Kaspersky Embedded Systems Security 3.x

Creating the protection scope

October 25, 2023

ID 148371

The procedure for creating the Real-Time File Protection task scope depends on the selected network file resource view. You can configure the view of network file resources as a tree or as a list (default view).

To apply the new protection scope settings to the task, the Real-Time File Protection task must be restarted.

To create a protection scope using the network file resource tree:

  1. Open the Protection scope settings window.
  2. In the left section of the window, open the network file resource tree to display all the nodes and child nodes.
  3. Do the following:
    • To exclude individual nodes from the protection scope, clear check boxes next to the names of these nodes.
    • To include individual nodes in the protection scope, clear the My Computer check box and do the following:
      • If you want to include all drives of the same type in the protection scope, select the check box next to the name of the required type of drives. For example, to include all removable drives on a device, select the Removable drives check box.
      • If an individual disk of a certain type is to be included in the protection scope, expand the node that contains the list of drives of this type and check the box next to the name of the required drive. For example, to select the removable drive F:, expand the Removable drives node and select the check box for the F: drive.
      • If you would like to include only a single folder or file on the drive, select the check box next to the name of that folder or file.
  4. Click the Save button.

The Protection scope settings window closes. The specified settings are saved.

To create a protection scope using the network file resources list:

  1. Open the Protection scope settings window.
  2. To include individual nodes in the protection scope, clear the My Computer check box and do the following:
    1. Open the context menu of the protection scope by right-clicking it.
    2. In the context menu of the button, select Add protection scope.
    3. In the Add protection scope window select an object type to add it to the protection scope:
      • Predefined scope - to include one of the predefined scopes in the protection scope on the device. Then in the drop-down list, select the desired protection scope.
      • Disk, folder or network location - to include individual drive, folder or a network object in the protection scope. Then select the desired scope by clicking the Browse button.
      • File - to include an individual file in the protection scope. Then select the desired scope by clicking the Browse button.

      You cannot add an object to a protection scope if it has already been added as an exclusion from a protection scope.

  3. To exclude individual nodes from the protection scope, clear check boxes next to the names of these nodes or take the following steps:
    1. Open the context menu of the protection scope by right-clicking it.
    2. In the context menu, select the Add exclusion option.
    3. In the Add exclusion window, select an object type that you want to add as an exclusion from the protection scope following the procedure used when adding an object to the protection scope.
  4. To modify the protection scope or an existing exclusion, select the Edit scope option in the context menu of the desired protection scope.
  5. To hide a previously added protection scope or an exclusion in the list of network file resources, select the Remove from the list option in the context menu of the desired protection scope.

    A protection scope is removed from the Real-Time File Protection task scope when it is removed from the network file resource list.

  6. Click the Save button.

The Protection scope settings window closes. The specified settings are saved.

The Real-Time File Protection task can be started if at least one of the device's file resource nodes is included in a protection scope.

If a complex protection scope is specified, for example, if different security values for settings for multiple nodes in the device's file resource tree are specified, this may slow the scanning of objects when they are accessed.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.