Scenario: Monitoring and reporting
Dec 4, 2023
This section provides a scenario for configuring the monitoring and reporting feature in Kaspersky Security Center.
After you deploy Kaspersky Security Center in an organization's network you can start to monitor it and generate reports on its functioning.
Monitoring and reporting in an organization's network proceeds in stages:
- Configuring the switching of device statuses
Get acquainted with the settings that define the assignment of device statuses depending on specific conditions. By changing these settings, you can change the number of events with Critical or Warning importance levels.
When configuring the switching of device statuses, be sure that the new settings do not conflict with the information security policies of your organization and that you are able to react to important security events in your organization's network in a timely manner.
- Configuring notifications about events on client devices
Configure notification (by email, by SMS, or by running an executable file) of events on client devices in accordance with your organization's needs.
- Changing the response of your security network to the Virus outbreak event
To adjust the network's response to new events, you can change the specific thresholds in the Administration Server properties. You can also create a stricter policy that will be activated, or create a task that will be run at the occurrence of this event.
- Managing statistics
Configure the display of statistics in accordance with your organization's needs.
- Reviewing the security status of your organization's network
To review the security status of your organization's network, you can do any of the following:
- Locating client devices that are not protected
To locate client devices that are not protected, go the workspace of the Administration Server node, on the Statistics tab open the Protection status second-level tab (page), and review the History of discovery of new networked devices information panel. You can also generate and review the Report on protection deployment.
- Checking protection of client devices
To check protection of client devices, go to the workspace of the Administration Server node, on the Statistics tab open the Deployment or Threat statistics second-level tab (page), and review the relevant information panels. You can also start and review the Critical events event selection.
- Evaluating and limiting the event load on the database
Information about events that occur during operation of managed applications is transferred from a client device and registered in the Administration Server database. To reduce the load on the Administration Server, evaluate and limit the maximum number of events that can be stored in the database.
- Reviewing license information
To review license information, go to the workspace of the Administration Server node, on the Statistics tab open the Deployment second-level tab (page), and review the License key usage information panel. You can also generate and review the Report on usage of license keys.
Upon completion of the scenario, you are informed about protection of your organization's network and, thus, can plan actions for further protection.