Kaspersky Embedded Systems Security 3.x

Configuring KSN Usage task

October 25, 2023

ID 150038

To configure the KSN Usage task:

  1. Expand the Managed devices node in the Kaspersky Security Center Administration Console tree.
  2. Select the administration group for which you want to configure application settings.
  3. Perform one of the following actions in the details pane of the selected administration group:
  4. In the Real-Time Computer Protection section, click the Settings button in the KSN Usage subsection.

    The KSN Usage window opens.

  5. On the General tab, configure the following task settings:
    • In the Action to perform on KSN untrusted objects section, specify the action that Kaspersky Embedded Systems Security for Windows is to perform if it detects an object identified by KSN as untrusted:
      • Remove
      • Log information
    • In the Data transfer section, restrict the size of files for which the checksum is calculated:
      • Clear or select the Do not calculate checksum before sending to KSN if file size exceeds (MB) check box.
      • If required, in the field to the right, change the maximum size of files for which Kaspersky Embedded Systems Security for Windows calculates the checksum.
    • In the KSN Proxy section, clear or select the Use Kaspersky Security Center as KSN Proxy check box.

      To enable KSN Proxy the KSN Statement must be accepted and Kaspersky Security Center properly configured. See Kaspersky Security Center Help for more details.

  6. If necessary, configure the task start schedule settings on the Task management tab. For example, you can enable task start by schedule and specify the start frequency of the At application launch if you want the task to run automatically when the protected device is restarted.

    The application will automatically start the KSN Usage task by schedule.

  7. Configure the data handling before starting the task.
  8. Click the OK button.

The modified settings are applied. The date and time of modifying the settings, as well as information about the task settings before and after modification, are saved in the system audit log.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.