permitted character except space.
The job name must contain no more than 1,024 characters. The job description must contain no more than 4,096 characters.
You can use this method if Kaspersky Endpoint Agent is installed on the devices selected for the job and integration between Kaspersky Endpoint Agent and Kaspersky Industrial CyberSecurity for Networks is configured. This method is used for scanning using Kaspersky Endpoint Agent on each device.
Use this method if the devices selected for the job do not have Kaspersky Endpoint Agent installed, but it is possible to connect to these devices via protocols that ensure secure management and data transfer. For this method, in the job settings specify one of the nodes with the installed application components from which connection to the devices is established. Specify the secret with the credentials for remote connections. You can select only one secret with one set of credentials for the job. In this case, the credentials stored in the selected secret must be applicable on all devices selected for the job (connections to these devices are possible with the same credentials from the secret).
For the Remote connection device polling method, the option to strengthen the security of connections with devices by verifying the certificates of these devices is not available. Attackers can attempt to spoof these devices in the network by exploiting the lack of device certificate authentication.
The application starts the job according to the schedule, provided that the previous start of this job has been completed. If by the time a scheduled job is started its previous launch has the Running status, the application skips the start of the scheduled job.
The maximum number of report recipients is 10.
The specified settings are displayed in the job details, on the Settings, Rules, and Devices tabs.
Page top