Kaspersky Industrial CyberSecurity for Networks

Selecting sources for device vulnerability monitoring

March 22, 2024

ID 220694

When monitoring device vulnerabilities, the application detects vulnerabilities whose information has been uploaded to the vulnerabilities database from various sources. You can select specific sources of vulnerability information for the purpose of detecting vulnerabilities from only those selected sources.

Only users with the Administrator role can select sources for device vulnerability detection.

To enable or disable use of sources of vulnerability information:

  1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through the web interface using the Administrator account.
  2. In the Vulnerabilities section, click the Sources link to open the window for selecting sources.
  3. Enable or disable the use of specific sources. The list contains all sources available in the database of known vulnerabilities.
  4. Click the Apply button.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.