Managing response actions in Kaspersky Industrial CyberSecurity for Networks

If joint operation with EPP applications is configured in Kaspersky Industrial CyberSecurity for Networks, you can trigger the response actions on devices. Response actions allow preventing or minimizing the consequences of detected threats from devices in an industrial network. Each response action is triggered manually when working with the corresponding object in the application.

The capability to trigger response actions is available for devices with the Endpoint Agent software component. When a response action is triggered, Kaspersky Industrial CyberSecurity for Networks transmits the information about it to Endpoint Agent. The Endpoint Agent software component executes the received command and sends a completion notification to Kaspersky Industrial CyberSecurity for Networks.

Depending on the nature of the threats detected on devices, you can trigger the following response actions:

For the Isolate device from the network, Prevent run and Move to quarantine response actions, you can trigger the corresponding reverse actions in Kaspersky Industrial CyberSecurity for Networks. This capability allows you to restore normal device functionality after a triggered response action has been completed and the threat has been eliminated from the device. The following reverse actions are available:

Kaspersky Industrial CyberSecurity for Networks registers triggered response actions and the corresponding reverse actions. The registered actions are displayed in the Events section on the Response actions tab.

You can trigger response actions by selecting the relevant events, executable files or devices. You can also trigger new response actions by using ones that were registered and completed as long as the selected action allows triggering reverse actions.

The actions available to you depend on the selected object. For example, if you selected a device with the Endpoint Agent software component, you can only manage the network isolation of this device and the startup of processes. All other response actions are available under other conditions.

Only users with the Administrator or Security Officer role can trigger response actions and corresponding reverse actions.

In this section:

Triggering event response actions

Triggering response actions when working with device executable files

Triggering device response actions

Triggering response actions when working with registered response actions

Viewing the response action table

Downloading files containing data from the standard output and error streams when starting a process

Deleting response actions

Page top