KICSforNetworks 2.9 en US
KICSforNetworks 2.9 en US
for Networks
1
Contents
About Kaspersky Industrial CyberSecurity for Networks
Distribution kit
Hardware and software requirements
Overview of Kaspersky Industrial CyberSecurity for Networks functionality
Security recommendations for Kaspersky Industrial CyberSecurity for Networks
What's new
Application architecture
Installing and removing the application
Common deployment scenarios
Preparing for application installation
Installation menu commands
Installation menu commands for Server management
Installation menu commands for sensor management
General installation menu commands
Installation menu exit commands
Application installation procedure
Viewing the End User License Agreement and Privacy Policy
Recon guring and reinstalling the application
Installing the application in non-interactive mode
Reinforcing the security of computers with application components installed
Installing the Kaspersky Industrial CyberSecurity for Networks Administration Plug-in for Kaspersky Security Center
Getting started
Upgrading from a previous version of the application
Removing the application
Starting and stopping the application
Connecting to the Server through a web browser
Closing a Server connection session through a web browser
Starting the Application Console
Closing the application Console
Application interface
Web interface of Kaspersky Industrial CyberSecurity for Networks
Page for entering account credentials to connect through a web browser
Menu of the Kaspersky Industrial CyberSecurity for Networks web interface
Dashboard section
Assets section
Network map section
Events section
Tags section
Network Control section
Settings section
Kaspersky Industrial CyberSecurity for Networks Console
Elements of the Kaspersky Industrial CyberSecurity for Networks Console interface
Process control tab
Con gure events tab
Intrusion detection tab
Settings of Server and sensors window
2
Manage logs window
Manage updates window
Update license key window
Licensing the application
About the End User License Agreement
About the Privacy Policy
About the license
About the license certi cate
About the license key used for activating update functionality
About the license key le used for activating update functionality
Adding a license key in the Application Console
Viewing information about an added license key in the Application Console
Removing a license key in the Application Console
Processing and storing data in Kaspersky Industrial CyberSecurity for Networks
About data provision
About logs
Folders for storing application data
Administration of Kaspersky Industrial CyberSecurity for Networks
Managing monitoring points
Adding a monitoring point
Enabling monitoring points
Disabling monitoring points
Renaming a monitoring point
Deleting a monitoring point
Identifying the Ethernet port associated with a network interface
Monitoring the state of Kaspersky Industrial CyberSecurity for Networks
Monitoring the application state when connected through the web interface
Viewing application messages
Viewing user activity audit entries
Monitoring the application state in the Kaspersky Industrial CyberSecurity for Networks Console
Viewing information about nodes with application components installed and about network interfaces on nodes
Viewing the status of services supporting operation of application components
Restarting a computer that has application components installed
Using a test network packet to verify event registration
Synchronizing Server time with the time source for industrial network assets
Updating SSL connection certi cates
Updating databases and application modules
Selecting an update source
Selecting the update run mode
Manually starting an update
Viewing information about update installation
Distributing access to application functions
About application user accounts
Application functions available through the web interface
Application functions available in the Console
Viewing information about application user accounts
Creating an application user account
Changing the role of an application user account
3
Deleting an application user account
Changing a user account password
Security policies
Creating a new security policy
Saving a security policy to a folder
Opening a security policy from a folder
Applying a security policy on the Server
Loading a security policy from the Server to the Console
Viewing security policy properties
Changing the name of a security policy
About the security policy conversion tool
Converting and importing a security policy
Process Control
Supported devices and protocols
Tree of devices and tags for process control
Devices and tags for Process Control
About Unknown Tag Detection
Enabling and disabling Unknown Tag Detection
Adding a process control device
Adding tags from the detected tag storage
Manually adding a tag
Editing the settings of a process control device or tag
Removing a process control device or tag
Searching tags
Importing tags and process control devices from data les
Selecting the monitored system commands
Detecting default passwords when connecting to devices
Process Control rules
About Process Control rules
Rules with de ned conditions for tag values
Rules using Lua scripts
Creating a group in the list of Process Control rules
Moving an item in the list of Process Control rules
Renaming an item in the list of Process Control rules
Removing an item from the list of Process Control rules
Searching Process Control rules
Highlighting tags used in Process Control rules
Con guring events
Grouping event types
Searching for event types
Creating event types
Changing event types
Con guring automatic saving of tra ic during event registration
Deleting event types
About transmission of events to recipient systems
Adding a recipient
Changing the recipient settings
Con guring the transmission of events to recipient systems
4
Removing a recipient
Kaspersky Industrial CyberSecurity for Networks event con guration variables
Asset management
Asset Management modes and methods
About monitoring read/write of PLC projects
Selecting the applied methods and changing the Asset Management mode
Assets table
Viewing the assets table
Selecting assets in the assets table
Automatically adding and updating assets
About the asset group tree
Creating an asset group tree
Manually adding assets
Merging assets
Deleting assets
Automatically changing the statuses of assets
Manually changing the statuses of assets
Viewing asset information
Managing the arrangement of assets in the group tree
Adding and removing labels for assets
Editing asset information
Adding, editing and deleting custom elds for an asset
Viewing events associated with assets
Network Control
Network Control learning mode
Network Control monitoring mode
Selecting the applied technologies and changing the Network Control mode
Automatic generation of Network Control rules in learning mode
Viewing the table of Network Control rules
Selecting Network Control rules
Manually creating Network Control rules
Editing Network Control rule settings
Changing the state of Network Control rules
Deleting Network Control rules
Intrusion Detection
Intrusion Detection rules
Additional Intrusion Detection methods
Enabling and disabling rule-based Intrusion Detection
Enabling and disabling additional Intrusion Detection methods
Viewing the table containing sets of Intrusion Detection rules
Changing the state of sets of Intrusion Detection rules
Loading and replacing custom sets of Intrusion Detection rules
Removing custom sets of Intrusion Detection rules
Managing logs
Managing the settings for storing log entries in the database
Managing the settings for saving tra ic in the database
Enabling and disabling the user activity audit
Changing the log level for processes
5
Managing technologies
Using the Kaspersky Industrial CyberSecurity for Networks API
Certi cates for secure connection through the API
Creating client certi cates for connection through the API
Performing common tasks
System monitoring in online mode
Information in the Assets block
Viewing detailed information about assets
Searching assets and proceeding to the Assets section
Information in the Events block
Selecting a period for displaying a histogram
Viewing detailed information about events and incidents
Searching events and incidents and proceeding to the Events section
Working with the network map
Nodes on the network map
Groups of assets on the network map
Links on the network map
Viewing details about objects
Changing the network map scale and positioning
Collapsing and expanding groups
Moving nodes and groups to other groups on the network map
Pinning and unpinning nodes and groups
Manually changing the location of nodes and groups
Automatic arrangement of nodes and groups
Filtering nodes and links by time of communication
Filtering nodes on the network map
Filtering links on the network map
Saving and loading network map display settings
Resetting the de ned lter settings on the network map
Searching nodes on the network map
Viewing events associated with nodes of known assets
Viewing events associated with a link
Viewing information in the assets table for selected nodes
Viewing information in the assets table for a selected link
Monitoring events and incidents
Event severity levels
Event registration technologies
Event statuses
Table of registered events
Selecting events in the events table
Viewing events included in an incident
Filtering events
Searching events
Resetting the de ned lter and search settings in the events table
Sorting events
Con guring the table of registered events
Viewing event details
Viewing information about assets associated with events
6
Changing the statuses of events
Setting markers
Copying events to a text editor
Exporting events to a le
Loading tra ic for events
Monitoring process parameters
Viewing process parameters
Sorting tags when viewing process parameters
Application interaction with Kaspersky Security Center
Connecting to the Console from Kaspersky Security Center
Adding a license key to Kaspersky Industrial CyberSecurity for Networks from Kaspersky Security Center
Using the Kaspersky Security Center Administration Server as the source of updates
Monitoring events via Kaspersky Security Center
Types of events in Kaspersky Security Center for Kaspersky Industrial CyberSecurity for Networks events
Correspondence of Kaspersky Security Center event severity levels
Monitoring the ICS security state: Kaspersky Security Center and SCADA
Troubleshooting
An application component cannot be installed on a selected node
Application problems detected
New application message
Not enough free space on hard drive
No tra ic at monitoring point
Unknown state of the application
Tra ic is not being loaded for events or incidents
Preventative maintenance and adjustment operations on the ICS
Unexpected system restart
After the Kaspersky Security Center Administration Server is reinstalled, Network Agent cannot be synchronized
Unable to connect to the Server through a web browser
When connecting to the Server, the web browser displays a certi cate warning
Contacting Technical Support
How to get technical support
Technical Support via Kaspersky CompanyAccount
Collecting information for Technical Support
Sources of information about the application
Appendices
Example installation of a Server and sensor
System event types in Kaspersky Industrial CyberSecurity for Networks
System event types based on Deep Packet Inspection technology
System event types based on Command Control technology
System event types based on Network Integrity Control technology
System event types based on Intrusion Detection technology
System event types based on Asset Management technology
System event types based on External technology
Files for importing custom tags and device con gurations
File with descriptions of devices: devices.csv
File with descriptions of connections and protocols: connections.csv
File with descriptions of tags and variables: variables.csv
File with descriptions of enumerations: enums.csv
7
File with descriptions of data sets (tag sets): datasets.csv
File with descriptions of MMS protocol reports: iec61850_mms_reports.csv
File with descriptions of Sampled Values protocol messages: iec61850_sv_messages.csv
Glossary
Account role
ARP spoo ng
Asset management
Command Control
Dedicated Kaspersky Industrial CyberSecurity network
Deep Packet Inspection
Device
Event
Event correlation rule
Event type
External
ICS
Incident
Industrial network
Intelligent electronic device (IED)
Intrusion Detection
Intrusion Detection rule
Kaspersky Industrial CyberSecurity for Networks Console
Kaspersky Industrial CyberSecurity for Networks Sensor
Kaspersky Industrial CyberSecurity for Networks Server
Kaspersky Industrial CyberSecurity for Networks Web Server
Link on the network map
Monitoring point
Network Control rule
Network Integrity Control
Network map
Node
Noti cation
PLC project
Process Control rule
Programmable Logic Controller (PLC)
SCADA
Security policy
SIEM
System command
Tag
AO Kaspersky Lab
Information about third-party code
Trademark notices
8
About Kaspersky Industrial CyberSecurity for Networks
Kaspersky Industrial CyberSecurity for Networks is an application designed to protect the infrastructure of
industrial enterprises from information security threats, and to ensure uninterrupted process ows. Kaspersky
Industrial CyberSecurity for Networks analyzes industrial network tra ic to monitor the activity of devices in the
industrial network, detect prohibited system commands transmitted or received by devices, and detect attempts
to set incorrect process parameter values. The application is part of the solution known as Kaspersky Industrial
CyberSecurity.
Scans communications between industrial network devices to check their compliance with de ned Network
Control rules.
Monitors industrial network devices and detects the activity of devices previously unknown to the application,
as well as the activity of devices that must not be used in the industrial network or that have not shown any
activity in a long time. When monitoring devices, the application can automatically refresh information about
devices based on data received in network packets.
Displays the network interactions between industrial network devices depicted as a network map. Displayed
objects are visually distinguished based on various attributes (for example, objects requiring attention).
Extracts the parameter values of the technological process controlled by the Industrial Control System
(hereinafter referred to as the "ICS") from network packets and checks the acceptability of those values based
on the de ned Process Control rules.
Analyzes industrial network tra ic to see if network packets contain system commands transmitted or
received by devices involved in automating an enterprise's processes (hereinafter referred to as "process
control devices"). Monitors tra ic to detect system commands or situations that could be signs of industrial
network security violations.
Monitors project read and write operations for programmable logic controllers, saves the obtained information
about projects, and compares this information to previously obtained information.
Analyzes industrial network tra ic for signs of attacks without a ecting the industrial network or drawing the
attention of a potential attacker. Uses de ned Intrusion Detection rules and preset network packet scan
algorithms to detect signs of attacks.
Registers events and relays information about them to recipient systems and to Kaspersky Security Center.
Analyzes registered events and, upon detecting certain sequences of events, registers incidents based on
embedded correlation rules. Incidents group events that have certain common traits or that are associated
with the same process. Correlation rules may be updated when updates are installed.
Saves tra ic associated with registered events in the database. Tra ic may be saved automatically if the
saving of tra ic is enabled for event types, or can be saved by requesting to load tra ic.
Distribution kit
The distribution kit of Kaspersky Industrial CyberSecurity for Networks includes the following les:
Package for installing the Intrusion Detection system: kics4net-suricata-<system version number>.x86_64.rpm
Package for installing Network Agent from the Kaspersky Security Center distribution kit: klnagent64-<Network
Agent version number>.x86_64.rpm
Packages for installing the Kaspersky Industrial CyberSecurity for Networks Administration Plug-in for
Kaspersky Security Center: kics4net-sc-plugin_<plug-in version number>_<localization code>.msi
Package containing the set of proto les for Kaspersky Industrial CyberSecurity for Networks API: kics4net-
api-<application version number>.tar.gz
Files containing the text of the End User License Agreement in English and in Russian
Files containing the text of the Privacy Policy in English and in Russian
Files containing information about the version (Release Notes) in English and in Russian
RAM: 32 GB.
Free space on the hard drive: 750 GB and an additional 250 GB for each monitoring point on this computer.
RAM: 4 GB, and an additional 2 GB for each monitoring point on this computer.
Free space on the hard drive: 50 GB and 250 GB for each monitoring point on this computer.
When using sensors, the bandwidth of the dedicated Kaspersky Industrial CyberSecurity network between the
Server and sensors must be at least twice the bandwidth of the industrial network.
Kaspersky Industrial CyberSecurity for Networks has the following software requirements for computers on which
application components will be installed:
10
CentOS 7.6.1810 operating system.
When installing the operating system, we recommend that you allocate the entire hard drive (minus the
space required for the boot and swap partitions) to the system (root) partition.
The same version of operating system must be installed on all computers where application components are
installed.
To install application components, the following software must be installed in the CentOS 7.6.1810 operating
system:
The KDE desktop environment version included in the CentOS 7.6.1810 operating system.
Python 2.7.
On the computer that will perform Server functions, the mail server (Mail Transfer Agent) must be correctly
con gured to send emails to the noti cation recipients con gured in the Console.
For installation of application components, it is recommended to use separate computers on which only
software from the operating system is installed. If third-party applications are installed on computers, the
performance of components of Kaspersky Industrial CyberSecurity for Networks may be reduced.
To install the Kaspersky Industrial CyberSecurity for Networks Administration Plug-in for Kaspersky Security
Center, the Windows® update KB2999226 must be installed on the computer hosting the Kaspersky Security
Center Administration Server. Installation of this update is required if the problems xed by this update are relevant
for the installed version of the operating system and con guration of the installed software on the computer
hosting the Administration Server (please refer to the description of the speci c update).
To connect to the web server, you can use the following web browsers:
Kaspersky Industrial CyberSecurity for Networks is compatible with the following versions of applications that are
part of the Kaspersky Industrial CyberSecurity solution:
Kaspersky Security Center 10 with Service Pack 3 or Kaspersky Security Center 11.
11
In Kaspersky Industrial CyberSecurity for Networks, industrial network tra ic analysis is provided by the following
functionality:
Asset Management. This functionality lets you monitor the activity of assets and track changes to asset
information based on data received in network packets. To automatically receive information about assets, the
application analyzes industrial network tra ic according to the rules for identifying information about devices
and the protocols of communication between devices. In conjunction with Process Control functionality,
read/write operations for programmable logic controllers are also monitored. For the purpose of Asset
Management, the application generates a table containing information that is received automatically from
tra ic or information that is manually provided. Asset Management can be con gured when working with the
assets table. Some con guration capabilities are also available when working with the network map.
Network Control. This functionality lets you monitor interactions between assets of the industrial network.
Detected interactions are checked to see if they match de ned Network Control rules. When the application
detects an interaction that is described in an active Network Control rule, it considers this interaction to be
allowed and does not register an event.
Deep Packet Inspection (hereinafter also referred to as "Process Control"). This functionality lets you monitor
tra ic to detect the values of process parameters and the systems commands transmitted or received by
assets. Values of industrial process parameters are tracked with the aid of Process Control rules that are used
by the application to detect unacceptable values. Lists of monitored system commands are generated when
you con gure the settings of Process Control devices.
Intrusion Detection. This functionality lets you monitor tra ic to detect signs of attacks or unwanted network
activity. Intrusion Detection rules and embedded network packet scan algorithms are used to detect such
activity. When the conditions de ned in an active Intrusion Detection rule are detected in tra ic, the
application registers a rule-triggering event. Using the embedded network packet scan algorithms, the
application detects signs of falsi ed addresses in ARP packets and various anomalies in the TCP and IP
protocols.
Only an application user with the Administrator role can con gure industrial network tra ic analysis functionality.
Application user accounts with the Operator role can be used to perform common tasks for monitoring the state
of the industrial process in Kaspersky Industrial CyberSecurity for Networks. These users can utilize the following
functionality:
Display information for system monitoring in online mode. This functionality lets you view the most signi cant
changes to the system that have occurred up to the current moment. When monitoring the system in online
mode, you can view information about assets requiring attention, and information about events and incidents
with the most recent time of last occurrence.
Display data on the network map. This functionality lets you visually display detected interactions between
assets of the industrial network. When viewing the network map, you can quickly identify problematic objects or
objects with other attributes and view information about these objects. To conveniently present information,
you can automatically or manually arrange assets on the network map.
Display information about events and incidents. This functionality lets you load registered events and
incidents from the Server database. To provide the capability to monitor new events and incidents, by default
the application loads events and incidents that occurred most recently. You can also load events and incidents
for any period. When viewing the events table, you can change the statuses of events and incidents, copy and
export data, load tra ic, and perform other actions.
Display information for monitoring process parameters. This functionality lets you view the values of process
parameters detected in tra ic at the current time. Information about settings is presented in the form of a
table whose values are automatically updated.
12
Functionality for managing operation of the application
To manage the application for the purpose of general con guration and control of its use, an application user with
the Administrator role can use the following functionality:
Manage monitoring points. This functionality lets you add monitoring points to the application to receive
tra ic from the industrial network. You can also use this functionality to temporarily pause and resume
monitoring of industrial network segments by disabling and enabling the corresponding monitoring points (for
example, while conducting preventative maintenance and adjustment operations for the ICS).
Manage technologies. This functionality lets you enable and disable the use of technologies and methods for
industrial network tra ic analysis, and change the operating mode of technologies and methods. You can
enable, disable, and change the operating mode of technologies and methods independently of each other.
Distribute access to application functions. This functionality lets you restrict user access to application
functions. Access is restricted based on the roles of application user accounts.
Monitor the state of the application. This functionality lets you monitor the current state of Kaspersky
Industrial CyberSecurity for Networks, and view application messages and user activity audit entries for any
period. Users with the Operator role can also access the log containing application messages.
Updating databases and application modules. This functionality lets you download and install updates,
thereby improving the e ectiveness of tra ic analysis and ensuring maximum protection of the industrial
network against threats. Update functionality is available after a license key is added to Kaspersky Industrial
CyberSecurity for Networks or to Kaspersky Security Center. You can manually start installation of updates, or
enable automatic installation of updates according to a de ned schedule.
Con gure the types of registered events. This functionality lets you generate and con gure a list of event
types for event registration in Kaspersky Industrial CyberSecurity for Networks, and for event transmission to
recipient systems (for example, to a SIEM system) and to Kaspersky Security Center. When con guring event
types, you can also add event types for event registration using methods of the Kaspersky Industrial
CyberSecurity for Networks API.
Manage logs. This functionality lets you change the settings for saving data in application logs. You can
con gure the settings for saving entries in logs and the settings for saving tra ic in the database. You can also
change the log levels for process logs.
Use the application programming interface. This functionality lets you use the set of functions implemented
through the Kaspersky Industrial CyberSecurity for Networks API in external applications. Using the methods
provided by the Kaspersky Industrial CyberSecurity for Networks API, you can obtain data on events and tags,
send events to Kaspersky Industrial CyberSecurity for Networks API, and perform other actions.
When deploying Kaspersky Industrial CyberSecurity for Networks, you are advised to do the following:
13
Restrict access to computers on which the Kaspersky Industrial CyberSecurity for Networks Server and
sensors are installed, and restrict access to the network equipment of the dedicated network.
Grant access to personnel authorized to install and con gure the Server's and sensors' equipment and
software, and to users of the application.
Use hardware or a security service to control physical access to the equipment running the application.
Restrict access to network equipment used for receiving data from the industrial network and for the
interaction of application components.
When application events are transmitted to recipient systems (other than Kaspersky Security Center), the
application does not guarantee the security of the data transfer. We recommend that you use other means to
secure the data transfer.
For use of application management tools, it is also recommended to take the following actions to ensure data
security on the intranet:
Use account credentials that meet the requirements for user names and passwords of application user
accounts.
Terminate the Server connection session before the user closes the web browser or Application Console.
To force termination of a connection session in the web browser, you need to use the Log out option in the
user menu. To force termination of a connection session in the Application Console, you need to close the
Console window.
14
What's new
Kaspersky Industrial CyberSecurity for Networks 2.9 has the following new capabilities and re nements:
Asset group tree – you can now manage the tree of asset groups. You can put known assets into groups to
organize these assets according to their purpose, location, or any other attribute.
Labels for assets – you can now add or remove labels for known assets. Labels can contain any user-de ned
text descriptions of assets.
Manage monitoring points – you can now add or remove monitoring points on nodes of the Server and sensors
without having to reinstall application components. To pause or resume tra ic processing, you can simply
disable or enable monitoring points (the functionality for pausing and resuming the Server or sensors has been
discontinued).
Identi cation of protocols based on the contents of network packets – for Network Control and event
registration, the application can now identify individual application-layer protocols based on the data
comprising the payload of network packets.
Unknown Tag Detection – the application can now detect and save information about tags that are not
included in the security policy but are associated with process control devices.
Expanded functionality for saving tra ic for events – you can now enable saving of tra ic for incidents (the
tra ic for all events within incidents will also be saved) and obtain tra ic from temporary dump les if the
tra ic is not found in the database (by requesting to load tra ic).
Collapse the menu on the web interface page – you can now collapse and expand the menu in the left part of
the page of the application web interface. Use the buttons to collapse or expand the menu.
Select all items in tables – you now have the capability to quickly select all items that satisfy the current lter
and search settings in the assets table, Network Control rules table, and events table. You can select all items
by using the key combination CTRL+A or by using the check box in the header of the left-most column of the
table.
Display the number of unprocessed events – an information panel has been added to the Events section to
display information about the number of events that have the New or In progress status.
Use Kaspersky Security Center to download updates – you can now select the Kaspersky Security Center
Administration Server as the source of updates for application modules and databases.
Add a license key from Kaspersky Security Center – you can now add a license key to Kaspersky Industrial
CyberSecurity for Networks using the functionality provided by Kaspersky Security Center for automatic
distribution of license keys.
Expanded functionality of the application programming interface (API) – you can now receive asset information
from the assets table.
Information about working with the application is provided in Online Help format – information about installing,
con guring, and using Kaspersky Industrial CyberSecurity for Networks (including about using the Kaspersky
Industrial CyberSecurity for Networks API) is published on the Kaspersky Online Help page. Online Help
provides convenient tools for searching, viewing, and printing information, and for receiving electronic
documents in PDF format.
15
Extended support for application layer protocols: there are now additional capabilities for analyzing tra ic of
supported application layer protocols and new supported protocols have been added.
16
Application architecture
Kaspersky Industrial CyberSecurity for Networks includes the following components:
The Server is the main component that receives and processes industrial network tra ic information, saves it
and provides data (for example, events and asset information). The application may have only one Server.
The Web Server provides the interface for connecting to the Server through a web browser (web interface).
Application users can use the web interface to view data provided by the Server and manage operation of the
application. The web server is installed on the computer that acts as the Server. Certi cates are used for a
secure connection with the Web Server.
The Console provides the graphical interface for connecting to the Server. Application users can use the
Console to con gure the functionality that cannot be con gured through the web interface. The Console is
installed on the computer that acts as the Server.
A sensor receives a copy of industrial network tra ic, processes the obtained data and relays it to the Server.
Sensors are installed on separate computers (not on a computer that performs Server functions). The
application can have up to 32 sensors.
The Kaspersky Industrial CyberSecurity for Networks Server performs the following functions:
Receives tra ic information from Kaspersky Industrial CyberSecurity for Networks sensors and/or
independently receives a copy of industrial network tra ic.
Processes incoming requests from the Web Server and the Console, and provides the requested data.
Transmits events to Kaspersky Security Center and recipient systems (for example, to a SIEM system).
The Web Server interacting with the Server provides the following capabilities to an application user:
View information about assets, events, and process parameters in online mode.
A Kaspersky Industrial CyberSecurity for Networks sensor performs the following functions:
Extracts information about device communications and process parameters from industrial network tra ic.
Relays events, information about tra ic, and information about process parameters to the Kaspersky Industrial
CyberSecurity for Networks Server.
Sensors and/or the Server receive a copy of industrial network tra ic from monitoring points. You can add
monitoring points to network interfaces detected on nodes that have application components installed.
Monitoring points must be added to network interfaces that relay tra ic from the industrial network.
You can add no more than 8 monitoring points on a sensor and no more than 4 monitoring points on the Server. You
can use no more than 32 monitoring points total in the application.
All network interfaces with added monitoring points must be connected to the industrial network in such a
way that excludes any possibility of impacting the industrial network. For example, you can connect using
ports on industrial network switches con gured to transmit mirrored tra ic (Switched Port Analyzer, SPAN).
Application users can connect to the Server through the web interface or the Console on a computer that
performs Server functions, or connect remotely. However, only a remote desktop system can be used to work
remotely with the Console.
It is recommended to use a dedicated Kaspersky Industrial CyberSecurity network for the connections between
nodes that have installed components of Kaspersky Industrial CyberSecurity for Networks and other components
of Kaspersky Industrial CyberSecurity (Kaspersky Industrial CyberSecurity for Nodes, Kaspersky Security Center).
Network equipment used for interaction between components in the dedicated network must be installed
separately from the industrial network. Normally, the following computers and devices should be connected to the
dedicated network:
Network switch.
18
Installing and removing the application
This section contains step-by-step instructions on installing and removing Kaspersky Industrial CyberSecurity for
Networks.
The Kaspersky Industrial CyberSecurity for Networks Server is installed together with the Console. Installation of
the Server is accompanied by installation of a Web Server that facilitates connection to the Server through the
web interface.
Regardless of the installation method, it is recommended to use a special dedicated network for connecting
Kaspersky Industrial CyberSecurity components (Kaspersky Industrial CyberSecurity for Networks, Kaspersky
Industrial CyberSecurity for Nodes, Kaspersky Security Center). The dedicated network's minimum bandwidth
requirements for installation of the Kaspersky Industrial CyberSecurity for Networks Server and sensors are
provided in the Hardware and software requirements section.
When installing a Server without sensors, all industrial network tra ic must be received by the computer that
performs Server functions. You can apply this installation method if the computer has a su icient number of
network interfaces that will receive tra ic from all segments of the industrial network. After the application is
installed, you need to add monitoring points to these network interfaces. Monitoring points are added when
connected to the Server through the web interface. You can use no more than 4 monitoring points on the Server.
The example in the gure below shows deployment of the Server without sensors. The network interfaces of the
computer that performs Server functions are connected to the SPAN ports of network switches (SPAN ports and
connections are marked in yellow) and receive a copy of tra ic from three segments of the industrial network. The
dedicated Kaspersky Industrial CyberSecurity network is designated by green lines.
19
Example deployment of a Server without sensors
You can use from 2 to 33 computers for installing the Server and sensors. The Server is installed on one of the
computers. The sensors are installed on the other computers. These sensors will receive tra ic from their
respective segments of the industrial network.
After the application is installed, you must add monitoring points on all computers that have sensors installed. If
the computer hosting the Server has a network interface connected to the industrial network, you can also add a
monitoring point to this network interface. Monitoring points are added when connected to the Server through the
web interface.
If the computer has multiple network interfaces that receive tra ic from di erent segments of the industrial
network, you will have to add a monitoring point to each of these interfaces. However, you need to adhere to the
limits on the maximum number of monitoring points:
20
The example in the gure below shows deployment of the Server and three sensors. The network interfaces of
computers that perform sensor functions are connected to the SPAN ports of network switches (SPAN ports and
connections are marked in yellow) and receive a copy of tra ic from their respective segments of the industrial
network. The dedicated Kaspersky Industrial CyberSecurity network is designated by green lines.
The computers have network access, and access over SSH is con gured and open.
You can use the system on the computer from which installation is performed as a user without root
permissions.
For installation of application components, it is recommended to use separate computers on which only
software from the operating system is installed. If third-party applications are installed on computers, the
performance of components of Kaspersky Industrial CyberSecurity for Networks may be reduced.
On all computers on which application components will be installed, set the same password for the user
account with root privileges (application components will be installed under this user account). By default,
the root user account is used to perform the installation. Memorize the user names and password. This
information will be needed when installing the application.
After the application is installed, you are advised to change the passwords for these users.
On the computer that will perform Server functions, create local user accounts (or select existing user
accounts) that will be allowed to start the Application Console. These user accounts will not require root
privileges to execute commands. Local user accounts will be used to sign in to the system and to
subsequently start the Application Console (however, after starting the Console, you will also need to
provide the application user credentials, which might not match the credentials of the local user account).
Remember the names of the created or selected local user accounts. This information will be needed when
installing the application.
The local user accounts that need to be allowed to start the Application Console are indicated when
con guring the application installation settings. These user accounts are automatically included into
the special group named kics4net, which is created in the operating system during installation of the
application. After the application is installed, you can use the standard tools of the operating system to
manually add the necessary user accounts to the kics4net group.
2. Find out and save the following information about the computers:
Name and IP address of the computer that will perform Server functions.
Name or IP address and SSL port of the computer with Kaspersky Security Center.
To display the computer name, you can enter the hostname command in the command line. To display
information about IP addresses and network interfaces, you can enter the sudo ifconfig command in the
command line (in a Windows operating system, use the ipconfig command).
3. On the computer from which the installation will be performed, use the SSH protocol to connect to each
computer to which the application components will be installed. A connection needs to be made to verify
access over SSH.
To connect:
b. After entering this command, perform the necessary actions at the operating system prompts.
4. On the computer from which the installation will be performed, create a folder for storing the installation les.
5. Copy the following les from the Kaspersky Industrial CyberSecurity for Networks distribution kit to the folder
you created:
22
Application installation script kics4net-deploy-<application version number>.bundle.sh
Package for installing the Server and sensors: kics4net-<application version number>.x86_64.rpm
Package for installing Network Agent from the Kaspersky Security Center distribution kit: klnagent64-
<Network Agent version number>.x86_64.rpm
The package for installing Network Agent is required if you want to monitor the state of the application,
receive a license key, and download application updates via Kaspersky Security Center. Network Agent
is a Kaspersky Security Center component that enables interaction between the Kaspersky Security
Center Administration Server and Kaspersky applications that are installed on a speci c node
(workstation or server). For detailed information on Network Agent, please refer to the Kaspersky
Security Center Help system.
The folder with the listed les will be required during installation, modi cation of installation settings, and
uninstallation of the application.
You can use the installation menu to create or modify the application installation con guration and run the
installation procedure in the de ned con guration.
The installation menu has a hierarchical structure of items. The rst level contains the items of the main menu. To
select the necessary option, you must enter its number and press ENTER. If the selected item takes you to another
group of items, a submenu will appear on the screen.
The menu items that de ne the values of settings may have default values or previously de ned values. These
values are displayed in brackets after the item name.
23
Installation menu commands for Server management
You can use the following installation menu commands to manage installation of the Server:
Add Server – adds a new node that will be assigned Server functions. This item is available if the Server has not
yet been added. If you select this option, you need to specify the main settings for the Server when the
following prompts appear:
Enter the IP address of the node for installation – de nes the IP address that will be used for connecting
to the computer over the SSH protocol and installing the Server.
Enter the IP address for connections to the Server – de nes the IP address that will be used by other
components (for example, sensors) to connect to the Server. By default, this is the IP address of the node
used for installing the Server.
Enter Server name – de nes the name of the Server within Kaspersky Industrial CyberSecurity. The Server
name must be unique (not match the names of sensors on other nodes) and must contain no more than 100
characters. You can use letters of the Latin alphabet, numerals, a space, and the following special
characters: _ and - (for example, Server_1). The Server name must begin and end with any permitted
character except a space.
Add the capability for application interaction with Kaspersky Security Center – adds the functionality
that allows use of the Kaspersky Security Center Administration Server to receive a license key and
download updates, and to relay events and application state to Kaspersky Security Center. You do not have
to add this functionality to relay events to other recipient systems. When adding the capability for
application interaction with Kaspersky Security Center, you must specify the IP address / name of the
computer with Kaspersky Security Center and the SSL port for the connection.
If the capability for application interaction with Kaspersky Security Center has been added, the
Network Agent component of Kaspersky Security Center is installed when the application is installed.
Kaspersky Security Center Network Agent is not installed if this component is being used by another
Kaspersky application (to avoid disrupting the interaction between this application and the Kaspersky
Security Center Administration Server). In addition, the functionality for interaction between Kaspersky
Industrial CyberSecurity for Networks and Kaspersky Security Center may be limited if the version of
the installed Network Agent di ers from the version of this component provided in the distribution kit
of Kaspersky Industrial CyberSecurity for Networks.
Enable time synchronization between Server and sensors – enables automatic time synchronization
between the Server and nodes on which sensors are installed.
Enter the IP address or name of the computer with the web server – de nes the IP address or computer
name of the Server for connecting through the web interface.
Enter the web server port number – de nes the port number for connecting through the web interface. If
the default port number (443) is speci ed, the user only needs to enter the IP address or computer name
when connecting through a web browser. In this case, the HTTPS protocol and the port number are
automatically determined.
Enter an application user name – de nes the user name for connecting to the Server and working with the
application. You can enter any unique name using uppercase and lowercase letters of the Latin alphabet,
numerals, dots, and the following special characters: _ and - (for example, Admin_1). The name must
contain from 3 to 20 characters, must begin with a letter, and end with any supported character except a
dot. The speci ed user name will be used only when connecting to the Server through the web interface or
in the Application Console. This user does not have to be registered as an operating system account on the
24
Server computer or other computer. You are prompted to enter a new password for the user when installing
the Server (unless another application user account with the same name is found).
Use self-signed certi cates to connect to web server – lets you select the option to use certi cates for
protecting the connection through the web interface. You can use a self-signed certi cate of the Web
Server or a certi cate that was published by a trusted certi cate authority (hereinafter referred to as a
"trusted certi cate"). If you want to select the option to use a self-signed certi cate, you must enter y at
this prompt. A self-signed certi cate will be created during installation of the Server. If you want to select
the option to use a trusted certi cate, you must enter n at this prompt and then y at the prompt to Use
trusted certi cates to connect to web server. To load a trusted certi cate, you must specify the path to
the trusted certi cate le. This le will be copied to the folder containing web server certi cates during
installation of the Server. If neither option was selected (n has been entered at both prompts), during
installation of the Server either a self-signed certi cate will be created or the existing certi cate in the
folder containing web server certi cates will be used (if a certi cate remained from a previously installed
Server).
If you want to use a trusted certi cate in the application, it must be issued for the same IP address or
computer name that will be indicated by application users when connected through the web interface.
To load a trusted certi cate, you can use a PFX le containing the saved trusted certi cate and private
key. The le must be created without a de ned password for accessing the contents.
Enter the operating system user name for starting the Console – de nes the operating system user
name that will be allowed to start the Kaspersky Industrial CyberSecurity for Networks Console. After
entering a user name, the Specify the name of one more user prompt appears. If you need to allow another
user to start the Console, you need to type y at this prompt and then specify the name of the other user
(this way you can specify multiple users consecutively). After you have speci ed the names of all relevant
users, you need to type n at the Specify the name of one more user prompt. Permission to start the
Console is provided by adding a user to the kics4net group during installation of the Server.
The speci ed user is provided the permission to only start the Console. To work with the Console, the
application user credentials must be entered into the prompt that is displayed immediately after the
Console is started.
Change Server settings – modi es the settings of the added Server. You can use this menu item to change
the main Server settings that can be edited (for example, Web Server settings) and con gure advanced
settings. After selecting this item, you will see a submenu in which you can change the following settings:
Change Server name – changes the name of the Server within Kaspersky Industrial CyberSecurity. This
menu item is analogous to the Enter Server name item in the Add Server menu.
Specify an additional user to run the installation – de nes an additional user account that will be used to
run the installation on the Server node. An additional user account needs to be speci ed if the user name
with root privileges on this node di ers from the user name de ned in the Change the user running the
installation item. The passwords of all user accounts that will be used to run the installation must match.
Enable hardware Watchdog – enables use of the hardware Watchdog. The hardware Watchdog is a
hardware-implemented system for controlling system hangs. If a node has a hardware Watchdog, you can
enable its use in Kaspersky Industrial CyberSecurity for Networks. If the use of a hardware Watchdog is
enabled, specify its path in the Specify path to hardware Watchdog item.
Disable autostart of kics4net – disables autostart of the kics4net service when the operating system
starts.
Set occupied space limit in gigabytes – sets a 500 GB limit on the maximum space that can be occupied
by application les on the hard drive of the node. This menu item is available if the current limit is de ned as
25
a percentage. When you select this item, you can change the default value within the range of 12–
100000 GB. However, if the free space on the node during installation of application components is less
than the de ned limit (including the space occupied by existing application les remaining from the previous
installation of application components), the installation ends with an error.
Set occupied space limit as a percentage of free disk space – enables a limit equal to 90% of free disk
space as the maximum space that can be occupied by application les on the hard drive of the node. This
menu item is available if the current limit is set in gigabytes. When you select this item, you can change the
default value within the range of 1–100%. During installation of application components, the application will
determine the free disk space on the hard drive of this node. The application will then convert the de ned
value into gigabytes and save the obtained result as the active limit. However, if the free space on this node
during installation of application components is less than 12 GB (including the space occupied by existing
application les remaining from the previous installation of application components), the installation ends
with an error.
Change the set occupied space limit – changes the current maximum space that can be occupied by
application les on the hard drive of the node. The range of possible values depends on the measurement
units of the currently de ned limit (as a percentage or in gigabytes). For details about determining the free
disk space on a hard drive depending on the measurement units, please refer to the sections titled Set
occupied space limit in gigabytes and Set occupied space limit as a percentage of free disk space.
Add the capability for application interaction with Kaspersky Security Center – adds the functionality
enabling the application to interact with Kaspersky Security Center (if this functionality was not already
added). This menu item is analogous to the Add the capability for application interaction with Kaspersky
Security Center item in the Add Server menu.
Change the IP address or name of the computer with Kaspersky Security Center – modi es the IP
address / name of the computer with Kaspersky Security Center (if the capability for application interaction
with Kaspersky Security Center has been added).
Change SSL port number of computer with Kaspersky Security Center – modi es the SSL port used for
connecting to the computer with Kaspersky Security Center (if the capability for application interaction
with Kaspersky Security Center has been added).
Disable the capability for application interaction with Kaspersky Security Center – removes the
capability for application interaction with Kaspersky Security Center.
Change the settings for connecting to the Server via API – changes the settings for inbound and
outbound connections using the Kaspersky Industrial CyberSecurity for Networks API. When modifying
settings, you can specify another computer name on which the gRPC server is running. This name must
match the name of the computer that performs Server functions. You can also generate new certi cates
for connecting to Kaspersky Industrial CyberSecurity for Networks through the API (if the computer name
was changed or if you need to update the current certi cates for other reasons).
Change the IP address or name of the computer with the web server – modi es the IP address or
computer name of the Server for connecting through the web interface.
Change the web server port number – modi es the port number for connecting through the web
interface. If the default port number (443) is speci ed, the user only needs to enter the IP address or
computer name when connecting through a web browser. In this case, the HTTPS protocol and the port
number are automatically determined.
Change the application user name – changes the previously de ned user name for connecting to the
Server and working with the application. You can enter any unique name using uppercase and lowercase
letters of the Latin alphabet, numerals, dots, and the following special characters: _ and - (for example,
Admin_1). The name must contain from 3 to 20 characters, must begin with a letter, and end with any
supported character except a dot. The speci ed user name will be used only when connecting to the Server
through the web interface or in the Application Console. This user does not have to be registered as an
26
operating system account on the Server computer or other computer. When changing the name of an
existing application user, the old user account is not deleted, and a new user account is created. You are
prompted to enter a new password for the user when reinstalling the application (unless another application
user account with the same name is found).
Change web server certi cate settings – modi es the settings for using certi cates to protect the
connection through the web interface. Certi cate usage settings are changed similarly to the Use self-
signed certi cates to connect to web server option in the Add Server menu.
Add an operating system user for starting the Console – adds an operating system user that will be
allowed to start the Kaspersky Industrial CyberSecurity for Networks Console. This menu item is analogous
to the Enter the operating system user name for starting the Console item in the Add Server menu.
Change the operating system user name for starting the Console – changes the added operating system
user name that is allowed to start the Kaspersky Industrial CyberSecurity for Networks Console (for
example, if the name of the operating system user account changed).
Remove the operating system user for starting the Console – revokes the operating system user's
permission to start the Console. Permission is revoked by removing the user from the kics4net group during
reinstallation of the application.
Create database again – deletes the existing database and creates a new one during reinstallation of the
application.
If you select this menu item, information in the existing database will be lost after Server installation.
Add sensor – adds a new node that will be assigned sensor functions. If you select this option, you need to
specify the main settings for the sensor when the following prompts appear:
Enter the IP address of the node for installation – de nes the IP address that will be used for connecting
to the computer over the SSH protocol and installing the sensor.
Enter sensor name – de nes the name of the sensor within Kaspersky Industrial CyberSecurity. The sensor
name must be unique (not match the names of other sensors or the Server) and must contain no more than
100 characters. You can use letters of the Latin alphabet, numerals, a space, and the following special
characters: _ and - (for example, Sensor_1). The sensor name must begin and end with any permitted
character except a space.
Change sensor settings – modi es the settings of the added sensor. You can use this menu item to change
the main sensor settings that can be edited (for example, its name) and con gure advanced settings. Selecting
this menu item displays a list of nodes on which sensors have been added. After selecting a node, you will see a
submenu in which you can change the following settings:
Change sensor name – changes the name of the sensor within Kaspersky Industrial CyberSecurity. This
menu item is analogous to the Enter sensor name item in the Add sensor menu.
27
Specify an additional user to run the installation – de nes an additional user account that will be used to
run the installation on the sensor node. This menu item is analogous to the Specify an additional user to
run the installation item in the Change Server settings menu.
Enable hardware Watchdog – enables use of the hardware Watchdog. This menu item is analogous to the
Enable Hardware Watchdog item in the Change Server settings menu.
Disable autostart of kics4net – disables autostart of the kics4net service when the operating system
starts.
Set occupied space limit in gigabytes – sets a 500 GB limit on the maximum space that can be occupied
by application les on the hard drive of the node. This menu item is available if the current limit is de ned as
a percentage. When you select this item, you can change the default value within the range of 8–
100000 GB. However, if the free space on the node during installation of application components is less
than the de ned limit (including the space occupied by existing application les remaining from the previous
installation of application components), the installation ends with an error.
Set occupied space limit as a percentage of free disk space – enables a limit equal to 90% of free disk
space as the maximum space that can be occupied by application les on the hard drive of the node. This
menu item is available if the current limit is set in gigabytes. When you select this item, you can change the
default value within the range of 1–100%. During installation of application components, the application will
determine the free disk space on the hard drive of this node. The application will then convert the de ned
value into gigabytes and save the obtained result as the active limit. However, if the free space on this node
during installation of application components is less than 8 GB (including the space occupied by existing
application les remaining from the previous installation of application components), the installation ends
with an error.
Change the set occupied space limit – changes the current maximum space that can be occupied by
application les on the hard drive of the node. The range of possible values depends on the measurement
units of the currently de ned limit (as a percentage or in gigabytes). For details about determining the free
disk space on a hard drive depending on the measurement units, please refer to the sections titled Set
occupied space limit in gigabytes and Set occupied space limit as a percentage of free disk space.
Remove sensor – removes the sensor node. Selecting this item displays a list of nodes on which sensors have
been added.
Change the user running the installation – de nes the user name with root privileges that runs the installation
of application components. The same password for the user accounts that will run the installation must be set
on all computers. The password must be entered during installation of components.
Change interface language – de nes the localization language for components of Kaspersky Industrial
CyberSecurity for Networks (Console, sensors, and Server) and the data that comes from them.
View application installation settings – displays the list of installation settings and their values.
28
Save settings and start installation – install the Kaspersky Industrial CyberSecurity for Networks application
components according to the de ned installation settings. The de ned settings are saved in the installation
settings le. The application installation script saves the installation settings le on each computer on which the
script is run.
Save settings and exit without installing – save changes to the installation settings le, terminate the
application installation script, and exit without installing components.
Exit without saving settings – terminate the application installation script without saving changes to the
installation settings le.
During installation of the application, by default the script veri es the checksums of packages in the folder
containing the saved les from the distribution kit. This lets you verify the integrity of les from the application
installation packages by comparing the calculated checksums of packages with their reference values. If a
calculated checksum for even one package does not match the reference value, the installation script stops.
It is recommended to install the application with validation of the package checksums enabled. If necessary,
you can disable validation of package checksums. However, correct installation of application components
cannot be guaranteed if you do so.
1. On the computer from which the installation will be performed, go to the folder containing the saved les from
the distribution kit of Kaspersky Industrial CyberSecurity for Networks.
If for some reason you need to enable validation of the checksums of packages used for application
installation, you can enter the script startup command with the --skip-checksum-validation switch.
This switch is intended only for testing and must not be used during normal installation of the application.
The screen prompts you to choose the language of the installation menu.
3. Select the language that you want to use in the installation menu.
The choice of the installation menu language does not a ect the localization of the Kaspersky Industrial
CyberSecurity for Networks components. To change the localization language of components, use the
Change interface language menu item.
29
4. If the application installation script was run without the --skip-checksum-validation switch, after
selecting the language for the installation menu, the script runs a veri cation of the checksums of packages in
the folder containing the saved les from the distribution kit. Wait for validation of the package checksums to
complete.
If a calculated checksum for even one package does not match the reference value, the installation script
stops. In this case, replace the corrupted les with the original les from the distribution kit and run the
application installation script again.
5. In the menu for selecting the installation option, select Run new installation.
The main installation menu appears on the screen.
a. Click the Add Server menu item to add the Kaspersky Industrial CyberSecurity for Networks Server.
Specify the IP addresses, name, and other main settings for the Server in the prompts that appear.
You can con gure advanced settings for the Server (for example, change the default limit on occupied disk
space). Use the Change Server settings menu item to con gure advanced settings.
b. If the Server is installed with sensors, use the Add sensor menu item to add nodes of sensors. For the
sensors, specify the IP addresses and names in the prompts that appear.
You can con gure advanced settings for sensors (for example, change the default limit on occupied disk
space). Use the Change sensor settings menu item to con gure advanced settings.
c. Use the Change the user running the installation menu item to specify the user account with root
privileges that will be used to install the application on computers. This account will be used on those nodes
for which no additional account was speci ed when con guring advanced settings of the Server or sensors.
d. Using the Change interface language menu item, select the localization language for components of
Kaspersky Industrial CyberSecurity for Networks.
7. When nished con guring the settings, select Save settings and start installation.
8. When the screen displays a message prompting you to read the terms of the End User License Agreement and
Privacy Policy, press ENTER.
The text of the End User License Agreement will appear on the screen.
10. If you fully agree to the terms of the End User License Agreement, select I con rm that I have fully read,
understand, and accept the terms and conditions of this End User License Agreement.
If you do not accept the terms of the End User License Agreement, cancel application installation by
selecting I decline the terms of the End User License Agreement.
11. When you see a message about viewing the Privacy Policy, press ENTER.
The text of the Privacy Policy will appear on the screen.
If you do not agree to the terms of the Privacy Policy, cancel application installation by selecting I decline
the terms of the Privacy Policy.
After you accept the terms of the Privacy Policy, the screen will prompt you to enter the password of the user
running the installation.
14. Enter the password of the user running the installation. The password must be entered twice: rst in the SSH
password prompt and then in the SUDO password prompt.
The installation script will begin the installation of components. During installation, the screen will display service
messages regarding operations being completed.
15. When the prompt appears for entering the password of the application user (the user name that was speci ed
during con guration of the Server), enter the new user password.
You can use uppercase and lowercase letters of the Latin alphabet, numerals, and the following special
characters: ( ) . , : ; ? ! * + % - < > @ [ ] { } / \ _ $ #.
The password must meet the following requirements:
After installation is complete, Kaspersky Industrial CyberSecurity for Networks does not monitor the industrial
network (monitoring points have not been added to network interfaces of nodes that have application
components installed). To use the application, you need to perform the necessary actions to prepare the
application for operation.
By reading the les named license_en.txt and privacy_policy_en.txt. These les are included in the application
distribution kit, and are saved in the application installation folder.
During the installation of Kaspersky Industrial CyberSecurity for Networks, the texts of the End User License
Agreement and Privacy Policy are displayed using the text terminal program known as "less". This program provides
the capability to scroll through text, perform a search, copy, and perform other actions on text, except for editing.
When viewing the End User License Agreement or Privacy Policy, the lower part of the screen displays an
information bar containing the following data:
31
Document name.
Main keyboard shortcuts for navigating through the text (cursor control keys).
After the End User License Agreement or Privacy Policy is loaded, the installer waits for the end of text viewing in
the "less" program. Text viewing in the "less" program ends in the following cases:
An attempt is made to scroll the text further down than its last line.
After the text of the End User License Agreement or Privacy Policy has been viewed, the installer displays a menu
in which you can select your next actions. When necessary, you can display the text again by selecting the Read
the terms of the End User License Agreement again or Read the terms of the Privacy Policy again menu item.
Like the installation procedure, reinstallation of components of Kaspersky Industrial CyberSecurity for Networks is
performed using the application installation script named kics4net-deploy-<application version number>.bundle.sh.
1. Run the application installation script by completing steps 1–4 of the installation procedure.
2. In the menu for selecting the installation option, select Edit settings of current installation.
The main installation menu appears on the screen.
Using the Change Server settings menu item, specify the necessary settings for the Server.
32
You cannot change the IP address of the Server. If you want to change the IP address, you need to rst
remove the existing Server and then add it again with the new IP address by using the Add Server menu item
(this menu item appears if a Server has not been added).
If the Server was installed with sensors, use the Change sensor settings menu item to specify the
necessary settings for the sensors.
You cannot change the IP address of a previously added sensor. If you want to change the IP address, you
need to rst remove the existing sensor and then add it again with the new IP address by using the Add
sensor menu item. You can also use this menu item to add new sensors.
Use the Change the user running the installation menu item to specify the user name of the account with
root privileges that will be used to install the application on computers. This account will be used on those
nodes for which no additional account was speci ed when con guring advanced settings of the Server or
sensors.
Using the Change interface language menu item, select the localization language for components of
Kaspersky Industrial CyberSecurity for Networks.
4. When nished con guring the settings, select Save settings and start installation.
5. If the previous installation of Kaspersky Industrial CyberSecurity for Networks was performed by a di erent
user:
a. When the screen displays a message prompting you to read the terms of the End User License Agreement
and Privacy Policy, press ENTER.
The text of the End User License Agreement will appear on the screen.
c. If you fully agree to the terms of the End User License Agreement, select I con rm that I have fully read,
understand, and accept the terms and conditions of this End User License Agreement.
If you do not accept the terms of the End User License Agreement, cancel application installation by
selecting I decline the terms of the End User License Agreement.
d. When you see a message about viewing the Privacy Policy, press ENTER.
The text of the Privacy Policy will appear on the screen.
f. If you fully accept the terms of the Privacy Policy, select I understand and agree that my data will be
processed and transmitted (including to third-party countries) in accordance with the Privacy Policy. I
con rm that I have fully read and understand the terms of the Privacy Policy.
If you do not agree to the terms of the Privacy Policy, cancel application installation by selecting I
decline the terms of the Privacy Policy.
33
After you accept the terms of the Privacy Policy, the screen will prompt you to enter the password of the
user running the installation.
6. Enter the password of the user running the installation. The password must be entered twice: rst in the SSH
password prompt and then in the SUDO password prompt.
The installation script will begin the installation of components. During installation, the screen will display service
messages regarding operations being completed.
7. When the prompt appears for entering the password of the application user (the user name that was speci ed
during con guration of the Server), enter the new user password. The password prompt is displayed if the
speci ed user name does not match the user name of any other application user.
You can use uppercase and lowercase letters of the Latin alphabet, numerals, and the following special
characters: ( ) . , : ; ? ! * + % - < > @ [ ] { } / \ _ $ #.
The password must meet the following requirements:
Installation of Kaspersky Industrial CyberSecurity for Networks in non-interactive mode implies that you
accept the terms of the End User License Agreement and Privacy Policy. During a non-interactive installation,
the texts of the End User License Agreement and Privacy Policy are not displayed. You must become familiar
with the terms of the End User License Agreement and Privacy Policy by reading the license_en.txt and
privacy_policy_en.txt les that are included in the application distribution kit.
If you accept the terms of the End User License Agreement and understand and agree that your data will be
processed and transmitted (including to third-party countries) in accordance with the Privacy Policy, and if
you con rm that you have fully read and understand the terms of the Privacy Policy, you can install the
application in silent mode (non-interactive mode) in accordance with the parameters described below.
For non-interactive installation, you must prepare an installation settings le. You can prepare an installation
settings le by using the application installation script named kics4net-deploy-<application version
number>.bundle.sh.
1. Con gure the installation settings by completing steps 1–6 of the installation procedure.
34
2. Save the installation settings le by selecting the Save settings and exit without installing menu item.
The installation settings le named inventory.json is saved in the /home/<user>/.con g/kaspersky/kics4net-
deploy/ folder (the application components will not be installed).
After preparing the installation settings le, you can install the application components in non-interactive mode.
During installation of application components in non-interactive mode, there is no validation of the checksums
of packages in the folder containing the saved les from the distribution kit. You can verify the checksums of
packages by completing steps 1–4 of the installation procedure prior to starting installation of components in
non-interactive mode.
1. On the computer from which the installation will be performed, go to the folder containing the saved les from
the distribution kit of Kaspersky Industrial CyberSecurity for Networks.
--accept-eula – accepts the terms of the End User License Agreement (mandatory parameter).
In addition to the mandatory settings listed above, you may also specify the following settings for running the
installation script:
-i <path to the installation settings file> – indicates the full path and name of the installation
settings le. If the setting is not de ned, the inventory.json le located in the
/home/<user>/.con g/kaspersky/kics4net-deploy/ folder is used.
--enable-debug-grpc-server – installs a debug gRPC server. This gRPC server is used for testing
purposes and is not required for normal use of the application.
After you enter a script run command, the screen will prompt you to enter the password of the user running the
installation.
3. Enter the password of the user running the installation. The password must be entered twice: rst in the SSH
password prompt and then in the SUDO password prompt.
The installation script will begin the installation of components. During installation, the screen will display service
messages regarding operations being completed.
4. When the prompt appears for entering the password of the application user (the user name that was speci ed
during con guration of the Server), enter the new user password. The password prompt is displayed if the
speci ed user name does not match the user name of any other application user.
You can use uppercase and lowercase letters of the Latin alphabet, numerals, and the following special
characters: ( ) . , : ; ? ! * + % - < > @ [ ] { } / \ _ $ #.
The password must meet the following requirements:
35
Must contain from 8 to 20 characters.
You can use the application installation script to perform the following actions:
Enable prevention of the startup of operating system services that are not required for the operation of
application components (for example, avahi-daemon and cups).
Change the network con guration settings that impact the security of the operating system (for example,
enable prevention of redirected network packet processing over the ICMP protocol).
The application installation script performs actions that harden the security on all computers on which application
components are installed.
To reinforce security, the script kics4net-deploy-<application version number>.bundle.sh uses the installation
settings le that was saved on the computer. If the installation settings le on this computer is corrupt or
missing from its original folder, the application installation script searches for a copy of the le on the
computer and on other computers that have application components installed.
1. On the computer from which the installation was performed, go to the folder containing the saved les from
the distribution kit of Kaspersky Industrial CyberSecurity for Networks.
-a enables prevention of the startup of operating system services and modi es the network con guration
settings.
3. In the SSH password and SUDO password invitations, enter the password for the user account that is used to
run the installation.
36
Wait for completion of the script kics4net-deploy-<application version number>.bundle.sh. If it completes
successfully, the screen displays information about the actions performed on computers with application
components installed.
You can install the administration plug-in in one of the following ways:
After installation, the Kaspersky Industrial CyberSecurity for Networks Administration Plug-in for Kaspersky
Security Center appears in the list of installed administration plug-ins in the properties of the Kaspersky Security
Center Administration Server. For detailed information on working with the Kaspersky Security Center
Administration Server, please refer to the Kaspersky Security Center Help system.
1. On the computer where the Kaspersky Security Center Administration Server is installed, run the le named
kics4net-sc-plugin_<plug-in version number>_<localization code>.msi from the Kaspersky Industrial
CyberSecurity for Networks distribution kit.
Run the le with the localization code that matches the localization language of Kaspersky Security Center.
1. On the computer where the Kaspersky Security Center Administration Server is installed, open the command
line interface.
<localization code> – localization code of the administration plug-in. Run the le with the localization
code that matches the localization language of Kaspersky Security Center.
<settings for starting MSI files> refers to one or several standard startup settings provided for
Windows Installer. You can receive information about available settings by running a le with the /help
setting.
37
Getting started
After installing components of Kaspersky Industrial CyberSecurity for Networks, you need to prepare the
application for operation. The preparation process consists of the following main stages:
After installing the current version of Kaspersky Industrial CyberSecurity for Networks, you can import the
following data left over from the previous version into the new application:
Security policies. You can import security policies that have been converted using the security policy
conversion utility.
Intrusion Detection rules. Use the rule replacement procedure for imports.
The database format of the current version of Kaspersky Industrial CyberSecurity for Networks is
incompatible with the database format of the previous version of the application. For this reason, after the
upgrade it will be impossible to load events that were registered in the previous version of the application. To
save and view data on previously registered events, you can leave the Server of the previous version and
install a Server of the up-to-date version on a di erent computer. If you do so, you will be able to connect to
the Server of the previous version of the application to view previously registered events.
38
Removing the application
Kaspersky Industrial CyberSecurity for Networks is uninstalled by using the application installation script kics4net-
deploy-<application version number>.bundle.sh. This script lets you remove individual nodes of the Server or
sensors or fully uninstall the current version of the application as well as previous versions (beginning with version
2.0).
For application removal, the script kics4net-deploy-<application version number>.bundle.sh uses the
installation settings le that was saved on the computer. If the installation settings le on this computer is
corrupt or missing from its original folder, the application installation script searches for a copy of the le on
the computer and on other computers that have application components installed.
1. Run the application installation script by completing steps 1–4 of the installation procedure.
2. In the menu for selecting the installation option, select Edit settings of current installation.
The main installation menu appears on the screen.
After removing the Server node, you need to add a di erent Server node to ensure proper
performance of the application.
Use the Remove sensor menu item to remove a sensor node (if multiple sensors have been added to the
application, select the relevant node in the list of nodes that have added sensors).
4. When nished con guring the settings, select Save settings and start installation.
5. In the SSH password and SUDO password invitations, enter the password for the user account that is used to
perform the uninstallation.
1. Run the application installation script by completing steps 1–4 of the installation procedure.
2. In the menu for selecting the installation option, select Edit settings of current installation.
The main installation menu appears on the screen.
4. If sensors have been added to the application, use the Remove sensor menu item to sequentially remove all
nodes of sensors.
5. Use the Removal settings menu item to con gure advanced settings for uninstallation. When this item is
selected, the following prompts are displayed:
39
Remove the application together with data. If you want to delete all data saved by the application in the
system, enter y. If you do not need to remove the data, enter n.
Remove Network Agent. If you want to remove the Kaspersky Security Center component Network Agent,
enter y. If you do not need to remove this component, enter n. This prompt is displayed if an installed
Network Agent is detected.
7. In the SSH password and SUDO password invitations, enter the password of the user performing the removal.
Removal of Kaspersky Industrial CyberSecurity for Networks does not automatically delete the additional les
from the distribution kit that were manually copied to the computer (for example, the Kaspersky Industrial
CyberSecurity for Networks API package). If necessary, these les can be manually deleted.
40
Starting and stopping the application
Application components installed on a computer are started automatically when the operating system of the
computer is loaded.
Kaspersky Industrial CyberSecurity for Networks receives industrial network tra ic through monitoring points.
After installation of Kaspersky Industrial CyberSecurity for Networks, there are no monitoring points on nodes
that have application components installed. To perform industrial network control functions, you need to add
monitoring points to nodes. If you need to pause the receipt and processing of tra ic through a monitoring
point, you can disable it.
To manage operation of the application and view information, you can connect to the Server through a web
browser or start the Application Console.
To connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser:
<Server name> – IP address or computer name of the Server that was speci ed during installation of the
Web Server.
<port> – port number that was speci ed during installation of the Web Server.
If the default port number (443) was speci ed during installation of the Web Server, you only need to enter
the IP address or computer name of the Server in the address bar. In this case, the HTTPS protocol and the
port number will be automatically determined.
3. On the account credentials entry page, enter the user name and password of the application user.
In the web browser window, you will see the Kaspersky Industrial CyberSecurity for Networks web interface
page.
A Server connection session has a time limit. A session remains active for 10 hours. If 10 hours have passed since
the connection was established, the current page of the application web interface switches to the page for
entering account credentials. If this happens, to continue working you will need to re-enter your application user
name and password.
41
Closing a Server connection session through a web browser
When you are done working with Kaspersky Industrial CyberSecurity for Networks through the web interface,
perform the necessary actions to close the connection session in the web browser.
If you close the web browser window without closing the connection session, the session remains active. An
unclosed session remains active for up to 10 hours. During this time, the application can grant access to the
Kaspersky Industrial CyberSecurity for Networks web interface without prompting for user account
credentials, provided that the connection is used by the same computer, web browser, and operating system
account.
To close the connection session with the Kaspersky Industrial CyberSecurity for Networks Server through a web
browser:
1. On the Kaspersky Industrial CyberSecurity for Networks web interface page, open the user menu.
If the menu is expanded, click the button on the right of the name of the current user.
The web browser window shows the page for entering account credentials.
To start the Console, you must provide application user account credentials.
1. In the applications start menu, select Applications → System → Kaspersky Industrial CyberSecurity for
Networks.
You will see a window for entering account credentials.
A Server connection session has a time limit. A session remains active for 10 hours. If 10 hours have passed since
the connection was established, the Console session will terminate and the screen shows the window for entering
account credentials. If this happens, to continue working you will need to re-enter your application user name and
password.
After the Console closes, Kaspersky Industrial CyberSecurity for Networks Server continues running.
43
Application interface
This section describes the primary application interface elements.
The page contains elds for entering a user name and password, and the Log in button.
The menu is displayed in the left part of the page. The contents of the selected section are displayed on the right.
After the user signs in, the menu contains the following elements:
– expands and collapses the menu to increase free space on the page. If the menu is collapsed, only the
images of elements are displayed within it.
44
– opens a list of noti cations regarding application operating issues. If noti cations are available, the
noti cation status icon is displayed nearby.
– opens a list of background operations. This list contains information about operations that take a long time
(for example, creating a le when exporting a large number of events). If there are active background
operations, the number and status of active operations is displayed nearby (green or red if there are operations
with errors).
– displayed if some application functions are disabled or if learning mode is enabled for functions. If the
menu is expanded, a message about disabled protection functions is displayed next to it. Clicking this icon or
text opens a window containing information about disabled protection functions.
– opens and closes the user menu if the menu is collapsed. If the menu is expanded, nearby you will see the
name of the current user and its role (in this case, you can use the button on the right to open and close the
user menu). The user menu consists of the following sections:
Language – lets you select the language of the application web interface: English or Russian.
The selected localization language of the application web interface does not a ect the localization
language of the Kaspersky Industrial CyberSecurity for Networks Server and Console. These
components use the localization language that was de ned during installation or reinstallation of
Kaspersky Industrial CyberSecurity for Networks. Therefore, the localization language of data provided
by the Server may di er from the selected localization language of the web interface. For example,
events and messages received from the Server (including some error messages) are displayed in the
localization language of the Server.
User account – groups menu items for performing actions with the account of the current user:
Change password – opens the window for changing the password of the current user.
Log out – ends the Server connection session and opens the page for entering the account credentials
for connecting.
Help – opens the Online Help page for Kaspersky Industrial CyberSecurity for Networks.
45
Dashboard section
In the Dashboard section of the application web interface (see the gure below), you can view the number of
devices in the industrial network and information about the latest registered events and incidents in online mode.
Dashboard section
Events – contains information about the events and incidents that have the most recent values for the date
and time of last occurrence.
The location of sections is xed. The sections are automatically resized depending on the current size of the web
browser window.
Assets section
In the Assets section of the application web interface (see the gure below), you can view and edit information
about known assets.
46
Assets section
The upper part of the Assets section has a toolbar containing the following elements for managing the assets
table:
Con gure groups – opens a window for creating an asset group tree. In this window, you can add or remove
asset groups, arrange them in the tree, and rename them.
Customize table – opens a window for con guring how the assets table is displayed. In this window, you can
specify the columns to display and change the order in which they are displayed.
Search eld – lets you enter a query to search the assets table.
Security states – groups buttons for selecting the option to lter assets by security state.
Clear lter – resets the de ned assets lter and search settings to their default state. The button is displayed
if search or lter settings are de ned.
The assets table is located in the main part of the Assets section. The table contains the columns speci ed during
con guration of the displayed columns. You can sort and lter rules based on values in the columns.
When one or multiple assets are selected, the details area opens in the right part of the web interface window. This
area contains information about the selected assets and the tools for managing them.
47
Network map section
The upper part of the Network map section has a toolbar containing the following management elements:
Manage views – opens a window for saving and applying the network map display settings.
Con gure groups – opens a window for creating an asset group tree. In this window, you can add or remove
asset groups, arrange them in the tree, and rename them.
Search eld – lets you enter a query to search nodes on the network map.
Asset statuses – lets you con gure ltering of nodes by asset status.
Link severity levels – lets you con gure ltering of links based on the severity of their associated events.
Protocols – lets you con gure ltering of links based on their communication protocols.
Asset states – lets you con gure ltering of nodes based on the security states of assets.
Asset categories – lets you con gure ltering of nodes by asset category.
OSI model layers – lets you con gure ltering of links based on the levels of communications corresponding to
the layers of the OSI model (Open Systems Interconnection) for the network protocol stack.
Linked assets – enables and disables the display of all nodes that have communicated with the ltered nodes
(regardless of the de ned lter settings).
Clear lter – resets the de ned object lter settings to their default state. This button is displayed if lter
settings have been de ned.
The network map display area shows nodes, links, and asset groups. The left part of the display area contains the
following toolbars:
Horizontal panel containing the + and – buttons for changing the scale, and the button for automatic
positioning of the network map.
48
– pins all the displayed nodes and collapsed groups.
When one or multiple nodes or collapsed groups are selected, or when a link is selected, the details area opens in
the right part of the web interface window. This area contains information about the selected objects and the
tools for managing them.
The lower part of the Network map section contains a time scale that you can use to select the period for ltering
nodes and links based on the time of their communications.
Events section
In the Events section of the application web interface (see the gure below), you can view and process events and
incidents registered by the application.
Events section
The upper part of the Events section has a toolbar containing the following elements for managing the table:
Export – lets you export information about all events and incidents with respect to the current lter and search
settings in the events table.
49
Customize table – opens a window for con guring how the events table is displayed. In this window, you can
enable or disable the display of the information panel, select the display mode for events and incidents, and
specify the displayed columns and change the order in which they are displayed.
Update table – enables and disables automatic update of the events table. Automatic update is enabled by
default. When automatic update is enabled, the table of registered events is updated in online mode. In this
case, the table is sorted by the Last seen column in descending order of the dates and times when the
conditions for event registration occurred. If you choose to sort by another column, the events table will no
longer be updated.
Search eld – lets you enter a query to search for events and incidents in the table.
Information panel – contains a chart showing the ratio between events with the New status and events with the
In progress status. On the right of the chart is the number of events with these statuses in the database. You
can enable and disable the display of the information panel in the window that lets you con gure the display of
the events table.
Severity – groups buttons for enabling and disabling the ltering of events and incidents based on their
importance level: Informational , Warning and Critical .
Technologies – groups buttons for enabling and disabling event ltering based on technology: Deep Packet
Inspection (DPI), Network Integrity Control (NIC), Intrusion Detection (IDS), Command Control (CC),
External (EXT) and Asset Management (AM).
Period – lets you lter events and incidents by time period. You can select one of four standard periods or
manually specify a period using the Specify a period option. When manually con guring the period, you will see
additional elds for selecting the date and time of the beginning and end of the period. If you manually specify a
period, the table will no longer be updated.
Clear lter – resets the de ned events lter and search settings to their default state. The button is displayed
if search or lter settings are de ned.
The main part of the Events section shows a table containing information about registered events and incidents.
The information is presented in the columns con gured to be displayed. You can sort and lter events and
incidents based on values in the columns.
When events or incidents are selected, the details area opens in the right part of the web interface window. This
area contains information about the selected events and incidents and the tools for managing them.
Tags section
In the Tags section of the application web interface (see the gure below), you can view tags with process
parameter values and monitor the current state of Kaspersky Industrial CyberSecurity for Networks.
50
Tags section
The following information about the current state of Kaspersky Industrial CyberSecurity for Networks is displayed
in the upper part of the Tags section:
Application state – current operating state of the application. The following application state information may
be displayed: No problems detected, An error occurred, and Unknown.
Total uptime – application operating time that has elapsed since the rst startup of Kaspersky Industrial
CyberSecurity for Networks until the current time. It includes periods of normal operation of the application
(without incidents) and periods when the operation of the application was disrupted.
E ective uptime – duration of normal operation of the application (without incidents) since the most recent
launch of Kaspersky Industrial CyberSecurity for Networks until present.
Since rst start – application operating time that has elapsed since the rst startup of Kaspersky Industrial
CyberSecurity for Networks. It includes periods of normal operation (without incidents), periods when
operation was disrupted, and periods when the Kaspersky Industrial CyberSecurity for Networks Server was
shut down.
The table of process parameters contains the tags that are speci ed in Process Control rules. The columns in the
table contain the following information about tags:
Tag name – tag name de ned in the list of devices and tags.
ID – numerical ID of the tag. It is assigned when a tag is added to the list of devices and tags.
Description – brief description of a tag de ned in the list of devices and tags.
You can sort tags based on the values in columns, except for the Value column.
51
Network Control section
In the Network Control section of the application web interface (see the gure below), you can manage Network
Control rules.
The upper part of the Network Control section has a toolbar containing the following elements for managing the
table of Network Control rules:
Customize table – opens a window for con guring how the Network Control rules table is displayed. In this
window, you can specify the columns to display and change the order in which they are displayed.
Refresh – appears in the upper part of the Network Control section if autoupdate of the rules table is
disabled.
Search eld – lets you enter a query to search the rules table.
Rules – displays the total number of Network Control rules (including rules that are not currently displayed).
Technologies – groups buttons for ltering rules by technology: Command Control (CC) and Network Integrity
Control (NIC).
Address information – lets you con gure ltering of rules based on the address information contained in the
rules.
52
Clear lter – resets the de ned rules lter and search settings to their default state. The button is displayed if
search or lter settings are de ned.
The network control rules table is located in the main part of the Network Control section. The table contains the
columns speci ed during con guration of the displayed columns. You can sort and lter rules based on values in
the columns.
When one or multiple rules are selected, the details area opens in the right part of the web interface window. This
area contains information about the selected rules and the tools for managing them.
Settings section
The Settings section of the application web interface may contain the following tabs:
Deployment
On the Deployment tab in the Settings section (see the gure below), you can view information about
nodes that have application components installed, and about network interfaces and monitoring points on
nodes. If a user account with the Administrator role was used to connect to the Server, you can also
manage monitoring points on this tab.
The Deployment tab contains the tiles of nodes that have application components installed (on the left)
and tiles of the network interfaces on these nodes (on the right of each node). When you select a node tile
or network interface tile, the details area appears in the right part of the window.
Technologies
53
On the Technologies tab in the Settings section (see the gure below), you can manage the technologies
and methods used for analyzing tra ic in Kaspersky Industrial CyberSecurity for Networks. The
Technologies tab is displayed if a user account with the Administrator role was used to connect to the
Server.
The Technologies tab contains a list of technologies and methods for which you can change the states
and operating modes.
Users
On the Users tab in the Settings section (see the gure below), you can manage application user
accounts. The Users tab is displayed if a user account with the Administrator role was used to connect to
the Server.
The Users tab contains tiles for application users and a tile with the plus (+) icon for adding user accounts.
54
Application messages
On the Application messages tab in the Settings section (see the gure below), you can view messages
about application operation.
The upper part of the Application messages tab has a toolbar containing the following management
elements:
Search eld – lets you enter a query to search messages in the table.
Period – lets you lter application messages by time period. You can select one of four standard
periods or manually specify a period using the Specify a period option. When manually con guring the
period, you will see additional elds for selecting the date and time of the beginning and end of the
period. If you manually specify a period, the table will no longer be updated.
Statuses – lets you con gure ltering of messages based on their statuses.
Clear lter – resets the de ned message lter and search settings to their default state. The button is
displayed if search or lter settings are de ned.
Below is a table containing information about registered application messages. You can sort and lter
messages based on values in the table columns.
Audit
55
On the Audit tab in the Settings section (see the gure below), you can view audit log entries and enable
or disable the user activity audit. The Audit tab is displayed if a user account with the Administrator role
was used to connect to the Server.
The upper part of the Audit tab has a toolbar containing the following management elements:
Customize table – opens a window for con guring how the audit entries table is displayed. In this
window, you can specify the columns to display and change the order in which they are displayed.
Search eld – lets you enter a query to search entries in the table.
User activity audit: enabled / disabled – enables or disables the user activity audit.
Period – lets you lter audit entries by time period. You can select one of four standard periods or
manually specify a period using the Specify a period option. When manually con guring the period, you
will see additional elds for selecting the date and time of the beginning and end of the period. If you
manually specify a period, the table will no longer be updated.
Result – groups buttons for enabling and disabling audit entry ltering based on the results of actions:
Success and Failure .
Clear lter – resets the de ned entries lter and search settings to their default state. The button is
displayed if search or lter settings are de ned.
Below is a table containing information about registered audit entries. You can sort and lter entries based
on values in the table columns.
The displayed tabs depend on which role is assigned to the user who established the connection to the Server.
56
Elements of the Kaspersky Industrial CyberSecurity for Networks Console
interface
The window of the Kaspersky Industrial CyberSecurity for Networks Console contains a title, main menu, tab
display area, and application state bar.
The title of the Console window displays the application name and the name of the security policy that is open in
the Console. The security policy name is enclosed in square brackets. If changes to the security policy have not
been saved, the security policy name is marked with the * character.
Under the title of the Console window is the application's main menu, which contains the following items:
Manage security policy – groups menu items used for performing actions with security policies of Kaspersky
Industrial CyberSecurity for Networks:
Save – saves changes to the current security policy (if you are saving it for the rst time, you will see a
window for selecting the folder to save it in).
Save as – lets you save the security policy in the selected folder (you will see a window for selecting the
folder to save it in).
Load from Server – loads the security policy that is applied on the Server in the Console.
Properties – opens a window containing information about the security policy that is currently open in the
Console and information about the security policy that is running on the Server.
Recent – contains items that let you quickly open one of the security policies that was recently opened in
the Console (each menu item contains a security policy name and path to the folder containing the security
policy les).
Settings – groups menu items used for opening management and con guration windows:
Server and sensors – opens a window for viewing general information about nodes that have application
components installed and for changing the log levels for application process logs.
Logs – opens a window in which you can edit the settings for storing entries in application logs, and edit the
settings for storing tra ic saved during event registration.
Update – opens a window for con guring settings and starting an update.
License key – opens a window for viewing information about the update license key, and also provides the
capability to add or remove the license key.
Intrusion detection
The status bar of Kaspersky Industrial CyberSecurity for Networks is located in the lower part of the Console
window. The status bar displays the following information:
Tra ic re ects the ow of tra ic within the controlled network. The unit of measure is kbps.
Tags – shows the stream of tags. The unit of measure is tag per second.
Information about the application state when there are application operating issues.
Information about the license key when there are key status warnings.
The upper part of the tab contains a bar with information about Process Control settings. The bar indicates the
number of rules, rule groups, Lua scripts, devices, and tags.
The Process control tab displays two tables: the Process Control rules table is displayed on the left, and the
Devices and tags table is displayed on the right. Toolbars containing buttons for managing lists are located above
the tables.
58
The table of Process Control rules contains the rules describing the conditions for registering events in Kaspersky
Industrial CyberSecurity for Networks. You can logically combine rules into groups.
Above the table of Process Control rules is a toolbar containing the following control elements:
Search eld – lets you enter a query to search for rules based on the values in displayed columns of the rules
table.
Add Lua script – adds a Process Control rule with a Lua script.
Contains – displays the number of items (groups, rules, and Lua scripts) belonging to the group.
You can change the width of columns and switch the places of the Contains and Description columns.
The table of devices and tags displays the relationship between process items: process control devices, protocols,
and tags. A tree structure is used to represent the items.
Above the table of devices and tags is a toolbar containing the following control elements:
Show tags – lets you select a tag display option in the drop-down list:
All – the table contains all tags created in the current security policy.
In rules – the table contains tags used in any rules in the current security policy.
In the current rule – the table contains tags used in the selected Process Control rule.
Search eld – lets you enter a query to search for tags based on the values in the displayed columns of the
table of devices and tags, and based on tag IDs. To search by tag ID, you need to enter id: in the search string
and specify the relevant IDs separated by a space (for example, id: 3 52 675).
Import – imports tags and process control devices from data les.
Add tag – adds a tag for the selected device and protocol.
59
Detected tags – displays the number of tags in the detected tag storage.
Address – displays address information. For protocols, the IP address, port, and MAC address of the process
control device are speci ed. For tags, the physical address of the tag in device memory is speci ed.
You can change the width of columns, and change the places of the Unit of measure, Type and Address columns.
Above the Event types list is a toolbar containing the following control elements:
Group – lets you select the method used to group event types in the drop-down list: By technology, By
severity or Do not group.
Search eld – lets you enter a search query in the list of event types.
60
The list of Event types contains the numbers and titles of event types registered by the application.
You can con gure the transmission of events to recipient systems (for example, to a SIEM system). Recipient
systems that receive application events are called recipients. Each recipient has a separate column in the table
containing the list of event types. In this column, you can select check boxes to enable transmission of speci c
event types to a recipient.
The bar with control buttons for the list of event types is located in the lower part of the Con gure events tab:
Above the table containing the sets of Intrusion Detection rules, a toolbar provides the following management
elements and data elds:
Sets of rules – total number of rule sets in the table. The sets of rules include Intrusion Detection rules
grouped by certain attributes. System sets and custom sets of rules can be used in the application.
Custom rules – menu for selecting actions to take on custom sets of rules. You can use the menu items to load
custom sets of rules into the application or remove all custom sets of rules.
61
Search eld – lets you enter a query to search by values in the Name of rules set column.
The table containing the sets of Intrusion Detection rules is located in the main part of the tab. The table columns
display the following information about sets of rules:
Name of rules set – name of the set of Intrusion Detection rules. For custom rule sets, the name matches the
name of the le from which the rule set was loaded (without the RULES extension).
Origin – value determining the type of rule set. Two values are available: System (for the system set of rules) or
User (for the custom set of rules).
Active – eld for enabling and disabling rules. If the check box is selected, the rule set is active (rules from the
rule set are applied when intrusions are detected). If the check box is cleared, the rule set is inactive (rules from
the rule set are not applied). The state of rule sets is modi ed after the changes are applied.
Errors – information about the presence of errors in rules. If errors have not been detected, the No value is
displayed. If there are errors, the number of detected errors is displayed. You can open a window containing
additional information about errors by clicking the Details link (this link appears if there are errors).
The lower part of the Intrusion detection tab contains buttons for canceling and applying changes to the state of
sets of rules (in the Active column).
The Settings of Server and sensors window contains the Operating mode tab. The upper part of the tab
contains an Apply button that you can use to apply the changes made to process log levels.
Below is a table containing the main information about nodes with Kaspersky Industrial CyberSecurity for
Networks Server and sensors installed. The table columns display the following information:
62
Node – name and current state of the node (Available, Unavailable, Malfunction, State unknown). For each node,
you see a list of processes that support the operation of application components.
Logging settings – for changing the settings for storing logs in the database, and for enabling and disabling the
user activity audit.
Save tra ic – to change the settings for saving tra ic in the application database.
The Logging settings tab contains the Audit, Event history and Application messages settings groups in which
you can manage the settings for storing logs in the database. Entries are saved in logs according to the values
speci ed for the following settings:
You can use the Enable check box in the Audit settings group to enable and disable the user activity audit.
63
Save tra ic tab
The Save tra ic tab contains the Settings for saving tra ic settings group in which you can manage the settings
for saving tra ic. Tra ic data is saved in the database according to the values that are de ned by the following
settings:
A panel containing a message about the update license key and the Proceed to add a key button are displayed
if a license key has not been added or if there were problems with the added key. You can use the Proceed to
add a key button to open the window for adding a license key.
Management elements for con guring updates (available after a license key is added):
Update source settings group – for selecting the source of updates for databases and application
modules. Your speci ed update source can be a local folder on a computer that performs Server functions,
Kaspersky update servers, or the Kaspersky Security Center Administration Server.
64
Run mode settings group – for selecting the update run mode. You can select the Automatically (by
schedule) option and de ne a run schedule. You can also select the Manually option to disable the run
schedule.
The lower part of the Manage updates window has buttons for canceling and saving changes in the settings for
updating databases and application modules.
Depending on whether or not a license key has been added, the Update license key window may contain various
information and control elements.
If a license key has not been added to the application, the window contains a warning about the absent key and the
Add key button.
If a license key has been added, the window contains the following information:
Valid from – date when the license key was added to the application.
Expires on – date when the license key expires, and the number of days remaining.
The right part of the window displays the Remove button for removing a license key from the application.
65
Licensing the application
This section contains information about licensing Kaspersky Industrial CyberSecurity for Networks.
Please carefully read and accept the terms of the End User License Agreement before you start using the
application.
You can view the terms of the End User License Agreement in the following ways:
By reading the license_en.txt le. This le is included in the application distribution kit, and is saved in the
application installation folder.
Please read and accept the terms of the End User License Agreement during installation of the application. If you
do not accept the terms of the End User License Agreement, you must cancel the installation of the application
and must not use the application.
Please carefully read and accept the terms of the Privacy Policy before you start using the application.
By reading the privacy_policy_en.txt le. This le is included in the application distribution kit, and is saved in the
application installation folder.
Please read and accept the terms of the Privacy Policy during installation of the application. If you do not accept
the terms of the Privacy Policy, you must cancel the installation of the application and must not use the application.
66
Base – for use of all functionality of the Server and sensors, except update functionality for databases and
application modules.
This type of license has no time limit and does not require you to add a license key to the application.
Limited Updates – for use of update functionality for databases and application modules on the Server and
sensors.
This type of license has a time limit. To activate update functionality, you need to add a license key to the
application. When this type of license expires, the application continues to work, but update functionality
becomes unavailable. In this case, to continue to use the application with available update functionality, you
need to add a new license key.
You can view information about the added license key in the Application Console.
Technical support services are provided if you have an active Technical Support Agreement. To receive technical
support services, you must appoint contact persons who are authorized to open requests for technical support
services.
A license certi cate for Kaspersky Industrial CyberSecurity for Networks contains the following information:
Information about the application and the component covered by the license
Restriction on the number of licensing units (for example, the number of sensors)
License type
You can add a license key to the application by using a license key le. After you add a license key to the
application, the license key is displayed in the application interface as a unique alphanumeric sequence.
Kaspersky can blacklist a license key over violations of the End User License Agreement. If a license key has been
blocked, you must add a di erent license key to use the functionality for updating databases and application
modules.
67
About the license key le used for activating update functionality
A license key le is a le with the KEY extension that you receive from Kaspersky. A license key le is intended for
adding a license key that activates the functionality for updating databases and application modules.
You receive a license key le after you purchase Kaspersky Industrial CyberSecurity for Networks. The method
used to receive a license key le is determined by the Kaspersky distributor from whom you purchased the
application (for example, the license key le may be sent to the email address you specify).
You can also add a license key from a license key le that was received when purchasing a previous version of
Kaspersky Industrial CyberSecurity for Networks. A license key can be added to the application before its
expiration date.
You do not have to connect to Kaspersky activation servers to activate the functionality for updating databases
and application modules using a license key le.
When you connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser, you
cannot add a license key.
Only users with the Administrator role can add a license key in the Application Console.
1. Start the Application Console and provide the account credentials of a user with the Administrator role.
3. Click the Add key button. This button is absent if a license key has already been added to the application.
The license key le selection window appears on the screen.
4. Specify the path to the folder and the name of the license key le with the KEY extension.
The license key from the selected key le will be loaded into the application. Information about the added license
key will be displayed in the Update license key window.
68
When you connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser, you
cannot view information about the added license key.
The status bar is displayed on all Console tabs in the lower part of the Console window.
If there are warnings about the license key status, the status bar shows the warning icon and a text description.
The color of the warning icon signi es the importance level (severity) of the problem. The text description of the
warning contains more detailed information. If a description is not fully displayed, you can move the cursor over the
warning icon to bring up a tooltip with the full description.
Red
Update functionality is not available (for example, because the license key expired).
Yellow
Update functionality is activated but only 14 days or less remain until the license key expires.
If the status bar displays the warning icon and text description, you can use these elements to proceed to the
Update license key window.
To proceed to the Update license key window using the displayed elements in the status bar:
Click the license key status warning icon or the text description in the status bar.
Information about the license key in the Update license key window
You can view detailed information about the license key in the Update license key window.
For an added license key, the Update license key window displays the following information:
Valid from – date when the license key was rst added to the application.
Expires on – date when the license key expires, and the number of days remaining.
69
In the Kaspersky Industrial CyberSecurity for Networks Console, you can remove an added license key from the
application (for example, if you need to replace the current license key with a di erent key). After the license key is
removed, the application does not provide the functionality for updating databases and application modules. This
functionality will be re-activated the next time you add a license key.
When you connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser, you
cannot remove a license key.
Only users with the Administrator role can delete a license key.
1. Start the Application Console and provide the account credentials of a user with the Administrator role.
70
Processing and storing data in Kaspersky Industrial CyberSecurity for
Networks
This section contains information about data provision, utilized logs, and folders for storing data.
The application does not send users' personal data to Kaspersky. Users' personal data is processed on the
computers on which the application components are installed.
The application processes and saves the following data related to users' personal data:
Names of user accounts that were created in the operating system of the Server computer and added to the
kics4net group (users that work with the Application Console).
Names of user accounts that were created in the application (application users).
Device information received by the application during tra ic analysis using rules for discovering information
about devices and communication protocols.
IP address or name of the computer with Kaspersky Security Center, and IP addresses or names of computers
that are recipient systems' servers for receiving events: Syslog server, SIEM server.
Data in industrial network tra ic transmitted between devices and containing users' personal data (this data is
processed by the application together with other data when analyzing a copy of industrial network tra ic).
The listed data is processed for the purpose of analyzing process violations and for detecting network tra ic
anomalies that may be signs of attacks.
If the application administrator has con gured the transmission of events to recipient systems, the received data
is processed and stored in the recipient system in accordance with its functionality and purpose.
If the application installation script was used to create les for the purpose of providing information to Kaspersky
Technical Support, the following data is saved in these les:
Files of process logs for application components, the DBMS, and the Intrusion Detection system.
Information about the current status of services that support the operation of application components:
kisc4net
kics4net-postgresql
kics4net-webserver
klnagent
Information about the version and distribution package of the operating system on computers that have
application components installed (the uname -a command is used for receiving information).
Information about the network interfaces on computers that have application components installed (the
ifconfig command is used for receiving information).
Settings, status, and operating mode of the rewall in the operating system.
If the corresponding settings are de ned, the following les and data are also saved when running the
application installation script:
Data on the certi cates used in Kaspersky Industrial CyberSecurity for Networks (except certi cates that
were published by trusted certi cate authorities).
The application does not monitor access to the application installation settings le, which may contain personal
data. The application does not provide access to the list of users who can work with the Application Console.
Therefore, the application does not track the reading of this list. However, the application does track startups of
application components (for example, the Console) and other connections to the Server that involve veri cation
of user credentials.
When receiving updates from Kaspersky servers, the application transmits the following data necessary for
automatic selection of the relevant updates:
72
About logs
Kaspersky Industrial CyberSecurity for Networks saves data on its operation in logs. Depending on the type of log
used to save the data, the application uses a database or saves data in les.
The application saves the contents of the following logs in the database:
Audit log
You can view the contents of the listed logs when connected to the Server through the web interface.
If necessary, you can also con gure the transfer of data from the log of events and incidents to recipient systems.
Information about application processes is saved as les in local folders. Process log les may contain the following
information:
Data on the starting and stopping of Kaspersky Industrial CyberSecurity for Networks processes.
Error messages.
Information about processes is stored according to the de ned log levels for processes.
You can use a text editor to view les containing process logs. Root privileges in the operating system are required
for providing access to logs.
Files containing process logs are stored in non-encrypted form. You are advised to ensure protection against
unauthorized access to information.
Deleting or modifying any le in these folders can a ect the operation of the application.
The Kaspersky Industrial CyberSecurity for Networks Server uses the following folders and subfolders for storing
data:
73
Main folders of the Server:
/var/opt/kaspersky/kics4net/ – folder for storing certi cates and operational data of Kaspersky Industrial
CyberSecurity for Networks.
DBMS folders:
/opt/kaspersky/kics4net/share/ids/ – folder for storing operational data of the Intrusion Detection system
(Intrusion Detection system con guration, rules and other data).
/var/log/kaspersky/kics4net-suricata/ – folder for storing process logs related to the Intrusion Detection
system.
/var/opt/kaspersky/kics4net-webserver/ – folder for storing operational data of the web server ( les of
certi cates and other data).
/var/log/kaspersky/kics4net-webserver/ – folder for storing process logs of the Web Server (the Web
Server also saves process data in the system log of the operating system).
/home/<user>/.con g/kaspersky/kics4net-deploy/ – folder for storing installation process logs and the
installation settings le (if application components were installed from this computer).
74
Network Agent folders:
/usr/lib/systemd/system/ – folder for storing con guration les for services (for example, kics4net.service).
/var/run/ – folder for storing variables of data on system health after loading. Application components may
store les in the folder itself (for example, the le klnagent.pid) or in subfolders (for example, in the subfolder
/kics4net/).
A Kaspersky Industrial CyberSecurity for Networks sensor uses the following folders and subfolders for storing
data:
/var/opt/kaspersky/kics4net/ – folder for storing certi cates and operational data of Kaspersky Industrial
CyberSecurity for Networks.
/opt/kaspersky/kics4net/share/ids/ – folder for storing operational data of the Intrusion Detection system
(Intrusion Detection system con guration, rules and other data).
/var/log/kaspersky/kics4net-suricata/ – folder for storing process logs related to the Intrusion Detection
system.
/home/<user>/.con g/kaspersky/kics4net-deploy/ – folder for storing installation process logs and the
installation settings le (if application components were installed from this computer).
/usr/lib/systemd/system/ – folder for storing con guration les for services (for example, kics4net.service).
/var/run/ – folder for storing variables of data on system health after loading. Application components may
place les in the folder itself or in subfolders.
Root privileges in the operating system are required for modifying the application les.
75
Administration of Kaspersky Industrial CyberSecurity for Networks
This section contains information about the actions performed for administration of Kaspersky Industrial
CyberSecurity for Networks.
Each monitoring point must be associated with a network interface that receives a copy of tra ic from a speci c
industrial network segment. To add monitoring points, you can use network interfaces that meet the following
conditions:
The network interface is intended for receiving a copy of industrial network tra ic, and this network interface is
not used for other purposes (for example, to connect nodes that have application components installed).
You can add monitoring points to not only physical network interfaces but also to logical interfaces that combine
multiple physical interfaces (bonded interfaces). However, you cannot add a monitoring point to a physical network
interface that is one of the interfaces of a logical bonded interface.
Monitoring points can be enabled and disabled. You can disable a monitoring point to temporarily stop monitoring
an industrial network segment relaying a copy of tra ic to a network interface. When you need to resume
monitoring of the industrial network segment, you can enable the monitoring point.
After disabling or removing a monitoring point, the application may still register events associated with this
monitoring point for some time. This is due to a possible delay in processing incoming tra ic when the Server
is experiencing high loads.
You can manage monitoring points and view information about monitoring points, network interfaces and nodes on
the Deployment tab in the Settings section of the web interface of Kaspersky Industrial CyberSecurity for
Networks.
Only users with the Administrator role can add monitoring points to network interfaces.
76
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
3. On the Deployment tab, open the details area by clicking the Add monitoring point link in the tile of the
relevant network interface. The link is displayed if a monitoring point has not been added to the network
interface.
The details area appears in the right part of the web interface window.
4. In the entry eld in the upper part of the details area, enter the name of the monitoring point.
You can use uppercase and lowercase letters of the Latin alphabet, numerals, and the _ and - characters.
The monitoring point name must meet the following requirements:
You can enable monitoring points individually, or all of them on one node or all nodes simultaneously.
Only users with the Administrator role can enable monitoring points.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
If you want to enable one monitoring point, click the Enable button in the tile of the network interface
containing the monitoring point. The button is available if the monitoring point is disabled.
If you want to enable all monitoring points on a node, click the Enable all button in the tile of the node
hosting the disabled monitoring points. The button is available if the node has network interfaces with
disabled monitoring points.
If you want to enable all monitoring points on all nodes, use the Enable on all nodes link in the toolbar.
77
Disabling monitoring points
You can disable a monitoring point if you need to temporarily pause the receipt and processing of tra ic on the
network interface of this monitoring point.
You can disable monitoring points individually, or all of them on one node or all nodes simultaneously.
Only users with the Administrator role can disable monitoring points.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
If you want to disable one monitoring point, click the Disable button in the tile of the network interface
containing the monitoring point. The button is available if the monitoring point is enabled.
If you want to disable all monitoring points on a node, click the Disable all button in the tile of the node
hosting the enabled monitoring points. The button is available if the node has network interfaces with
enabled monitoring points.
If you want to disable all monitoring points on all nodes, use the Disable on all nodes link in the toolbar.
The new name of the monitoring point will appear in events that are registered after its renaming. The old
name of the monitoring point is displayed in previously registered events.
Only users with the Administrator role can rename a monitoring point.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
3. On the Deployment tab, select the tile of the network interface containing the monitoring point that you want
to rename.
The details area appears in the right part of the web interface window.
78
4. Click the icon located on the right of the current name of the monitoring point, and enter the new name in
the eld that appears.
You can use uppercase and lowercase letters of the Latin alphabet, numerals, and the _ and - characters.
The monitoring point name must meet the following requirements:
If it becomes necessary to temporary pause the receipt of tra ic at a network interface of a monitoring point (for
example, while performing preventative maintenance and adjustment operations), you can disable the monitoring
point without deleting it.
The tra ic received from a monitoring point prior to its deletion is not deleted from the database. Information
about this monitoring point is also saved in the table of registered events.
Only users with the Administrator role can delete a monitoring point.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
3. On the Deployment tab, select the tile of the network interface containing the monitoring point that you want
to delete.
The details area appears in the right part of the web interface window.
79
If the network interface does not support LED blink mode (for example, there is no LED indicator next to the
Ethernet port or the network interface is a logical bonded interface), an error occurs when blink mode is enabled.
Only users with the Administrator role can enable Ethernet port blink mode.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
3. On the Deployment tab, click the Blink button on the network interface tile.
If the network interface supports an LED indicator, the network cable connection icon begins to blink on the
network interface tile. At the same time, the LED indicator next to the Ethernet port begins to blink on the
corresponding network adapter of the computer.
While blink mode is enabled for one network interface, you cannot enable blink mode for another network interface
on the same node.
Monitoring the application state when connected through the web interface
You can view information about the current state of the application when connected to the Server through a web
browser.
In the web browser window, the lower part of the menu shows the icon and a noti cation if some protection
functions are disabled (see the gure below).
One or more protection functions are disabled (for example, rule-based Intrusion Detection).
Learning mode is enabled for one or multiple protection functions (for example, for Network Integrity Control
technology).
Click the icon or the text of the message about disabled protection functions.
80
Noti cations about application operation problems
The upper part of the web interface menu contains a button for opening the list of noti cations about problems in
application operation (see the gure below).
List of noti cations about problems in application operation in the web browser window
If the list contains noti cations about critical problems (for example, messages about disruption of application
operation), a red icon is displayed. If the list contains only noti cations about non-critical problems, a yellow icon is
displayed.
The list contains only up-to-date noti cations. If a problem has been resolved (for example, a lost connection with
the Server has been restored), the corresponding noti cation is automatically removed from the list.
You can view detailed information about noti cations (except noti cations regarding unavailability of the Server or
database).
2. In the list of noti cations, click the text of the noti cation.
The web browser window shows a section containing information pertaining to the noti cation (for example, the
Application messages tab in the Settings section).
You can view information about the current state of the application in the Tags section. The Application state
eld displays the status as the presence or absence of problems in application operation.
If the application is running normally, the Application state eld displays the No problems detected status.
If the An error occurred or Unknown status is displayed, industrial network protection functions may be only
partially operational. You need to take steps to restore normal operation of the application.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser.
81
2. Select the Settings section and go to the Application messages tab.
The table will display application messages that match the de ned lter and search settings.
The columns of the application messages table contain the following information:
Date and time – date and time of registration of the application message.
Status – name of the message status. The following statuses are available for messages:
State unknown, Malfunction – for messages about non-critical malfunctions in application operation.
Moderate malfunction, Critical malfunction, Fatal malfunction – for messages about disruption of
application operation.
Node – name or IP address of the node from which the message originated.
When viewing the application messages table, you can use the following functions:
When ltering based on a standard period, the application messages table is updated in online mode.
1. On the Application messages tab, in the Settings section, perform one of the following actions:
Last hour
Last 12 hours
Last 24 hours
Last 48 hours
3. If table updates are disabled, in the opened window con rm that you agree to resume table updates.
The table will display application messages for the period you speci ed.
82
When ltering by a de ned period, the table will no longer be updated. The table displays only the
messages that were registered during the speci ed period.
1. On the Application messages tab, in the Settings section, perform one of the following actions:
3. If table updates are enabled, in the opened window con rm that you agree to suspend table updates.
On the right of the Period drop-down list in the toolbar, you will see additional buttons that you can use
to manually de ne the ltering period.
4. Click any of the buttons containing a date and time value in the From and to elds.
The calendar opens.
5. In the eld under the calendar on the left, specify the date and time for the start boundary of the
ltering period. In the eld under the calendar on the right, specify the date and time for the end
boundary of the ltering period. If you want to remove the limit for the end boundary of the period,
delete the value in the eld under the calendar on the right.
To enter a value in the eld, you can select a date in the calendar (the current time will be indicated) or
manually enter the necessary value in the format DD-MM-YYYY hh:mm:ss.
6. Click OK.
The table will display application messages for the period you speci ed.
83
When ltering by the Date and time column, you can use one of the standard periods or de ne a speci c
period.
To lter the application messages table by the Status or System process column:
1. On the Application messages tab in the Settings section, click the ltering icon in the relevant column.
When ltering by status, you can also use the Statuses drop-down list in the toolbar.
The ltering window opens.
2. Select the check boxes opposite the values by which you want to lter events.
3. Click OK.
1. On the Application messages tab in the Settings section, click the ltering icon in the relevant column.
The ltering window opens.
2. In the Including and Excluding elds, enter the values for application messages that you want to include
into the lter and/or exclude from the lter.
3. If you want to apply multiple lter conditions combined by the logical operator OR, in the lter window
of the column click the Add condition button and enter the condition in the opened eld.
4. If you want to delete one of the created lter conditions, in the lter window of the column click the
icon.
5. Click OK.
On the Application messages tab, in the Settings section, enter your search query into the Search
messages eld. The search is initiated as you enter characters.
The application messages table displays entries that meet the search criteria.
To reset the de ned lter and search settings in the application messages table:
On the Application messages tab in the Settings section, click the Clear lter button in the toolbar
(this button is displayed if the lter and/or search settings are de ned).
84
To sort application messages:
1. On the Application messages tab in the Settings section, click the header of the column by which you
want to sort.
2. If you need to sort the table based on multiple columns, press the SHIFT key and hold it down while
clicking the headers of the columns by which you want to sort.
The table will be sorted by the selected column. When sorting by multiple columns, the rows of the table
are sorted according to the sequence of column selection. Next to the headers of columns used for
sorting, you will see icons displaying the current sorting order: in ascending order or descending order of
values.
Only users with the Administrator role can view audit entries.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
The table will display the audit entries that match the de ned lter and search settings.
The columns of the audit entries table contain the following information:
Date and time – date and time when the user activity data was registered.
Node – IP address of the node on which the registered action was performed.
When viewing the audit entries table, you can use the following functions:
Con gure the display and order of columns in the audit entries table
85
To con gure the list of columns displayed in the table:
1. On the Audit tab in the Settings section, click the Customize table button.
A window opens for con guring the display of the audit entries table.
2. Select the check boxes opposite the settings that you want to view in the table. You must select at
least one setting.
3. If you want to change the order in which columns are displayed, select the name of the column that
needs to be moved to the left or right in the table and use the buttons containing an image of the up or
down arrows.
The selected columns will be displayed in the audit entries table in the order you speci ed.
When ltering based on a standard period, the audit entries table is updated in online mode.
1. On the Audit tab in the Settings section, perform one of the following actions:
Last hour
Last 12 hours
Last 24 hours
Last 48 hours
3. If table updates are disabled, in the opened window con rm that you agree to resume table updates.
The table will display audit entries for the period you speci ed.
86
When ltering by a de ned period, the table will no longer be updated. The table displays only the entries
that were registered during the speci ed period.
1. On the Audit tab in the Settings section, perform one of the following actions:
3. If table updates are enabled, in the opened window con rm that you agree to suspend table updates.
On the right of the Period drop-down list in the toolbar, you will see additional buttons that you can use
to manually de ne the ltering period.
4. Click any of the buttons containing a date and time value in the From and to elds.
The calendar opens.
5. In the eld under the calendar on the left, specify the date and time for the start boundary of the
ltering period. In the eld under the calendar on the right, specify the date and time for the end
boundary of the ltering period. If you want to remove the limit for the end boundary of the period,
delete the value in the eld under the calendar on the right.
To enter a value in the eld, you can select a date in the calendar (the current time will be indicated) or
manually enter the necessary value in the format DD-MM-YYYY hh:mm:ss.
6. Click OK.
The table will display audit entries for the period you speci ed.
87
You can lter the audit entries table based on the values in all columns except the Description column.
When ltering by the Date and time column, you can use one of the standard periods or de ne a speci c
period.
1. On the Audit tab, in the Settings section, click the ltering icon in the relevant column.
When ltering by the results of actions, you can also use the corresponding buttons in the toolbar.
The ltering window opens.
2. Select the check boxes opposite the values by which you want to lter events.
3. Click OK.
1. On the Audit tab, in the Settings section, click the ltering icon in the relevant column.
The ltering window opens.
2. In the Including and Excluding elds, enter the values for audit entries that you want to include into the
lter and/or exclude from the lter.
3. If you want to apply multiple lter conditions combined by the logical operator OR, in the lter window
of the column click the Add condition button and enter the condition in the opened eld.
4. If you want to delete one of the created lter conditions, in the lter window of the column click the
icon.
5. Click OK.
On the Audit tab, in the Settings section, enter your search query into the Search records eld. The
search is initiated as you enter characters.
The audit entries table will display the entries that meet the search criteria.
A search is performed in all columns except the Date and time and Result columns.
To reset the de ned lter and search settings in the audit entries table:
On the Audit tab in the Settings section, click the Clear lter button in the toolbar (this button is
displayed if search or lter settings are de ned).
88
To sort audit entries:
1. On the Audit tab in the Settings section, click the header of the column by which you want to sort.
You can lter the audit entries table based on the values of any column except the Description column.
2. If you need to sort the table based on multiple columns, press the SHIFT key and hold it down while
clicking the headers of the columns by which you want to sort.
The table will be sorted by the selected column. When sorting by multiple columns, the rows of the table
are sorted according to the sequence of column selection. Next to the headers of columns used for
sorting, you will see icons displaying the current sorting order: in ascending order or descending order of
values.
If there are problems in the application, a noti cation icon and text description of the problem will be displayed in
the status bar (see the gure below).
Application state
The color of the noti cation icon signi es the severity of the problem. The text description contains more detailed
information about the problem. If a description is not fully displayed, you can move the cursor over the problem's
noti cation icon to bring up a tooltip with the full description.
The problem's noti cation icon may have one of the following colors:
Red
There is no connection between the Server and the Console, or the connection is established but the following
problems have been detected:
Yellow
Problems that are not critical for the application have been detected on one or more nodes (application
processes continue running).
Gray
The application state is unknown; information about the state of the application is being refreshed.
If the application is not experiencing any problems, a problem noti cation icon is not displayed in the status bar.
89
Viewing information about nodes with application components installed and
about network interfaces on nodes
Users with the Administrator role and users with the Operator role can both view information about nodes with
application components installed and about network interfaces on nodes.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser.
3. If you want to view expanded information (including displaying the names of elds), select the tile of the
relevant node or network interface.
The details area appears in the right part of the web interface window.
Current state of the node indicated as an icon and text description (in the details area, the icon and text
description are displayed in the State eld). Possible states:
OK. The node is available, and no application messages about non-critical malfunctions or disrupted
operation were received from this node.
Non-critical malfunction. The node is available, and application messages with the State unknown or
Malfunction status were received from this node.
Operation disrupted. The node is available, and application messages with the Moderate malfunction,
Critical malfunction or Fatal malfunction status were received from this node.
Application component installed on the node: Server or Sensor (it is displayed in the Node type eld in the
details area).
Icon showing if a network cable is connected to the Ethernet port of the network interface (it is displayed in the
Connection eld in the details area). The following icons are provided:
90
– the network cable is connected.
Name of the network interface in the operating system (it is displayed in the Network interface eld in the
details area).
MAC address (it is displayed in the MAC address eld in the details area).
IP address. If multiple IP addresses are detected on a network interface, the network interface tile displays only
one of them and the details area displays no more than 16 IP addresses.
If a monitoring point has been added to the network interface, the following additional information is displayed.
Current state of the monitoring point indicated as an icon and text description (in the details area, the icon and
text description are displayed in the State eld). Possible states:
Error. An error was detected when switching over the operating mode of the monitoring point.
Current operating mode of the monitoring point. In the network interface tile, information about the current
mode is displayed next to the current status eld (except the Switchover state. In the details area, information
about the current state is displayed in the Mode eld. The following modes are provided:
Enabled.
Disabled.
1. On the computer on which the application component is installed, open the operating system console.
91
kics4net – main service (runs on a computer that performs Server functions or sensor functions)
kics4net-postgresql – DBMS service (runs only on a computer that performs Server functions)
kics4net-webserver – Web Server service (runs only on a computer that performs Server functions)
Example:
sudo service kics4net status
If the service is not active, you can restart the computer or restart the service.
The computer was unexpectedly restarted, after which the operation of application components was not
restored.
A lost connection between the Server and a sensor is not being restored. In this case, you should restart the
computer that performs sensor functions.
You can use the standard commands of the operating system to restart a computer that has application
components installed.
If the computer cannot be restarted for some reason, you can restart the services that support operation of
application components.
If the computer performs Server functions, enter the following sequence of commands:
sudo service kics4net-postgresql restart
sudo service kics4net restart
sudo service kics4net-webserver restart
92
To verify the registration of events in Kaspersky Industrial CyberSecurity for Networks, you can use a test network
packet. When this type of packet is detected in tra ic, the application registers test events based on the following
technologies:
Deep Packet Inspection. An event is registered regardless of whether or not there are Process Control rules or
tags.
Network Integrity Control An event is registered regardless of whether or not there are Network Control rules.
Use of Network Integrity Control technology must be enabled.
Intrusion Detection. An event is registered regardless of whether or not there are Intrusion Detection rules. Use
of Rule-based Intrusion Detection must be enabled.
Asset management. An event is registered regardless of whether or not there are known assets in the assets
table. Use of asset activity detection must be enabled.
Events are registered with system event types that are assigned the following codes:
To verify audit functions, Kaspersky Industrial CyberSecurity for Networks saves information about the
registration of test events in the audit log. An audit entry is created for each registered event, and this entry
speci es the technology used to register the test event.
A test network packet is a UDP protocol packet with certain parameter values. The parameters are de ned in such
a way as to exclude the probability of receiving such a packet in normal industrial network tra ic.
The following data must be de ned in the parameters of a test network packet:
Ethernet II header:
IP header:
ID: 20
TTL: 20
93
Flags: 0x00
UDP header:
Source port: 20
Destination port: 20
Packet contents:
To generate and send a test network packet, you can use a network packet generator program such as Scapy .
You need to send the test network packet from a node whose tra ic is controlled by Kaspersky Industrial
CyberSecurity for Networks.
Example:
To send a test network packet using the program Scapy in a Linux® operating system:
1. In the operating system console of the computer, enter the command to run Scapy in interactive mode:
sudo scapy
After the packet is detected in tra ic, Kaspersky Industrial CyberSecurity for Networks registers test
events.
Synchronizing Server time with the time source for industrial network assets
To correctly correlate the time of registration of events with the time when events occurred in the industrial
network, time must be synchronized in the system. The time on nodes with Kaspersky Industrial CyberSecurity for
Networks components installed must be synchronized with a common source of time used by industrial network
assets.
When installing Kaspersky Industrial CyberSecurity for Networks, you can enable time synchronization between
the Server and nodes on which sensors are installed. In this case, the node with the Server installed will serve as
the time source for nodes that have sensors installed.
94
The Network Time Protocol (NTP) is used for automatic con guration of time synchronization between the
Server and other nodes. In this case, you cannot con gure synchronization with other time sources or use the
Precision Time Protocol (PTP) on nodes that have sensors installed.
It is recommended to use the software tools from the operating system of the computer performing Server
functions to con gure time synchronization between the application Server and the time source used by assets in
the industrial network. You can use the standard NTP and PTP protocols to synchronize the Server time. You can
nd an example of how to con gure time synchronization in the Knowledge Base on the Kaspersky website .
Kaspersky Industrial CyberSecurity for Networks can use the following certi cates:
Certi cates for connections between nodes of Kaspersky Industrial CyberSecurity for Networks.
Certi cates for connecting to Kaspersky Industrial CyberSecurity for Networks through the web interface.
Certi cates for connecting to Kaspersky Industrial CyberSecurity for Networks through the API.
Certi cates need to be regularly updated in accordance with the information security requirements at the
enterprise.
Updating certi cates for connections between nodes of Kaspersky Industrial CyberSecurity
for Networks
During installation of Kaspersky Industrial CyberSecurity for Networks, certi cates for connections between
nodes of Kaspersky Industrial CyberSecurity for Networks are automatically updated. You can manually update
these certi cates without reinstalling application components.
1. On the computer from which the installation was performed, go to the folder containing the saved les from
the distribution kit of Kaspersky Industrial CyberSecurity for Networks.
2. Enter the command for running the application installation script with the update-certs parameter:
bash kics4net-deploy-<application version number>.bundle.sh --update-certs
3. In the SSH password and SUDO password invitations, enter the password for the user account that is used to
run the installation.
Wait for completion of the script kics4net-deploy-<application version number>.bundle.sh. Upon successful
completion, a success noti cation will appear on the screen.
95
The application will begin to use the updated certi cates on all nodes that have installed components of Kaspersky
Industrial CyberSecurity for Networks.
Updating certi cates for connecting to Kaspersky Industrial CyberSecurity for Networks
through the web interface
You can update certi cates used for connecting to the Server through the web interface when reinstalling
Kaspersky Industrial CyberSecurity for Networks. To update certi cates, in the main installation menu select
Change Server settings → Change Web Server certi cate settings and choose one of the following certi cate
options:
If you want to update self-signed certi cates, enter y at the Use self-signed certi cates to connect to web
server prompt.
If you want to update trusted certi cates, enter y at the Use trusted certi cates to connect to web server
prompt and then enter the path to the le of the trusted certi cate.
Certi cates will be updated after reinstallation of Kaspersky Industrial CyberSecurity for Networks.
Updating certi cates for connecting to Kaspersky Industrial CyberSecurity for Networks
through the API
You can update certi cates used for connecting to Kaspersky Industrial CyberSecurity for Networks through the
API when reinstalling Kaspersky Industrial CyberSecurity for Networks. To update certi cates, in the main
installation menu select Change Server settings → Change the settings for connecting to the Server via API
and type y at the Generate new certi cates prompt.
Certi cates will be updated after reinstallation of Kaspersky Industrial CyberSecurity for Networks.
Timely updates of databases and application modules ensure maximum protection of the industrial network using
Kaspersky Industrial CyberSecurity for Networks. It is recommended to update databases and application modules
immediately after installing components of Kaspersky Industrial CyberSecurity for Networks, and then con gure
the settings for automatic installation of updates.
96
Local folder on the computer that performs functions of the Kaspersky Industrial CyberSecurity for Networks
Server.
You can use the Kaspersky Industrial CyberSecurity for Networks Console to manually con gure the settings for
installing updates. You can view information about installed updates in the Application Console (only general
information) or when connected to the Kaspersky Industrial CyberSecurity for Networks Server through a web
browser (general information, and additional information saved in application messages).
Updates of databases and application modules are subject to the following limitations and special considerations:
To download updates from Kaspersky update servers, you must have Internet access. When connected to
update servers from a computer that performs functions of the Kaspersky Industrial CyberSecurity for
Networks Server, the connection is established over the HTTPS protocol (connection through a proxy server is
not supported).
To download updates from a local folder, the kics4net group must be granted access to this folder. Use the
standard tools of the operating system to grant access to the folder.
There is no support for downloading updates from folders on other computers over remote access protocols
(FTP, NFS, SMB, and others). To download updates over a remote access protocol, you can connect a network
resource (folder containing updates to be downloaded) on the computer that performs functions of the
Kaspersky Industrial CyberSecurity for Networks Server. The network resource can be connected using the
standard tools for mounting network resources in the operating system. After connecting the network
resource, you can select a local folder to be mounted as the source of updates.
To download updates from the Kaspersky Industrial CyberSecurity for Networks Administration Server to
Kaspersky Industrial CyberSecurity for Networks, the capability for application interaction with Kaspersky
Security Center must be added. You can specify the settings for relaying events and application state to
Kaspersky Security Center when installing or reinstalling Kaspersky Industrial CyberSecurity for Networks.
Updates are downloaded from the Administration Server repository, which obtains its updates through the
corresponding task in Kaspersky Security Center.
Local folder on the computer that performs functions of the Kaspersky Industrial CyberSecurity for Networks
Server.
Only users with the Administrator role can select an update source.
97
1. Start the Application Console and provide the account credentials of a user with the Administrator role.
3. In the Update source settings group, select one of the following options for update sources:
Local folder – for downloading updates from a speci ed local folder on the computer that performs
functions of the Kaspersky Industrial CyberSecurity for Networks Server.
Kaspersky update servers – for downloading updates from Kaspersky update servers.
Kaspersky Security Center Administration Server – for downloading updates from the Kaspersky
Security Center Administration Server (this option is available if the capability for application interaction
with Kaspersky Security Center has been added).
4. If the Local folder option is selected, specify the path to the folder in the local le system. You can use the
Browse button to open the window for selecting a folder.
The kics4net group must be granted access to the speci ed folder. If necessary, grant access to this
folder using the standard tools of the operating system.
Manually.
Only users with the Administrator role can select the update run mode.
1. Start the Application Console and provide the account credentials of a user with the Administrator role.
3. In the Run mode settings group, select one of the following options for starting an update:
4. If the Automatically (by schedule) option is selected, specify the update schedule settings. To do so:
98
a. In the drop-down list, indicate when the update will occur. Select one of the following options: Hourly, Daily,
Weekly, Monthly.
b. Depending on the selected option, specify the values for the settings de ning the precise update run
schedule.
Only users with the Administrator role can manually start an update.
1. Start the Application Console and provide the account credentials of a user with the Administrator role.
General information provides the dates and times when the updated application modules and databases were
released. This information is displayed in the Application Console or when connected to the Server through a web
browser.
In the Help menu of the Application Console window, select the About option.
To view general information about installed updates when connected to the Server through a web browser:
Detailed information contains information about update installation processes that are started. The application
saves the following detailed information:
99
Update run mode
Date and time of release of the databases and application modules installed during the update process (if the
update was successful)
Detailed information about update installation is saved in the application message log.
User accounts created in the application are used for restricting user access. Users must use these user accounts
to connect to the Server and work with the application. It is not possible to connect under other user accounts or
using anonymous connections.
User accounts created in the application do not have to be registered as operating system user accounts on the
Server's computer or another computer.
The rst application user account must be created during installation of Kaspersky Industrial CyberSecurity for
Networks. After installation, you can add application user accounts when connected to the Server through the
web interface or when reinstalling the application.
Depending on the method used to connect to the Server, users can access the following sets of functions:
When connected to the Server, the application provides access to functions depending on the role of the user
that established the connection.
Administrator.
A user with the Administrator role has access privileges that enable use of all functions for application
management, monitoring, and viewing information. This user can also access functions for managing application
user accounts.
Operator.
A user with the Operator role has access privileges only for monitoring and viewing information.
100
The Administrator role is assigned to the user account that is created during installation or reinstallation of
Kaspersky Industrial CyberSecurity for Networks. If the name of an already existing user account is speci ed when
reinstalling the application, the role of this user is not changed.
After the application is installed, you can connect to the Server through the web interface under a user account
with the Administrator role and generate a list of application user accounts with their corresponding roles. You can
create up to 100 application user accounts in the application.
When connected to the Server, users receive the access privileges corresponding to the role of their user
account. If the role of a user is changed by another user (who has been assigned the Administrator role) while the
user is working, the access rights of the connected user are updated in online mode. For example, a user that has
connected to the Server with the Administrator role will lose the rights to access application management
functions after the Operator role is assigned to their user account.
You can manage application user accounts on the Users tab in the Settings section of the Kaspersky Industrial
CyberSecurity for Networks web interface.
Available application functions when connected through the web interface, depending on the user role
Monitoring the application state when connected through the web interface
Changing the password of your own user account for connecting through the
web interface
101
Viewing asset information
Merging assets
Deleting assets
Managing technologies
102
Manually starting an update
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
The Users tab displays user tiles containing the names and roles of application users.
3. On the Users tab, add a new user tile. To do so, click the tile with the + icon.
You will see a new user tile showing elds for entering account credentials and selecting a role for the new user
account.
4. In the user name entry eld, enter a user name for the account you want to create.
You can use uppercase and lowercase letters of the Latin alphabet, numerals, a dot, and the _ and -
characters.
The user account name must meet the following requirements:
Must be unique within the list of application user names (not case-sensitive).
5. In the password entry elds, enter the password that you want to set for the user account.
You can use uppercase and lowercase letters of the Latin alphabet, numerals, and the following special
characters: ( ) . , : ; ? ! * + % - < > @ [ ] { } / \ _ $ #.
The password must meet the following requirements:
6. In the drop-down list, select the necessary user role: Administrator or Operator.
7. Click Save.
The user tile displays an icon containing the name of the user account and the role assigned to it.
Users with the Administrator role can change the role of any user account except the role of their own user
account.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
104
2. Select the Settings section and go to the Users tab.
3. On the Users tab, click the Change button in the user tile of the user whose role you want to change.
The user tile will switch to account settings editing mode.
4. In the drop-down list, select the necessary user account role: Administrator or Operator.
5. Click Save.
The user tile displays an icon containing the user name and role assigned to this user account.
A user with the Administrator role can delete any user account except their own user account.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
3. On the Users tab, click the Delete button in the tile of the user that you want to delete.
A window with a con rmation prompt opens.
You are connecting for the rst time after the user account was created.
The password must be changed regularly in accordance with the information security requirements at the
enterprise.
1. In the web browser window on the Kaspersky Industrial CyberSecurity for Networks web interface page, open
the user menu:
If the menu is expanded, click the button on the right of the name of the current user.
105
2. In the user menu, select Change password.
The Password change window appears.
4. In the New password and Repeat new password elds, enter the new password.
The new password must meet the conditions listed in the Password change window. The conditions you ful ll
are automatically marked while you are entering your password.
5. Click the Edit button. This button is available after entering the current password and new password and after
ful lling all requirements for the new password.
The new password will be required for the next connection to the Server through a web browser or through the
Application Console.
Security policies
A security policy is a set of data that de nes the following operational settings of the application:
The other application operation settings (including the settings of Asset Management, Network Control, and
Intrusion Detection) are applied irrespective of the active security policy.
The application registers events and displays process parameter values according to the active security policy
currently running on the Server. Only one security policy can be running on the Server at a time.
You can create, edit or open a security policy in the Console. For the Application Server to start operating based
on a security policy, the security policy must be applied on the Server. You can create multiple security policies and
save them to folders on the computer on which the Application Console is running.
The folder used to store a security policy contains the following set of les for the security policy:
common
gate
industrial
meta_data
nic
ui
version
Editing security policy les in any editor other than the Kaspersky Industrial CyberSecurity for Networks
Console may lead to a disruption in the operation of Kaspersky Industrial CyberSecurity for Networks if the
security policy is applied on the Server. The application may stop performing protection functions for the
industrial network.
106
You can open from a folder on the computer and view a previously saved security policy in the Kaspersky Industrial
CyberSecurity for Networks Console. When a security policy is opened, the current security policy is no longer
displayed in the Console but continues to run on the Server until a new policy is applied.
In the current version of Kaspersky Industrial CyberSecurity for Networks Console, you cannot open security
policies created in a previous version of the application. You can import security policies from the previous version
of the application by using the security policy conversion utility.
A security policy can be opened from a folder regardless of the state of the Console's connection to the
Kaspersky Industrial CyberSecurity for Networks Server. If there is no connection to the Server, the Process
Control and Con gure events tabs in the Application Console display the data of the opened policy. In addition,
the window of the Application Console displays a noti cation stating that there is no connection to the Server.
If you want to view the active security policy in the Console, you can load the current security policy from the
Server. The Console needs to be connected to the Server to load the security policy from the Server.
In the Security policy properties window, you can view general information about the security policy open in the
Console and about the security policy running on the Server. This window displays the following information:
Applied – time last applied on the Server (for a security policy that is running on the Server).
Saved – time last saved to a folder (for a security policy that is open in the application Console).
Path – path to the folder in which the security policy was saved (for a security policy that is open in the
application Console).
The settings de ned in the created security policy go into e ect in Kaspersky Industrial CyberSecurity for
Networks after it is applied on the Server.
1. In the Manage security policy menu in the Application Console window, select Create.
2. If there are unsaved changes in the current security policy, a window opens with a prompt to continue. Perform
the necessary action:
If you want to save the changes to the current security policy, click Yes.
A window opens for entering the name of the new security policy.
3. Enter the name of the new security policy and click OK. It is recommended to use characters from the Latin
alphabet.
4. Con gure the Process Control settings and the registration settings for event types.
107
5. Save the security policy.
2. Select Save.
To save the security policy with the option of changing its folder:
3. In the window that opens, specify the path to the destination folder for saving the security policy.
Select the folder containing the saved les of the security policy.
1. In the Manage security policy menu in the Console window, select the Open option.
2. If there are unsaved changes in the current security policy, a window opens with a prompt to continue. Perform
the necessary action:
If you want to save the changes to the current security policy, click Yes.
A window opens for selecting the folder containing the security policy les.
Data of the open security policy is loaded to the Kaspersky Industrial CyberSecurity for Networks Console. The
title of the Console window displays the name of the open security policy.
108
1. In the Manage security policy → Recent menu, in the Console window select the name of the security policy
that you want to open.
2. If there are unsaved changes in the current security policy, a window opens with a prompt to continue. Perform
the necessary action:
If you want to save the changes to the current security policy, click Yes.
Data of the selected security policy is loaded to the Kaspersky Industrial CyberSecurity for Networks Console.
The title of the Console window displays the name of the selected security policy.
1. Make sure that the security policy that you want to apply on the Server is displayed in the Application Console.
2. In the Manage security policy menu in the window of the Application Console, select the Apply option.
3. If the credentials of a user with the Operator role are indicated for the current Console session, a user change
prompt window opens. Click Yes in the prompt window and enter the name and password of a user with the
Administrator role in the next window.
A window opens with a con rmation prompt to apply the security policy.
4. Con rm the changes made to the security policy. To do so, click Yes in the prompt window.
The screen shows a progress bar showing the process of applying the security policy.
The Server and sensors linked with it automatically begin running according to the new security policy. In the
Security policy properties window, you can see which security policy is running on the application Server.
1. In the Manage security policy menu in the Console window, select Load from Server.
2. If there are unsaved changes in the current security policy, a window opens with a prompt to continue. Perform
the necessary action:
If you want to save the changes to the current security policy, click Yes.
109
Data of the security policy applied on the Server is displayed in the Kaspersky Industrial CyberSecurity for
Networks Console.
1. In the Manage security policy menu in the Console window, select Properties.
The Security policy properties window is displayed on the screen. The window displays information about the
security policy that is currently open in the Console, and information about the security policy that is applied on
the Server.
2. View the security policy properties and click OK to close the window.
1. In the Manage security policy menu in the Application Console window, select the Properties option.
The Security policy properties window is displayed on the screen.
2. In the Name eld, enter the new name for the security policy and click OK.
The new security policy name will be displayed in the title of the Application Console window.
The con g_converter tool is located in the Kaspersky Industrial CyberSecurity for Networks installation directory:
/opt/kaspersky/kics4net/bin/.
To launch the con g_converter tool use the following command line parameters:
--cfg-version – version of the application in which the original security policy was created.
Version 2.8 is the default version.
-i – path to the folder with the original security policy. This is a required parameter.
-o – the path to the directory in which the converted security policy will be located. This is a required
parameter.
110
If the speci ed directory does not exist, it will be created automatically.
-F – automatically overwrite les in the folder with the converted security policy.
If the -F parameter is set, prior to conversion the con g_converter tool will automatically delete all les in the
folder in which the converted security policy will be placed.
If the -F parameter is not set, the con g_converter tool will ask whether you want to overwrite the les in the
directory in which the converted security policy will be located. If you specify the No option, conversion will not
be performed.
-l – language of the con g_converter tool interface. The default language is Russian. To use English, you need
to specify english for the parameter.
To convert and import a security policy that was created in a previous version of the application:
Example:
./config_converter -i /home/user1/policy1 -o /home/user1/policy2
After the con g_converter tool is nished, make sure that there is a converted security policy in the speci ed
folder.
4. If necessary, you can also con gure the Process Control settings and the registration settings for event types,
and then save the security policy.
Process Control
In Kaspersky Industrial CyberSecurity for Networks, Deep Packet Inspection is conducted for devices that
transmit and receive process parameters and system commands. Various types of devices supported by the
application may be used for Process Control.
For Process Control in industrial network tra ic, you can use Process Control rules and monitor system
commands.
111
Process Control rule – set of conditions for the values of tags. Process Control rules contain descriptions of
situations that must be detected in industrial network tra ic (for example, when a tag exceeds the speci ed value).
When the conditions of a rule are satis ed, an event is registered in Kaspersky Industrial CyberSecurity for
Networks. You can specify the desired type of registered event when con guring a Process Control rule.
Monitoring system commands ensures registration of events when transmitted system commands are detected in
tra ic. When con guring the settings of process control devices, you can select the relevant system commands
to monitor. This functionality can be used regardless of Process Control rules.
Lists containing Process Control rules and containing devices and tags for Process Control are part of a security
policy. Only users with the Administrator role can apply the current security policy on the Server. However, users
with the Administrator role and users with the Operator role can both make changes and save the security policy
to a folder (including with changed settings for process control).
You can generate a list of Process Control rules and a list of devices and tags for process control in the Kaspersky
Industrial CyberSecurity for Networks Console on the Process Control tab.
When you connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser,
you cannot manage Process Control rules or process control devices.
BECKHOFF® CX series
OMRON CJ2M
112
Siemens™ SIMATIC™ S7-200, S7-300, S7-400, S7-1200, S7-1500
Yokogawa ProSafe-RS
Devices supporting protocols of the IEC 60870 standard: IEC 60870-5-101, IEC 60870-5-104
Devices supporting protocols of the IEC 61850 standard: IEC 61850-8-1 (GOOSE, MMS), IEC 61850-9-2
(Sampled Values)
FTP server
OPC DA server
OPC UA server
I/O devices that support the following protocols: DCE/RPC, FTP, IEC 60870-5-101, IEC 60870-5-104,
Modbus TCP, OPC DA, OPC UA Binary, and the WMI device interaction protocol
For the listed types of devices, Kaspersky Industrial CyberSecurity for Networks analyzes communications over
the following application-level protocols:
ABB SPA-Bus
Allen-Bradley EtherNet/IP
BECKHOFF ADS/AMS
113
CODESYS V3 Gateway
DCE/RPC and protocols based on DCE/RPC (OPC DA and the WMI device interaction protocol)
DNP3
Emerson DeltaV
FTP
Modbus TCP
OMRON FINS
OPC UA Binary
Yokogawa Vnet/IP
Relematika BDUBus
Modi cation of the Modbus TCP protocol for devices of Ekra 200 series
Protocols for interaction of devices in Honeywell Experion PKS / PlantCruise control systems
Protocols for detection and interaction of Honeywell ControlEDGE 900 series devices
114
Tree of devices and tags for process control
A tree of devices and tags for process control is a hierarchical structure that displays the links between process
control devices (for example, PLCs), their protocols and tags. The tags that are part of this structure can be used
in Process Control rules.
– protocol
– tag
A tag is a process parameter transmitted in the industrial network (for example, a controlled temperature). The
values of tags are transmitted by devices over speci c protocols.
Kaspersky Industrial CyberSecurity for Networks supports the use of various types of devices and protocols for
Process Control.
After installation of the application, the application uses the original modules for processing application-layer
protocols based on Deep Packet Inspection technology. You can update protocol processing modules by
installing updates.
To describe the logical connections between devices, supported protocols and tags, you need to create a
hierarchical tree structure from these elements. You can generate a tree of devices and tags in the following ways:
Manually add assets, protocols (when adding assets or when changing the settings of assets), and tags.
After adding tags to the tree, you can specify the necessary tags in Process Control rules.
The application only monitors the values of tags speci ed in Process Control rules.
You can monitor the values of tags in the table of registered events or view them in online mode in the Tags
section.
The settings of a process control device or tag are displayed in the Application Console on the Process control
tab. The settings editor area appears in the lower part of the tab when adding or modifying a process control
device or tag.
115
Settings of Process Control devices
Device type is the type of device from the list of supported device types for Process Control in Kaspersky
Industrial CyberSecurity for Networks. The supported types of devices are listed in the drop-down list.
Host Name is the name that is displayed in the list of process control devices.
The Total eld displays the total number of system commands for the selected protocols.
The Monitored eld displays the number of monitored system commands that will cause the application to
register events if detected.
The Select system command link opens the Monitored system commands window in which you can select
the system commands to monitor from the list.
Protocol – the utilized protocol. The drop-down list shows the available protocols for the speci ed device type
whose tra ic you can monitor.
When the Modbus TCP protocol is selected, the Change the places of machine words in 32-bit values check
box appears on the right of the drop-down list. You can use this check box to enable or disable support for an
inverted sequence of machine words in 32-bit data values over the Modbus TCP protocol.
When the IEC 60870-5-101 protocol is selected, the Advanced settings link appears on the right of the drop-
down list. This link opens the Advanced settings window in which you can con gure the following protocol
settings:
Two-byte ASDU address. This check box enables or disables two-byte addressing mode for application
service data units (ASDU). If this mode is disabled, one-byte addressing is used.
Originator. This check box enables or disables the use of an additional byte for the originator's address in a
data block ID.
Block size for channel address. This drop-down list lets you select the number of bytes in a link-level
address block.
Block size for object address. This drop-down list lets you select the number of bytes in an address block
of an information object.
Address – depending on the selected protocol, this lets you specify the IP address and port, MAC address of
the device, or the domain ID (for the IEC 61850: GOOSE protocol).
You can add additional protocols and addresses for a device by using the Add protocol and Additional address of
the device buttons. To remove additional protocols and addresses, use the buttons on the left of the names of
settings.
Settings of tags
Main settings:
116
Tag name – displayed name of the tag.
Unit of measure – unit of measurement for the process parameter represented by the tag.
The following settings determine the boundaries of values depending on the selected tag's data type:
Scalable tag – determines the tag scaling limits in the elds for entering the minimums and maximums for
input and output values.
Maximum string length – determines the number of characters for a tag with a string data type.
Area
Memory area
Tag address
ASDU address
Block number
Bit
Bank number
Bit count
Group
Index
DB number
Application
POU instance
Variable o set
Tag MSD ID
Information about unknown tags is obtained from tra ic when the application is operating in Unknown Tag
Detection mode. You can enable and disable this mode.
When the application is operating in Unknown Tag Detection mode, the performance of application-layer
protocol processing modules may be slightly reduced. For this reason, Unknown Tag Detection is disabled by
default after the application is installed. It is recommended to enable Unknown Tag Detection mode for a
su icient amount of time to detect all tags that may be associated with devices and protocols in the security
policy. It is recommended to disable this mode after you have added detected tags to the security policy.
Allen-Bradley EtherNet/IP
CODESYS V3 Gateway
DNP3
Emerson DeltaV
OPC DA
OPC UA Binary
Yokogawa Vnet/IP
Information about tags is not duplicated in storage. If the same tag is detected multiple times in tra ic, the date
and time of last detection of this tag is updated in the storage.
When any of the speci ed limits are reached, the application deletes the oldest tags from storage to save newly
detected tags. Tags that were detected before the others are considered to be old tags.
The storage is automatically cleared as tags are added to the security policy.
Unknown Tag Detection is disabled by default after the application is installed. It is recommended to enable
Unknown Tag Detection after rst preparing the application. To prepare the application, you need to add all devices
and protocols whose tags you want to detect in tra ic to the tree of devices and tags. Devices and protocols are
added in the Application Console. You can add devices and protocols manually or import them from data les.
After adding devices and protocols, you need to apply the current security policy on the Server.
Only users with the Administrator role can enable and disable Unknown Tag Detection.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
3. Use the Unknown Tag Detection toggle switch to enable or disable Unknown Tag Detection.
4. After you enable or disable this detection mode, wait for the toggle switch to change to the necessary position
(Enabled or Disabled).
This process takes some time. The toggle switch will be unavailable during this time.
An IEC 61850 device is added by importing tags and devices from data les.
119
1. Select the Process control tab in the Console window.
2. In the Devices and tags area, click the Add device button.
The device editor appears in the lower part of the tab.
Specify one or multiple protocols used for communication with the device.
De ne the settings of one or multiple addresses for communication with the device.
If necessary, edit the settings for monitoring system commands for a device. By default, all system
commands except those that are frequently encountered during normal operation of the device are
monitored for the speci ed device protocols.
The tree of devices and tags for Process Control displays the device and its associated protocols for
monitoring.
It is possible that not all tags from the detected tag storage will be added to the security policy in the Console. You
can add only those tags whose corresponding devices and protocols are available in the security policy. If the
security policy in the Console does not contain the device and/or protocol corresponding to the tag from the
storage, this tag cannot be added to the security policy.
If you want to add all tags from the detected tag storage, the security policy loaded to the Console must have
the same composition of devices and protocols that were used for unknown tag detection. To do so, for
example, you can load the current security policy from the Server to the Console (if the composition of
devices and protocols in this security policy has not changed since the detection of unknown tags).
When tags are added, the application sequentially processes the tags that are available in the detected tag
storage. Each processed tag is automatically deleted from the storage. The application deletes all processed tags
from storage, including those that were added to the security policy and those that were not added.
Users with the Administrator role and users with the Operator role can both add tags from the detected tag
storage to the security policy in the Console.
To add tags from the detected tag storage to the security policy in the Console:
120
3. Click the Load tags button. The button is available if the detected tag storage is not empty (a non-zero value is
displayed in the Detected tags eld).
This starts the process for adding tags and opens the Add detected tags window. After the process of adding
tags is complete, the window displays information about the number of detected tags in the storage, and
information about the number of tags added to the security policy.
You can interrupt the process of adding tags by clicking the Cancel button (this button is displayed until
the process completes). If you do so, the security policy will contain only the added tags that were
processed before you canceled the process. Unprocessed tags will not be removed from the detected tag
storage.
The added tags are displayed in the tree of devices and tags on the Process control tab. You can change the
parameters of added tags and specify these tags in Process Control rules.
After adding tags from the detected tag storage, it is recommended to apply the security policy on the Server and
disable Unknown Tag Detection.
If you have nished adding tags but do not apply the security policy on the Server and Unknown Tag Detection
is still enabled, the tags that were added to the security policy may be detected again as new tags and sent to
the tag storage. This happens because the application only checks whether detected tags are present in the
security policy that is being applied on the Server. However, when adding tags from the detected tag storage,
the application checks whether they are present in the security policy that is loaded in the Console (not the
security policy on the Server). If the added tags are already found in the security policy in the Console, these
tags are not duplicated in the policy.
2. In the tree of devices and tags, select the device and its protocol for which you want to add a tag. You must
select a protocol in which the transmission of tags is supported. You can also select one of the available tags
for the protocol.
After selecting a protocol (or one of the tags of this protocol), the Add tag button becomes active. The button
will be inactive if you have selected a protocol in which the transmission of tags is not supported (for example,
the FTP system protocol).
Specify the required settings whose names are distinguished by font (for example, the tag name and data
type).
If necessary, specify the other settings that are available for the tag depending on the protocol and the
selected data type (for example, the unit of measurement and scaling limits).
121
5. Save the tag settings by clicking the OK button.
The tree of devices and tags will display the new tag for the selected protocol.
2. In the tree of devices and tags, select the element whose settings you want to change.
4. If a tag is selected, you will be prompted to continue. If this is the case, con rm that you want to modify tag
settings.
The device editor or tag editor appears in the lower part of the screen.
b. Specify one or multiple protocols used for communication with the device.
c. De ne the settings of one or multiple addresses for communication with the device.
d. If necessary, edit the settings for monitoring system commands for a device.
a. Specify the required settings whose names are distinguished by font (for example, the tag name and data
type).
b. If necessary, specify the other settings that are available for the tag depending on the protocol and the
selected data type (for example, the unit of measurement and scaling limits).
2. In the tree of devices and tags, select the element that you want to remove.
122
Searching tags
You can perform a search for tags based on the values of any column.
To lter the found tags, you can select one of the following lter settings:
1. In the upper-right corner of the Devices and tags area, enter your search query into the Tag search eld. To
search by tag ID, enter id: in the search eld and then enter the desired IDs separated by a space (for example,
id: 3 52 675). The search is initiated as you enter characters.
The tree of devices and tags displays the tags that meet the search criteria. The found tags will be displayed
together with the devices and protocols associated with those tags.
2. If necessary, select the necessary lter setting in the Show tags drop-down list:
In rules – to display the tags found in all existing Process Control rules.
In the current rule – to display the tags found only for the selected Process Control rule.
The tree of devices and tags will display the items that match the ltering criterion.
3. If you selected the In the current rule lter setting and you want to display the tags found in another Process
Control rule, select the relevant rule in the table of Process Control rules.
To import custom tags and process control devices into Kaspersky Industrial CyberSecurity for Networks using
data les:
123
If the list of devices and tags is not empty, in the window that appears, specify the method for importing: Add
or Replace. When the Add option is selected, the imported devices will be added to the list of existing devices.
When the Replace option is selected, existing devices in the list will be replaced by the imported devices.
The imported process control devices and their associated protocols and tags will appear in the list on the
Process control tab.
When a monitored system command is detected, Kaspersky Industrial CyberSecurity for Networks registers an
event for Command Control technology. The event is registered using the system event type that is assigned the
code 4000002602. You can con gure the available parameters for this event type in the Application Console on
the Con gure events tab.
You can view information about registered events when connected to the Server through a web browser.
2. In the list of devices and tags, select the device for which you want to con gure monitoring of system
commands.
4. In the device editor area, in the System commands line, click the Select system command link.
You will see the Monitored system commands window containing a list of system commands that can be
monitored.
The list of monitored system commands depends on the speci ed protocols for the device. If the
necessary system commands are absent from the list, close the Monitored system commands window
and add all missing protocols that could be used by the device to the device settings.
5. In the Monitored system commands window, select the check boxes next to the system commands that you
want to monitor.
6. Click OK.
124
Detecting default passwords when connecting to devices
When monitoring the communications of process control devices, Kaspersky Industrial CyberSecurity for
Networks can determine when default passwords are used. If a connection is made to a device using a password
that is set as the default password for the particular type of device, the application registers the corresponding
event. To register default password detection events, the application uses the system event type for the
detection of system commands.
Kaspersky Industrial CyberSecurity for Networks detects default passwords in the following cases:
An attempt to use a default password was successful or the result of that attempt was not determined. In this
case, an event is registered for the detection of the DEFAULT PASSWORD ENTRY system command.
A new password matching the default password is set. In this case, an event is registered for the detection of
the DEFAULT PASSWORD SET system command.
The default password is received when reading the connection account credentials from a device. In this case,
an event is registered for the detection of the DEFAULT PASSWORD READ or DEFAULT PASSWORD READ
WITH TYPE system command (if the password details indicate its type, which determines the operations that
can be performed with the device using this password).
Detection of default passwords is supported for certain types of devices and application-level protocols (see the
table below).
ABB Relion series: RED670, REL670, RET670 ABB SPA-Bus DEFAULT PASSWORD
ENTRY
DEFAULT PASSWORD
SET
General Electric MULTILIN series: B30, C60 Modbus TCP DEFAULT PASSWORD
ENTRY
DEFAULT PASSWORD
READ
DEFAULT PASSWORD
READ WITH TYPE
DEFAULT PASSWORD
SET
125
Schneider Electric Modicon: M580, M340 Modbus TCP DEFAULT PASSWORD
READ WITH TYPE
Siemens SIMATIC S7-200, S7-300, S7-400 Siemens Industrial Ethernet DEFAULT PASSWORD
Siemens S7comm ENTRY
DEFAULT PASSWORD
READ
To register default password detection events, the following conditions must be met:
Network Control is enabled in monitoring mode and Command Control technology is applied.
The table of Network Control rules does not contain any rules for Command Control technology that allow
system commands with default passwords. For example, such rules may be automatically created in Network
Control learning mode. If the table of Network Control rules contains rules that allow system commands with
default passwords, it is recommended to switch these rules to inactive state.
For the relevant assets, tracking of system commands with default passwords is enabled.
You can combine Process Control rules into groups to logically organize rules based on user-de ned attributes (for
example, rules related to speci c devices can be put into di erent groups). You can form a hierarchical structure of
groups and rules nested within them. Up to eight nesting levels are supported.
126
The following icons are used for the tree elements:
– group.
A rule containing a Lua script consists of a script in the Lua language containing a description of the algorithm
used for event registration.
If you are using Lua scripts to create Process Control rules, you can use a global script, which is a Lua script in
which global variables and Lua functions are initialized. You can use these global variables and functions in a Lua
script for any particular rule. A speci ed global Lua script is automatically executed when the security policy is
applied. When a security policy is created, the global Lua script is empty and does not contain executable code. A
security policy can have only one global Lua script, which can be viewed and modi ed when working with any rule
containing a Lua script.
The settings of a Process Control rule are displayed in the editor area that appears under the rule list when adding
or modifying a rule.
In the left part of the rule editor area, you can con gure the following settings:
For rules in which conditions are de ned for the values of tags, you can con gure the settings of conditions
whose violation will cause an event to be registered. For information about conditions, please refer to the Types
of conditions for the Process Control rules section.
For rules consisting of a Lua script, you can con gure the type of Lua script (Rule script or Global script) and
the text of the Lua script. When creating a rule script, the entry eld displays a Lua script template with brief
comments. You can use the help button above the script entry eld to open a window containing detailed
comments for creating a script. For information about the applied functions and variables, please refer to the
Functions and variables for a Lua script section.
In the right part of the rule editor area, you can con gure the type of event that will be registered when the rule
conditions are satis ed.
You can use the Event drop-down list to select an existing event type or add a new type. The following control
buttons are located next to the drop-down list:
127
An event type in the rule editor area uses the same event type settings that are provided on the Con gure events
tab.
You can specify the types of conditions when performing the following actions:
To create a rule:
2. If the list of Process Control rules contains groups, select the group to which you need to move the
new rule. You can select the group itself or one of the existing rules from the group.
b. De ne the conditions.
5. Click OK.
The new rule appears in the list.
The application Server will begin to register events when the rule conditions are ful lled.
128
To edit a rule:
2. In the list of Process Control rules, select the rule that you want to edit.
b. De ne the conditions.
5. Click OK.
The application Server will begin to register events based on the changes made to the rule.
In the drop-down list of condition types, you can select one of the following options:
Equal to – the value of the controlled tag is equal to the speci ed value.
Two parameters are used in this type of condition:
Does not equal – the value of the controlled tag is not equal to the speci ed value.
Two parameters are used in this type of condition:
Less than – the value of the controlled tag is less than the speci ed minimum permissible value.
Two parameters are used in this type of condition:
Greater than – the value of the controlled tag is greater than the speci ed maximum permissible value.
Two parameters are used in this type of condition:
129
Deviation exceeds allowance – if the controlled tag value di ers from the speci ed value by more than the
value of the allowance parameter.
Three parameters are used in this type of condition:
Parameter 3: allowance as a percentage of the speci ed value (constant – an unsigned number in the range
from 0.001 to 100).
Out of range – the value of the controlled tag is outside of the speci ed range.
Three parameters are used in this type of condition:
Tag bit equals – the value of the monitored bit in the controlled tag is equal to the speci ed value.
Three parameters are used in this type of condition:
Parameter 2: sequence number of the monitored bit in the tag (integer within the range corresponding to
the data type of the selected tag: from 1 to 8, 16, 32 or 64).
Parameter 3: value of the monitored bit in the tag (speci ed as one of two integers: zero or one).
Detection – the controlled tag was detected in the tra ic being monitored.
One parameter is used in this type of condition: controlled tag of any type.
Change exceeds allowance – the change in the value of the controlled tag exceeds the allowance relative to
the previously registered value of the tag.
Two parameters are used in this type of condition:
Parameter 2: allowance as a percentage of the previous value (constant – an unsigned number in the range
from 0.001 to 100).
Tag bit has changed – the value of the monitored bit in the controlled tag is changed.
Two parameters are used in this type of condition:
Parameter 2: sequence number of the monitored bit in the tag (integer within the range corresponding to
the data type of the selected tag: from 1 to 8, 16, 32 or 64).
130
To de ne a tag for a setting, you can select the relevant tag in the drop-down list or drag the tag from the Devices
and tags list.
In the drop-down list to the right of the eld containing the selected tag, you can select which most recent value
of the tag is used in the rule. The following options are provided:
Read – the most recent tag value intercepted when reading the tag from the device.
Write – the most recent tag value intercepted when writing the tag to the device.
Read and write – the most recent tag value intercepted when reading or writing the tag.
You can de ne multiple conditions in a Process Control rule. To apply multiple conditions, you can select logical
operators (AND / OR) and specify the priorities of conditions by using parentheses in logical expressions. You can
add a condition by clicking the Add condition button. To remove an additional condition, use the button on the
left of the condition.
You can change functions in Lua scripts when performing the following actions:
2. If the list of Process Control rules contains groups, select the group to which you need to move the
new rule. You can select the group itself or one of the existing rules from the group.
4. In the Lua script editor above the script entry eld, select the Rule script option.
6. Click OK.
The new Lua script appears in the list.
131
Creating or editing a global Lua script
2. Open the Lua script editor. To do so, you can use one of the following methods:
If the list of Process Control rules does not contain rules containing Lua scripts, create a new rule
with a Lua script. To do so:
If the list of Process Control rules contains groups, select the group in which the rule containing a
Lua script will be created. You can select the group itself or one of the existing rules from the
group.
If the list of Process Control rules contains at least one rule that has a Lua script:
3. In the Lua script editor above the script entry eld, select the Global script option.
4. In the script entry eld, enter the code of the script in the Lua language.
To open the window containing comments on creating a global script, click the help button above the
script entry eld.
5. Click OK.
The de ned global variables and functions of a global Lua script can be used when creating or editing
rules containing Lua scripts.
132
To edit a Lua rule script:
2. In the list of Process Control rules, select the rule with the Lua script that you want to edit.
4. In the Lua script editor above the script entry eld, select the Rule script option.
6. Click OK.
The application Server will begin to register events based on the changes made to the rule.
Tags are described in the function code by an expression in the following format:
X = tag'tag_name'[.R/.W/.RW],
where the following modi er values are used: .R – tag is intercepted when reading the tag from the device, .W –
tag is intercepted when writing the tag to the device, .RW – any most recent value of the tag. You are not required
to specify a modi er. If a modi er is not speci ed, any most recent tag value is used.
When creating a rule using a Lua script, you can use additional variables with a user-de ned name and value.
_AddEventParam('parameter_name', parameter_value)
You can use the added variable in the settings of custom event types. The added variable may be used in the
format $extra.<parameter_name>.
You can use functions for adding a record to the process log in which the Lua script is executed (this is normally a
process whose name starts with the word Filter). A record de ned by an argument of the function (variable or
constant) is added to the log:
133
_WriteInfoLog(function_argument) creates a log record with the Informational level.
print(function_argument1, function_argument2,…) creates a log record with the Debug level that may
contain multiple arguments of the function. Variables or constants de ned by function arguments are
separated by a tab character in a log record.
Records are not created in the log if the level of the record is lower than the log level set for the process in the
Settings of Server and sensors window.
2. If you need to add a new group into an existing group, select the group that will serve as the parent group.
5. Click OK.
The new group appears in the list.
2. In the list of Process Control rules, select the item that you want to move.
3. Use the mouse to drag the item to the necessary place in the list.
2. In the list of Process Control rules, select the item that you want to change.
134
4. You will see the editor area (if a rule is selected) or the Group name window (if a group is selected).
6. Click OK.
2. In the list of Process Control rules, select the item that you want to remove.
4. Click Yes.
1. In the upper-right corner of the Process Control rules area, enter the search query into the Rule search eld.
The search is initiated as you enter characters.
The list of Process Control rules displays the rules and groups that meet the search criteria.
2. If you want to exclude groups from search results, clear the Show groups check box.
To highlight listed tags that are used in the selected rule or rules of the selected group:
Select the relevant item in the list of Process Control rules (group or individual rule).
135
In the Devices and tags tree, all tags associated with the selected item will be highlighted. Tags are highlighted in
light green. To display the highlighted tags on the screen, expand the corresponding nodes of the tree and, if
necessary, vertically move the slider on the right of the tree.
The list of types of registered events is displayed in the Kaspersky Industrial CyberSecurity for Networks Console
on the Con gure events tab. Each event type corresponds to one of the technologies used by the application.
When you connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser,
you cannot work with the list of event types.
The list of event types is part of the security policy. Only users with the Administrator role can apply the current
security policy on the Server. However, users with the Administrator role and users with the Operator role can both
make changes and save the security policy to a folder (including with changed settings for event types).
The list of event types contains system event types and custom event types. System event types are created by
the application during installation and cannot be deleted from the list. The application uses system event types to
register primary events based on Deep Packet Inspection technology and to register any events based on other
technologies. You can create additional event types for Deep Packet Inspection and External technologies. These
event types are called custom event types.
For custom event types, you can delete and modify settings, and select recipients. For system event types, you
can select recipients and modify individual registration settings.
You can use custom event types to con gure receipt of events from external systems. To do so, in the
Console, you need to speci cally create event types to be received from an external system. When an event
type is created, it is assigned a unique number (this number is saved as the value of the Code setting). Then, in
the external system, you need to con gure the transmission of events to the application using Kaspersky
Industrial CyberSecurity for Networks API methods. When sending an event to Kaspersky Industrial
CyberSecurity for Networks, the external system will specify the event type identi er de ned by the Code
setting. Using this identi er, the Kaspersky Industrial CyberSecurity for Networks Server will determine the
event type and register it as an event based on External technology.
Code – unique event type number that will be displayed in the list of event types on the Con gure events tab.
In the table of registered events, the event type identi er is displayed in the Event type column. The event type
identi er is automatically assigned by the application when the event type is created. This setting cannot be
changed.
Severity – importance level that will be speci ed for the event when it is registered: Critical, Warning, or
Informational. This setting can be changed only for custom event types.
Technology – technology used for event registration. This setting is accessible only for custom event types.
You can specify Deep Packet Inspection or External technology.
Title – text of the event title. It is displayed in the list of event types on the Con gure events tab. In the table
of registered events, the title of the event type is displayed in the Title column. The titles of event types are
136
also displayed in the Events block in the Dashboard section of the application web interface. This setting can
be changed only for custom event types.
Description – additional text that will be displayed in the table of registered events in the Description column.
This setting can be changed only for custom event types.
Keep tra ic – check box that lets you enable or disable automatic saving of tra ic that was registered in the
system before and after registration of the event. Tra ic is saved in the application database. If the automatic
saving of tra ic is enabled, you can con gure the settings for saving tra ic by clicking the Con gure link.
If automatic saving of tra ic is disabled, you can manually load tra ic some time after registration of an
event of this type. When the application receives a request to load tra ic, it searches network packets in
tra ic dump les that were temporarily created by the application. If relevant network packets are found in
the tra ic dump les, they are loaded after rst being saved in the database.
Event regenerate timeout – maximum period of time after which an event is allowed to be registered again. If
the conditions for event registration are repeated again before the speci ed time period elapses, the new
event is not registered but the counter for the number of repeats of the previously registered event is
increased and the date and time of the last occurrence of the event is updated. After this period elapses, the
application will register a new event of this type when the event registration conditions are repeated. The
repeat event timeout period begins when an event of this type is last registered. For example, if the de ned
time period is 8 hours and the conditions for registering this type of event are detected two hours after the
previous event, a new event will not be registered. A new event will be registered when the event registration
conditions are detected after 8 or more hours.
For registered events, the event regenerate timeout may occur earlier than the speci ed period. Re-
registration of an event is allowed if the Resolved status was assigned to the event, and if the computer
performing Server functions was restarted.
The texts of titles and descriptions in the settings of event types may contain variables. When registering events,
the Server inserts the current values of the variables.
You can view the registered events when connected to the Server through a web browser.
By technology. Within each technology, items are grouped by their importance level (severity).
In the toolbar of the Con gure events tab, select the necessary grouping mode in the Group drop-down list.
137
You can search codes and titles in the list of event types.
In the toolbar of the Con gure events tab, enter your search query into the Search for event types eld. The
search is initiated as you enter characters.
The list of event types will display the elements that meet the search criteria (the values of the Description setting
in event types are not taken into account during the search).
Created event types for External technology can be used to receive events in Kaspersky Industrial CyberSecurity
for Networks from external systems.
3. Click OK.
You can select a new event type when creating a Process Control rule on the Process control tab. Events of the
new type will be registered after the security policy is applied on the Server.
1. On the Con gure events tab, select the relevant event type and click the Edit button.
A warning window opens.
138
2. Click OK.
The settings editor area appears in the lower part of the Con gure events tab.
a. Assign the event severity: Critical, Warning, or Informational (available only for custom events).
4. Click OK.
The change to the severity or title of the event will be displayed in the list of event types.
If automatic saving of tra ic is disabled for an event type, you will be able to manually load tra ic only after waiting
some time after registration of an event of this type. In this case, the application uses tra ic dump les to load
tra ic (these les are temporarily saved and are automatically deleted as more and more tra ic is received). When
tra ic is loaded from these les, the database saves the speci c amount of network packets that was de ned by
default when enabling the saving of tra ic for event types.
The application saves tra ic in the database only when an event is registered. If the conditions for registering
this event are repeated during the event regenerate timeout, tra ic at this point in time is not saved in the
database.
You can enable and con gure the saving of tra ic for any event types except a system event type assigned the
code 4000002700. An event with the code 4000002700 is registered when there is no tra ic at a monitoring
point. For this reason, tra ic is not expected for this type of event.
If the saving of tra ic is enabled for incidents (meaning for system types of events assigned the codes
8000000000, 8000000001, 8000000002 or 8000000003), the application saves tra ic for all embedded events
of the incident when an incident is registered. The settings de ned for the incident are applied when saving tra ic
of embedded events. However, the tra ic storage settings de ned directly for types of events embedded in an
incident take priority over the settings de ned for an incident. This means that tra ic for embedded events of an
incident will be saved according to the settings de ned for the speci c types of these events. If these settings are
not de ned, the tra ic for embedded events will be saved according to the settings de ned for an incident.
Enabling and con guring the saving of tra ic for incidents is su icient for one of the event types with codes
8000000000, 8000000001, 8000000002 or 8000000003. The application automatically applies the changes
made to one of these event types to the remaining three types.
139
To con gure the settings for saving tra ic for an event type:
1. In the event type settings editor, select the Keep tra ic check box.
2. Open the Save event tra ic window by clicking the Con gure link.
3. In the Save event tra ic window, con gure the saving of tra ic before event registration. To do so, specify the
necessary values in the Packets before event and/or Milliseconds before event elds. If the value is zero, the
setting is not applied. If the values are de ned in both of these elds, the application will save the minimum
amount of packets corresponding to one of the de ned values.
4. Con gure the saving of tra ic after event registration. To do so, specify the necessary values in the Packets
after event and/or Milliseconds after event elds. If the value is zero, the setting is not applied. If the values
are de ned in both of these elds, the application will save the minimum amount of packets corresponding to
one of the de ned values.
For certain technologies (particularly Deep Packet Inspection), fewer post-registration packets than
de ned by the settings for saving tra ic may be saved in events. This is due to the technological speci cs
of tra ic monitoring.
5. Click OK.
1. On the Con gure events tab, select the event type to delete.
Kaspersky Industrial CyberSecurity for Networks can relay event information to the following recipients:
SIEM server
Syslog server
140
Kaspersky Security Center
To relay events to Kaspersky Security Center on the Kaspersky Industrial CyberSecurity for Networks Server, you
must add the capability for application interaction with Kaspersky Security Center. You can add this functionality
during installation or reinstallation of Kaspersky Industrial CyberSecurity for Networks.
To relay events to other recipient systems, you do not need to add the capability for application interaction
with Kaspersky Security Center.
Recipient name – the name that is displayed in the column header on the Con gure events tab.
Recipient type – the selected type of recipient. Depending on the selected type, you can con gure the
following additional settings:
For a SIEM server and Syslog server: address and port of the server.
The contents and order of information about events relayed to SIEM server and Syslog server
recipients may di er from the contents and order of information displayed in the events table.
An event template is a text description template for events in a noti cation. A template determines the
content and order in which information is displayed about each event in a noti cation. A template is
generated using variables.
Text of noti cation. In the noti cation text, you can specify the $events variable, which is replaced by a
list of lines containing information about events when the Server creates a noti cation. Each line
corresponds to an event template with the current values of variables.
Number of noti cations per day. Determines the maximum number of noti cations per day, starting at
0:00 hours in the time zone of the Server. If there are more noti cations, recipients are sent an email
message stating that the maximum number of event noti cations has been exceeded. If this is the case,
new noti cations will not be sent until the end of the current day.
Quantity of events in each noti cation. Determines the maximum number of events whose information
can be placed into one noti cation. If there are more events, two or more noti cations with this same
limit are created (within the daily limit).
For Kaspersky Security Center: quantity of relayed events per day. This setting determines the maximum
number of relayed events per day, starting at 0:00 hours in the time zone of the Server. If there are more
events to relay, the other events registered before the end of the current day are not sent to Kaspersky
Security Center.
141
The settings that determine the maximum number of relayed events are applied to events that are registered in
Kaspersky Industrial CyberSecurity for Networks. If information about multiple network interactions is provided in a
speci c event, this event is converted into separate event records for a recipient (with one event for each network
interaction). For this reason, the list of events for a recipient may contain more events than speci ed by the
parameter that determines the maximum number of events.
Adding a recipient
To add a recipient:
b. Select the recipient type and de ne the remaining settings for sending events.
4. Click OK.
The Con gure events tab will display a column in whose title the name of the added recipient will be speci ed.
2. Click the title of the column with the name of the recipient whose settings you want to change.
The Recipients window appears on the screen.
4. Click OK.
If you changed the name of a recipient, the new name is displayed in the column header on the Con gure events
tab.
2. Make sure that the list of event types displays the recipients to whom you want to relay application events.
If the relevant recipient is missing, add it to the list.
3. In the lines containing event types or groups (subgroups) of event types, select the check boxes for the
relevant recipients.
The application will send the selected types of events to the recipients after the security policy is applied on the
Server.
Removing a recipient
To remove a recipient:
2. Click the title of the column containing the name of the recipient that you want to remove.
The Recipients window appears on the screen.
In place of the speci ed variables, the Server automatically inserts the current values of settings when registering
or relaying an event.
In the settings of custom event types, you can use the following variables for the Title and Description entry
elds:
$communications – lines of the description of network interactions (one line for each network interaction)
indicating the protocol and addresses of the network packet source and destination.
$dst_address – address of the network packet destination (depending on the data available in the protocol,
this can be an IP address, port number, MAC address and/or other address data).
$monitoring_point – name of the monitoring point whose tra ic invoked registration of the event.
$protocol – name of the application-level protocol that was being monitored when the event was registered.
143
$src_address – address of the network packet source (depending on the data available in the protocol, this
can be an IP address, port number, MAC address and/or other address data).
$tags is the list of all names and values of tags participating in the Process Control rule.
$technology_rule – name of the Process Control rule by which the event was registered.
$extra.<paramName> – additional variable added using the AddEventParam function for an external system
or Lua script.
In the Email recipient settings, you can use the following variables for the Event template entry eld:
$closed – date and time when the Resolved status was assigned or the date and time of the event regenerate
timeout (for events that are not incidents), or the date and time of registration of the last event included in the
incident (for incidents).
$communications – lines of the description of network interactions (one line for each network interaction)
indicating the protocol and addresses of the network packet source and destination.
$monitoring_point – name of the monitoring point whose tra ic invoked registration of the event.
In the Email recipient settings, for the Text of noti cation entry eld, you can use the $events variable only. The
variable is replaced by a list of lines containing information about events. Each line will correspond to an event with
the current values of variables from the Event template eld.
1. Set the cursor in the necessary position of the entry eld in which you want to use the variable.
2. Click the Add variable button or enter the $ character (the $ character needs to be separated from the
preceding word by a space).
The entry eld next to the cursor will display a drop-down list of available variables.
144
The variable will be added to the entry eld and will be distinguished by a special font.
Asset management
Kaspersky Industrial CyberSecurity for Networks lets you monitor devices connected to an industrial network. An
assets table is created for the purpose of asset management in the application.
The assets table contains asset information that was manually provided or obtained automatically during tra ic
analysis.
Only information that can be identi ed during tra ic analysis can be automatically obtained and updated (for
example, address information of an asset). For asset activity detection and automatic update of information, the
corresponding Asset Management methods must be enabled. If necessary, you can manually specify the values of
speci c data and disable their automatic update to lock the current values (for example, you can lock the asset
category if the currently de ned category di ers from the one that is determined automatically).
Some information must be speci ed manually because it cannot be automatically updated. For example, you can
save speci c information about assets in the table, and add absent criteria for sorting and ltering assets. You can
also use manually de ned information to arrange assets in various groups in the group tree, or lter and search for
assets based on asset labels.
Information from the assets table is stored on the Server and is independent of the security policy that is loaded in
the Console or applied on the Server. However, process control devices saved in a security policy are automatically
added to the assets table after the policy is applied on the Server (or the address information of previously added
assets is updated).
You can view and edit information about assets in the Assets section of the Kaspersky Industrial CyberSecurity
for Networks web interface. You can also view information about the interactions between assets and perform
various actions with assets when working with the network map.
Asset activity detection This method lets you monitor the activity of assets in industrial network tra ic based
on the obtained MAC- and/or IP addresses of assets.
Asset Information Detection This method lets you automatically obtain and update information about assets
based on received data about the interactions of assets.
PLC Project Control This method lets you detect information about PLC projects in tra ic, save this
information in the application, and compare it to previously obtained information.
You can enable and disable the use of individual asset management methods.
Learning mode. This mode is intended for temporary use. In this mode, all assets whose activity is detected in
tra ic are considered to be authorized by the application. You can enable learning mode only for the asset
activity detection method. The Asset Activity Detection method can be applied together with the Asset
Information Detection and PLC Project Control methods.
145
Monitoring mode. This mode is intended for continual use. In this mode, when activity of assets is detected, the
application considers only those assets that have been assigned the Authorized status as authorized.
In learning mode, the application assigns the Authorized status to all detected assets. The application does not
register events when it detects activity of assets or when asset information is automatically updated.
Asset management learning mode must be enabled for a su icient amount of time to detect the activity of new
devices. This amount of time depends on the number of devices in the industrial network and how frequently they
operate and are serviced. We recommend that you enable learning mode for at least one hour. In large industrial
networks, learning mode can be enabled for a period ranging from one to several days to detect the activity of all
new devices.
In monitoring mode (when the asset activity detection method is enabled), the application assigns the
Unauthorized status to all devices that have showed activity and are either unknown to the application or are
assets that have the Archived status. The application assigns the Archived status to assets that have not shown
activity and whose information has not changed in a long time (30 days or more).
When the asset information detection method is enabled, the application automatically updates information about
assets. For example, the application can automatically update the name of the operating system installed on an
asset as it detects updated data in the tra ic of the asset. The application updates data for which automatic
updates are enabled in the settings of assets.
To automatically receive information about assets, the application analyzes industrial network tra ic according to
the rules for identifying information about devices and the protocols of communication between devices. These
rules are embedded in the application and are applied independent from the security policy loaded in the Console
or applied on the Server.
After installation, the application uses the default rules for identifying information about devices and the
protocols of communication between devices. In most cases, these rules generate correct results. However,
there can be situations when information is incorrectly identi ed due to the technical speci cs of devices (for
example, when identifying the category of some devices). To increase the accuracy of identifying information,
Kaspersky experts regularly update the databases containing the sets of rules. You can update rules by
installing updates.
In monitoring mode, the application registers the corresponding events based on Asset Management technology.
Depending on the applied methods, events may be registered in the following cases:
When PLC Project Control is enabled, the application may register a large number of events associated with
the detection of read/write operations with projects/blocks. Normally, a large number of events are registered
at the initial stage when this method is used. To reduce the total number of registered events, the PLC Project
Control method is disabled by default after the application is installed. You can enable this method at any
time.
146
Kaspersky Industrial CyberSecurity for Networks can monitor industrial network tra ic for information about PLC
projects and compare this information with previously received information about PLC projects.
A PLC project is a microprogram written for a PLC. A PLC project is stored in PLC memory and is run as part of
the industrial process that uses the PLC. A PLC project may consist of blocks that are individually transmitted and
received over the network when the project is read or written.
Information about a PLC project/block may be received by the application when it detects operations for reading
a project/block from a PLC or writing a project/block to a PLC. The obtained information is saved in Kaspersky
Industrial CyberSecurity for Networks. The next time it detects a project/block write or read operation, the
application compares the received information about the project/block with the saved information. If the received
information about a project/block does not match the latest saved information about that project/block (including
when there is no saved information), the application registers the corresponding event.
Receiving information about PLC projects is supported for the following types of devices:
To monitor read and write of PLC projects, you are not required to add assets to the list of process control
devices. Read and write of PLC projects is monitored for all detected assets of the speci ed types.
For each asset, the application saves no more than 100 di erent variants of PLC projects. If a PLC project is
transmitted or received by individual blocks, up to 100 di erent variants of each block are saved.
If the maximum number of saved PLC projects (or PLC project blocks with the same name) has been reached for
an asset, the application saves a newly detected project/block in place of the oldest project/block.
When monitoring read/write of PLC projects, the application registers events based on Asset Management
technology. Events are registered with system event types that are assigned the following codes:
4000005200 – for a detected read of an unknown block of a project from a PLC (if there is no saved
information about this block).
4000005201 – for a detected read of a known block of a project from a PLC (if there is saved information
about this block but the obtained information does not match the latest saved information about this
block).
4000005204 – for a detected read of an unknown project from a PLC (if there is no saved information
about this project).
4000005205 – for a detected read of a known project from a PLC (if there is saved information about this
project but the obtained information does not match the latest saved information about this project).
4000005202 – for a detected write of a new block of a project to a PLC (if there is no saved information
about this block).
4000005203 – for a detected write of a known block of a project to a PLC (if there is saved information
about this block but the obtained information does not match the latest saved information about this
block).
147
4000005206 – for a detected write of a new project to a PLC (if there is no saved information about this
project).
4000005207 – for a detected write of a known project to a PLC (if there is saved information about this
project but the obtained information does not match the latest saved information about this project).
You can con gure the available parameters for event types in the Application Console on the Con gure events
tab.
You can view information about registered events when connected to the Server through a web browser.
Selecting the applied methods and changing the Asset Management mode
Only users with the Administrator role can manage asset management modes and methods.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
3. Enable or disable the use of asset management methods by using the following toggle switches:
4. After a method is enabled or disabled, wait for the toggle switch to change to the necessary position (Enabled
or Disabled).
The process may take some time, during which the toggle switch will be unavailable. Wait for the method to be
enabled or disabled.
5. If the asset activity detection method is enabled, select the necessary asset management mode to be applied
with the method. To do so, in the drop-down list on the right of the method name, select one of the following
values:
6. After the mode is selected, wait for the name of this mode to appear in the eld of the drop-down list.
This process may take some time, during which the drop-down list displays the Changing status. Wait for the
selected mode to be enabled.
Assets table
An assets table is created for the purpose of asset management in the application. All assets in the table are
considered to be known to the application.
148
The assets table has the following limitations on the number of elements:
The total number of assets with the Authorized and Unauthorized statuses can be no more than 1000.
If the maximum number of assets with the Authorized and Unauthorized statuses is reached, new assets with
these statuses are not added to the table. If this is the case, to add a new asset to the table you need to
remove one of the previously added assets.
The number of assets with the Archived status can be no more than 1000.
If the maximum number of assets with the Archived status is reached, new assets with this status are added to
the table in place of assets that have went the longest without showing any activity.
When the assets table is over lled, the application displays the appropriate message.
Status – asset status that determines whether activity of the asset is allowed in the industrial network. An
asset can have one of the following statuses:
Authorized. This status is assigned to an asset for which activity is allowed in the industrial network.
Unauthorized. This status is assigned to an asset for which activity is not allowed in the industrial network.
Archived. This status is assigned to an asset if it is no longer being used or must not be used in the industrial
network, or if the asset has shown no activity and the asset information has not changed in a long time (30
days or more).
Address information – MAC- and/or IP addresses of the asset. If an asset has multiple network interfaces, you
can specify the MAC- and/or IP addresses for the network interfaces of the asset. Up to 64 network interfaces
can be assigned for an asset.
Category – name of the category that determines the functional purpose of the asset. Kaspersky Industrial
CyberSecurity for Networks supports the following categories of assets:
HMI / SCADA – computers with installed software for human-machine interface (HMI) systems or SCADA
systems.
Other – devices that do not fall into the categories described above.
149
Group – name of the group containing the asset in the asset group tree (contains the name of the group and
the names of all its parent groups).
Security state – indicator of whether there are events associated with the asset. Depending on the severity
levels of events, the following states are available:
Critical events. There are unprocessed events with the Critical severity level.
Warnings. There are unprocessed events with the Warning severity level but there are no unprocessed
events with the Critical severity level.
OK. There are no unprocessed events or there are only events with the Informational severity level.
Last seen – date and time when the last activity of the asset was registered.
Last modi ed – date and time when information about the asset was last modi ed.
Creation date – date and time when the asset was added to the assets table.
When viewing the assets table, you can use the following functions:
Con gure the display and order of columns in the assets table
1. In the Assets section of the application web interface, click the Customize table button.
You will see a window for con guring the display of the assets table.
2. Select the check boxes opposite the settings that you want to view in the table. You must select at
least one setting.
3. If you want to change the order in which columns are displayed, select the name of the column that
needs to be moved to the left or right in the table and use the buttons containing an image of the up or
down arrows.
The selected columns will be displayed in the assets table in the order you speci ed.
1. In the Assets section, click the ltering icon in the relevant column of the table.
When ltering by asset security states, you can also use the corresponding buttons in the toolbar.
The ltering window opens.
2. Select the check boxes opposite the values by which you want to lter events. You can clear or remove
all check boxes by clicking the link that is displayed in the upper part of the lter window.
3. Click OK.
To lter assets by the Asset ID, OS, Vendor, Model or Network name column:
1. In the Assets section, click the ltering icon in the relevant column of the table.
The ltering window opens.
2. In the Including and Excluding elds, enter the values for assets that you want to include into the lter
and/or exclude from the lter.
3. If you want to apply multiple lter conditions combined by the logical operator OR, in the lter window
of the selected column click the Add condition button and enter the condition in the opened eld.
4. If you want to delete one of the created lter conditions, in the lter window of the selected column
click the icon.
5. Click OK.
1. In the Assets section, click the ltering icon in the Address information column.
The ltering window opens.
2. In the Including and Excluding elds, in the drop-down lists select the types of addresses for assets
that you want to include into the lter and/or exclude from the lter. You can select the following types
of addresses:
IP address
MAC address
Complex – if you want to specify multiple addresses of di erent types combined by the logical
operator AND. To add di erent types of addresses, use the Add condition (AND) button.
3. If you want to apply multiple lter conditions by address type combined with the logical operator OR, in
the lter window click the Add condition (OR) button and select the relevant types of addresses.
4. If you want to delete one of the created lter conditions, in the lter window click the icon located on
the right of the eld containing the drop-down list.
5. Click OK.
1. In the Assets section, click the ltering icon in the Group column.
151
The ltering window opens.
2. Click the icon in the right part of the eld for indicating the group.
The Select group in tree window appears.
3. In the asset group tree, select the relevant group and click the Select button.
The path to the selected group will appear in the eld in the lter window.
4. If you want to apply multiple lter conditions combined by the logical operator OR, in the lter window
click the Add condition button and specify a di erent group in the opened eld.
5. If you want to delete one of the created lter conditions, in the lter window click the icon.
6. Click OK.
To lter assets by the Last seen, Last modi ed or Creation date column:
1. In the Assets section, click the ltering icon in the relevant column of the table.
The calendar opens.
2. In the calendar, specify the date and time for the start and end boundaries of the ltering period. To do
so, select a date in the calendar (the current time will be indicated) or manually enter the value in the
format DD-MM-YY hh:mm:ss.
3. Click OK.
1. In the Assets section, click the ltering icon in the Labels column.
The ltering window opens.
2. Enter one or multiple labels combined with the logical operator AND.
3. If you want to apply multiple lter conditions combined by the logical operator OR, in the lter window
click the Add condition (OR) button and enter the relevant labels (multiple labels in this condition will
also be combined by the logical operator AND).
4. If you want to delete unnecessary labels in the lter window, you can do the following:
Use the icon next to the names of labels to delete the unnecessary labels.
Delete one of the created lter conditions by using the icon located on the right of the eld.
5. Click OK.
Search assets
152
To nd the relevant assets:
In the Assets section, enter your search query into the Search assets eld. The search is initiated as you
enter characters.
The assets table will display the assets that meet the search criteria.
A search is performed in all columns except the following columns: Asset IDs, Status, Category, Security
state, Last seen, Last modi ed, and Creation date. The search is also performed in the values of custom
elds for assets.
To reset the de ned lter and search settings in the assets table:
In the toolbar in the Assets section, click the Clear lter button (this button is displayed if search or
lter settings are de ned).
Sorting assets
To sort assets:
1. In the Assets section, click the header of the column by which you want to sort.
2. When sorting assets by the Address information column, in the drop-down list of the column header
select the setting by which you want to sort assets.
Depending on the values selected for display in the Address information column, you can select one of
the following options:
IP address
MAC address
3. If you need to sort the table based on multiple columns, press the SHIFT key and hold it down while
clicking the headers of the columns by which you want to sort.
The table will be sorted by the selected column. When sorting by multiple columns, the rows of the table
are sorted according to the sequence of column selection. Next to the headers of columns used for
sorting, you will see icons displaying the current sorting order: in ascending order or descending order of
values.
Asset information could be changed on the Server while you are viewing the assets table (for example, it
could be changed by another user who is connected to the Server).
To keep the assets table up to date, you can enable automatic update of the table.
In the toolbar in the Assets section, use the Autoupdate toggle switch.
153
Selecting assets in the assets table
In the assets table, you can select assets to view their information and manage these assets. When assets are
selected, the details area appears in the right part of the web interface window.
To select the relevant assets in the table, perform one of the following actions:
If you want to select one asset, select the check box next to the asset or use your mouse to select the asset.
If you want to select multiple assets, select the check boxes next to the relevant assets or select them by
holding down the CTRL or SHIFT key.
If you want to select all assets that satisfy the current lter and search settings, perform one of the following
actions:
Select any asset in the table and press the key combination CTRL+A.
Select the check box in the title of the left-most column of the table.
When more than one asset is selected, the details area shows the quantitative distribution of the selected assets
by category. If there are assets with various categories among the selected assets, you can exclude assets from
one of the categories. To do so, you need to clear the check box next to the name of this category.
The title of the left-most column of the table shows the asset selection check box. Depending on the number of
selected assets, the check box can have one of the following states:
– all assets that satisfy the current lter and search settings were not selected in the table. However, one
asset or multiple assets may be selected in the table by using the check boxes next to the assets or by using
the CTRL or SHIFT key.
– all assets that satisfy the current lter and search settings were selected in the table.
– all assets that satisfy the current lter and search settings were selected in the table, but then the check
boxes for some of the assets were cleared. This state is also retained if the check boxes were cleared for all
assets selected in this way (due to the fact that the number of selected assets may change).
If all assets that satisfy the lter and search settings are selected, the number of selected assets may be
automatically changed. For example, the composition of assets in the table may be changed by an application
user in a di erent connection session or when assets are automatically added. It is recommended to con gure
the lter and search settings in such a way that ensures that only the relevant assets end up in the selection
(for example, you can lter assets by their IDs before selecting all assets).
Asset activity detection When using this method, the application adds newly detected assets to the table
based on the obtained MAC- and/or IP addresses of the assets. If the application detects activity of an already
154
known asset, it may change its status depending on the current asset management mode.
Asset Information Detection When using this method, the application updates information about known assets
based on data received from tra ic.
When assets are added automatically, a name is de ned for each new asset based on the following template:
Asset <value of the internal asset counter>. The value of the internal counter in the asset name may di er from
the asset ID that is displayed in the Asset ID column. If use of the asset information detection method is enabled,
the application may update the name of an asset when it receives information about the asset.
When an asset name is updated, the application replaces the current asset name with the obtained name of the
device model or its network name (the name used to represent it in the network). The network name of the asset
takes priority during an update.
To update the asset name according to changes in the model name and/or in the network name, you must enable
automatic updates of this information in the asset settings.
The asset group tree supports up to six nesting levels. You can add assets to groups at any level of the hierarchy.
However, each asset can be added to only one of the groups in the tree.
You can specify groups for assets when manually adding an asset, when editing asset information, or when
selecting multiple assets in the table. If an asset was not added to any of the groups, this asset is assigned to the
top level of the hierarchy within the tree. By default, assets that are automatically added to the table are not put
into groups.
You can nd out which assets belong to groups when viewing the assets table. Paths to groups are indicated in the
Group column.
Only users with the Administrator role can create an asset group tree.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
2. In the Assets section or in the Network map section, click the Con gure groups button.
Any changes made in the Create group tree window are immediately applied.
155
To select a group, the Select group in tree window opens when adding assets to groups or when ltering by
the Group column. In this window, you can also access the functions for creating the asset group tree.
To create the asset group tree, you can use the following functions:
Add group
1. In the Create group tree or Select group in tree window, select the parent group or the group next to
the location where you want to add a new group. If the tree is empty or you want to add a group on the
top level of the hierarchy, skip this step and proceed to the next one.
2. Depending on where you want to add the new group, do the following:
If you want to add a child group to the currently selected group, click the Add button or press the
INSERT key.
If you want to add a group at the same level as the currently selected group, press ENTER.
If no group is selected in the tree and you want to add a group at the top level of the hierarchy, click
the Add button or press either the INSERT or ENTER key.
Must begin and end with any permitted character except a space.
Must not match the name of any other group included under the same parent group (not case-
sensitive).
Rename group
156
To rename a group in the asset group tree:
1. In the Create group tree or Select group in tree window, select the group that you want to rename.
Must begin and end with any permitted character except a space.
Must not match the name of any other group included under the same parent group (not case-
sensitive).
The new group name will appear in the information about assets that are added to this group or to its
child groups.
Delete group
When a group is deleted, the assets that were added to this group or its child groups are not deleted.
Instead, these assets are moved to the top level of the hierarchy within the asset tree (and information
about their inclusion in the group is deleted from information regarding these assets).
1. In the Create group tree or Select group in tree window, select the group that you want to delete.
The selected group and its child groups will be removed from the tree.
Move group
1. In the Create group tree or Select group in tree window, select the group that you want to move.
2. Use the arrow icons or their corresponding key combinations ALT+↓, ALT+↑, ALT+←, or ALT+→ to move
the group relative to other elements of the tree. If an operation cannot be performed, the icon for the
operation is not available.
Search groups
157
To nd relevant groups in the asset group tree:
In the Create group tree or Select group in tree window, enter your search query into the Search
groups eld. The search is initiated as you enter characters.
The asset group tree will display the groups that meet the search criteria. For groups that are child groups,
their parent groups are also displayed.
The composition of groups in the asset group tree could be changed on the Server while you are working
with the tree (for example, it could be changed by another user who is connected to the Server).
In the Create group tree or Select group in tree window, click the icon.
Only users with the Administrator role can manually add assets.
158
To manually add an asset when working with the assets table:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
3. On the Addresses tab in the details area, specify unique MAC- and/or IP addresses for the asset.
4. You can specify multiple IP addresses for the same network interface of the asset. To generate a list of
IP addresses, perform one of the following actions:
If you want to remove an IP address, click the icon located on the right of the eld containing the
IP address.
5. If the asset has multiple network interfaces, generate a list of network interfaces of the asset and
specify the corresponding MAC- and/or IP addresses for them.
To do so, perform one of the following actions:
If you want to add a network interface, click the Add interface button located under the group of
settings of the last network interface of the asset.
If you want to delete a network interface, click the Delete interface button located on the right of
the name of the network interface of the asset (if there are two or more network interfaces).
If you want to de ne a di erent name for a network interface, click the icon located on the right
of the current name and enter the new name for the network interface in the eld that opens.
6. On the Settings tab in the details area, specify the relevant values in the elds that identify the asset
information.
7. On the Addresses and Settings tabs in the details area, enable or disable automatic updates for the
relevant information about the asset. To do so, use the Autoupdate toggle switches located above the
elds that have automatic update capability.
8. On the Custom elds tab in the details area, create a list of custom elds if necessary.
9. Click Save.
This button is unavailable if not all required information is speci ed in the asset settings or if invalid
values have been de ned. The tab containing settings requiring corrected values is marked by the
icon.
The assets table will show the new device with the Authorized status.
159
When working with the network map, you can add a new asset to the assets table using a node
representing a device that is unknown to the application.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
3. Select the relevant node representing the device that is unknown to the application.
The details area appears in the right part of the web interface window.
5. Con gure the settings of the new asset without changing the MAC- and/or IP address that are
speci ed for the node.
For a description of how to con gure these settings, please refer to the procedure for manually adding
an asset when working with the assets table.
6. Click Save.
The assets table will show the new device with the Authorized status. The node that previously
represented a device that was unknown to the application will now represent an asset on the network
map.
Merging assets
If one asset is represented by multiple assets in the table for some reason, these assets can be merged into one
asset. Assets can be merged automatically when the asset activity detection method is enabled in learning mode.
You can also manually merge assets.
Assets are automatically merged if the application identi es a connection between the MAC address of one
asset and the IP address of a di erent asset. If con icts arise between de ned values in asset information,
the merged asset will retain the values that were de ned for the asset with the IP address. For this reason,
prior to enabling learning mode (and while working in this mode), it is not recommended to change information
about assets for which only a MAC address is de ned if they could be automatically merged with assets that
have de ned IP addresses.
When nodes are merged, the total number of network interfaces of the new asset must be no more than 64.
Only a user with the Administrator role can manually merge assets.
160
To manually merge multiple assets when working with the assets table:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
3. In the assets table, select the assets that you want to merge.
The details area appears in the right part of the web interface window.
5. Check the settings of the new asset and edit them if necessary:
On the Addresses tab in the details area, the MAC- and IP addresses of the selected assets are
distributed among individual network interfaces. If necessary, change the values of addresses and
the names of network interfaces.
On the Settings tab in the details area, all elds containing con icting values in the selected assets
are marked by messages regarding the con icting values. The con icting values are merged into one
value in text elds.
On the Custom elds tab in the details area, the list contains all custom elds of the selected
assets.
The assets table will show the new device with the Authorized status.
161
When working with the network map, you can merge multiple nodes on the network map into one new
asset for the assets table.
You can select the relevant nodes individually or as part of collapsed groups that include the relevant
assets. When a collapsed group is selected, all assets in the child groups of any nesting level are also
included in the asset selection.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
2. In the Network map section, select multiple objects representing nodes and/or collapsed groups.
To select multiple nodes and/or groups, perform one of the following actions:
Hold down the SHIFT key and use your mouse to select a rectangular area containing the relevant
objects.
Hold down the CTRL key and use your mouse to select the relevant objects.
The details area appears in the right part of the web interface window. The details area shows the total
number of selected nodes and groups while also showing the quantitative distribution of selected
objects by type.
3. If the selected objects belong to di erent types or categories of devices, you can exclude certain
types of objects (for example, nodes of devices that are unknown to the application) or categories (for
example, PLC). To do so, clear the check box next to the name of the category or type.
5. Check the settings of the new asset and edit them if necessary:
On the Addresses tab in the details area, the MAC- and IP addresses of the selected assets are
distributed among individual network interfaces. If necessary, change the values of addresses and
the names of network interfaces.
On the Settings tab in the details area, all elds containing con icting values in the selected assets
are marked by messages regarding the con icting values. The con icting values are merged into one
value in text elds.
On the Custom elds tab in the details area, the list contains all custom elds of the selected
assets.
The assets table will show the new device with the Authorized status. The network map will show one
merged node instead of the previously selected multiple nodes.
162
Deleting assets
You can delete one or multiple assets from the assets table.
Information about deleted assets is not saved in the application. If deleted assets start displaying activity in
the industrial network again, the application will add them to the assets table as new assets (with the
Authorized or Unauthorized status depending on the current asset management mode).
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
3. In the assets table, select the assets that you want to delete.
The details area appears in the right part of the web interface window.
4. Click Delete asset (if one asset is selected) or Delete assets (if multiple assets are selected).
A window with a con rmation prompt opens.
163
When working with the network map, you can remove assets from the assets table by using the nodes
representing those assets on the network map.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
2. In the Network map section, select one or multiple nodes representing assets.
To select multiple nodes, perform one of the following actions:
Hold down the SHIFT key and use your mouse to select a rectangular area containing the relevant
nodes.
Hold down the CTRL key and use your mouse to select the relevant nodes.
The details area appears in the right part of the web interface window. The details area shows the total
number of selected nodes while also indicating how many of the assets belong to each category.
3. If there are assets with various categories among the selected nodes, you can exclude assets from one
of the categories. To do so, clear the check box next to the name of this category. The category name
will disappear from the list.
4. Click the Delete asset button (if one node is selected) or Delete assets (if multiple nodes are
selected).
A window with a con rmation prompt opens.
In monitoring mode, the assigned status depends on whether the device that showed activity is known or unknown
to the application. In this mode, statuses are assigned according to the following rules:
If a device is not in the assets table when it is detected, the Unauthorized status is assigned to this device.
If the device is in the assets table and has the Authorized or Unauthorized status, the status is not changed.
If the device is in the assets table with the Archived status, the Unauthorized status is assigned to this device.
If an asset with the Authorized status has not shown any activity and information about this asset has not been
changed in a long time (30 days or more), the Archived status is assigned to this asset.
When assets with the Unauthorized status appear in the assets table, you need to determine whether all of these
assets are required for industrial process support. After making this determination, it is recommended to manually
assign one of the following statuses to each asset:
164
Authorized – if the asset is required for industrial process support.
Instead of assigning the Archived status, you can delete the asset. However, all information speci ed for
the asset will also be deleted. If a deleted asset is detected again, the application will provide only the
information that has been received since the asset was re-added to the assets table (the date and time of
the rst detection of the asset is also updated).
You can change the status for one selected asset or for multiple selected assets simultaneously. If one asset with
the Archived status is selected, the status of this asset can be changed only when information about the asset is
changed. If multiple assets are selected, you can assign any status to these assets, regardless of their current
status.
The application automatically changes the status of an Archived asset if it displays activity. Depending on the
current asset management mode, the application assigns either the Authorized or Unauthorized status to the
detected asset.
Changing the statuses of assets when working with the assets table
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
3. In the assets table, select the assets whose status you want to change.
The details area appears in the right part of the web interface window.
4. Depending on the current status and number of selected assets, perform one of the following actions:
If multiple assets are selected, click the button with the name of the relevant status.
If one asset with the Authorized or Unauthorized status is selected, click the button containing the
name of the necessary status (a button containing the name of the current status is not displayed).
Changing the statuses of assets when working with the network map
165
When working with the network map, you can change the statuses of known assets represented by nodes
on the network map.
You can select the relevant nodes individually or as part of collapsed groups that include the relevant
assets. When a collapsed group is selected, all assets in the child groups of any nesting level are also
included in the asset selection.
To change the status of assets when working with the network map:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
2. In the Network map section, select one or multiple objects representing nodes of assets and/or
collapsed groups.
To select multiple nodes and/or groups, perform one of the following actions:
Hold down the SHIFT key and use your mouse to select a rectangular area containing the relevant
objects.
Hold down the CTRL key and use your mouse to select the relevant objects.
The details area appears in the right part of the web interface window. The details area shows the total
number of selected nodes and groups while also showing the quantitative distribution of selected
objects by type.
3. If the selected objects belong to di erent types or categories of devices, you can exclude certain
types of objects (for example, nodes of devices that are unknown to the application) or categories (for
example, PLC). To do so, clear the check box next to the name of the category or type.
4. Depending on the current status and number of selected nodes, perform one of the following actions:
If multiple nodes representing known assets are selected, click the button with the name of the
relevant status.
If one node representing an asset with the Authorized or Unauthorized status is selected and you
want to assign a di erent status to this asset, click the button containing the name of the
necessary status (a button containing the name of the current status is not displayed).
Custom elds – set of user-de ned information that is absent from the standard set of information. Up to 16
custom elds may be speci ed for an asset.
166
To view asset information:
The details area appears in the right part of the web interface window. The details area displays all data that has
de ned values. Information for which automatic updates are disabled is marked by the icon.
Until an asset is added to a speci c group, information about this asset does not contain any information about
the speci c location of the asset. This asset is assigned to the top level of the hierarchy within the group tree.
After an asset is added to a group, the application saves the location of this asset as the full path to the group in
the group tree.
Only users with the Administrator role can manage the location of assets within the group tree.
To manage the arrangement of assets in the group tree, you can use the following functions:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
2. Select the asset in the Assets section or in the Network map section.
The details area appears in the right part of the web interface window.
167
You can add multiple assets to a group when working with the assets table.
When working with the network map, you can also add multiple known assets represented by nodes on the
network map to a group. You can select the relevant nodes individually or as part of collapsed groups that
include the relevant assets. When a collapsed group is selected, all assets in the child groups of any nesting
level are also included in the asset selection.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
3. In the assets table, select the assets that you want to add to a group.
The details area appears in the right part of the web interface window.
To add multiple assets to a group when working with the network map:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
2. In the Network map section, select the relevant nodes of assets and/or collapsed groups.
To select multiple nodes and/or groups, perform one of the following actions:
Hold down the SHIFT key and use your mouse to select a rectangular area containing the relevant
objects.
Hold down the CTRL key and use your mouse to select the relevant objects.
The details area appears in the right part of the web interface window. The details area shows the total
number of selected nodes and groups while also showing the quantitative distribution of selected
objects by type.
3. If the selected objects belong to di erent types or categories of devices, you can exclude certain
types of objects (for example, nodes of devices that are unknown to the application) or categories (for
example, PLC). To do so, clear the check box next to the name of the category or type.
168
6. In the asset group tree, select the relevant group.
If the relevant group is not in the tree, you can add it in the currently open Select group in tree window.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
2. Select the asset in the Assets section or in the Network map section.
The details area appears in the right part of the web interface window.
5. In the Group eld, delete the path to the group by clicking the Clear link above the eld (the link is
displayed if a group is de ned).
6. Click Save.
This button is unavailable if not all required information is speci ed in the asset settings or if invalid
values have been de ned. The tab containing settings requiring corrected values is marked by the
icon.
After saving the changes for the asset, the Group parameter is cleared and the asset will be assigned to
the top level of the hierarchy within the group tree.
169
You can remove multiple assets from groups when working with the assets table. The assets selected for
removal from groups may be part of the same group or in di erent groups.
When working with the network map, you can also remove multiple known assets represented by nodes on
the network map from groups. You can select the relevant nodes individually or as part of collapsed groups
that include the relevant assets. When a collapsed group is selected, all assets in the child groups of any
nesting level are also included in the asset selection.
To remove multiple assets from groups when working with the table:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
3. In the assets table, select the assets that you want to remove from groups.
The details area appears in the right part of the web interface window.
For all selected assets, the Group parameter is cleared and these assets will be assigned to the top level
of the hierarchy within the group tree.
To remove multiple assets from groups when working with the network map:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
2. In the Network map section, select the nodes in expanded groups and/or collapsed groups.
To select multiple nodes and/or groups, perform one of the following actions:
Hold down the SHIFT key and use your mouse to select a rectangular area containing the relevant
objects.
Hold down the CTRL key and use your mouse to select the relevant objects.
The details area appears in the right part of the web interface window. The details area shows the total
number of selected nodes and groups while also showing the quantitative distribution of selected
objects by type.
3. If the selected objects belong to di erent types or categories of devices, you can exclude certain
types of objects (for example, nodes of devices that are unknown to the application) or categories (for
example, PLC). To do so, clear the check box next to the name of the category or type.
170
6. In the prompt window, con rm removal of the assets from groups.
For all selected assets, the Group parameter is cleared and these assets will be displayed outside of
groups.
An asset label contains a text description that helps you quickly nd or lter assets in the table. Any convenient
text descriptions can be saved as labels. You can assign up to 16 labels for an asset. Each asset can have its own
set of labels.
Lists of asset labels are displayed in the assets table in the Labels column. Labels in a cell are sorted in alphabetical
order.
Only users with the Administrator role can add or remove labels for assets.
171
To add labels for an asset:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
2. Select the asset in the Assets section or in the Network map section.
The details area appears in the right part of the web interface window.
4. In the Labels eld, enter the text descriptions that you want to use as labels. To separate labels, you can
use the ENTER key or the ; character.
You can use uppercase and lowercase letters, numerals, a space, and the following special characters: !
@ # № $ % ^ & ( ) [ ] { } ' , . - _.
A label name must meet the following requirements:
Must begin and end with any permitted character except a space.
5. If necessary, use the Copy labels link to copy the list of labels. The link is displayed if the list of labels is
not empty.
6. Click Save.
This button is unavailable if not all required information is speci ed in the asset settings or if invalid
values have been de ned. The tab containing settings requiring corrected values is marked by the
icon.
172
You can add labels for multiple assets when working with the assets table.
When working with the network map, you can also add labels for known assets that are represented by
nodes on the network map. You can select the relevant nodes individually or as part of collapsed groups
that include the relevant assets. When a collapsed group is selected, all assets in the child groups of any
nesting level are also included in the asset selection.
To add labels for multiple assets when working with the table:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
3. In the assets table, select the assets for which you want to add labels.
The details area appears in the right part of the web interface window.
5. In the Labels eld, enter the text descriptions that you want to use as labels. To separate labels, you can
use the ENTER key or the ; character.
You can use uppercase and lowercase letters, numerals, a space, and the following special characters: !
@ # № $ % ^ & ( ) [ ] { } ' , . - _.
A label name must meet the following requirements:
Must begin and end with any permitted character except a space.
6. If necessary, use the Copy labels link to copy the list of labels. The link is displayed if the list of labels is
not empty.
7. If you want to clear the current lists of labels for selected assets and provide only new labels for these
assets, select the Delete existing check box.
If the Delete existing check box is cleared, the current list of labels will remain on each asset. The
new labels will be added to the lists of labels on all selected assets. In this case, the total number of
labels for some of the selected assets may exceed the limit (up to 16 labels for each asset). The
application checks this limit before adding new labels.
8. Click OK.
The button is not available if the names of entered labels do not meet the requirements, or if the list of
labels is empty while the Delete existing check box is cleared.
To add labels for multiple assets when working with the network map:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
2. In the Network map section, select the relevant nodes of assets and/or collapsed groups.
173
To select multiple nodes and/or groups, perform one of the following actions:
Hold down the SHIFT key and use your mouse to select a rectangular area containing the relevant
objects.
Hold down the CTRL key and use your mouse to select the relevant objects.
The details area appears in the right part of the web interface window. The details area shows the total
number of selected nodes and groups while also showing the quantitative distribution of selected
objects by type.
3. If the selected objects belong to di erent types or categories of devices, you can exclude certain
types of objects (for example, nodes of devices that are unknown to the application) or categories (for
example, PLC). To do so, clear the check box next to the name of the category or type.
5. In the Labels eld, enter the text descriptions that you want to use as labels. To separate labels, you can
use the ENTER key or the ; character.
You can use uppercase and lowercase letters, numerals, a space, and the following special characters: !
@ # № $ % ^ & ( ) [ ] { } ' , . - _.
A label name must meet the following requirements:
Must begin and end with any permitted character except a space.
6. If necessary, use the Copy labels link to copy the list of labels. The link is displayed if the list of labels is
not empty.
7. If you want to clear the current lists of labels for selected assets and provide only new labels for these
assets, select the Delete existing check box.
If the Delete existing check box is cleared, the current list of labels will remain on each asset. The
new labels will be added to the lists of labels on all selected assets. In this case, the total number of
labels for some of the selected assets may exceed the limit (up to 16 labels for each asset). The
application checks this limit before adding new labels.
8. Click OK.
The button is not available if the names of entered labels do not meet the requirements, or if the list of
labels is empty while the Delete existing check box is cleared.
174
To clear the list of asset labels:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
2. Select the asset in the Assets section or in the Network map section.
The details area appears in the right part of the web interface window.
If you want to delete speci c labels, use the icon next to the names of the labels.
Click the Clear link above the list of labels if you want to remove all labels.
5. Click Save.
This button is unavailable if not all required information is speci ed in the asset settings or if invalid
values have been de ned. The tab containing settings requiring corrected values is marked by the
icon.
175
You can clear the lists of labels for multiple assets when working with the assets table.
When working with the network map, you can also clear the lists of labels for known assets that are
represented by nodes on the network map. You can select the relevant nodes individually or as part of
collapsed groups that include the relevant assets. When a collapsed group is selected, all assets in the
child groups of any nesting level are also included in the asset selection.
To clear the lists of labels for multiple assets when working with the table:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
3. In the assets table, select the assets for which you want to clear the lists of labels.
The details area appears in the right part of the web interface window.
6. Click OK.
To clear the lists of labels for multiple assets when working with the network map:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
2. In the Network map section, select the relevant nodes of assets and/or collapsed groups.
To select multiple nodes and/or groups, perform one of the following actions:
Hold down the SHIFT key and use your mouse to select a rectangular area containing the relevant
objects.
Hold down the CTRL key and use your mouse to select the relevant objects.
The details area appears in the right part of the web interface window. The details area shows the total
number of selected nodes and groups while also showing the quantitative distribution of selected
objects by type.
3. If the selected objects belong to di erent types or categories of devices, you can exclude certain
types of objects (for example, nodes of devices that are unknown to the application) or categories (for
example, PLC). To do so, clear the check box next to the name of the category or type.
6. Click OK.
176
Editing asset information
Only users with the Administrator role can change asset information.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
4. On the Addresses tab in the details area, specify the MAC- and/or IP addresses of the asset.
You can specify multiple IP addresses for the same network interface of the asset. To generate a list of IP
addresses, perform one of the following actions:
If you want to remove an IP address, click the icon located on the right of the eld containing the IP
address.
5. If the asset has multiple network interfaces, generate a list of network interfaces of the asset and specify the
corresponding MAC- and/or IP addresses for them.
To generate a list of network interfaces of an asset, perform one of the following actions:
If you want to add a network interface, click the Add interface button located under the group of settings
of the last network interface of the asset.
If you want to delete a network interface, click the Delete interface button located on the right of the name
of the network interface of the asset (if there are two or more network interfaces).
If you want to de ne a di erent name for a network interface, click the icon located on the right of the
current name and enter the new name for the network interface in the eld that opens.
6. On the Settings tab in the details area, specify the relevant values in the elds that identify the asset
information.
Also on the Settings tab, you can change the status of an asset (for example, assign any other status to an
asset with the Archived status).
7. On the Addresses and Settings tabs in the details area, enable or disable automatic updates for the relevant
information about the asset. To do so, use the Autoupdate toggle switches located above the elds that have
automatic update capability.
8. On the Custom elds tab in the details area, create a list of custom elds and their values if necessary.
9. Click Save.
177
This button is unavailable if not all required information is speci ed in the asset settings or if invalid values have
been de ned. The tab containing settings requiring corrected values is marked by the icon.
The number of custom elds for one asset shall not exceed 16.
The number of characters in the eld name can be no more than 100.
The number of characters in the eld value can be no more than 1024.
Only users with the Administrator role can add, edit, or delete custom elds.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
4. Go to the Custom elds tab and perform one of the following actions:
If you want to add a custom eld, click the Add custom eld button and in the opened elds enter the name
and value for the custom eld.
If you want to edit a custom eld, enter the new name and/or value of the relevant custom eld.
If you want to delete a custom eld, click the icon located on the right of the custom eld name.
5. Click Save.
In the events table, the application shows events whose Source or Destination columns contain the MAC- or IP
addresses of selected assets.
178
To view events associated with assets:
2. In the assets table, select the assets for which you want to view events.
The details area appears in the right part of the web interface window.
3. Depending on which events you want to load, click one of the following buttons (the buttons are unavailable if
more than 200 assets are selected):
Show unprocessed events – if you want to view events with the New or In progress status.
The Events section opens. The events table will apply a lter based on the IDs of assets. The list of asset IDs
de ned for event ltering is displayed in the Asset IDs eld in the toolbar. If you loaded events by using the
Show unprocessed events button, events will also be ltered by the Status column.
Network Control
To control an industrial network using Kaspersky Industrial CyberSecurity for Networks, you can con gure
monitoring of the communications between devices in the industrial network.
The application monitors communications between industrial network devices based on Network Control rules. A
Network Control rule describes the authorized communications for devices.
Network Integrity Control – the rule describes network interaction between devices using a speci c set of
protocols and connection settings.
Command Control – the rule describes the monitored system commands during communications between
devices over one of the supported protocols for Process Control.
Generally, a Network Control rule contains the following information about communications:
By default, a rule is active after it is created and is applied to allow the described communications. The application
does not register events when it detects interactions that are described in active network control rules.
Inactive rules are intended for describing unwanted network communications. . In Network Control learning mode,
inactive rules prevent automatic creation of new active rules for detected network interactions that are described
in inactive rules. In Network Control monitoring mode, inactive rules are not taken into account.
The application processes network control rules based on Network Integrity Control and Command Control
technology if the use of these technologies is enabled.
The following methods are provided for creating a list of Network Control rules:
The list of Network Control rules is stored on the Server and is independent of the security policy loaded in the
Console or applied on the Server.
You can con gure network control rules in the Network Control section of the Kaspersky Industrial CyberSecurity
for Networks web interface.
You can con gure the settings for registration of Network Control events in the Application Console on the
Con gure events tab. Events registered based on Network Integrity Control and Command Control technologies
are categorized as system events.
You can view Network Control events in the table of registered events. Events registered based on Network
Integrity Control technology have the Warning severity level. Events registered based on Command Control
technology are assigned a severity that depends on the severity level de ned for the detected system command.
If use of Network Integrity Control technology is enabled, the application generates rules based on this
technology. When the application detects network communications matching inactive rules, it registers events
based on Network Integrity Control technology. The event is registered using the system event type that is
assigned the code 4000002601.
If the use of Command Control technology is enabled, the application generates rules based on this
technology. When the application detects system commands that satisfy inactive rules, it registers
unauthorized system command detection events based on Command Control technology. The event is
registered using the system event type that is assigned the code 4000002602.
When generating Network Control rules, the application adds new rules from analysis of network communications
and system commands in industrial network tra ic. For these rules, the Origin parameter contains the System
value. If you manually change rule settings, the Origin parameter will take the User value.
Network communications detected during tra ic analysis are checked for compliance with current Network
Control rules. If a detected interaction does not match any rule, the application creates a new Network Control
rule. In this case, an interaction detection event is not registered. When a new rule is created, the application makes
it active and adds settings values based on the received data about the network interaction.
If the detected interaction only matches an inactive rule, the application registers an event based on the
technology corresponding to this rule. A new active rule is not created.
During the learning process, the application can optimize the list of Network Control rules. Optimization involves
combining two or more speci c rules into one general rule, or deleting speci c rules if a general rule is available.
Rules that satisfy the following conditions are optimized:
180
Rules are merged during optimization if the resulting general rule will correspond only to the detected network
interactions and no others. For example, one Network Control rule was created after a system command was
detected during an interaction between two devices. Then another system command was detected during an
interaction between these same devices. In this case, after optimization, only one general rule will remain. It will
describe both system commands detected during network interaction between these devices.
The application periodically optimizes the list of Network Control rules while operating in learning mode. The
frequency of optimization is once per minute. Optimization is performed if new interactions are detected in
industrial network tra ic. To keep the rules table up to date, you must update rules.
There may be a delay before the rule list is optimized after learning mode is disabled. The length of the delay
depends on the amount of data being received by the application, and may last up to three minutes. During
this time, we recommend that you not make any changes to the rules generated in learning mode.
Network Control learning mode must be enabled for enough time to receive all the necessary data about network
interactions. This amount of time depends on the number of devices in the industrial network and how frequently
they operate and are serviced. We recommend that you enable learning mode for at least one hour. In large
industrial networks, learning mode can be enabled for a period ranging from one to several days to accumulate the
maximum amount of data.
If use of Network Integrity Control technology is enabled, the application checks devices' network interactions
for compliance with the rules based on this technology. When the application detects network interactions for
which there are no active rules, it registers unauthorized communication detection events based on Network
Integrity Control technology. The event is registered using the system event type that is assigned the code
4000002601.
If use of Command Control technology is enabled, the application checks devices' network interactions for
compliance with the rules based on this technology. When the application detects system commands for which
there are no active rules, it registers unauthorized system command detection events based on Command
Control technology. The event is registered using the system event type that is assigned the code
4000002602.
Rules related to di erent technologies are applied independently of each other. Therefore, to allow use of a system
command, the list of Network Control rules must have rules for this system command and for the network packet
that transmits it.
Selecting the applied technologies and changing the Network Control mode
Only users with the Administrator role can manage Network Control modes and technologies.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
Command Control
4. After a technology is enabled or disabled, wait for the toggle switch to change to the necessary position
(Enabled or Disabled).
The process may take some time, during which the toggle switch will be unavailable. Wait for the technology to
be enabled or disabled.
5. For each enabled technology, select the necessary Network Control mode. To do so, in the drop-down list on
the right of the technology name, select one of the following values:
6. After the mode is selected, wait for the name of this mode to appear in the eld of the drop-down list.
7. This process may take some time, during which the drop-down list displays the Changing status. Wait for the
selected mode to be enabled.
In learning mode, the application can automatically create Network Control rules that allow transmission of system
commands for Kaspersky Industrial CyberSecurity for Nodes. These rules are needed for integration of Kaspersky
Industrial CyberSecurity for Networks and Kaspersky Industrial CyberSecurity for Nodes within the integrated
solution Kaspersky Industrial CyberSecurity. To automatically create rules prior to enabling learning mode, you must
enable the PLC Project Integrity Check component on computers with Kaspersky Industrial CyberSecurity for
Nodes installed in this same industrial network. For detailed information on enabling components of Kaspersky
Industrial CyberSecurity for Nodes, please refer to the Administrator's Guide for Kaspersky Industrial
CyberSecurity for Nodes.
When viewing the table of Network Control rules, you can use the following functions:
Con gure the display and order of columns in the rules table
182
To con gure the list of columns displayed in the table:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser and
select the Network Control section.
3. Select the check boxes opposite the settings that you want to view in the table. You must select at
least one setting.
The following settings are available for selection:
Rule ID
Unique ID of the rule.
Technology
Technology associated with the rule.
Protocols/Commands
For rules related to Network Integrity Control technology – the set of utilized protocols. For rules
related to Command Control technology – the protocol and system commands. The protocols that
are determined by the application based on the contents of network packets are italicized.
Side 1
Address information of one of the sides of network interaction:
MAC address
IP address
Port number
Side 2
Address information of the other side of network interaction:
MAC address
IP address
Port number
Comment
Additional information about the rule.
Creation date
The date and time when the rule was created.
4. If you want to change the order in which columns are displayed, select the name of the column that
needs to be moved to the left or right in the table and use the buttons containing an image of the up or
down arrows.
For the Side 1 and Side 2 columns, you can also change the order in which the address information is
displayed for the sides of network interaction. To do so, select the value that you want to move to the
left or right in the table and use the buttons containing an image of the up or down arrows.
The selected columns will be displayed in the network control rules table in the order you speci ed.
184
To lter rules by the Rule ID column:
1. In the Network Control section, click the ltering icon in the Rule ID column.
The ltering window opens.
2. In the Including and Excluding elds, enter the values for rules that you want to include into the lter
and/or exclude from the lter.
3. If you want to apply multiple lter conditions combined by the logical operator OR, in the lter window
of the column click the Add condition button and enter the condition in the opened eld.
4. If you want to delete one of the created lter conditions, in the lter window of the column click the
icon.
5. Click OK.
1. In the Network Control section, click the ltering icon in the relevant column.
When ltering based on the states, technologies, or origins of Network Control rules, you can also use
the corresponding buttons in the toolbar.
The ltering window opens.
2. Select the check boxes opposite the values by which you want to lter events.
3. Click OK.
1. In the Network Control section, click the ltering icon in the Protocols/Commands column.
Filtering by the Protocols/Commands column is applied only for protocols. To lter Network
Control rules based on the names of system commands, you can use the rule search function.
You will see a window containing the table of supported protocols displayed as a protocol stack tree.
You can manage how tree elements are displayed by using the + and - buttons next to the names of
protocols that contain protocols of subsequent layers.
The table columns provide the following information:
EtherType – number of the next-level protocol within the Ethernet protocol (if the protocol has a
de ned number). It is displayed in decimal format.
IP number – number of the next-level protocol within the IP protocol (if the protocol has a de ned
number). It is indicated only for protocols within the IP protocol structure. It is displayed in decimal
format.
2. If necessary, use the search eld above the table to nd relevant protocols.
3. In the list of protocols, select the check boxes opposite the protocols by which you want to lter
events.
185
If you select or clear the check box for a protocol that contains nested protocols, the check boxes for
the nested protocols are also automatically selected or cleared.
4. Click OK.
1. In the Network Control section, open the Address information drop-down list.
The ltering window opens.
MAC address
IP address
Port number
3. Click OK.
To lter rules based on the Creation date or Modi cation date column:
1. In the Network Control section, click the ltering icon in the relevant column.
The calendar opens.
2. In the calendar, specify the date and time for the start and end boundaries of the ltering period. To do
so, select a date in the calendar (the current time will be indicated) or manually enter the value in the
format DD-MM-YY hh:mm:ss.
3. Click OK.
Rule search
In the Network Control section, enter your search query into the Rule search eld. The search is
initiated as you enter characters.
The Network Control rules table displays the rules that meet the search criteria.
A search is performed in all columns except the State, Technology, Creation date, Modi cation date and
Origin columns.
To reset the de ned lter and search settings in the network control rules table:
In the toolbar in the Network Control section, click the Clear lter button (this button is displayed if
search or lter settings are de ned).
Sorting rules
186
To sort network control rules:
1. In the Network Control section, click the header of the column by which you want to sort.
You can sort the table of Network Control rules based on the values of any column except the
Comment column.
2. When sorting rules by the Protocols/Commands, Side 1 or Side 2 column, in the drop-down list of the
column header select the setting by which you want to sort rules:
Depending on the values selected for display in the Side 1 or Side 2 columns, select the sorting
settings: by MAC address, by IP address, or by port number.
3. If you need to sort the table based on multiple columns, press the SHIFT key and hold it down while
clicking the headers of the columns by which you want to sort.
The table will be sorted by the selected column. When sorting by multiple columns, the rows of the table
are sorted according to the sequence of column selection. Next to the headers of columns used for
sorting, you will see icons displaying the current sorting order: in ascending order or descending order of
values.
Network control rules could be changed on the Server while you are viewing the rules table. For example,
the Network Control rules table becomes outdated if an application user in a di erent connection session
changes rules or if the application optimizes the list of rules in learning mode.
To keep the table of network control rules up to date, you can enable automatic update of rules or
manually update the table. During updates, all rules are reloaded from the Server.
When automatic update is enabled, the table of network control rules is updated every ve seconds.
1. Disable automatic update if this function is enabled. To do so, in the Network Control section, set the
Autoupdate toggle switch to Disabled.
2. Click the Refresh button (this button is displayed on the right of the Autoupdate toggle switch if the
toggle switch is disabled).
187
In the table of Network Control rules, you can select rules to view their information and manage these rules. When
rules are selected, the details area appears in the right part of the web interface window.
To select the relevant Network Control rules, perform one of the following actions:
If you want to select one rule, select the check box next to the rule or use your mouse to select the rule.
If you want to select multiple rules, select the check boxes next to the relevant rules or select the rules while
holding down the CTRL or SHIFT key. When multiple rules are selected, the application checks the state of the
selected rules and determines whether there are active and inactive rules among the selected rules.
If you want to select all rules that satisfy the current lter and search settings, perform one of the following
actions:
Select any rule in the table and press the key combination CTRL+A.
Select the check box in the title of the left-most column of the table.
When multiple rules are selected, the details area shows the total number of selected rules. If you selected all rules
that satisfy the current lter and search settings, one of the following values appears in the details area:
The precise number is displayed if you selected 1000 rules or less. In this case, the application checks the state
of the selected rules just as with other methods for selecting multiple rules.
If more than 1000 rules are selected, the number 1000+ is displayed. In this case, the application does not
check the state of the selected rules.
The title of the left-most column of the table shows the rule selection check box. Depending on the number of
selected rules, the check box can have one of the following states:
– all rules that satisfy the current lter and search settings were not selected in the table. However, one rule
or multiple rules may be selected in the table by using the check boxes next to the rules or by using the CTRL or
SHIFT key.
– all rules that satisfy the current lter and search settings were selected in the table.
– all rules that satisfy the current lter and search settings were selected in the table, but then the check
boxes for some of the rules were cleared. This state is also retained if the check boxes were cleared for all rules
selected in this way (due to the fact that the number of selected rules may change).
If all rules that satisfy the lter and search settings are selected, the number of selected rules may be
automatically changed. For example, the composition of rules in the table may be changed by an application
user in a di erent connection session or when the list of rules is optimized in learning mode. It is recommended
to con gure the lter and search settings in such a way that ensures that only the relevant rules end up in the
selection (for example, you can lter rules by their IDs before selecting all rules).
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
If you want to create a rule based on Network Integrity Control technology, click the NIC button.
If you want to create a rule based on Command Control technology, click the CC button.
4. In the Protocol eld, specify the protocol for interaction between devices.
When the Protocol eld is selected, a window opens showing the table of supported protocols displayed as a
protocol stack tree. You can manage how tree elements are displayed by using the + and - buttons next to the
names of protocols that contain protocols of subsequent layers.
If necessary, use the search eld above the table to nd relevant protocols.
To specify the protocol:
a. In the protocols table, select the protocol that you want to specify for the rule. To select the relevant
protocol, click the button that is displayed in the left column of the protocols table.
For a Network Integrity Control rule, you can specify any protocol that is displayed in the table of
supported protocols. For a Command Control rule, you can select only a protocol from among the
supported protocols for process control.
b. Click OK.
If you select a protocol that can be identi ed by the application based on the contents of network packets, a
noti cation about this appears under the Protocol eld.
5. If Command Control technology is selected for the rule, specify the relevant system commands in the
Commands eld.
When the Commands eld is selected, a window opens with a list of system commands that are available for
the selected protocol. To specify the commands:
a. In the list of system commands, select the check boxes next to the commands that should be allowed. If all
commands should be allowed, you can either select all check boxes or clear all check boxes for all
commands.
b. Click OK.
6. If necessary, enter additional information about the rule in the Comment eld.
7. In the Side 1 and Side 2 settings groups, specify the address information for the sides of network interaction
that is available for editing. Depending on the selected protocol (or set of protocols), address information may
contain the following values:
MAC address
189
IP address
Port number
8. Click Save.
The application will check the table of Network Control rules.
9. If the rules table contains an active rule in which all the settings match, you will see a warning about the
presence of a matching rule. In this case, close the warning and change the settings of the created rule.
10. If the rules table contains an active rule with more general settings, you will see a warning about the presence of
a general rule. If a general rule is present, a new speci c rule will not be used in the application. The warning will
contain a prompt to save the new speci c rule. To create a new rule with de ned settings, con rm your decision
in the prompt window (for example, if you want to then remove the general rule).
The new rule will be added to the list of Network Control rules.
11. If the rules table contains active rules with more speci c settings, you will see a warning about the presence of
more speci c rules. After a general rule appears, the speci c rules will not be used in the application. The
warning will contain a prompt to remove the speci c rules. To remove speci c rules, con rm your decision in the
prompt window.
If the rules table contains inactive rules with more speci c or matching settings, the application removes
these rules from the list. The application does not show a prompt when removing these rules.
12. If there is no active rule allowing network interaction between devices for a new rule related to Command
Control technology, you will be prompted to create the corresponding rule related to Network Integrity Control
technology. In this case, you are advised to create an additional rule together with the current rule being
created. To do so, con rm your decision in the prompt window and perform the necessary actions to create a
new rule related to Network Integrity Control technology.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
2. In the Network Control section, select the rule that you want to use as the basis for creating a new rule.
4. In the context menu, select Create rule based on the selected rule.
The details area in rule editing mode will appear in the right part of the web interface window. The settings of
the new rule will take the values obtained from settings of the selected rule.
5. Change the settings as necessary. To do so, complete steps 3–8 described in the procedure for creating a rule
with initially empty values of settings.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
3. In the table of registered events, select the event that you want to use as the basis for creating the network
control rule. You can select an event that was registered based on Network Integrity Control technology or
190
Command Control technology. However, the event must contain information only about one network
interaction.
The details area appears in the right part of the web interface window.
4. In the details area, click the Create Network Control rule button.
In the web browser window, the Network Control section opens. The details area in rule editing mode will
appear in the right part of the web interface window. The new rule's settings will take the values received from
the saved information about the event.
5. If necessary, edit the settings of the new rule. To do so, complete steps 4–8 described in the procedure for
creating a rule with initially empty values of settings. If you do not need to change the settings of the new rule,
save the rule by using the Save button.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
2. In the Network Control section, select the relevant rule whose settings you want to edit.
The details area appears in the right part of the web interface window.
4. Change the settings as necessary. For a description of the actions necessary for con guring settings, please
refer to the procedure for creating a rule with initially empty values of settings in the Manually creating Network
Control rules section.
You can switch rules to inactive state to disable their use when Network Control is in monitoring mode.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
2. In the Network Control section, select one or multiple active rules whose state you want to change.
The details area appears in the right part of the web interface window.
3. Depending on the number of selected rules, click the Deactivate rule or Deactivate rules button. The button is
not displayed if you selected only inactive rules. If all rules that satisfy the current lter and search settings are
selected, and the number of selected rules is more than 1000, the application does not check the state of rules.
In this case, the Deactivate rules button is displayed regardless of the state of the selected rules.
191
To switch Network Control rules to active state:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
2. In the Network Control section, select one or multiple inactive rules whose state you want to change.
The details area appears in the right part of the web interface window.
3. Depending on the number of selected rules, click the Activate rule or Activate rules button. The button is not
displayed if you selected only active rules. If all rules that satisfy the current lter and search settings are
selected, and the number of selected rules is more than 1000, the application does not check the state of rules.
In this case, the Activate rules button is displayed regardless of the state of the selected rules.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
3. In the rules table, select the rules that you want to delete.
The details area appears in the right part of the web interface window.
4. Depending on the number of selected rules, click the Delete rule or Delete rules button.
A window with a con rmation prompt opens. Depending on the state of the selected rules, the prompt will
suggest the following options:
If all selected rules are in active state, the application prompts you to delete the selected rules, switch them
to inactive state, or cancel the operation. This condition is not checked if all rules that satisfy the current
lter and search settings are selected, and the number of selected rules is more than 1000.
If there are inactive rules among the selected rules or if all rules that satisfy the current lter and search
settings are selected, and the number of selected rules is more than 1000, the application prompts you to
delete the selected rules or cancel the operation.
Intrusion Detection
To detect intrusions in industrial network tra ic, you can use Intrusion Detection rules and additional Intrusion
Detection methods based on embedded algorithms. When signs of attacks are detected in tra ic, Kaspersky
Industrial CyberSecurity for Networks registers events based on Intrusion Detection technology.
Intrusion Detection rules and additional Intrusion Detection methods based on embedded algorithms are applied
regardless of the security policy loaded in the Console or applied on the Server.
192
You can con gure Intrusion Detection rules in the Kaspersky Industrial CyberSecurity for Networks Console on the
Intrusion detection tab.
You can change the state of Intrusion Detection methods when connected to the Server through a web browser.
You can con gure the settings for registration of Intrusion Detection events in the Application Console on the
Con gure events tab.
You can view Intrusion Detection events in the table of registered events.
Intrusion Detection rules are included in rule sets. A rule set includes Intrusion Detection rules grouped according
to any attributes (for example, rules that contain interdependent tra ic analysis conditions). The following types of
rule sets may be used in the application:
System rule sets. These rule sets are provided by Kaspersky and are intended for detecting signs of the most
frequently encountered attacks or unwanted network activity. System rule sets are available immediately after
the application is installed. You can update system sets of rules by installing updates.
Custom rule sets. These rule sets are loaded into the application separately by the user. To load them, you need
to use les containing data structures that de ne Intrusion Detection rules. These les must be in the same
folder and have the RULES extension. The names of custom rule sets must match the names of the les from
which these rule sets were loaded (not including the le extensions).
Intrusion Detection rule sets may be active or inactive. Active state means that rules from the set are applied
during tra ic analysis if the rule-based Intrusion Detection method is enabled. If a rule set has been switched to
inactive, the rules from this set are no longer applied.
When a rule set is loaded, the application checks the rules in the set. If errors are found when the rule set is
checked (for example, duplicated rules are detected), the application displays information about the number of
detected errors for this set. Rule sets with detected errors are ignored in the application (the rules from these sets
are not applied, even if the sets are active).
When the conditions de ned in an active Intrusion Detection rule are detected in tra ic, the application registers a
rule-triggering event. Events are registered with system event types that are assigned the following codes:
4000003000 – for an event when a rule from a system rule set is triggered.
4000003001 – for an event when a rule from a custom rule set is triggered.
The severity levels of Kaspersky Industrial CyberSecurity for Networks events correspond to the priorities in
Intrusion Detection rules (see the table below).
Intrusion Detection rule priority Kaspersky Industrial CyberSecurity for Networks event severity
4 or higher Informational
2 or 3 Warning
193
1 Critical
If detection of signs of falsi ed addresses in ARP packets is enabled, Kaspersky Industrial CyberSecurity
for Networks scans the indicated addresses in ARP packets and detects signs of low-level man-in-the-
middle (MITM) attacks. This type of attack in networks that use the ARP protocol is characterized by the
presence of falsi ed ARP messages in tra ic.
When the application detects signs of falsi ed addresses in ARP packets, the application registers the
events based on Intrusion Detection technology. Events are registered with system event types that are
assigned the following codes:
4000004001 – for detection of multiple ARP replies that are not associated with ARP requests.
4000004002 – for detection of multiple ARP requests from the same MAC address to di erent
destinations.
If TCP protocol anomaly detection is enabled, Kaspersky Industrial CyberSecurity for Networks scans TCP
segments of the data stream in supported application-level protocols.
When it detects packets containing overlapping TCP segments with varying contents, the application
registers an event based on Intrusion Detection technology. The event is registered using the system event
type that is assigned the code 4000002701.
If IP protocol anomaly detection is enabled, Kaspersky Industrial CyberSecurity for Networks scans
fragmented IP packets.
When the application detects errors in the assembly of IP packets, it registers events for Intrusion
Detection technology. Events are registered with system event types that are assigned the following
codes:
4000005100 for detection of a data con ict when assembling an IP packet (IP fragment overlapped).
4000005101 for detection of an IP packet that exceeds the maximum permissible size (IP fragment
overrun).
4000005102 for detection of an IP packet whose initial fragment is smaller than expected (IP fragment
too small).
You can apply additional Intrusion Detection methods regardless of the presence and state of Intrusion Detection
rules. Embedded algorithms are used for the additional scan methods.
194
Enabling and disabling rule-based Intrusion Detection
You can enable and disable use of the rule-based Intrusion Detection method when connected to the Server
through a web browser.
Only users with the Administrator role can enable and disable the rule-based Intrusion Detection method.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
3. Use the Rule-based Intrusion Detection toggle switch to enable or disable rule-based Intrusion Detection.
4. After a method is enabled or disabled, wait for the toggle switch to change to the necessary position (Enabled
or Disabled).
This process takes some time. The toggle switch will be unavailable during this time.
Only users with the Administrator role can enable and disable the additional Intrusion Detection methods.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
3. Enable or disable the use of additional Intrusion Detection methods by using the following toggle switches:
ARP spoo ng detection – enables or disables detection of signs of falsi ed addresses in ARP packets.
TCP protocol anomaly detection – enables or disables TCP protocol anomaly detection.
4. After a method is enabled or disabled, wait for the toggle switch to change to the necessary position (Enabled
or Disabled).
This process takes some time. The toggle switch will be unavailable during this time.
1. On the Intrusion detection tab, click the ltering icon in the column by which you want to lter.
You can lter by any column except the Name of rules set column.
2. In the drop-down list, select the setting for ltering sets of rules.
The table containing sets of Intrusion Detection rules will display only those sets of rules that satisfy the
selected lter setting.
On the Intrusion detection tab, enter your search query into the Search eld. The search is initiated as
you enter characters.
The table containing sets of Intrusion Detection rules will display the rule sets that meet the search criteria.
1. On the Intrusion detection tab, click the arrow icon in the right part of the header of the column by
which you want to sort.
The table will be sorted by the selected column. The arrow icon will take the appearance corresponding
to the current sort order.
2. If you want to reverse the sorting order, click the arrow icon again.
Only users with the Administrator role can change the states of sets of Intrusion Detection rules.
1. Start the Application Console and provide the account credentials of a user with the Administrator role.
3. In the table containing sets of Intrusion Detection rules, select or clear the check boxes in the Active column
for those rule sets whose state you want to change.
196
The lines containing sets of rules whose state will be changed are distinguished by their color.
Rule state will change in accordance with the boxes you check/uncheck. After switching a set of rules to inactive
state, the line corresponding to the set of rules will be displayed in cursive.
After loading Intrusion Detection rules from a le, the rules are saved in the application as a custom set of rules.
The name of the set of rules will match the name of the le without the RULES extension.
When sets of rules are loaded from les, the current custom sets of rules are deleted from the table and
replaced with the new ones. However, system sets of rules (whose Origin column shows the System value) are
not deleted from the table.
Only users with the Administrator role can load custom sets of Intrusion Detection rules.
1. Make sure that you have the permissions to read les in the folder containing the Intrusion Detection rule les
that you want to use.
2. Start the Application Console and provide the account credentials of a user with the Administrator role.
4. In the toolbar, open the Custom rules menu and select Replace custom rules.
The Folder containing les with Intrusion Detection rules window opens.
7. Check for errors in the loaded sets of rules. Information about detected errors is displayed in the Errors
column. If the set of rules contains errors, you can view detailed information about them by clicking the Details
link.
8. If you do not want to use some of the sets of rules for Intrusion Detection, change their state.
197
When custom sets of rules are removed, the les from which those sets of rules were loaded are not deleted. The
les can be used to load the rules again (for example, if you want to selectively load les).
Only users with the Administrator role can delete custom sets of Intrusion Detection rules.
1. Start the Application Console and provide the account credentials of a user with the Administrator role.
3. In the toolbar, open the Custom rules menu and select Delete custom rules.
The Delete custom rules menu item is available if the table has custom sets of Intrusion Detection rules.
A window with a con rmation prompt opens.
4. Click Yes.
All custom sets of Intrusion Detection rules will be deleted from the table.
Managing logs
This section contains information about managing logs of Kaspersky Industrial CyberSecurity for Networks.
Only users with the Administrator role can manage logs of Kaspersky Industrial CyberSecurity for Networks.
1. Start the Application Console and provide the account credentials of a user with the Administrator role.
3. On the Logging settings tab, in the Audit, Event history and Application messages groups of settings,
con gure the following settings:
198
Managing the settings for saving tra ic in the database
The application can save tra ic at the moment events are registered and store that tra ic in the database. The
database saves tra ic only when registering events for which tra ic saving is enabled. The application can also
save tra ic in the database directly by requesting to load tra ic using temporary tra ic dump les.
The application saves tra ic data in blocks. If a tra ic block relates to several events (when events are registered
in a short time interval), this tra ic block is not duplicated in the database.
1. Start the Application Console and provide the account credentials of a user with the Administrator role.
4. Con gure the following settings for saving tra ic in the database:
To enable or disable the user activity audit when connected to the Server through a web browser:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
3. Use the User activity audit toggle switch in the toolbar to enable or disable the user activity audit.
4. Wait for the changes to be applied. The toggle switch is unavailable until it is nished moving to the other state.
If you want to enable the audit, select the Enable check box in the Audit block.
If you want to disable the audit, clear the Enable check box in the Audit block.
ProductFacade
ProductServer
KisClient
Filter
NetworkDumper
EntityManager
Watchdog
For each process, you can assign one of the following log levels:
Critical. Data on process failures that could have a critical impact on the application is saved in the log.
Error. The log saves Critical level data and information about errors that occur while the process is running.
Warning. The log saves Error level data and data requiring attention.
Informational. The log saves Warning level data and reference information.
Debug. The log saves Informational level data and all process data that may be required during the application
debugging process (such as auxiliary messages and process performance data).
The log levels may need to be changed, for example, when contacting Technical Support.
To change the log level of a Kaspersky Industrial CyberSecurity for Networks process:
1. Start the Application Console and provide the account credentials of a user with the Administrator role.
2. In the Settings menu of the Application Console window, select Server and sensors.
The Settings of Server and sensors window opens.
200
3. On the Operating mode tab, expand the list of processes of the relevant node in the Node column.
4. If a process whose log level you need to change is associated with a speci c component (Server or sensor),
expand the list of processes of that component.
5. In the drop-down list of the Log level column, assign the log level for the relevant process.
Managing technologies
In the web interface of Kaspersky Industrial CyberSecurity for Networks, you can enable or disable the use of
technologies, and change the operating mode of technologies. Only users with the Administrator role can manage
technologies.
Command Control
If a technology or method is disabled, the application does not monitor communications of assets using this
technology or method. However, you can con gure the settings of disabled technologies and methods (for
example, add or edit rules).
The mode can be changed for the following technologies and methods:
Command Control
201
Asset activity detection
After the application is installed, all technologies and methods (except PLC Project Control and Unknown Tag
Detection) are enabled by default. Learning mode is enabled by default for technologies and methods whose mode
can be changed.
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using the
account credentials of a user with the Administrator role.
If the states or modes of technologies and methods cannot be changed at the current time, the toggle
switches in the list are not available (the No data value is displayed in the mode selection elds). In this
case, it is recommended to check the status of the kics4net service on the Server computer. If the service
is not active, you must start it.
3. Use the toggle switches on the left to enable or disable the use of relevant technologies and/or methods. To
enable or disable all technologies and methods simultaneously, use the Activate all or Deactivate all button.
4. After enabling or disabling a technology or method, wait for the changes to be applied. The toggle switch is
unavailable until it is nished moving to the other state.
5. If Network Integrity Control technology, Command Control technology, or the Asset Activity Detection method
are enabled, select the necessary mode. To do so, in the drop-down list on the right of the name of the
technology or method, select one of the following options:
To change the mode of all enabled technologies and methods simultaneously, use the Mode drop-down list.
6. After selecting a mode, wait for the changes to be applied. Until the mode is changed, the drop-down list
displays the Changing status.
If you selected di erent modes for enabled technologies and methods, the Mode drop-down list displays the
Mixed value.
API methods for Kaspersky Industrial CyberSecurity for Networks let you perform the following actions:
Sign up for noti cations about reading and writing of the values of tags.
The Kaspersky Industrial CyberSecurity for Networks API is supplied as a package containing a set of proto les.
This package is included in the application distribution kit. Proto les can be compiled into source code that
enables execution of RPC requests to Kaspersky Industrial CyberSecurity for Networks.
Documentation for the Kaspersky Industrial CyberSecurity for Networks API is published in Online Help format on
the Kaspersky Online Help page. This documentation serves as the Developer's Guide. The Developer's Guide
describes the application programming interface used for RPC requests to Kaspersky Industrial CyberSecurity for
Networks. The Developer's Guide also provides sample code and detailed descriptions of called elements that are
available in the Kaspersky Industrial CyberSecurity for Networks API. The Developer's Guide for the Kaspersky
Industrial CyberSecurity for Networks API is intended for professionals who are familiar with the Python
programming language and with the principles of developing applications using an API.
The Kaspersky Industrial CyberSecurity for Networks API uses the Google™ RPC network interaction protocol.
The Google RPC library supports a wide range of programming languages.
During the application installation process, the following keys and certi cates are created:
By default, the speci ed les are located in the folder /var/opt/kaspersky/kics4net/public_certs/. Access to this
folder is granted to a user with root privileges as well as to users of the kics4net group.
To connect to the gRPC server, the client application must use the following certi cates and keys:
The administrator must create certi cates and keys to be used by client applications (hereinafter also referred to
as "client certi cates"). Each client certi cate must be created in the name of the computer that will connect to
the Kaspersky Industrial CyberSecurity for Networks Server through the API.
For information on using client certi cates to establish a connection with the Kaspersky Industrial
CyberSecurity for Networks Server through the API, please refer to the documentation for the Kaspersky
Industrial CyberSecurity for Networks API.
1. Obtain from the user the name of the computer for which a client certi cate must be created.
2. Obtain from the user a certi cate signing request for the client computer.
If you must independently create a private key for the client and CSR, you can use the OpenSSL tool. To do so,
enter the following commands:
openssl genrsa -des3 -out client.key 4096
openssl req -new -key client.key -out client.csr
3. Create a certi cate based on the obtained CSR using the root certi cate and private key of the gRPC server.
The certi cate must be created in the name of the client computer that will be used to establish a connection
(see step 1).
For the created certi cate, in the settings of the OpenSSL tool specify the certi cate validity period in days
(the days setting) and the serial number of the certi cate (the set_serial setting). Example command for
creating a certi cate:
openssl x509 -req -days 365 -in client.csr \
-CA product_facade_grpc_ca.crt \
-CAkey product_facade_grpc_ca.key \
-set_serial 01 -out client.crt
4. Create a certi cate chain that includes the root certi cate of the gRPC server into the nal client certi cate.
If you are using intermediate certi cates, they must also be included in the chain. To create a certi cate chain,
enter the following command:
cat product_facade_grpc_ca.crt >> client.crt
5. Provide the following certi cates and keys to the user of the client application:
204
If a client certi cate must be sent separately, also send the root certi cate of the gRPC server (the le
product_facade_grpc_ca.crt) and all intermediate certi cates if they are being used.
205
Performing common tasks
This section contains a description of the common user tasks and instructions on how to perform them.
You can track the more signi cant changes in the system by viewing data in the Assets and Events sections. If you
need to view more detailed information (for example, about assets requiring attention), you can proceed to other
sections of the application web interface or open a tooltip.
To view data in online mode, you can also use the Tags section, which lets you view tags with process
parameter values and monitor the current state of Kaspersky Industrial CyberSecurity for Networks.
Data on the number of devices known to the application in each category. This data is displayed as category
icons in the upper part of the Assets section. The number of assets of the speci c category is indicated under
the icon of each category. If the list of assets contains devices requiring attention, the warning icon is displayed
on the category icons of these devices.
List of categories with assets requiring attention. This data is displayed in the middle part of the Assets section
if such devices are present. The space used for displaying graphical elements is limited by the size of the
Assets section.
The application determines that a device requires attention in any of the following cases:
The asset has the Authorized status and a security state other than OK.
If there are assets requiring attention, the following information is displayed for each category in the list:
Line containing the category icon, text comment, and link containing the number of assets requiring attention.
Line containing the graphical elements representing the assets. This line is displayed if there is su icient free
space in the Assets section. The number of graphical elements in the line depends on the current size of the
web browser window. If there are more devices requiring attention than the number of graphical elements
displayed in the line, the number of hidden devices is displayed on the right in the format +<number of
devices>.
206
Device name.
Device status. This is displayed as an icon if the device has the Unauthorized status.
Asset security state. This is displayed as a colored line on the left border of the graphical element. The color of
the line corresponds to the OK, Warnings or Critical events states.
Receive information about assets that require attention and belong to a speci c category.
To go to the assets table and view information about all assets in the selected category:
In the upper part of the Assets section, click the icon of the relevant category.
The Assets section opens in the web browser window. The assets table will be ltered based on the select
category of assets.
To proceed to the assets table and view information about devices that require attention and belong to a speci c
category:
In the list of categories containing devices requiring attention, click the link containing the number of devices of
the relevant category (this link is displayed at the end of the line containing the category icon and text comment
requiring attention).
The Assets section opens in the web browser window. The assets table will be ltered based on the IDs of assets
that require attention and belong to the speci c category.
The assets table is ltered based on the IDs of those assets that were displayed in the Assets block when you
proceeded to the assets table. After you switch to the assets table, the lter settings are not updated. If you
want to view the current number of assets requiring attention, you can go to the Dashboard section again.
To go to the assets table and view information about an asset requiring attention:
207
In the Assets section, click the graphical element that represents the relevant asset.
The Assets section opens in the web browser window. The assets table will be ltered based on the asset ID.
To go to the assets table and view information about all devices that are known to the application:
The Assets section opens in the web browser window. The assets table will display the assets that satisfy the lter
settings that were previously de ned in the assets table.
1. In the Assets block, enter your search query into the Search assets eld.
The Assets section opens in the web browser window. The assets table will display the assets that meet the
search criteria.
Histogram of events and incidents for the selected period. This data is displayed in the upper part of the
Events section. The histogram shows the distribution of events and incidents based on their severity levels.
List containing information about registered events and incidents sorted by date and time of last occurrence.
This data is displayed in the middle part of the Events section.
On the histogram showing the distribution of events and incidents, the columns correspond to the total number of
events for each time interval. Within columns, the severity of events and incidents are distinguished by color. The
following colors correspond to severity levels:
Blue. This color is used for events and incidents with the Informational severity level.
Yellow. This color is used for events and incidents with the Warning severity level.
Red. This color is used for events and incidents with the Critical severity level.
208
To display information about a column of the histogram, move the mouse cursor over it. A pop-up window shows
the date and time of the interval as well as the number of events and incidents by severity level.
The duration of time intervals depends on the selected display period. The following periods are available for
building a histogram:
The list of events and incidents in the Events block is updated in online mode. Events and incidents with the most
recent values for the date and time of last occurrence are placed at the beginning of the list.
The number of displayed elements in the list of events and incidents is limited by the size of the Events block.
The following information is provided for each event or incident in the list:
Icon designating the severity level of an event or incident: Informational, Warning, or Critical.
Data for the selected period will be displayed on the histogram showing the distribution of events and incidents.
209
To view detailed information about events and incidents, you can proceed to the events table by using the
management elements in the Events block of the Dashboard section. The following options are provided:
Receive information about an event or incident that is displayed in the Events block.
To view detailed information about an event or incident displayed in the list of the Events section:
In the web browser window, the Events section opens. The events table will apply a lter based on the ID of the
selected event or incident. The period ranging from the date and time of registration of the event or incident to
the current moment (without indicating an end boundary for the period) will also be de ned for the lter.
In the web browser window, the Events section opens. The events table displays the events and incidents that
meet the lter settings that were previously de ned in the events table.
1. In the Events block, enter your search query into the Search events eld.
In the web browser window, the Events section opens. The events table displays the events and incidents that
meet the search criteria.
Nodes. These objects designate the sources and destinations of network packets within detected
communications.
Asset groups. These objects correspond to groups in the asset group tree. Groups contain nodes that
represent the assets and child groups embedded in those groups.
210
Nodes and links appear on the network map based on data received from tra ic for a speci c time interval. Asset
groups are continually displayed.
If necessary, you can lter nodes and links. By default, the network map displays objects in online mode with a
de ned ltering period of one hour.
Objects requiring attention are visually distinguished on the network map. The application considers the following
to be objects requiring attention:
Node associated with unprocessed events that have the Warning or Critical severity, or node that represents
an asset with the Unauthorized status.
Link associated with events that have the Warning or Critical severity. Events registered during the de ned
object ltering period are taken into account. However, the current status of events is not taken into account.
Group that contains assets requiring attention, or whose nodes have links requiring attention. This includes
objects within the group and within any child group of all nesting levels.
A device that is known to the application (an asset). This type of node represents an asset that is listed in the
assets table.
A device that is unknown to the application. This type of node represents a device with a unique IP address or
MAC address that is not in the assets table. Such a node may appear on the network map, for example, if
network packets are sent using the ping command to the address of a non-existent device. Nodes of unknown
devices are displayed individually if their total number does not exceed 100 (according to the current lter
settings on the network map). If the number of nodes exceeds this limit, one consolidated node of unknown
devices is displayed.
WAN. This type of node represents devices of a Wide Area Network with which industrial network devices
connect.
The following information is displayed for nodes representing assets when the network map is maximized:
IP address of the device (If an IP address is not assigned, the MAC address is displayed).
211
The thick line on the left border of a node has one of the following colors depending on the asset's security
state:
The icon signi es that the router indicator has been set for the asset.
If an asset has the Unauthorized status or has a security state di erent from the OK state, the node has a red
background.
The following is displayed for nodes representing unknown devices when the network map is maximized:
If a node represents one unknown device, the IP address or MAC address of the device is displayed. For a
consolidated node of unknown devices (a node that combines more than 100 unknown devices), Unknown
devices is displayed.
The following is displayed for WAN nodes when the network map scale is maximized:
If a group is collapsed, the following is displayed when the network map scale is maximized:
Group name.
Number of assets that satisfy the current lter settings on the network map. This number includes assets
within the group and within its child groups in all nesting levels.
The window of an expanded group contains a title with the group name and an area for displaying objects. The
group window displays the assets included in this group, and the child groups of the next nesting level. Of the
assets included in the group, only the assets that meet the current lter settings on the network map are
displayed.
If a group contains assets or links requiring attention (including in child groups of any nesting level), the window has
a red background.
Each link shows two sides of communication. A side of communication in a link may be one of the following objects
on the network map:
Collapsed group, if the link shows communication with one or more assets in this group.
Consolidated node of unknown devices, if the link shows communication with one or more unknown devices of
this node.
Depending on the severity of events registered when communications are detected, the link may have the
following colors:
Gray – the communication did not cause event registration, or only events with the Informational severity level
were registered.
Red – the communication caused the registration of events with the Warning or Critical severity level.
Events registered during the de ned object ltering period are taken into account for links. However, the current
status of events is not taken into account.
If a node represents a known asset, the details area displays the same information that is displayed in the
assets table.
213
If a node represents one unknown device, the details area displays the MAC address and/or IP address of the
device.
Number of nodes combined by this node under the current lter settings.
IP addresses – number of IP addresses of unknown devices and the rst 100 IP addresses. This section is
displayed if there are nodes with IP addresses among the nodes of unknown devices.
MAC addresses – number of MAC addresses of unknown devices and the rst 100 MAC addresses. This
section is displayed if there are nodes with MAC addresses among the nodes of unknown devices.
Exclude de ned addresses indicates that all assets whose addresses are included in the listed subnets are
excluded from the asset group.
Subnets – section containing a list of subnet masks by which devices of an external network are identi ed.
Number of assets and groups within the selected group and its child groups of all nesting levels.
Path to the group in the asset group tree. If a group is in the top level of the hierarchy, Top-level group is
displayed.
Information about the number of objects requiring attention within the selected group and its child groups of all
nesting levels. If there are no such objects, the OK security state is displayed.
Severity – icon corresponding to the maximum importance level of events associated with the link. If no event
is associated with the link, No events is displayed. Events registered during the de ned object ltering period
are taken into account. However, the current status of events is not taken into account.
Sections containing basic information about the rst and second sides of communication:
If the side of communication is a node of a known asset or a node of an unknown device, the section
displays the name or address of the asset/device, category, and address information (for a known asset,
address information is provided only for those network interfaces that were used during the
communication).
If the side of communication is a collapsed group, the section displays the name of the group and the
number of assets and child groups within it.
If the side of communication is a consolidated node of unknown devices, the section displays the Unknown
devices node name and the number of nodes combined within this node.
If one of the sides of communication is a collapsed group, you will see the number of links that are designated
by the selected link:
Total links – total number of links with assets of the collapsed group.
List showing the quantitative distribution of links based on the severity of their associated events (including
the number of links not associated with any event). Next to list items are links for viewing detailed
information about the items. You can click the To assets link to go to the Assets section and lter assets
214
associated with links. You can click the To events link to go to the Events section and lter events
associated with links.
Protocols – section containing a list of protocols used for communication. The volume of transmitted data
calculated for detected network packets is speci ed for each protocol. This section is not displayed if one of
the sides of communication is a consolidated node of unknown devices.
You can change the positioning of the network map by moving it around the screen.
You can use the following functions when working with the network map:
Use the mouse wheel or the + and – buttons located in the toolbar next to the current scale value.
Reducing the scale of the network map reduces the amount of information that is displayed in nodes and
collapsed groups.
If the display scale is less than 25%, icons and text information are not displayed in nodes and collapsed
groups. The appearance of nodes and collapsed groups may change as follows:
On a node representing a device that is known to the application (asset), the upper-right corner
displays the asset status as a triangle in one of the following colors:
A thick black line on the left border of the node appears on the WAN node.
On a collapsed group, the upper-right corner displays a triangle indicating the presence of objects
requiring attention. The triangle has one of the following colors:
Green means that the group does not contain objects requiring attention.
215
If necessary, you can change the positioning of the network map manually or automatically. Automatic
positioning lets you move the network map and change its scale in such a way to display all nodes that
satisfy the de ned lter settings, and all expanded groups.
1. Position the mouse cursor over any part of the network map that is not occupied by objects.
2. Click and hold the left mouse button to drag the network map image.
Click the button in the toolbar located in the left part of the network map display area.
The positioning and scale of the network map will change to display all nodes and expanded groups.
Hold down the SHIFT key and use your mouse to select a rectangular area containing the relevant groups.
Hold down the CTRL key and use your mouse to select the relevant collapsed groups.
2. Click the button in the toolbar located in the left part of the network map display area (the button is available
if at least one collapsed group is selected).
To collapse expanded groups on the network map, perform one of the following actions:
If you want to collapse one expanded group, click the button in this groups' window title.
If you want to collapse all expanded groups on the network map, click the button in the toolbar located in the
left part of the network map display area (the button is available if at least one group is expanded).
Only users with the Administrator role can move nodes and groups to other groups.
2. In the Network map section, select the relevant nodes of assets and/or collapsed groups.
To select multiple nodes and/or groups, perform one of the following actions:
Hold down the SHIFT key and use your mouse to select a rectangular area containing the relevant objects.
Hold down the CTRL key and use your mouse to select the relevant objects.
The details area appears in the right part of the web interface window. The details area shows the total number
of selected nodes and groups while also showing the quantitative distribution of selected objects by type.
3. If the selected objects belong to di erent types or categories of devices, you can exclude certain types of
objects (for example, nodes of devices that are unknown to the application) or categories (for example, PLC).
To do so, clear the check box next to the name of the category or type.
4. Move the cursor over one of the selected objects (group or node representing a known asset).
5. Press the CTRL key and hold it down while dragging the selected objects to the relevant group (or to any place
outside of groups if you want to move the selected objects to the top level of the hierarchy within the group
tree).
A window with a con rmation prompt opens.
Objects that are included in groups can be moved only within the con nes of their respective groups. Other
objects may occupy any space on the network map except the space occupied by expanded groups.
Nodes and groups are pinned when their location is changed manually or automatically. You can also pin the current
location of displayed nodes and collapsed groups within the con nes of one group or on the entire network map.
After the location of a node or collapsed group is pinned, the icon appears in the upper-right corner of this
element. The icon is no longer displayed when the network map scale is reduced to 25% or less.
The location of a pinned node or pinned group is retained. If a pinned node disappears from the network map (for
example, after a lter is applied), this node will be displayed in the same location the next time it appears.
To pin the location of displayed nodes and collapsed groups, perform one of the following actions:
If you want to pin the location of all displayed nodes and collapsed groups on the network map, click the
button in the toolbar located in the left part of the network map display area (the button is available if there are
unpinned objects on the network map).
If you want to pin the location of displayed nodes and collapsed groups in the window of an expanded group,
click the button in the expanded group's window title (the button is available if there are unpinned objects
within the window of the group).
217
To unpin displayed nodes and collapsed groups, perform one of the following actions:
If you want to unpin one node or one collapsed group, click the icon in the upper-right corner of the node or
collapsed group.
If you want to unpin all displayed nodes and collapsed groups on the network map, click the button in the
toolbar located in the left part of the network map display area (the button is available if there are pinned
objects on the network map).
If you want to unpin displayed nodes and collapsed groups in the window of an expanded group, click the
button in the expanded group's window title (the button is available if there are pinned objects within the
window of the group).
After their arrangement, nodes and groups are locked (pinned) in their new location. If necessary, you can unpin
these objects.
Objects that are included in groups can be moved only within the windows of these groups.
1. On the network map, select one or multiple objects representing nodes and/or collapsed groups.
To select multiple nodes and/or collapsed groups, perform one of the following actions:
Hold down the SHIFT key and use your mouse to select a rectangular area containing the relevant objects.
Hold down the CTRL key and use your mouse to select the relevant objects.
2. Use your mouse to drag the selected objects to the necessary location.
After they are moved, nodes and collapsed groups will remain pinned. The icon appears in these objects.
Move the cursor over the expanded group's window title, left-click and drag the window to the necessary
location.
Radial arrangement.
Grid-aligned arrangement.
218
All displayed nodes and groups at the top level of the hierarchy within the group tree.
After automatic arrangement, nodes and groups are locked (pinned) in their new location. The icon appears in
these objects. If necessary, you can unpin these objects.
To automatically arrange all displayed nodes and groups that are located at the top level of the hierarchy in the
group tree:
1. In the toolbar located in the left part of the network map display area, click one of the following buttons (the
buttons are available if there are nodes or groups displayed on the network map):
If you want to align the objects according to the grid, click the button.
To automatically arrange only the displayed nodes and groups within an expanded group:
2. In the title of the expanded group's window, click one of the following buttons (the buttons are available if there
are displayed nodes or groups within the group):
If you want to align the objects according to the grid, click the button.
To automatically arrange only the selected nodes and collapsed groups on the network map:
1. On the network map, select multiple nodes and/or collapsed groups by performing one of the following actions:
Hold down the SHIFT key and use your mouse to select a rectangular area containing the relevant objects.
Hold down the CTRL key and use your mouse to select the relevant objects.
2. In the toolbar located in the left part of the network map display area, click one of the following buttons (the
buttons are available if at least three objects with common links are selected):
If you want to align the objects according to the grid, click the button.
219
Filtering nodes and links by time of communication
You can con gure ltering of nodes and links to display only the ones that communicated during the speci ed time
period.
You can select the ltering period by using the time scale displayed in the lower part of the Network map section.
The following elements are displayed on the time scale:
Periods when events with the Critical and Warning severity levels were registered. These periods are displayed
as red strips in the lower part of the time scale. The periods are not displayed if a duration of more than seven
days is de ned for the time scale.
Filtering period. This period is displayed as a yellow band lined with buttons for moving the boundaries.
Chart of the volume of tra ic processed by the application. The chart is not displayed if a duration of more
than seven days is de ned for the time scale.
End of the time scale. Depending on the arrangement of the ltering period, the end of the time scale is
displayed as a date and time (if the date and time are de ned) or as a Now link.
Period correlated to the current moment. The right-side boundary of this period corresponds to the end of the
time scale.
Period not correlated to the current moment. This type of period may be arranged in any part of the time scale.
You can also use the mouse to move the period to the right part of the time scale.
2. If it is necessary to specify a di erent period duration, perform one of the following actions:
Move the left border of the yellow band of the period to the necessary position (the maximum duration of
the period is 7 days).
Open the window for selecting the period duration by using the button showing the current period duration
above the yellow band of the period, select the relevant option (Hour, Day, 7 days), and click OK.
The network map shows only those nodes and links for which communications were detected since the
beginning of the speci ed period up to the current moment.
1. If the necessary period is not within the time scale, change the values of the date and time for the start and/or
end of the time scale.
220
a. To change the data and time of the start of the time scale, open the window by clicking the link in the left
part of the time scale and select one of the following options:
Day
7 days
Month
Specify a date. For this option, specify a date and time in the opened eld.
b. To change the date and time of the end of the time scale, open the window by clicking the link in the right
part of the time scale and select one of the following options:
Now
Specify a date. For this option, specify a date and time in the opened eld.
2. Specify the relevant period. To do so, perform one of the following actions:
Move one or both of the borders of the yellow band of the period to the necessary part of the time scale
(the maximum duration of the period is 7 days).
Open the window for selecting the period duration by using the graphical element above the yellow band of
the period, select the relevant option (Hour, Day, 7 days), and click OK.
You can also use the mouse to move the period to the relevant place on the time scale.
The network map shows only those nodes and links for which communications were detected during the
currently de ned period.
1. In the toolbar located above the network map, open the Asset statuses drop-down list.
You will see a list containing the names of statuses for assets that are known to the application
(Unauthorized, Authorized, Archived), and the Unknown device status for devices that are unknown
to the application.
2. In the drop-down list, select the check boxes for the statuses of assets that need to be displayed on
the network map.
3. Click OK.
The network map displays only those nodes that represent assets with the selected statuses.
221
Filtering by asset security state
To lter nodes on the network map based on the security states of assets:
1. In the toolbar located above the network map, open the Asset states drop-down list.
You will see a list containing the names of security states for assets (OK, Warning, Critical events).
2. In the drop-down list, select the check boxes for the security states of nodes that need to be displayed
on the network map.
3. Click OK.
The network map displays only those nodes that represent assets with the selected security states.
1. In the toolbar located above the network map, open the Asset categories drop-down list.
You will see a list containing the names of categories for known assets, as well as individual categories
for unknown devices and WAN nodes.
2. In the drop-down list, select the check boxes for those categories of assets that need to be displayed
on the network map.
3. Click OK.
The network map displays only those nodes that represent the selected categories of assets.
After applying a lter, the network map displays only those nodes that satisfy the de ned lter settings. In
addition, for a node to be displayed on the network map, it must have a connection (link) with another displayed
node. If the de ned lter settings cause the network map to not display all nodes with which a node has interacted,
this node is also not displayed on the network map. Filtering is applied similarly for nodes that are part of a
consolidated node of unknown devices: if the network map does not display all nodes with which a node of an
unknown device has interacted, this node is removed from the list of nodes within the consolidated node of
unknown devices.
If necessary, you can enable the network map to display all nodes associated with ltered nodes. Together with
nodes that satisfy the de ned node lter settings, the network map will also display all nodes with which
interactions have occurred (irrespective of the de ned lter settings).
For example, if node ltering by PLC category is enabled and you have enabled the display of linked nodes, the
network map will display all nodes with which PLC category assets have communicated. If the display of linked
nodes is disabled, the network map will display nodes of only those PLC category assets that have communicated
with each other.
Use the Linked assets toggle switch in the toolbar located above the network map.
222
By default, the network map displays all links for which communication was detected during the de ned time
period. To limit the number of links displayed on the network map, you can use the following functions:
1. In the toolbar located above the network map, open the Link severity levels drop-down list.
You will see a list containing the names of the severity levels of events (Informational, Warning, Critical
events), as well as the No events item that lets you lter connections for which no events have been
registered.
2. In the drop-down list, select the check boxes for those severity levels by which you want to lter links.
3. Click OK.
The network map displays only those links associated with events that have the selected severity levels.
1. In the toolbar located above the network map, open the Protocols drop-down list.
You will see a window containing the table of supported protocols displayed as a protocol stack tree.
You can manage how tree elements are displayed by using the + and - buttons next to the names of
protocols that contain protocols of subsequent layers.
The table columns provide the following information:
EtherType – number of the next-level protocol within the Ethernet protocol (if the protocol has a
de ned number). It is displayed in decimal format.
IP number – number of the next-level protocol within the IP protocol (if the protocol has a de ned
number). It is indicated only for protocols within the IP protocol structure. It is displayed in decimal
format.
2. If necessary, use the search eld above the table to nd relevant protocols.
3. In the list of protocols, select the check boxes opposite the protocols by which you want to lter
events.
If you select or clear the check box for a protocol that contains nested protocols, the check boxes for
the nested protocols are also automatically selected or cleared.
4. Click OK.
The network map displays only those links in which the selected protocols were used.
223
You can lter links based on the levels of communications corresponding to the layers of the OSI (Open
Systems Interconnection) model for the network protocol stack.
To lter links on the network map based on the layers of the OSI network model:
1. In the toolbar located above the network map, open the OSI model layers drop-down list.
You will see a list containing the names of OSI model layers:
Data Link. This layer includes the communication links in which MAC addresses were used to
communicate with devices.
Network. This layer includes links in which IP addresses were used to communicate with devices.
2. In the drop-down list, select the check boxes for those OSI model layers whose links need to be
displayed on the network map.
3. Click OK.
The network map displays only those links that are associated with the selected OSI model layer.
When a network map view is saved, the following display settings are saved:
Filtering of nodes
Filtering of links
The application can save and use no more than 10 groups of settings providing di erent views of the network map.
Only users with the Administrator role can manage the list of network map views (including saving the current
display settings). However, users with the Administrator role and users with the Operator role can both access the
list of views and apply the saved groups of settings.
When working with network map views, you can use the following functions:
Adding a new view while saving the current network map display settings
224
To add a new view and save the current network map display settings in this view:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
2. In the Network map section, con gure the network map display settings.
Must begin and end with any permitted character except a space.
Updating a view while saving the current network map display settings
To update a view and save the current network map display settings in this view:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
2. In the Network map section, con gure the network map display settings.
4. Select the view in which you want to save the current network map display settings.
6. In the prompt window, con rm that you want to save the current settings in the selected view.
225
To rename a view:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
Must begin and end with any permitted character except a space.
To delete a view:
1. Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser using
the account credentials of a user with the Administrator role.
226
To apply the settings saved in a view on the network map:
In the toolbar located above the network map, click the Clear lter button (this button is displayed if lter
settings have been de ned).
The network map will display all nodes and links for which communications were detected during the currently
de ned period.
For nodes representing known assets, the search is performed in all columns of the assets table except the
following columns: Status, Security state, Last seen, Last modi ed and Creation date. The search is also
performed in the values of custom elds for assets.
1. In the Network map section, enter your search query into the Search nodes eld. The search is initiated as you
type characters in the search eld.
If nodes that satisfy the search query are found, the contours of these nodes are highlighted in yellow. The
contours of collapsed groups in which nodes were found are highlighted in the same way. However, the right
part of the Search nodes eld will display the following information:
Sequence number of the currently selected object (node or collapsed group containing the found nodes)
among the search results.
Total number of found objects (nodes and/or collapsed groups containing the found nodes).
227
The number of nodes in collapsed groups is not taken into account in the total number of found
objects. If you want the nodes in groups to also be taken into account in the search results, expand the
collapsed groups.
2. To navigate between the found objects, use the arrow buttons in the right part of the Search nodes eld.
Arrow movements proceed in alphabetical order of the names of found objects. When moving to the next
object, the network map is automatically positioned to display this object.
The capability to load events is available if no more than 200 nodes on the network map are selected. You can
select the relevant nodes individually or as part of collapsed groups that include the relevant assets. When a
collapsed group is selected, all assets in the child groups of any nesting level are also included in the asset
selection.
1. On the network map, select one or multiple objects representing nodes of known assets and/or collapsed
groups.
To select multiple nodes and/or groups, perform one of the following actions:
Hold down the SHIFT key and use your mouse to select a rectangular area containing the relevant objects.
Hold down the CTRL key and use your mouse to select the relevant objects.
The details area appears in the right part of the web interface window. The details area shows the total number
of selected nodes and groups while also showing the quantitative distribution of selected objects by type.
2. If the selected objects belong to di erent types or categories of devices, you can exclude certain types of
objects (for example, nodes of devices that are unknown to the application) or categories (for example, PLC).
To do so, clear the check box next to the name of the category or type.
3. Depending on which events you want to load, click one of the following buttons (the buttons are unavailable if
the total number of assets in the selection exceeds 200):
Show unprocessed events – if you want to view events with the New or In progress status.
The Events section opens. The events table will apply a lter based on the IDs of assets corresponding to the
selected nodes on the network map (the Asset IDs eld appears in the toolbar). If you loaded events by using
the Show unprocessed events button, events are additionally ltered by the Status column.
Load events associated with a selected link. This method can be used for any link except links with the
consolidated node of unknown devices.
The application loads no more than 200 events associated with a link. If there are more events, the events with the
highest severity and with the latest time of occurrence are selected rst.
1. On the network map, select a link (except a link in which one of the sides of communication is a consolidated
node of unknown devices).
The details area appears in the right part of the web interface window.
2. Depending on which events you want to load, click one of the following buttons (the buttons are available if
there are events associated with the link):
Show unprocessed events – if you want to view events with the New or In progress status.
3. If more than 200 events associated with the link were registered during the time period de ned on the network
map, you will see a warning about the large number of events. In the prompt window, con rm whether you want
to load events with the highest severity levels.
The Events section opens. The events table will apply a lter based on the IDs of events and the time period
de ned on the network map. If you loaded events by using the Show unprocessed events button, events are
additionally ltered by the Status column.
1. On the network map, select the link showing interactions with nodes in the collapsed group.
The details area appears in the right part of the web interface window. The Total links: <number> settings group
contains a list of the maximum severities of events in links to nodes of the collapsed group. For each severity
level, the number of links with this severity is displayed. Only the severities of links to nodes of the collapsed
group are shown. If there are links that are not associated with any event, No events is displayed with the
number of such links.
2. Load events by using the To events link in the row containing the relevant severity.
You can load the following events:
For the Critical severity level, events associated with links that have Critical severity are loaded.
For the Warning severity level, events associated with links that have a Warning or Critical severity are
loaded.
For the Informational severity level, events associated with links that have an Informational, Warning or
Critical severity are loaded.
3. If more than 200 events associated with links that have the selected severities were registered during the time
period de ned on the network map, you will see a warning about the large number of events. In the prompt
window, con rm whether you want to load events with the highest severity levels.
229
The Events section opens. The events table will apply a lter based on the IDs of events and the time period
de ned on the network map.
The capability to load information is available if no more than 200 nodes representing known assets are selected.
You can select the relevant nodes individually or as part of collapsed groups that include the relevant assets. When
a collapsed group is selected, all assets in the child groups of any nesting level are also included in the asset
selection.
1. On the network map, select one or multiple objects representing nodes of known assets and/or collapsed
groups.
To select multiple nodes and/or groups, perform one of the following actions:
Hold down the SHIFT key and use your mouse to select a rectangular area containing the relevant objects.
Hold down the CTRL key and use your mouse to select the relevant objects.
The details area appears in the right part of the web interface window. The details area shows the total number
of selected nodes and groups while also showing the quantitative distribution of selected objects by type.
2. If the selected objects belong to di erent types or categories of devices, you can exclude certain types of
objects (for example, nodes of devices that are unknown to the application) or categories (for example, PLC).
To do so, clear the check box next to the name of the category or type.
3. Depending on the number of selected objects, click the Show asset or Show assets button (the Show assets
button is not available if the total number of known assets in the selection exceeds 200).
The Assets section opens. The assets table will apply a lter based on the IDs of assets corresponding to the
selected nodes on the network map.
You can view information in the assets table only for links to nodes in collapsed groups.
The application loads no more than 200 assets associated with links to nodes in collapsed groups. If there are more
assets, the assets associated with links with the highest severity are selected rst.
To view information about assets associated with links to nodes in collapsed groups:
1. On the network map, select the link showing interactions with nodes in the collapsed group.
230
The details area appears in the right part of the web interface window. The Total links: <number> settings group
contains a list of the maximum severities of events in links to nodes of the collapsed group. For each severity
level, the number of links with this severity is displayed. Only the severities of links to nodes of the collapsed
group are shown. If there are links that are not associated with any event, No events is displayed with the
number of such links.
2. Load asset information by using the To assets link in the row containing the relevant severity.
You can load the following asset information:
For the Critical severity level, you can load information about assets associated with links that have Critical
severity.
For the Warning severity level, you can load information about assets associated with links that have a
Warning or Critical severity.
For the Informational severity level, you can load information about assets associated with links that have
Informational, Warning, or Critical severity.
For the No events severity level, you can load information about assets associated with links that have any
severity.
3. If the total number of known assets in the selection exceeds 200, you will see a warning about the large number
of assets. In the prompt window, con rm whether you want to load assets associated with links that have the
highest severity levels.
The Assets section opens. The assets table will apply a lter based on the IDs of assets.
An event in Kaspersky Industrial CyberSecurity for Networks is a record containing information about the
detection of certain changes or conditions in industrial network tra ic requiring the attention of an ICS security
o icer. Events are registered and transmitted to the Kaspersky Industrial CyberSecurity for Networks Server. The
Server processes received events and saves them in a database.
An incident is a special type of event that is registered when a certain sequence of events is received. Incidents
group events that have certain common traits or that are associated with the same process.
The application registers incidents based on event correlation rules. An event correlation rule describes the
conditions for checking the sequences of events. When the application detects a sequence of events matching
the rule conditions, it registers an incident that indicates the name of the triggered rule. Incidents are registered
using system event types that are assigned the codes 8000000000, 8000000001, 8000000002 and
8000000003.
Event correlation rules are embedded in the application and are applied regardless of the security policy loaded in
the Console or applied on the Server.
After installation, the application uses the default event correlation rules. To improve the e ectiveness of
rules, Kaspersky experts regularly update the databases containing the sets of rules. You can update
correlation rules by installing updates.
231
The Kaspersky Industrial CyberSecurity for Networks Server registers events and incidents and relays information
about them to external systems according to the settings de ned for registering event types. You can con gure
these settings in the Console on the Con gure events tab. For con guration information, please refer to the
Con guring events section.
The settings for storing events and incidents are con gured in the Manage logs window of the Application
Console. By default, the database will store 100000 records for 365 days. If the number of records or the retention
period exceed the speci ed maximum values, the oldest records are deleted. When necessary, you can change the
number of stored records as well as their retention period.
The application saves events and incidents in the database on the Server.
Deleting or modifying any le in DBMS folders can disrupt the operation of the application.
You can view information about events and incidents in the following sections of the Kaspersky Industrial
CyberSecurity for Networks web interface:
The Dashboard section displays general information about the latest events and incidents registered by the
application.
The Events section displays detailed information about events and incidents and provides the capability to
download information from the Server database for any period.
You can de ne severity levels for custom event types. The severity levels for system event types (including events
in incidents) are assigned by the application automatically.
232
Network Integrity Control (NIC)
This technology is used to register events associated with industrial network integrity or the security of
communications (for example, an event for the detection of communications between devices in the industrial
network over a protocol that is new for those devices).
External (EXT)
This technology is used for incidents and events that are received by Kaspersky Industrial CyberSecurity for
Networks from external systems using Kaspersky Industrial CyberSecurity for Networks API methods.
You can assign the Deep Packet Inspection or External technology for custom event types. The application
automatically assigns technologies for system event types.
Event statuses
Statuses of events and incidents enable the application to show the progression of information processing by the
ICS security o icer.
After the Resolved status is assigned, events and incidents with this status are not taken into account by
the application when determining the security states of assets displayed in the assets table and on the
network map.
The statuses of events and incidents are changed manually. You can sequentially assign statuses in order from the
New status to the Resolved status (however, you are not required to assign the intermediate In progress status).
After the status of an event or incident is changed, you cannot assign the previous status to it.
233
Table of registered events
You can view the table of registered events and incidents in the Events section of the application web interface.
By default, the table of registered events and incidents is updated in online mode. The beginning of the table
displays the events and incidents with the latest dates and times when last visible.
The date and time when the event or incident was last visible may di er from the date and time of its
registration (the date and time of registration is displayed in the Start column). For an event, the date and
time when last visible may be updated during the event regenerate timeout for this type of event. For an
incident, the date and time when last visible is updated according to the date and time of last occurrence of
the events that are part of the incident.
You can perform the following operations when working with the table of events and incidents:
Filter events
Search events
Sort events
Add markers
Export events to le
The settings for displaying the events table (for example, the lter settings) are automatically saved for the current
application user. The saved settings are applied the next time this user connects to the Server, provided that the
connection is used by the same computer, web browser, and operating system user account.
234
If you want to select one event or incident, select the check box next to this event or incident or use your
mouse to select it.
If you want to select multiple events and/or incidents, select the check boxes next to the events and/or
incidents or select them by holding down the CTRL or SHIFT key. When multiple events and/or incidents are
selected, the application checks their status and determines if there are events and incidents with the New,
In progress and Resolved statuses among those selected.
If you want to select all events and incidents that satisfy the current lter and search settings, perform one of
the following actions:
Select any event or incident in the table and press the key combination CTRL+A.
Select the check box in the title of the left-most column of the table.
When multiple events and/or incidents are selected, the details area displays the total number of selected
elements. However, embedded elements of collapsed incidents (events and other incidents) are not taken into
account.
If you selected all events and incidents that satisfy the current lter and search settings, embedded elements of
collapsed incidents are included in the total number of selected elements. The details area displays one of the
following values:
If 1000 or less events and incidents are selected, the precise number is displayed. In this case, the application
checks the statuses of the selected events and incidents just as with other multiple selection methods.
If more than 1000 events and incidents are selected, the number 1000+ is displayed. In this case, the
application does not check the statuses of the selected events and incidents.
The title of the left-most column of the table shows a check box for the selection of events and incidents.
Depending on the number of selected items in the table, the check box can have one of the following states:
– all events and incidents that satisfy the current lter and search settings were not selected in the table.
However, one event/incident or multiple events and/or incidents may be selected in the table by using the
check boxes next to the events and incidents or by using the CTRL or SHIFT key.
– all events and incidents that satisfy the current lter and search settings were selected in the table.
– all events and incidents that satisfy the current lter and search settings were selected in the table, but
then the check boxes for some of them were cleared. This state is also retained if the check boxes were cleared
for all events and incidents selected in this way (due to the fact that the number of selected events and
incidents may change).
If all events and incidents that satisfy the lter and search settings are selected, the number of selected
elements may be automatically changed. For example, this may happen if new events or incidents are
registered. It is recommended to con gure the lter and search settings in such a way that ensures that only
the relevant elements end up in the selection (for example, you can lter events by their IDs before selecting
all events and incidents).
235
Simple viewing mode. In this mode, the events table displays all events without consideration of how events are
nested in incidents.
Tree display mode. In this mode, incidents are displayed as a tree structure with nested events and may be
collapsed or expanded in the events table.
You can change the display mode when con guring the events table.
To expand or collapse rows containing information about embedded elements of an incident in tree display mode:
Filtering events
To limit the number of events and incidents displayed in the events table, you can use the following functions:
When ltering based on a standard period, the events table is updated in online mode.
Last hour
Last 12 hours
Last 24 hours
Last 48 hours
3. If table updates are disabled, in the opened window con rm that you agree to resume table updates.
The table will display events and incidents for the period you speci ed.
236
When ltering by a de ned period, the table will no longer be updated. The table will display only the events
and incidents whose date and time of last occurrence are within the speci ed period.
3. If table updates are enabled, in the opened window con rm that you agree to suspend table updates.
On the right you will see additional buttons that you can use to manually de ne the ltering period.
4. Click any of the buttons containing a date and time value in the From and to elds.
The calendar opens.
5. In the eld under the calendar on the left, specify the date and time for the start boundary of the
ltering period. In the eld under the calendar on the right, specify the date and time for the end
boundary of the ltering period. If you want to remove the limit for the end boundary of the period,
delete the value in the eld under the calendar on the right.
To enter a value into the eld, you can select a date in the calendar (the current time will be speci ed
for the selected date) or manually enter the necessary value. When the date and time are entered
manually, you must enter the value in the format DD-MM-YYYY hh:mm:ss.
6. Click OK.
The events table will display events and incidents for the period you speci ed.
237
You can con gure ltering of events and incidents based on the values in all columns except the End, Title,
and Description columns.
1. In the Events section, click the ltering icon in the Start column.
The calendar opens.
2. In the calendar, specify the date and time for the start and end boundaries of the ltering period. To do
so, select a date in the calendar (the current time will be indicated) or manually enter the value in the
format DD-MM-YYYY hh:mm:ss. If you want to remove the limit for one of the boundaries of the period,
delete the value in the eld under the calendar.
3. Click OK.
To lter the events table by the Severity, Technology, Status, Monitoring point or Marker column:
1. In the Events section, click the ltering icon in the relevant column.
When ltering by severity level or technology, you can also use the corresponding buttons in the
toolbar.
The ltering window opens.
2. Select the check boxes opposite the values by which you want to lter events. You can select the All
check box to select all values in the Marker and Technology columns.
3. Click OK.
1. In the Events section, click the ltering icon in the relevant column.
The ltering window opens.
2. In the Including and Excluding elds, in the drop-down lists select the types of address blocks that you
want to include into the lter and/or exclude from the lter. You can select the following types of
address blocks:
IP address
Port number
MAC address
Application-level address
VLAN ID
Complex – if you want to specify multiple address blocks of di erent types combined by the logical
operator AND. To add di erent types of address blocks, use the Add condition (AND) button.
3. If you want to apply multiple lter conditions by address block type combined with the logical operator
OR, in the lter window click the Add condition (OR) button and select the relevant types of addresses.
4. If you want to delete one of the created lter conditions, in the lter window click the icon located on
the right of the eld containing the drop-down list.
238
5. Click OK.
1. In the Events section, click the ltering icon in the Protocol column.
You will see a window containing the table of supported protocols displayed as a protocol stack tree.
You can manage how tree elements are displayed by using the + and - buttons next to the names of
protocols that contain protocols of subsequent layers.
The table columns provide the following information:
EtherType – number of the next-level protocol within the Ethernet protocol (if the protocol has a
de ned number). It is displayed in decimal format.
IP number – number of the next-level protocol within the IP protocol (if the protocol has a de ned
number). It is indicated only for protocols within the IP protocol structure. It is displayed in decimal
format.
2. If necessary, use the search eld above the table to nd relevant protocols.
3. In the list of protocols, select the check boxes opposite the protocols by which you want to lter
events.
If you select or clear the check box for a protocol that contains nested protocols, the check boxes for
the nested protocols are also automatically selected or cleared.
4. Click OK.
To lter the events table by the Total appearances, ID, Triggered rule or Event type column:
1. In the Events section, click the ltering icon in the relevant column.
The ltering window opens.
2. In the Including and Excluding elds, enter the values for events and incidents that you want to include
into the lter and/or exclude from the lter.
3. If you want to apply multiple lter conditions combined by the logical operator OR, in the lter window
of the selected column click the Add condition button and enter the condition in the opened eld.
4. If you want to delete one of the created lter conditions, in the lter window of the selected column
click the icon.
5. Click OK.
239
You can lter the events table by the values in cells of any column except the following columns: Start,
Last seen, Title, Description and End.
2. In the events table, select the check box next to the event or incident whose setting you want to use as
a lter.
If you want to select multiple events and/or incidents, select the check boxes next to the events and/or
incidents whose settings you want to use as a lter. You can also select multiple events and/or
incidents by holding down the CTRL or SHIFT key.
The details area appears in the right part of the web interface window. If multiple events and/or
incidents are selected, the details area displays the total number of selected elements.
3. In the events table, move your mouse cursor over a cell of the relevant column of one of the selected
events or incidents.
Show all events with this setting, if one event or incident is selected.
Show all events with these settings, if multiple events and/or incidents are selected.
The Show all events with this setting or Show all events with these settings options are not
available for selection if it is impossible to lter by column values.
The table of registered events displays the events and incidents that have values in that same column
matching the values of the selected events and/or incidents.
When ltering the events table in tree display mode, incidents that meet the ltering criteria may be presented in
the following variants:
Displayed only with the nested elements that also meet the de ned ltering criteria
You can select the relevant display option for incidents by using the Show embedded events when ltering check
box when con guring the table.
Searching events
You can search events and incidents in the events table.
The search is performed in the columns containing characters (letters and/or numerals), except the Start, Last
seen, End and Total appearances columns.
240
In the Events section, enter your search query into the Search events eld. The search is initiated as you type
characters in the search eld.
The table displays the events and incidents that meet the search criteria.
When performing a search in tree display mode, incidents that meet the ltering criteria may be presented in the
following variants:
Only with the nested elements that also meet the search criteria
You can select the relevant display option for incidents by using the Show embedded events when ltering check
box when con guring the table.
Resetting the de ned lter and search settings in the events table
You can reset the de ned lter and search settings in the events table to their default state.
To reset the de ned lter and search settings in the events table:
In the toolbar in the Events section, click the Clear lter button (this button is displayed if the lter and/or
search settings are de ned).
Sorting events
You can sort events and incidents displayed in the Events section of the application web interface. You can sort by
the values of any column except the Description column.
By default, table rows are sorted by the Last seen column in descending order of the dates and times when events
last occurred. If the default sorting scheme is changed, the application stops updating events in the table.
1. In the Events section, click the header of the column by which you want to sort.
2. When sorting events by the Destination or Source column, in the drop-down list of the column header, select
the address of the destination or source by which you want to sort.
Depending on the values selected for display in these columns, you can select one of the following options:
IP address
Port number
MAC address
VLAN ID
Application-level address
3. If you need to sort the table based on multiple columns, press the SHIFT key and hold it down while clicking the
headers of the columns by which you want to sort.
241
4. If table updates are enabled, in the opened window con rm that you agree to suspend table updates.
The table will be sorted by the selected column. When sorting by multiple columns, the rows of the table are
sorted according to the sequence of column selection. Next to the headers of columns used for sorting, you will
see icons showing the current sorting order: in ascending order or descending order of values.
2. If you want to enable display of the information panel showing the number of events with the New and
In progress statuses, select the Display information panel check box.
3. In the Display embedded lists settings group, select the relevant mode for displaying events included in
incidents:
Flat. In this mode, the events table displays all events without consideration of how events are nested in
incidents.
Tree. In this mode, incidents are displayed as a tree of embedded events and other incidents. If you want the
nested elements of incidents to be displayed regardless of the current lter and search settings, select the
Show embedded events when ltering check box.
4. In the Displayed table columns settings group, select the check boxes opposite the settings that you want to
view in the table. You must select at least one setting.
The following settings are available for viewing:
Start
For an event that is not an incident – date and time of event registration. For an incident – date and time of
registration of the rst event included in the incident. In the table, you can view the date together with the
time, or just the date or time by itself. To select the information to display, select the check boxes opposite
the Date and/or Time settings.
Last seen
For an event that is not an incident, this is the date and time when the event last occurred. It may contain
the date and time of event registration, or the date and time when the event regenerate counter value
increased if the conditions for event registration were repeated during the event regenerate timeout. The
value of the regenerate counter is displayed in the Total appearances column. For an incident, this is the
latest date and time of last occurrence of events that are part of the incident. Just like with the Start
column, you can view the date together with the time, or just the date or time by itself.
Title
Header de ned for the event type.
242
Severity
This icon corresponds to the importance level of an event or incident.
Source
Address of the source of network packets (the abbreviated names for display in table cells are speci ed in
parentheses):
IP address
MAC address
VLAN ID (VID)
Application-level address
Destination
Address of the destination of network packets (the abbreviated names for display in table cells are speci ed
in parentheses):
IP address
MAC address
VLAN ID (VID)
Application-level address
Protocol
Application layer protocol that was being monitored when the application registered the event.
Technology
This icon corresponds to the technology that was used to register the event.
Total appearances
For an event that is not an incident, this is the value of the regenerate counter after the event is registered
within the event regenerate timeout. A value greater than 1 means that the conditions for event registration
were repeated N – 1 times. The value 1 is displayed for the incident in this column.
ID
Unique ID of the registered event or incident.
Status
This icon corresponds to the status of an event or incident.
Description
Description speci ed for the event type.
End
243
For an event that is not an incident, this is the date and time when the Resolved status was assigned, or the
date and time of the event regenerate timeout. For an incident, this is the latest date and time of the end of
events that are part of the incident. Just like with the Start column, you can view the date together with the
time, or just the date or time by itself.
Triggered rule
For an event that is not an incident, this is the name of the Process Control rule or Intrusion Detection rule
whose triggering caused the registration of the event. For an incident, this is the name of the correlation rule
whose triggering caused the registration of the incident.
Monitoring point
Monitoring point whose tra ic invoked registration of the event.
Event type
Numerical code assigned to the event type.
Marker
This is a selection of icons that you can set for any event or incident so that you can easily nd events and
incidents based on a criterion that is not in the table.
5. If you want to change the order in which columns are displayed, select the name of the column that you want to
move to the left or right in the table and use the buttons containing an image of the up or down arrows.
For the Start, Last seen and End columns, you can also change the order in which the date and time are
displayed. For the Source and Destination columns, you can change the order of the addresses of the senders
and recipients of network packets. To do so, select the value that you want to move to the left or right in the
table and use the buttons containing an image of the up or down arrows.
The selected columns will be displayed in the Events section in the table in the order you speci ed.
The right part of the web interface window will show the details area, which displays detailed information about
the selected event or incident.
The capability to load information is available if no more than 200 events are selected, not including incidents (if
incidents are selected, information is loaded for the rst 200 events selected, including events of the selected
incidents). The assets table displays information for no more than 200 assets associated with events.
244
1. Select the Events section.
2. In the events table, select the events and/or incidents for which you want to view asset information.
The details area appears in the right part of the web interface window.
The Assets section opens. The assets table will be ltered based on the IDs of assets corresponding to the
selected events.
2. In the events table, select the events and/or incidents whose status you want to change. The selected events
and/or incidents must have the New status.
The details area appears in the right part of the web interface window.
3. Click the In progress button. The button is not available if the In progress or Resolved status is assigned to the
selected events and incidents. If all events and incidents that satisfy the current lter and search settings are
selected, and the number of selected elements is more than 1000, the application does not check their
statuses. In this case, the In progress button is available.
A window with a con rmation prompt opens.
2. In the events table, select the events and/or incidents whose status you want to change. The selected events
and/or incidents must have the New or In progress status.
The details area appears in the right part of the web interface window.
3. Click the Resolved button. The button is not available if the Resolved status is assigned to the selected events
and incidents. If all events and incidents that satisfy the current lter and search settings are selected, and the
number of selected elements is more than 1000, the application does not check their statuses. In this case, the
button with the Resolved status name is available.
A window with a con rmation prompt opens.
A marker is an icon that lets you easily nd events and incidents based on a criterion that is absent from the table.
1. In the Events section, left-click to open the context menu in the cell of the Marker column for the row
containing the relevant event or incident.
2. In the context menu, select the marker that you want to set for this event or incident.
You can select one of the seven markers provided in the application. You choose the purpose of each marker on
your own.
The capability to copy events is available if no more than 200 events are selected (including within the selected
incidents).
2. In the events table, select the events and/or incidents whose information you want to copy to a text editor.
The details area appears in the right part of the web interface window.
Copy details of the event, if you are copying one event or incident.
Copy details of the selected events, if you are copying multiple events and/or incidents.
6. Paste the details into the text editor window (for example, by pressing the key combination CTRL+V).
The copied event details can be edited in the text editor. Information about multiple events will be separated by
an empty line.
Exporting events to a le
246
You can export information about events and/or incidents to a CSV le. The information is exported from the
columns that are currently displayed in the table.
2. In the events table, select the events and/or incidents whose information you want to export to a le.
To export information about all events and incidents that satisfy the current lter and search settings, you
can select all events and incidents in the table or use the Export button in the toolbar of the Events
section. Clicking the Export button immediately starts the process for generating a CSV le.
After events and/or incidents are selected, the details area appears in the right part of the web interface
window.
3. Depending on the number of selected elements, click the Export event or Export the selected events button.
4. If it takes a long time (more than 15 seconds) to create the le, the le creation operation is transferred to the
list of background operations. In this case, to download the le:
This opens the standard web browser window for saving a le.
5. In the opened window, specify the name of the le and folder in which you want to save the le.
The capability to load tra ic is available if no more than 200 events are selected in the events table (including
events within incidents).
Tra ic for events is loaded from the application database. The database saves tra ic only when registering
events for which tra ic saving is enabled. The application can also save tra ic in the database directly by
requesting to load tra ic using tra ic dump les. These les are intended for temporarily saving tra ic and
are automatically deleted as more and more tra ic is received from the industrial network (the frequency of
le deletion depends on the amount of tra ic received). To ensure that tra ic is loaded, it is recommended to
enable the saving of tra ic for the relevant event types and con gure the settings for saving tra ic in the
database in accordance with the rate of tra ic and registration of events.
247
To load a tra ic le for events and/or incidents:
2. In the events table, select the events and/or incidents whose tra ic you want to load.
The details area appears in the right part of the web interface window.
3. Depending on the number of selected elements, click the Load tra ic for the event or Load tra ic for the
selected events button.
4. If it takes a long time (more than 15 seconds) to create the le, the le creation operation is transferred to the
list of background operations. In this case, to download the le:
This opens the standard web browser window for saving a le.
5. In the opened window, specify the name of the le and folder in which you want to save the le.
The set of displayed process parameters is determined by Process Control tags. Only tags for which there are
Process Control rules for them. You can generate lists of Process Control rules and tags in the Application
Console on the Process control tab. For information on con guring Process Control, please refer to the Process
Control section.
The application does not save the tag values displayed in online mode. The names and values of tags may be saved
in events registered based on Deep Packet Inspection technology (the tag values received when the event is
registered are saved in the event). To save the names and values of tags, the variable $tags must be present in the
settings of event types.
You can view tags with the values of process parameters in the Tags section of the Kaspersky Industrial
CyberSecurity for Networks web interface.
Connect to the Kaspersky Industrial CyberSecurity for Networks Server through a web browser and select the
Tags section.
248
The web browser window will display a table containing the tags and their current values. The current tag
processing rate is displayed in the Tags row in the upper part of the window.
To sort tags:
In the table of tags, click the header of the column by which you want to sort.
The table will be sorted by the selected column. Next to the header of the column you will see an icon displaying
the current sorting order: in ascending order or descending order of values.
249
Application interaction with Kaspersky Security Center
This section contains information about con guring interaction between the application and Kaspersky Security
Center, and about using Kaspersky Security Center functions to receive a license key, download updates for
application modules and databases, and monitor events and the security state of the ICS.
To enable interaction between Kaspersky Industrial CyberSecurity for Networks and Kaspersky Security Center,
the following conditions must be ful lled:
The capability for application interaction with Kaspersky Security Center was added during installation of the
Server. If this functionality was not added, add it.
The Kaspersky Industrial CyberSecurity for Networks Administration Plug-in for Kaspersky Security Center is
installed in Kaspersky Security Center.
The computer on which the Kaspersky Industrial CyberSecurity for Networks Server is installed is included in
the Kaspersky Security Center administration group (in the Managed devices group or its subgroup). For
detailed information on moving managed assets to administration groups, please refer to the Kaspersky
Security Center Help system.
To connect, you must install and con gure the following VNC components:
VNC server. It is installed on the computer that performs functions of the Kaspersky Industrial CyberSecurity
for Networks Server. When con guring the VNC server, you need to set a password for the VNC connection. If
a rewall is enabled on the computer, you also need to open the ports for the VNC and SSH protocols.
VNC client. It is installed on the computer that has the Kaspersky Security Center Administration Console.
To access the Kaspersky Industrial CyberSecurity for Networks Console from Kaspersky Security Center:
2. In the Kaspersky Security Center Administration Console tree, in the Managed devices folder, select the
administration group containing the computer on which the Kaspersky Industrial CyberSecurity for Networks
Server is installed.
3. In the workspace on the Assets tab, select the computer hosting the Kaspersky Industrial CyberSecurity for
Networks Server, and select External tools → VNC in the context menu of the computer.
By default, the VNC tool is absent from the list of external tools. To add the tool, in the context menu of the
computer, select External tools → Con gure external tools. In the External tools window, click the Add
button and specify the following values of settings:
In the Tool name eld, enter any name for the tool (for example, VNC).
In the Executable le name eld, enter the full path to the executable le of the VNC client (for example,
C:\Program Files\TightVNC\tvnviewer.exe).
250
In the Working directory eld, enter the full path to the working folder of the VNC client (for example,
C:\Program Files\TightVNC\).
Select the Create tunnel for TCP port speci ed below check box and enter the number of the VNC port
on the VNC server (for example, if the VNC server uses screen :3, enter the VNC port number 5903).
4. After the external VNC tool is started, a password prompt window appears. Enter the password for the VNC
connection.
The opened window displays the desktop of the computer on which the Kaspersky Industrial CyberSecurity for
Networks Server is installed. If the Application Console is not running, start it.
To distribute a license key, you need to rst add it to the Kaspersky Security Center Administration Server
repository. You can add a license key to the Administration Server repository from a license key le.
Automatic distribution of a license key is possible if the computer hosting the Kaspersky Industrial CyberSecurity
for Networks Server is in the administration group in the Managed devices folder within the Kaspersky Security
Center Administration Console tree. If the computer hosting the Kaspersky Industrial CyberSecurity for Networks
Server is not in the administration group, you need to add it.
For detailed information about licensing managed applications in Kaspersky Security Center and for descriptions
of the actions required for automatic distribution of keys, please refer to the Kaspersky Security Center Help
system.
To use the Kaspersky Security Center Administration Server as the source of updates for databases and
application modules of Kaspersky Industrial CyberSecurity for Networks:
1. In the Kaspersky Security Center Administration Console, create and con gure the "Download updates to the
Administration Server repository" task.
For detailed information on creating and using the "Download updates to the Administration Server repository"
task, please refer to the Kaspersky Security Center Help system.
2. In the Kaspersky Industrial CyberSecurity for Networks Console, select the Kaspersky Security Center
Administration Server as the source of updates.
251
3. Select the update run mode, or manually start an update if updates have already been downloaded to the
Administration Server.
Time means the Kaspersky Industrial CyberSecurity for Networks event registration time in the time zone of
the computer where Kaspersky Security Center is installed.
Asset means the name of the managed device in Kaspersky Security Center (the computer on which
Kaspersky Industrial CyberSecurity for Networks Server is installed).
Event means the name of the Kaspersky Security Center event type de ned for events of Kaspersky Industrial
CyberSecurity for Networks.
Description means the title and brief description of the Kaspersky Industrial CyberSecurity for Networks
event.
Group is the name of the administration group that contains the computer hosting the Kaspersky Industrial
CyberSecurity for Networks Server in the Managed devices folder in the Kaspersky Security Center
Administration Console tree.
Application means the application name (Kaspersky Industrial CyberSecurity for Networks).
Severity means the importance level of the event based on how importance is typi ed by Kaspersky Security
Center.
Registered means the time at which the event was registered in the Kaspersky Security Center database.
You can con gure the contents of elds displayed in the events table. For descriptions of how to add or remove
elds in the tables, please refer to the Kaspersky Security Center Help system.
The parameter values of events relayed from Kaspersky Industrial CyberSecurity for Networks are displayed
according to the localization settings of Kaspersky Industrial CyberSecurity for Networks. The localization
language of Kaspersky Security Center is disregarded for these parameters.
If a Kaspersky Industrial CyberSecurity for Networks event contains information about multiple network
interactions, this event is converted into separate items of the Kaspersky Security Center events table. This way,
individual events are created in Kaspersky Security Center for each network interaction speci ed in a Kaspersky
Industrial CyberSecurity for Networks event.
To have events of Kaspersky Industrial CyberSecurity for Networks displayed in the Kaspersky Security Center
events table:
1. Make sure that the required components are installed in Kaspersky Industrial CyberSecurity for Networks and
Kaspersky Security Center.
2. In the Kaspersky Industrial CyberSecurity for Networks Administration Plug-in for Kaspersky Security Center,
con gure the receipt of the relevant types of events for all event severity levels. For detailed information on
252
con guring the receipt of Kaspersky Security Center events, please refer to the Kaspersky Security Center
Help system.
3. In the Kaspersky Industrial CyberSecurity for Networks Console, select the Con gure events tab.
4. Add Kaspersky Security Center as a recipient of events. This recipient is added automatically if the capability
to transmit events to Kaspersky Security Center is enabled when the security policy is created in Kaspersky
Industrial CyberSecurity for Networks.
5. In the list, specify the types of events that you want to send to Kaspersky Security Center. If a recipient was
added automatically for Kaspersky Security Center, transmission of all system types of events with the Critical
severity is enabled by default for this recipient.
6. In the Manage security policy menu in the Application Console window, apply the security policy.
If a rewall is enabled on the computer that performs functions of the Kaspersky Industrial CyberSecurity
for Networks Server, you need to check the con gured rewall settings. To ensure that events are
transmitted, the rewall must be con gured to allow transmission through the SSL port that was speci ed
for connecting to the computer with Kaspersky Security Center during installation of the Kaspersky
Industrial CyberSecurity for Networks Server.
When the speci c types of events are registered in Kaspersky Industrial CyberSecurity for Networks, these
events will also be displayed in the Kaspersky Security Center events table.
Types of events in Kaspersky Security Center for receiving events of Kaspersky Industrial CyberSecurity for Networks
Displayed name of the event type Registration as a Corresponding event type code in
Kaspersky Security Kaspersky Industrial CyberSecurity
Center incident for Networks
253
Process Control rule violation Only events with the 4000002900
Critical severity level
Intrusion Detection rule from the system no 4000003000
set of rules was triggered
254
Correlation rule event registered Only events with the 8000000000, 8000000001,
Critical severity level 8000000002, 8000000003
Kaspersky Security Center event Kaspersky Industrial CyberSecurity for Networks event
severities severity
Warning Warning
Monitoring the ICS security state: Kaspersky Security Center and SCADA
Kaspersky Industrial CyberSecurity for Networks can relay data about the ICS security state to Kaspersky
Security Center. To transmit data to Kaspersky Industrial CyberSecurity for Networks and Kaspersky Security
Center, the required components must be installed.
If the transmission of ICS security state data to Kaspersky Security Center has been con gured, you can
con gure the SCADA system to receive the corresponding information from Kaspersky Security Center.
2. In the Kaspersky Security Center Administration Console tree, in the Managed devices folder, select the
administration group containing the computer on which the Kaspersky Industrial CyberSecurity for Networks
Server is installed.
Information about the computer status will be displayed in the section for working with the selected object,
which appears on the right in the workspace of the selected group.
3. If the section for working with the selected object does not appear, open it by using the right border of the
table containing the list of managed devices.
255
The computer status of the Kaspersky Industrial CyberSecurity for Networks Server corresponds to the ICS
security state. The security state of the ICS is determined based on the presence of unprocessed incidents of
Kaspersky Security Center. Kaspersky Security Center incidents are registered when certain types of events of
Kaspersky Industrial CyberSecurity for Networks are received.
The color of the icon of the Kaspersky Industrial CyberSecurity for Networks Server computer corresponds to
one of the following ICS security states:
Red color: Critical status. There are unprocessed incidents of Kaspersky Security Center. This status is
displayed if the Unprocessed incidents detected condition is enabled for the selected administration group in
the list of conditions of the Critical status (enabled by default).
Yellow color: Warning status. There are unprocessed incidents of Kaspersky Security Center. This status is
displayed if the Unprocessed incidents detected condition is enabled for the selected administration group in
the list of conditions of the Warning status (and if this condition is disabled for the Critical status).
Green color: OK status. There are no unprocessed incidents of Kaspersky Security Center.
A green icon with the OK status may be displayed even if there are unprocessed incidents of Kaspersky
Security Center. This is possible if the Unprocessed incidents detected condition is disabled for the
selected administration group in the lists of conditions for the Warning and Critical statuses. To correctly
display the ICS security state, you must enable the speci ed condition in the list of conditions for at least
one of the Warning or Critical statuses.
To con gure SCADA system to receive and display the ICS security state:
1. Install Kaspersky Security Gateway on the computer hosting Kaspersky Security Center.
You can nd detailed information on installing and con guring Kaspersky Security Gateway in the Kaspersky
Security Gateway Administrator's Guide.
2. In the SCADA system, create a control element that re ects the state of the computer with Kaspersky
Industrial CyberSecurity for Networks.
3. Con gure the created control element to receive data over the OPC DA 2.0 or IEC 60870-5-104 protocol.
Instructions on con guring the control element are provided in the Kaspersky Security Gateway Administrator's
Guide.
256
Troubleshooting
This section contains a description of possible problems in the operation of Kaspersky Industrial CyberSecurity for
Networks and methods for resolving them.
Problem
During installation of the application, there is a message stating that a node is unavailable for component
installation due to failure to connect over the SSH protocol. The component is not installed on this node.
Solution
Installation of the application component is impossible if the address information or network name of the
computer was changed after con guring access over the SSH protocol on the node for component installation. To
install the application component, you must restore access to the remote computer over the SSH protocol.
To restore access over the SSH protocol and install the application component:
1. On the computer from which the installation of application components is performed, update the key used for
connecting to the node over the SSH protocol. To do so, sign in to the system using the account credentials of
the user account used to install the application, and enter the following command in the operating system
console:
sudo ssh-keygen -R <node IP address>
2. Reinstall the application with the same installation settings. During reinstallation, make sure that there is no
message stating that the node is unavailable for component installation.
Problem
Depending on the method used to connect to the Server, the application informs of operating issues in the
following ways:
When connected through the web interface – the upper part of the application web interface menu displays a
red icon next to the button.
When connected through the Application Console – the Console status bar displays a red icon and an error
message.
Solution
257
This state of Kaspersky Industrial CyberSecurity for Networks signi es that one of the application processes is
malfunctioning.
2. If the malfunction persists, please contact Kaspersky Technical Support. Be prepared to submit process logs of
Kaspersky Industrial CyberSecurity for Networks and other system data when requested by Technical Support
representatives. Process logs are located in the folders that are listed in the Folders for storing application data
section. Root privileges in the operating system are required for providing access to logs.
Problem
A new application message appeared on the Application messages tab in the Settings section (when connected
to the Server through the web interface).
Messages requiring attention are indicated by a red or yellow icon next to the button in the web interface
menu. If the icon is displayed, this means that there is a message regarding disruption of application operation
or about a non-critical malfunction, and this problem has not been resolved. To view information, you can go to
the Application messages tab by using the button when a red or yellow icon is displayed next to this
button.
Solution
Read the concise information in the message on the Application messages tab. Based on this information, you can
make a decision on the necessary actions.
The next steps depend on the message status. The following statuses are available for messages:
Normal operation – in most cases, the message does not require a response. However, there may be situations
requiring additional clari cation of the circumstances. For example, this may be necessary when you receive a
message about the successful application of a security policy when you do not know why this action was taken.
State unknown, Malfunction – if the message just recently appeared, wait 20–30 seconds and check the
current state of the application. You can view information about the current state of the application in the
Console window.
Moderate malfunction, Critical malfunction or Fatal malfunction – the application is malfunctioning. If the issue
could not be resolved, please contact Kaspersky Technical Support. Be prepared to submit process logs of
Kaspersky Industrial CyberSecurity for Networks and other system data when requested by Technical Support
representatives. Process logs are located in the folders that are listed in the Folders for storing application data
section. Root privileges in the operating system are required for providing access to logs.
258
Not enough free space on hard drive
Problem
There is not enough free space on the computer hard drive where the application Server or sensor is installed.
Solution
The computer must meet the hardware and software requirements to ensure proper functioning of application
components.
1. On the hard drive of the computer, free up su icient space to satisfy the minimum free disk space
requirements.
Problem
The application has registered an event whose description contains the following text: No traffic at
monitoring point. The event description includes the duration of the absence of tra ic, the name of the
monitoring point, and the network interface that is not receiving tra ic.
Solution
For tra ic to arrive at the monitoring point, the following conditions must be met:
On the network interface of the monitoring point, the network cable is connected to the Ethernet port.
The rate of incoming tra ic is more than 0 bps at the network interface of the monitoring point.
You can view information about monitoring points and network interfaces when connected to the Server through
the web interface in the Settings section on the Deployment tab.
If the displayed rate of incoming tra ic is 0 bps at the network interface of the monitoring point, verify that the
following conditions are met:
The network interface of the monitoring point is correctly con gured in the operating system.
When the network interface is connected to the industrial network switch, transmission of mirrored tra ic
through the connection port (SPAN) must be correctly con gured on the network switch.
259
Unknown state of the application
Problem
The Console status bar shows a gray icon and a text message containing a description of a problem (for example,
regarding the unknown state of a node that has application components installed).
Solution
This state of Kaspersky Industrial CyberSecurity for Networks signi es that the application was unable to connect
to an application component or process.
Wait 20–30 seconds. The application state will change. The following options are available:
If the problem was not reproduced, the gray icon and message will no longer be displayed in the status bar of
the Console.
If the problem persists, the application will inform of any operating issues.
Problem
Cannot load tra ic for the selected events and/or incidents. The events table either does not display the tools for
loading tra ic (for example, the Load tra ic for the event button is missing from the details area when one event
is selected), or displays the message No traffic for the selected events (when attempting to load tra ic).
Solution
Saved tra ic for the selected events and/or incidents may be missing for one of the following reasons:
The application saves tra ic during event registration if the saving of tra ic is enabled for the speci c type of
event. By default, saving of tra ic is disabled for all types of events. You can enable and con gure the saving of
tra ic for relevant types of events.
You cannot enable saving of tra ic for event types that are registered as incidents (event type codes:
8000000000, 8000000001, 8000000002 and 8000000003). To save tra ic associated with incidents, you need
to enable the saving of tra ic for the types of events that result in registration of incidents.
Various event types may be used to register incidents. The utilized event types are determined by event
correlation rules. However, event correlation rules may be changed when application updates are installed.
260
You can determine the approximate composition of event types used for incidents by viewing events in previously
registered incidents. However, the list of event types obtained in this way will be incomplete. Other types of events
may be used in subsequently registered incidents (for example, due to changes in correlation rules after installation
of updates). If you want the application to always save tra ic for all events within incidents, you can enable the
saving of tra ic for all system event types (for which it is possible to enable saving of tra ic).
The application deletes saved tra ic for registered events when one of the tra ic storage limits is reached (for
example, upon reaching the maximum volume of saved tra ic in the database). Tra ic packets that were saved
before other packets are deleted from the database. If saved tra ic is deleted too quickly and you do not have
time to load it for relevant events, you can increase the maximum values of tra ic storage settings.
Problem
Preventative maintenance and adjustment operations on the ICS can create a large number of important and
critical events in Kaspersky Industrial CyberSecurity for Networks.
Solution
While conducting preventive maintenance and adjustment operations, you can select one of the following options
for resolving this problem:
Leave all monitoring points enabled on the Server and on application sensors. In this case, when viewing
information about events and interactions of assets, take into account the time and list of preventive
maintenance and adjustment operations to be conducted.
Disable the monitoring points that receive tra ic from industrial network segments where preventative
maintenance and adjustment operations will be conducted. For example, if the work will be conducted in only
one shop, you can disable the monitoring point that receives tra ic from this shop and leave all other
monitoring points enabled.
Disable all monitoring points on all nodes that have application components installed. You can select this option
if preventative maintenance and adjustment operations are to be conducted throughout the entire industrial
network.
If you have disabled monitoring points, to resume control of the protected ICS you need to re-enable the
monitoring points immediately after completion of preventative maintenance and adjustment operations.
Bear in mind that intruders may attempt to gain unauthorized access to the network during maintenance and
commissioning operations on the ICS. Follow the security regulations and procedures in place at your enterprise
when deciding to disable monitoring points.
If the composition or settings of the industrial network equipment were changed while conducting preventative
maintenance and adjustment operations (for example, MAC addresses and IP addresses), make the appropriate
changes for Process Control, Network Control, and Asset Management.
Problem
261
Unexpected restart of a computer hosting a component of Kaspersky Industrial CyberSecurity for Networks.
Solution
Wait for the computer reboot to nish. After the computer has restarted, the following states of Kaspersky
Industrial CyberSecurity for Networks are possible:
Normal operation of Kaspersky Industrial CyberSecurity for Networks has not resumed.
The application informs of detected operating issues.
If the malfunction persists, restart the services that support operation of application components. If the problem
is not resolved after the restart, please contact Kaspersky Technical Support. Be prepared to submit process logs
of Kaspersky Industrial CyberSecurity for Networks and other system data when requested by Technical Support
representatives. Process logs are located in the folders that are listed in the Folders for storing application data
section. Root privileges in the operating system are required for providing access to logs.
Problem
If the settings from a backup copy were not restored after reinstalling the Kaspersky Security Center
Administration Server, the Kaspersky Security Center Administration Console does not show the computer on
which Kaspersky Industrial CyberSecurity for Networks is installed.
Solution
To restore synchronization of Network Agent, you can restore the settings of the Kaspersky Security Center
Administration Server by using the klbackup utility. The klbackup tool is included in the Kaspersky Security Center
distribution package. For detailed information on backup copying and restoring the settings of the Kaspersky
Security Center Administration Server, please refer to the Kaspersky Security Center Help system.
If for some reason it is not possible to restore the settings of the Kaspersky Security Center Administration Server
using the klbackup utility, you can restore synchronization of Network Agent by using the klmover utility that is
included in Network Agent.
1. On the computer that performs functions of the Kaspersky Industrial CyberSecurity for Networks Server, open
the operating system console and go to the folder /opt/kaspersky/klnagent64/bin/.
262
3. After the klmover utility nishes, check the connection of Network Agent to the Kaspersky Security Center
Administration Server. To do so, type the following command in the command line:
sudo ./klnagchk
The screen will display information about the connection to the Administration Server.
After Network Agent synchronization is successfully restored, the Kaspersky Security Center Administration
Console will show the computer on which Kaspersky Industrial CyberSecurity for Networks is installed.
Problem
When attempting to connect to the Server through a web browser, the Kaspersky Industrial CyberSecurity for
Networks web interface page does not load.
Solution
Possible situations:
There is no network access to the computer hosting the Kaspersky Industrial CyberSecurity for Networks
Server with the web server installed. Check the connection with the computer based on the speci ed Server
name (for example, using the ping command).
Incorrect data has been entered into the web browser address bar. Enter the Server IP address or computer
name that was speci ed during installation of the Web Server. If the default port 443 is set, you do not have to
specify the port number. If a di erent port number is set, enter the full address https://<Server name>:
<port> in the address bar.
JavaScript is disabled in the web browser. A message about this is displayed on the connection failure warning
page. In the web browser settings, enable the execution of JavaScript and refresh the page.
Access to the Server computer is blocked by the rewall. Properly con gure the rewall that is being used.
When connecting to the Server, the web browser displays a certi cate
warning
Problem
When attempting to connect to the Server, the web browser displays a warning stating that the security
certi cate or established connection is not trusted. The contents of the warning depend on the speci c web
browser being used.
Solution
The warning means that a self-signed certi cate is being used on the web server. To use a trusted certi cate, you
need to contact the administrator.
263
You can temporarily use a self-signed certi cate to connect to the Server (for example, when testing the
operation of Kaspersky Industrial CyberSecurity for Networks). When using a self-signed certi cate, in the web
browser warning window select the option that lets you continue connecting. After connecting to the Server, the
web browser window will display a warning message about the certi cate. The text of the message depends on the
speci c web browser being used.
264
Contacting Technical Support
This section describes the ways to get technical support and the terms on which it is available.
Before contacting Technical Support, please carefully read the technical support rules .
You can contact Technical Support experts in one of the following ways:
Submit a request to Kaspersky Technical Support through the Kaspersky CompanyAccount portal .
You can register all of your organization's employees under a single account on Kaspersky CompanyAccount. A
single user account lets you centrally manage electronic requests from registered employees to Kaspersky and
also manage the privileges of these employees via Kaspersky CompanyAccount.
English
Spanish
Italian
German
Polish
Portuguese
Russian
French
Japanese
To learn more about Kaspersky CompanyAccount, please visit the Technical Support website .
265
Collecting information for Technical Support
Kaspersky Technical Support experts may request your logs from Kaspersky Industrial CyberSecurity for Networks
and other system data.
Logs are located on computers that have components of Kaspersky Industrial CyberSecurity for Networks
installed. Information about the folders used for storing logs is provided in the Folders for storing application data
section.
Root privileges in the operating system are required for providing access to logs.
Kaspersky Technical Support experts may also request additional data on the application components. This data
can be obtained using the application installation script kics4net-deploy-<application version number>.bundle.sh.
1. On the computer from which the installation was performed, go to the folder containing the saved les from
the distribution kit of Kaspersky Industrial CyberSecurity for Networks.
2. Enter the command for running the application installation script with the gather-artefacts parameter:
bash kics4net-deploy-<application version number>.bundle.sh \
--gather-artefacts -<parameter> <folder name>
where:
<folder name> – name of the folder used for copying archived data les.
Example:
bash kics4net-deploy-<application version number>.bundle.sh \
--gather-artefacts -a /tmp/data_for_support
3. In the SSH password and SUDO password invitations, enter the password for the user account that was used
to run the installation of application components.
Wait for completion of the script kics4net-deploy-<application version number>.bundle.sh. Upon successful
completion, les will be created in the speci ed folder.
266
Sources of information about the application
You can use the following sources to independently nd information about Kaspersky Industrial CyberSecurity for
Networks:
Kaspersky Industrial CyberSecurity for Networks page on the Technical Support website (Knowledge Base).
Online Help.
If you cannot nd a solution to an issue on your own, please contact Kaspersky Technical Support.
On the Kaspersky Industrial CyberSecurity for Networks page , you can view general information about the
application, its functions and features.
The Kaspersky Industrial CyberSecurity for Networks page in the Knowledge Base provides articles containing
useful information and recommendations on application use.
Online Help
Preparing to install, installing, and uninstalling Kaspersky Industrial CyberSecurity for Networks.
Interaction between Kaspersky Industrial CyberSecurity for Networks and Kaspersky Security Center.
Online Help also contains information about the common tasks that users can perform with the application
depending on the available permissions in Kaspersky Industrial CyberSecurity for Networks.
Online Help includes documentation for the Kaspersky Industrial CyberSecurity for Networks API. This
documentation serves as the Developer's Guide for the Kaspersky Industrial CyberSecurity for Networks API. In
the Kaspersky Industrial CyberSecurity for Networks API Developer's Guide, you can nd information on
performing the following tasks:
267
Remotely calling procedures for receiving data from Kaspersky Industrial CyberSecurity for Networks and for
sending data to the application.
268
Appendices
This section provides information that complements the main document text with examples, reference
information, and additional data.
1. On computer 1 and computer 2, set the same password for the root user account (application components will
be installed under this user account).
To set a password, you can enter the sudo passwd root command in the command line.
2. On computer 1, create the kics4net_startuser account. This account will be used to run the application
installation script. After the application is installed, this account will also be allowed to start the Application
Console.
The kics4net_startuser account does not need to run commands with root privileges. To create the account,
you can enter the sudo useradd kics4net_startuser command in the command line. After creating the
account, you can set a password for it by using the sudo passwd kics4net_startuser command.
3. Find out and save the following information about the computers:
IP address of computer 2.
Name or IP address and SSL port of the computer with Kaspersky Security Center.
To display the computer name, you can enter the hostname command in the command line. To display
information about IP addresses and network interfaces, you can enter the sudo ifconfig command in the
command line (in a Windows operating system, use the ipconfig command).
4. On computer 1, verify that you can access computer 2 over the SSH protocol.
To connect:
b. After entering this command, perform the necessary actions at the operating system prompts.
5. On computer 1, sign in to the system using the kics4net_startuser account and create the folder
/home/kics4net_startuser/kics4net_install/.
269
6. Copy the following les from the Kaspersky Industrial CyberSecurity for Networks distribution kit to the folder
you created:
Package for installing the Server and sensors: kics4net-<application version number>.x86_64.rpm
Package for installing Network Agent from the Kaspersky Security Center distribution kit: klnagent64-
<Network Agent version number>.x86_64.rpm
9. Select the language that you want to use in the installation menu.
10. After you select the language for the installation menu, the application veri es the checksums of packages in
the folder containing the saved les from the distribution kit. Wait for validation of the package checksums to
complete.
11. In the menu for selecting the installation option, select Run new installation.
The main installation menu appears on the screen.
12. Select the Add Server menu item and specify the main settings of the Server in the prompts that follow:
Enter the IP address of the node for installation – type the IP address of computer 1.
Enter the IP address for connections to the Server – re-enter the IP address of computer 1.
Enter Server name – type any Server name that is unique in Kaspersky Industrial CyberSecurity (for
example, Server_1).
Add the capability for application interaction with Kaspersky Security Center – type y, and in the
prompts that follow, enter the IP address/name of the computer with Kaspersky Security Center and the
SSL port for connection.
Enter the IP address or name of the computer with the web server – type the IP address / name of
computer 1.
Enter the web server port number – type port number 443.
Enter an application user name – type the application user name kics4net_admin.
270
Use self-signed certi cates to connect to web server – type y to con rm the use of a self-signed
certi cate for the Web Server. If you have a certi cate that was published by a trusted certi cate authority,
to use this certi cate type n at this prompt and then y at the prompt to Use trusted certi cates to
connect to web server. To use a trusted certi cate, you must specify the path to the trusted certi cate
le.
If you want to use a trusted certi cate in the application, it must be issued for the same IP address or
computer name that will be indicated by application users when connected through the web interface.
To load a trusted certi cate, you can use a PFX le containing the saved trusted certi cate and private
key. The le must be created without a de ned password for accessing the contents.
Enter the operating system user name for starting the Console – type the user name
kics4net_startuser. This user will be allowed to start the Application Console.
13. Select the Add sensor menu item and specify the main settings of the sensor in the prompts that follow:
Enter the IP address of the node for installation – type the IP address of computer 2.
Enter sensor name – type any name that is unique for a sensor in Kaspersky Industrial CyberSecurity (for
example, Sensor_1).
14. Select the Change interface language menu item, and select the localization language for components of
Kaspersky Industrial CyberSecurity for Networks in the menu that appears.
15. When nished con guring the settings, select Save settings and start installation.
16. When the screen displays a message prompting you to read the terms of the End User License Agreement and
Privacy Policy, press ENTER.
The text of the End User License Agreement will appear on the screen.
18. Select I con rm that I have fully read, understand, and accept the terms and conditions of this End User
License Agreement.
19. When you see a message about viewing the Privacy Policy, press ENTER.
The text of the Privacy Policy will appear on the screen.
21. Select I understand and agree that my data will be processed and transmitted (including to third-party
countries) in accordance with the Privacy Policy. I con rm that I have fully read and understand the terms
of the Privacy Policy.
After you accept the terms of the Privacy Policy, the screen will prompt you to enter the password of the user
running the installation.
22. Enter the root user password. The password must be entered twice: rst in the SSH password prompt and
then in the SUDO password prompt.
271
The installation script will begin the installation of components. During installation, the screen will display service
messages regarding operations being completed.
23. When the prompt appears for entering the password of the user kics4net_admin, enter the new password for
this user.
After installation is complete, Kaspersky Industrial CyberSecurity for Networks does not monitor the industrial
network (monitoring points have not been added to network interfaces of nodes that have application
components installed). To use the application, you need to perform the necessary actions to prepare the
application for operation.
4000002900 Process Control rule Critical A Process Control rule con gured with this
violation: $ruleName event type was triggered.
The following variables are used in the title
and description of an event type:
$ruleName – name of the rule.
4000000001 Test event (DPI) Informational A test network packet was detected.
272
4000002602 $systemCommandShort Determined by the A monitored system command was
importance level of detected (and no active Network Control
the system rule was created for the system
command command).
The following variables are used in the
title and description of an event type:
$systemCommandShort – brief
description of the detected system
command.
$systemCommandFull – detailed
description of the detected system
command.
4000002700 No tra ic at the monitoring Warning The network interface linked to the
point named $monitoringPoint monitoring point has not received tra ic
in more than 15 seconds.
The following variables are used in the
title and description of an event type:
$monitoringPoint – name of the
monitoring point.
4000000002 Test event (NIC) Informational A test network packet was detected
273
(when Network Integrity Control is
enabled).
4000003000 Rule from the $ leName set Determined An Intrusion Detection rule in the system
(system set of rules) was based on the set of rules was triggered (the rule set is
triggered rule priority in active state).
The following variables are used in the
title and description of an event type:
$ leName – name of the rule set.
4000003001 A rule from the $ leName set Determined An Intrusion Detection rule in the custom
(custom set of rules) was based on the set of rules was triggered (the rule set is
triggered. rule priority in active state).
The following variables are used in the
title and description of an event type:
$ leName – name of the rule set.
4000005100 IP protocol anomaly detected: Critical IP protocol anomaly detected: data does
data con ict when assembling not match when overlaying fragments of
IP packet an IP packet.
4000005101 IP protocol anomaly detected: Critical An IP protocol anomaly was detected: the
fragmented IP packet size actual total size of a fragmented IP
exceeded packet after assembly exceeds the
acceptable limit.
4000005102 IP protocol anomaly detected: Critical An IP protocol anomaly was detected: the
the size of the initial fragment size of the initial fragment of an IP packet
of the IP packet is less than is less than the minimum permissible
expected value.
4000002701 TCP protocol anomaly Critical TCP protocol anomaly detected: packets
detected: content substitution contain overlapping TCP segments with
in overlapping TCP segments varying contents.
4000000003 Test event (IDS) Informational A test network packet was detected (with
rule-based Intrusion Detection enabled).
4000005003 Detected new asset Critical Asset Management monitoring mode resulted in
with the address the automatic addition of a new asset based on
$owner_ip_or_mac a detected IP address or MAC address that has
not been speci ed for other assets in the table.
The following variables are used in the title and
description of an event type:
275
$owner_ip_or_mac – IP or MAC address of
the asset.
276
$challenger_id – ID of the asset that used
the IP address.
4000005006 Detected tra ic from Critical In Asset Management monitoring mode, activity
address was detected from an asset that was assigned
$owner_ip_or_mac, the Archived status.
which is assigned to an
The following variables are used in the title and
asset with the Archived
description of an event type:
status
$owner_ip_or_mac – IP or MAC address of
the asset.
4000005010 Detected new MAC Critical Asset Management monitoring mode resulted in
address the detection of a new MAC address used by an
$new_mac_addr for asset (autoupdate of address information is
asset with the IP disabled for the asset).
address $owner_ip
The following variables are used in the title and
description of an event type:
$new_mac_addr – detected MAC address.
4000005200 PLC Project Control: Critical PLC Project Control read/write monitoring
detected read of resulted in a detected read of an unknown block
unknown block from of a project from a PLC (if there is no saved
PLC $asset_name information about this block).
The following variables are used in the title and
description of an event type:
$asset_name – name of the asset.
4000005201 PLC Project Control: Critical PLC Project Control read/write monitoring
detected read of known resulted in a detected read of a known block of a
block from PLC project from a PLC (if there is saved information
$asset_name about this block but the received information
does not match the latest saved information
about this block).
The following variables are used in the title and
description of an event type:
$asset_name – name of the asset.
278
$saved_date_time – date and time when the
block was saved in the application.
4000005202 PLC Project Control: Critical PLC Project Control read/write monitoring
detected write of new resulted in a detected write of an unknown block
block to PLC of a project from a PLC (if there is no saved
$asset_name information about this block).
The following variables are used in the title and
description of an event type:
$asset_name – name of the asset.
4000005203 PLC Project Control: Critical PLC Project Control read/write monitoring
detected write of known resulted in a detected write of a known block of
block to PLC a project from a PLC (if there is saved
$asset_name information about this block but the received
information does not match the latest saved
information about this block).
The following variables are used in the title and
description of an event type:
$asset_name – name of the asset.
4000005204 PLC Project Control: Critical PLC Project Control read/write monitoring
detected read of resulted in a detected read of an unknown
unknown project from project from a PLC (if there is no saved
PLC $asset_name information about this project).
The following variables are used in the title and
description of an event type:
$asset_name – name of the asset.
4000005205 PLC Project Control: Critical PLC Project Control read/write monitoring
detected read of known resulted in a detected read of a known project
project from PLC from a PLC (if there is saved information about
$asset_name this project but the received information does
not match the latest saved information about
this project).
The following variables are used in the title and
description of an event type:
$asset_name – name of the asset.
279
$saved_date_time – date and time when the
project was saved in the application.
4000005206 PLC Project Control: Critical PLC Project Control read/write monitoring
detected write of new resulted in a detected write of a new project to
project to PLC a PLC (if there is no saved information about
$asset_name this project).
The following variables are used in the title and
description of an event type:
$asset_name – name of the asset.
4000005207 PLC Project Control: Critical PLC Project Control read/write monitoring
detected write of known resulted in a detected write of a known project
project to PLC to a PLC (if there is saved information about this
$asset_name project but the received information does not
match the latest saved information about this
project).
The following variables are used in the title and
description of an event type:
$asset_name – name of the asset.
4000000004 Test event (AM) Informational A test network packet was detected (with the
asset activity detection method enabled).
8000000000 Incident Determined by the A sequence of events that satisfy the conditions of a
importance level of correlation rule was detected (if the incident title and
the correlation rule description are not de ned in the rule).
8000000001 $customTitle Determined by the A sequence of events that satisfy the conditions of a
importance level of correlation rule was detected (if an incident title is
the correlation rule de ned in the rule but not an incident description).
The event type title uses the $customTitle variable,
which is replaced with the incident title when an event
is registered.
8000000002 Incident Determined by the A sequence of events that satisfy the conditions of a
importance level of correlation rule was detected (if an incident
280
the correlation rule description is de ned in the rule but not an incident
title).
The event type description uses the
$customDescription variable, which is replaced with
the incident description when an event is registered.
8000000003 $customTitle Determined by the A sequence of events that satisfy the conditions of a
importance level of correlation rule was detected (if the incident title and
the correlation rule description are de ned in the rule).
The following variables are used in the title and
description of an event type:
$customTitle – title of the incident.
The following set of data les is required for importing tags and devices into Kaspersky Industrial CyberSecurity
for Networks:
datasets.csv. Contains descriptions of data sets for the IEC 61850 standard.
iec61850_mms_reports.csv. Contains descriptions of reports for the IEC 61850: MMS protocol.
iec61850_sv_messages.csv. Contains descriptions of messages for the IEC 61850: Sampled Values protocol.
The list of tags in the variables.csv le has the "connection" grouping attribute.
You can specify several di erent protocols and addresses for one connection in the connections.csv le.
Rows containing the parameter values in the enums.csv and datasets.csv les are lled out only when describing
enumerations and data sets for MMS and GOOSE protocols of the IEC 61850 standard. For other protocols, the
enums.csv and datasets.csv les can contain only header rows. Note that the enums.csv and datasets.csv les
must be located in the import folder.
When data les are imported, only the values of the speci ed parameters are considered. Parameters whose
values are not speci ed are omitted. If the data le is missing strings to which a di erent le from the set of data
les contains references, the relevant strings are omitted during import.
If you use di erent protocols with di erent sets of tags, you have to use several connections for one device.
Connection IDs in each row of the devices.csv le have to be unique.
The le should begin with header strings containing the data needed for le processing. An example of header
strings of the devices.csv le is provided below.
Example:
'Devices
'Format Version V1.0.0.0;KICS Importer Version V1.0.0.0
'Field separator: ; Decimal separator: . Text quotes: " Var name separator: .
'Device;Type;Connection
Devices
The name of the CSV le is speci ed in this string. Devices – the name of the device description le. The data
le name corresponds to the le purpose and is de ned for each le in the set.
Field separator: ; Decimal separator: . Text quotes: " Var name separator: .
Use this string to specify the separators used in the data le:
Field separator: ;
Decimal separator: .
Device;Type;Connection
282
This string contains the names of columns with data. Data in the le should be arranged according to the
following order of columns:
4 – MITSUBISHI SYSTEM Q
6 – SIEMENS SIPROTEC
21 – EMERSON DELTAV
26 – OMRON CJ2M
27 – ABB AC 800M
30 – DNP3 device
31 – OPC UA server
32 – ABB AC 700F
34 – OPC DA server
35 – BECKHOFF CX series
37 – EMERSON CONTROLWAVE
40 – I/O device
45 – YOKOGAWA PROSAFE-RS
Connection is the connection ID from the connections.csv le containing a description of connections and
protocols.
The header strings are followed by the le body containing the values of parameters (device name, device type
code, connection ID). An example of the devices.csv le is provided below.
Example:
'Devices
'Format Version V1.0.0.0;KICS Importer Version V1.0.0.0
'Field separator: ; Decimal separator: . Text quotes: " Var name separator: .
284
'Device;Type;Connection
"ms_plc";4;"ms_plc"
"mc_SysQ";8;"mc_SysQ"
The le should begin with header strings containing the data needed for le processing. An example of header
strings of the connections.csv le is provided below.
Example:
'Connections
'Field separator: ; Decimal separator: . Text quotes: " Var name separator: .
'Connection;Protocol;Address
The rst three header strings are identical to the header strings in the devices.csv le.
Protocol – code of the application-level protocol. The following protocol codes are used:
0 – MODBUS TCP
4 – ALLEN-BRADLEY ETHERNET/IP
7 – IEC 60870-5-104
11 – EMERSON DELTAV
14 – YOKOGAWA VNET/IP
16 – DNP3
18 – OPC UA BINARY
20 – OPC DA
23 – BECKHOFF ADS/AMS
24 – IEC 60870-5-101
Address – a string containing the full network address of the device, which is speci c to the given protocol.
Example:
Connection with the Schneider Momentum controller (one IP address):
"Barline1";0;"IP-Address=192.168.0.7;Port=502"
Connection with the Mitsubishi System Q controller (one IP address, two ports):
"Station1";3;"IP-Address=192.168.0.8;Port=5001 Network=0;Station=0;PC=255"
"Station1";3;"IP-Address=192.168.0.8;Port=5002 Network=0;Station=0;PC=255"
Connection with the redundant Siemens S7-400 controller, two controllers (two IP addresses, one set of
tags):
"S7$Program";1;"IP-Address=192.168.0.21;Port=102;Rack=0;Slot=2"
"S7$Program";1;"IP-Address=192.168.0.22;Port=102;Rack=0;Slot=2"
The connection with the Siemens S7-400 uses two protocols: S7Comm over the TCP/IP stack, and
S7Comm over the Industrial Ethernet network (one set of tags):
"S7$Program";1;"IP-Address=192.168.0.21;Port=102;Rack=0;Slot=2"
"S7$Program";2;"MAC=00:01:02:03:04:05;Rack=0;Slot=2"
The header strings are followed by the le body containing the values of parameters (connection ID, application-
level protocol code, full network address of the device). An example of the connections.csv le is provided below.
Example:
'Connections
'Format Version V1.0.0.0;KICS Importer Version V1.0.0.0
'Field separator: ; Decimal separator: . Text quotes: " Var name separator: .
'Connection;Protocol;Address
286
"ms_plc";3;"IP-Address=192.168.0.77;Port=1025"
"mc_SysQ";7;"IP-Address=192.168.0.77;Port=2404;Asdu=555"
The format of the device network address in the le connections.csv depends on the type of protocol used.
Example:
The following address formats can be used for protocols supported by Kaspersky Industrial CyberSecurity for Ne
MODBUS TCP:
"IP-Address=192.168.0.7;Port=502"
ALLEN-BRADLEY ETHERNET/IP:
"IP-Address=192.168.0.7;Port=44818"
IEC 60870-5-104:
"IP-Address=192.168.0.7;Port=104;Asdu=2"
287
EMERSON DELTAV:
"IP-Address=192.168.0.38;Port=18507"
YOKOGAWA VNET/IP:
"IP-Address=192.168.0.4;Port=5313"
DNP3:
"IP-Address=192.168.1.10;Port=20000"
OPC UA BINARY:
"IP-Address=192.168.0.213;Port=49320"
OPC DA:
"IP-Address=192.168.0.7;Port=135"
BECKHOFF ADS/AMS:
"IP-Address=192.168.0.7;Port=48898"
288
IEC 60870-5-101:
"IP-Address=192.168.0.7;Port=950"
The le should begin with header strings containing the data needed for le processing. An example of header
strings of the variables.csv le is provided below.
Example
'Variables
'Format Version V1.0.0.0;KICS Importer Version V1.0.0.0
'Field separator: ; Decimal separator: . Text quotes: " Var name separator: .
'ID;Varname;Connection;Address;Datatype;Length;InLo;InHi;OutLo;OutHi;Description;EngUnit
The rst three header strings are identical to the header strings in the devices.csv le.
The string
ID;Varname;Connection;Address;Datatype;Length;InLo;InHi;OutLo;OutHi;Description;EngUnits;E
contains the names of columns with data:
Datatype – numerical code of the tag data type. The following codes are used:
0 – BOOL
1 – INT8
2 – UINT8
289
3 – INT16
4 – UINT16
5 – INT32
6 – UINT32
7 – INT64
8 – UINT64
9 – FLOAT
10 – DOUBLE
11 – STRING
12 – ENUM
13 – BOOL ARRAY
14 – UNSPECIFIED
Description – tag description (for example, "Steam pressure at the output of Boiler No. 1").
EngUnits – units of measurement of the physical quantity corresponding to the tag (for example, m/s, J).
EnumName – name of the enumeration from the le enums.csv, which de nes the value of the tag.
The EnumName eld can be lled for tags with data types ENUM, INT*, or UINT*. The EnumName eld contains a
link to the enumeration from the enums.csv le.
Example:
The EnumName eld in the variables.csv le:
EnumName = "OnOffSwitch"
Description of the enumeration in the enums.csv le:
"OnOffSwitch"; 0; "On"
"OnOffSwitch"; 1; "Off"
The header strings are followed by the le body containing the values of parameters (for example, tag ID, tag name,
or connection ID). An example of the variables.csv le is provided below.
Example:
'Variables
'Format Version V1.0.0.0;KICS Importer Version V1.0.0.0
'Field separator: ; Decimal separator: . Text quotes: " Var name separator: .
'ID;Varname;Connection;Address;Datatype;Length;InLo;InHi;OutLo;OutHi;Description;EngUnit
5;"System.mitsub_n.ms_plc.Bit01";"ms_plc";"W0";4;0;0;0;0;0;"System.mitsub_n.ms_plc.Bit01
290
6;"System.mitsub_n.ms_plc.Register01";"ms_plc";"W20";9;0;0;0;0;0;"System.mitsub_n.ms_plc
1;"systemQ.Bit01";"mc_SysQ";"10";0;0;0;0;0;0;"systemQ.Bit01";"";""
The structure of the tag address in the Address eld depends on the protocol used.
The following structure addresses are used for the supported protocols:
MODBUS TCP: integer (for example, addresses of discrete inputs: from 100001).
SIEMENS S7COMM over TCP and S7COMM over INDUSTRIAL ETHERNET: string in the format [Area]
[ByteAddress].[BitAddress].
If the condition MemArea=DataBlocks is satis ed, the address is supplemented with the number of the data
block. The string changes to [DB17]:[ByteAddress].[BitAddress], where:
Area – the enumeration of codes of memory areas according to the protocol standard: M, I, O, DB, C, T.
BitAddress – the bit address inside the byte, which is represented by an integer.
Area – the enumeration of codes of memory areas according to the protocol speci cation: SM, SD, M, L, F,
V, D, TS, TC, TN, SS, SC, SN, CS, CC, CN, S, Z, R, X, Y, B, W, SB, SW, DX, DY, ZR.
Address – the address value. The address is an integer in the range that depends on the data area.
IEC 61850 MMS and GOOSE: per the IEC 61850 standard – a string of the format
DOMAIN=Domain;LN=LnName;CO=CoName;DA=FullTagName;CDC=CdcName;LNCDC=LNClassName, where:
DOMAIN – a parameter that includes the device name and the logical device name.
DA – tag name.
IEC 60870-5-104 and IEC 60870-5-101: a string in the format [ASDU]:[Address], where:
Area – the enumeration of codes of memory areas according to the protocol standard: I, Q, T, M, G, AI, AQ,
R, P, L, W.
291
ByteAddress – the byte address represented by an integer.
BitAddress – the bit address inside the byte, which is represented by an integer.
SIEMENS S7COMMPLUS over TCP: string in the format LID=LidValue;RID=RidValue, where LidValue and
RidValue are internal identi ers of a tag in the TiaPortal project.
OMRON FINS over UDP, OMRON FINS over TCP and OMRON FINS over ETHERNET/IP: string in the format
[Area][ByteAddress].[BitAddress], where:
Area – enumeration of codes of memory areas according to the protocol standard: A, CIO, C, CS, D, DR, E,
H, IR, TK, T, TS, W.
BitAddress – the bit address inside the byte, which is represented by an integer.
CODESYS V3 GATEWAY over TCP and CODESYS V3 GATEWAY over UDP: string with the tag name.
MSD_VERSION is an integer in the range of 0–65535 that is used for comparing versions of projects/tags in
the PLC and SCADA system.
An example of the tag address string for the MMS and GOOSE protocols is provided below.
Example:
DOMAIN=IED009PROT1;LN=LLN0;CO=DC;DA=NamPlt.configRev;CDC=LPL;LNCDC=LLN0
292
File with descriptions of enumerations: enums.csv
The enumerations description le contains all elements of all enumerations used in the current set of data les for
the IEC 61850 standard.
The le should begin with header strings containing the data needed for le processing. An example of header
strings of the enums.csv le is provided below.
Example:
'Enums
'Format Version V1.0.0.0;KICS Importer Version V1.0.0.0
'Field separator: ; Decimal separator: . Text quotes: " Var name separator: .
'Connection;EnumName;IntValue;TextValue
The rst three header strings are identical to the header strings in the devices.csv le.
The header strings are followed by the le body containing the parameter values (connection ID, name of
enumeration, numerical value of enumeration, text description). An example of the enums.csv le is provided below.
Example:
'Enums
'Format Version V1.0.0.0;KICS Importer Version V1.0.0.0
'Field separator: ; Decimal separator: . Text quotes: " Var name separator: .
'Connection;EnumName;IntValue;TextValue
"AA1J1Q01A2";"Beh";1;"on"
"AA1J1Q01A2";"Beh";2;"blocked"
"AA1J1Q01A2";"Beh";3;"test"
"AA1J1Q01A2";"Beh";4;"test/blocked"
"AA1J1Q01A2";"Beh";5;"off"
The le should begin with header strings containing the data needed for le processing. An example of header
strings of the datasets.csv le is provided below.
Example:
'Datasets
293
'Format Version V1.0.0.0;KICS Importer Version V1.0.0.0
'Field separator: ; Decimal separator: . Text quotes: " Var name separator: .
'Connection;DatasetName;Deprecated;ItemName
The rst three header strings are identical to the header strings in the devices.csv le.
ItemName – full name of the device model element. This can be the nal name of a tag or the name of the top
branch of the tree.
The header strings are followed by the le body containing the parameter values (connection ID, name of the data
set, unused value, and name of the device model element). An example of the datasets.csv le is provided below.
Example:
'Datasets
'Format Version V1.0.0.0;KICS Importer Version V1.0.0.0
'Field separator: ; Decimal separator: . Text quotes: " Var name separator: .
'Connection;DatasetName;Deprecated;ItemName
"S7UTDZD";"S7UTDZDPROT/LLN0$DataSet";0;"S7UTDZDPROT/PTRC1$ST$Tr"
"S7UTDZD";"S7UTDZDPROT/LLN0$DataSet";0;"S7UTDZDMEAS/M1_MMXU1$MX$A$phsA"
The le should begin with header strings containing the data needed for le processing. An example of header
strings of the iec61850_mms_reports.csv le is provided below.
Example:
'Reports
'Format Version V1.0.0.0;KICS Importer Version V1.0.0.0
'Field separator: ; Decimal separator: . Text quotes: " Var name separator: .
'Connection;ReportName;ReportId;DataSetName;IsBuffered
The rst three header strings are identical to the header strings in the devices.csv le.
294
DataSetName – name of the data set associated with this report.
IsBuffered – indicates whether or not the report is bu ered. Takes the Buffered or Unbuffered value.
The header strings are followed by the le body containing the parameter values (connection ID, report name,
report ID, name of the data set for the report, and the bu er indicator). An example of the
iec61850_mms_reports.csv le is provided below.
Example:
'Reports
'Format Version V1.0.0.0;KICS Importer Version V1.0.0.0
'Field separator: ; Decimal separator: . Text quotes: " Var name separator: .
'Connection;ReportName;ReportId;DataSetName;IsBuffered
"IED24151LD";"IED24151LD/LLN0$BR$brcbST01";"brcbST01";"IED24151LD/LLN0$DSList";"Buffered
"IED24151LD";"IED24151LD/LLN0$RP$urcbMX01";"urcbMX01";"IED24151LD/LLN0$MXList";"Unbuffer
The le should begin with header strings containing the data needed for le processing. An example of header
strings of the iec61850_sv_messages.csv le is provided below.
Example:
'SVMessages
'Format Version V1.0.0.0;KICS Importer Version V1.0.0.0
'Field separator: ; Decimal separator: . Text quotes: " Var name separator: .
'Connection;SVControlBlockName;SampledValuesId;ConfRev;DataSetName;IsMulticast;OptionalF
The rst three header strings are identical to the header strings in the devices.csv le.
The string
Connection;SVControlBlockName;SampledValuesId;ConfRev;DataSetName;IsMulticast;OptionalFiel
contains the names of columns containing data:
OptionalFields – list of additional (optional) elds included in the message body for transmission.
295
The header strings are followed by the le body containing the parameter values (connection ID, control block
name, message ID, con guration revision, name of the data set for the message, type of transmission, and
additional elds). An example of the iec61850_sv_messages.csv le is provided below.
Example:
'SVMessages
'Format Version V1.0.0.0;KICS Importer Version V1.0.0.0
'Field separator: ; Decimal separator: . Text quotes: " Var name separator: .
'Connection;SVControlBlockName;SampledValuesId;ConfRev;DataSetName;IsMulticast;OptionalF
"IED_TRANSFORMER1";"IED_TRANSFORMER1/LLN0$MS$SMV_Control_Block1";"SMV_ID_1";"0";"IED_TRA
296
Glossary
Account role
Set of access rights that determine the actions available to a user when connected to the Server through the web
interface. Kaspersky Industrial CyberSecurity for Networks provides the Administrator role and the Operator role.
ARP spoo ng
A technique used by criminals to conduct a "man-in-the-middle" attack on networks that use ARP (Address
Resolution Protocol).
Asset management
Technology for registering events associated with the detection of activity of devices in tra ic (for example,
detection of activity shown by a previously unknown device).
Command Control
Technology for registering events associated with the detection of system commands for devices in tra ic (for
example, detection of an unauthorized system command).
Device
An industrial network device used to automate an industrial process at an enterprise (for example, a programmable
logic controller, remote terminal, or intelligent electronic device).
Event
297
A record containing information about the detection of data requiring the attention of an ICS security o icer in
industrial network tra ic. Kaspersky Industrial CyberSecurity for Networks saves registered events in the
database. To view registered events, you need to connect to the Server through the web interface. If necessary,
you can con gure transmission of events to Kaspersky Security Center and recipient systems.
Event type
De ned set of parameters for registering events in Kaspersky Industrial CyberSecurity for Networks. A unique
number (event type code) is assigned to each event type. Kaspersky Industrial CyberSecurity for Networks uses
system event types and custom event types. System event types are created by the application during installation
and cannot be deleted. Custom event types can be manually created, edited, and deleted.
External
Technology for registering incidents as well as events that are received by Kaspersky Industrial CyberSecurity for
Networks from external systems using Kaspersky Industrial CyberSecurity for Networks API methods.
ICS
Abbreviation for Industrial Control System. A package of hardware and software designed to automate control of
process equipment at industrial enterprises.
Incident
In Kaspersky Industrial CyberSecurity for Networks, an incident is an event that is registered when a speci c
sequence of events is received. Incidents group events that have certain common traits or that are associated
with the same process. Kaspersky Industrial CyberSecurity for Networks registers incidents based on event
correlation rules.
Industrial network
Computing network that links the nodes of an automated Industrial Control System of an industrial enterprise.
298
A set of devices that ensure timely disconnection of faulty power facilities from the power system, and that
perform the necessary actions to ensure normal operation of the power system in automated or semi-automated
operating modes.
Intrusion Detection
Technology for registering events associated with the detection of tra ic anomalies that are signs of an attack
(for example, detection of signs of ARP spoo ng).
299
Monitoring point
A point where incoming data is received. It is added to the network interface of a node hosting the Server or
sensor of Kaspersky Industrial CyberSecurity for Networks, and is used for receiving a copy of industrial network
tra ic (for example, from a network switch port con gured to transmit mirrored tra ic).
Network map
A model that visually represents detected communications between industrial network devices. The network map
contains the following objects: nodes representing assets, asset groups, and links between nodes/asset groups.
Node
Computer on which a Kaspersky Industrial CyberSecurity for Networks Server or sensor is installed, or an object
on the network map representing one or multiple assets.
Noti cation
A message with information about an event (or events), which is sent by the application via noti cation delivery
systems (for example, via email) to the speci ed addresses.
PLC project
Microprogram written for a PLC. It is stored in PLC memory and is run as part of the industrial process that uses
the PLC. A PLC project may consist of blocks that are individually transmitted and received over the network when
the project is read or written.
300
A set of conditions for tag values. When the conditions of a Process Control rule are ful lled, Kaspersky Industrial
CyberSecurity for Networks registers an event.
SCADA
Abbreviation for Supervisory Control And Data Acquisition. A software suite that enables the operator to control
industrial processes in real time.
Security policy
Set of data that de nes the process control settings and the settings for registering di erent types of events.
SIEM
Abbreviation for Security Information and Event Management. This is a solution for managing information and
events in an organization's security system.
System command
Data block in industrial network tra ic containing the device management command (for example, START PLC) or
system message related to device operation (for example, REQUEST NOT FOUND).
Tag
Variable that contains the value of a speci c process parameter such as temperature.
301
AO Kaspersky Lab
Kaspersky is an internationally renowned vendor of systems for computer protection against various types of
threats, including viruses, malware, spam, network and hacker attacks.
In 2008, Kaspersky was rated among the world's top four leading vendors of information security software
solutions for end users (IDC Worldwide Endpoint Security Revenue by Vendor). Kaspersky is the preferred vendor
of computer protection systems for home users in Russia ("IDC Endpoint Tracker 2014").
Kaspersky was founded in 1997 in Russia. It has since grown into an international group of companies with 38 o ices
in 33 countries. The company employs more than 3000 highly quali ed specialists.
Products. Kaspersky products protect both home computers and corporate networks.
The personal product range includes applications that provide information security for desktop, laptop, and tablet
computers, as well as for smartphones and other mobile devices.
The company o ers protection and control solutions and technologies for workstations and mobile devices, virtual
machines, le and web servers, mail gateways, and rewalls. The company's portfolio also features specialized
products providing protection against DDoS attacks, protection for industrial control systems, and prevention of
nancial fraud. Used in conjunction with the centralized management tools of Kaspersky, these solutions ensure
e ective automated protection against computer threats for organizations of any scale. Kaspersky products are
certi ed by major testing laboratories, compatible with the applications of most software vendors, and optimized
for work on most hardware platforms.
Virus analysts work around the clock at Kaspersky. Every day they uncover hundreds of thousands of new
computer threats, create tools to detect and disinfect them, and include the signatures of these threats in the
databases used by Kaspersky applications.
Technologies. Many of technologies that make part of any modern anti-virus were rst developed by Kaspersky. It
is therefore logical for many third-party software developers to use the kernel of Kaspersky Anti-Virus in their own
applications. Those companies include Alcatel-Lucent, Alt-N, Asus, BAE Systems, Blue Coat, Check Point, Cisco
Meraki, Clearswift, D-Link, Facebook, General Dynamics, H3C, Juniper Networks, Lenovo, Microsoft, NETGEAR,
Openwave Messaging, Parallels, Qualcomm, Samsung, Stormshield, Toshiba, Trustwave, Vertu, ZyXEL. Many of the
company's innovative technologies are backed by patents.
Achievements. Years of struggle against computer threats have brought hundreds of awards to Kaspersky.
Following tests and research conducted by the reputed Austrian test laboratory AV-Comparatives in 2014,
Kaspersky ranked among the top two vendors by the number of Advanced+ certi cates earned and was eventually
awarded the Top Rated certi cate. However, the most important award to Kaspersky is the commitment of users
all over the world. The company's products and technologies protect more than 400 million users. The number of
its client organizations exceeds 270 thousand.
302
Information about third-party code
Information about third-party code is contained in the le legal_notices.txt, in the application installation folder.
303
Trademark notices
Registered trademarks and service marks are the property of their respective owners.
Flash is either a registered trademark or trademark of Adobe Systems Incorporated in the United States and/or
other countries.
Apple, iPad, iPhone, Mac, macOS, Mac OS, and OS X are trademarks of Apple Inc., registered in the United States
and other countries.
AXIS and AXIS COMMUNICATIONS are registered trademarks or trademark applications of Axis AB in various
jurisdictions.
Cisco and IOS are trademarks of Cisco Systems, Inc. and/or its a iliates registered in the United States and
elsewhere.
General Electric and MULTILIN are registered trademarks of General Electric Company.
Intel and Core are trademarks of Intel Corporation registered in the United States and elsewhere.
IBM and DB2 are trademarks of International Business Machines Corporation, registered in many jurisdictions.
Linux is the registered trademark of Linus Torvalds in the U.S. and other countries.
Microsoft, SQL Server, Windows, Windows Server, and Windows Vista are registered trademarks of Microsoft
Corporation in the United States and elsewhere.
IPX is a registered trademark of Novell Inc. in the United States and other countries.
Java and Oracle are registered trademarks of Oracle and/or its a iliates.
304
The Trademark BlackBerry is owned by Research In Motion Limited and is registered in the United States and may
be pending or registered in other countries.
Dameware is a trademark of SolarWinds Worldwide, LLC registered in the United States and elsewhere.
Tor is a trademark of The Tor Project registered in the United States (U.S. Registration № 3 465 432).
VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions.
305