Contents
Web Threat Protection
The Web Threat Protection component allows you to scan inbound traffic via HTTP, HTTPS, and FTP, websites, and IP addresses, prevent malicious files from being downloaded from the Internet, and block access to phishing, adware, and other malicious websites.
Current connections for intercepted TCP ports are reset when Web Threat Protection is enabled.
By default, the Web Threat Protection task is disabled. However, it is enabled automatically if local management of Web Threat Protection settings has been allowed on the device (a policy is not applied or the "lock" is not set in the policy properties) and one of the following executable browser files, including in snap format, has been detected on the system:
- chrome
- chromium
- chromium-browser
- firefox
- firefox-esr
- google-chrome
- opera
- yandex-browser
You can enable or disable Web Threat Protection, and also configure the protection settings:
- Select action that the application performs on a web resource where a dangerous object is detected.
- Configure a list of trusted web addresses. The application will not scan the contents of websites whose web addresses are included in this list.
- Select objects that the application will detect when scanning inbound traffic.
- Configure the encrypted connections scan to scan HTTPS traffic.
To scan FTP traffic, control of all network ports must be configured in the settings for the encrypted connections scan.
When a website is opened, the application performs the following actions:
- Checks the website security using the downloaded application databases.
- Checks the website security using heuristic analysis, if enabled.
- Checks the trustworthiness of a website using Kaspersky reputation databases if the use of Kaspersky Security Network is enabled.
You are advised to enable the use of Kaspersky Security Network to help Web Threat Protection work more effectively.
- Blocks or allows opening of the website.
On attempt to open a dangerous website, the application performs the following:
- For HTTP or FTP traffic, the application blocks access and shows a warning message.
- For HTTPS traffic, a browser displays an error page.
Removing application certificates may cause the Web Threat Protection component to work incorrectly.
Kaspersky Embedded Systems Security adds a special chain of allowing rules (kess_bypass) to the list in the mangle table of the iptables and ip6tables utilities. This chain of allowing rules makes it possible to exclude traffic from scans by the application. If traffic exclusion rules are configured in the chain, they affect the operation of the Web Threat Protection component.
Configuring Web Threat Protection in the Web Console
In the Web Console, you can configure Web Threat Protection settings in the policy properties (Application settings → Essential Threat Protection → Web Threat Protection).
Web Threat Protection component settings
Setting |
Description |
---|---|
Web Threat Protection enabled / disabled |
This toggle button enables or disables the Web Threat Protection component. The toggle button is switched off by default. |
Action on threat detection |
In this section, you can specify the action that the application performs on the web resource where the dangerous object is detected:
|
Detect malicious objects |
This check box enables or disables checking of links against the databases of malicious web addresses. The check box is selected by default. |
Detect phishing links |
This check box enables or disables checking of links against the databases of phishing web addresses. The check box is selected by default. |
Use heuristic analysis for detecting phishing links |
This check box enables or disables the use of heuristic analysis for detecting phishing links. This check box is available if the Detect phishing links check box is selected, and is selected by default. |
Detect adware |
This check box enables or disables checking links against the databases of adware web addresses. This check box is cleared by default. |
Detect legitimate applications that intruders can use to compromise devices or data |
This check box enables or disables checking links against the databases of legitimate applications that intruders can use to compromise devices or data. This check box is cleared by default. |
Trusted web addresses |
This table contains addresses of URLs and web pages whose content you consider trusted. You can only add HTTP/HTTPS web addresses to the list of trusted web addresses. You can use masks to specify web addresses. Masks are not supported to specify IP addresses. By default, the table is empty. |
Web address window
In this window, you can add a web address or a web address mask to the list of trusted web addresses.
You can add only HTTP/HTTPS web addresses to the list of trusted web addresses. You can use masks to specify web addresses. Masks are not supported to specify IP addresses.
Page topConfiguring Web Threat Protection in the Administration Console
In the Administration Console, you can configure Web Threat Protection settings in the policy properties (Essential Threat Protection → Web Threat Protection).
Web Threat Protection component settings
Setting |
Description |
---|---|
Enable Web Threat Protection |
This check box enables or disables Web Threat Protection. This check box is cleared by default. |
Trusted web addresses |
This group of settings contains the Configure button, which opens the Trusted web addresses window, where you can specify the list of trusted web addresses. The application will not scan the contents of websites whose web addresses are included in this list. |
Action on threat detection |
Action that the application performs on a web resource where a dangerous object is detected:
|
Scan settings |
This group of settings contains the Configure button, which opens the Scan settings window, where you can configure the settings for scanning incoming traffic. |
Trusted web addresses window
In this window, you can add web addresses and web pages whose content you consider trusted.
You can only add HTTP/HTTPS web addresses to the list of trusted web addresses. You can use masks to specify web addresses. Masks are not supported to specify IP addresses. By default, the list is empty.
Web address window
In this window, you can add a web address or a web address mask to the list of trusted web addresses.
You can add only HTTP/HTTPS web addresses to the list of trusted web addresses. You can use masks to specify web addresses. Masks are not supported to specify IP addresses.
Page topScan settings window
In this window, you can configure the settings for scanning incoming traffic during operation of the Web Threat Protection component.
Web Threat Protection settings
Setting |
Description |
---|---|
Detect malicious objects |
This check box enables or disables checking of links against the databases of malicious web addresses. The check box is selected by default. |
Detect phishing links |
This check box enables or disables checking of links against the databases of phishing web addresses. The check box is selected by default. |
Use heuristic analysis for detecting phishing links |
This check box enables or disables the use of heuristic analysis for detecting phishing links. This check box is available if the Detect phishing links check box is selected, and is selected by default. |
Detect adware |
This check box enables or disables checking links against the databases of adware web addresses. This check box is cleared by default. |
Detect legitimate applications that intruders can use to compromise devices or data |
This check box enables or disables checking links against the databases of legitimate applications that intruders can use to compromise devices or data. This check box is cleared by default. |
Configuring Web Threat Protection in the command line
In the command line, you can manage Web Threat Protection using the Web Threat Protection predefined task (Web_Threat_Protection).
The task starts automatically if one of the supported browsers is detected in the system and local management of Web Threat Protection settings is allowed on the device (a policy is not applied or the "lock" is not set in the policy properties). You can start and stop the task manually.
You can configure Web Threat Protection settings by editing the settings of the Web Threat Protection predefined task.
Web Threat Protection task settings
Setting |
Description |
Values |
---|---|---|
|
Specifies the action to be performed upon detection of an infected object in web traffic. |
|
|
Enables or disables checking of links against the databases of malicious web addresses. |
|
|
Enables or disables checking of links against the databases of phishing web addresses. |
|
|
Enables or disables the use of heuristic analysis for scanning web pages for phishing links. |
|
|
Enables or disables checking of links against the databases of adware web addresses. |
|
|
Enables or disables the scanning of links against the database of web addresses containing legitimate applications that intruders can use to compromise the devices or data. |
|
|
Enables or disables the usage of a list of trusted web addresses. The application does not scan trusted web addresses for viruses or other malicious objects. You can specify trusted web addresses using the |
|
|
Specifies trusted web addresses. |
The default value is not defined. You can use masks to specify web addresses. Masks are not supported to specify IP addresses. |