Contents
Managing Standard IOC Scan tasks
This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.
Standard IOC Scan tasks are group or local tasks that are created and configured manually in Kaspersky Security Center or through the command line interface. IOC files prepared by the user are used to run the tasks.
Only the files with IOC rules can be specified for the IOC Scan task. Files with other types of rules are not supported for the IOC Scan task.
This section provides instructions on how to manage Standard IOC Scan tasks.
Requirements for IOC files
This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.
When creating IOC Scan tasks, consider the following requirements and limitations related to
:- Kaspersky Endpoint Agent supports IOC files with the ioc and xml extensions. These files use open standard for IOC description – OpenIOC versions 1.0 and 1.1.
- Only the files with IOC rules can be specified for the IOC Scan task. Files with other types of rules are not supported for the IOC Scan task.
- If, when creating the IOC Scan task, you upload some IOC files that are not supported by Kaspersky Endpoint Agent then when the task starts, the application will use only supported IOC files.
- If, when creating the IOC Scan task, none of the downloaded IOC files is supported by Kaspersky Endpoint Agent, the task can be started, but as a result of the task execution, no indicators of compromise will be detected.
- Semantic errors and IOC terms and tags in IOC files that are not supported by the application do not cause the task execution errors. The application just does not detect matches in such sections of IOC files.
- that are used in the same IOC Scan task must be unique. The presence of IOC files with the same identifier can affect the correctness of the task execution results.
- The size of a single IOC file must not exceed 3 MB. Using larger files results in the failure of IOC Scan tasks. In this case, the total size of all added files in the IOC collection can exceed 3 MB.
- It is recommended to create one IOC file per each threat. This makes it easier to read the results of the IOC Scan task.
The table below shows the features and limitations of the OpenIOC standard supported by the application.
Features and limitations of the OpenIOC standard versions 1.0 and 1.1
Supported conditions |
OpenIOC 1.0:
OpenIOC 1.1:
|
Supported condition attributes |
OpenIOC 1.1:
|
Supported operators |
|
Supported data types |
|
Data types interpretation details |
The following data types are interpreted as string: The application supports interpretation of the OpenIOC 1.0: Using the
OpenIOC 1.1: Using the Using the The application supports interpretation of the |
Supported IOC terms |
The full list of supported IOC terms is provided in a separate table. |
Supported IOC terms
This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.
The file that can be downloaded by the following link contains a table with a full list of supported IOC terms of the OpenIOC standard.
Configuring Standard IOC Scan task
This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.
Task creation is performed before, as an individual step.
If you selected the Open task details when creation is complete check box on the Finish task creation page during the task creation, proceed to step 4 of the following instruction.
Only the files with IOC rules can be specified for the IOC Scan task. Files with other types of rules are not supported for the IOC Scan task.
To configure the Standard IOC Scan task settings:
- In the main Kaspersky Security Center Web Console window select Devices → Tasks.
- To open the task settings window, click the task name.
- Select the Application settings tab.
- In the IOC scan settings section, configure the IOC collection by following these steps:
- In the IOC collection group of settings click the Redefine IOC files button.
- In the dialog that opens, click the Add IOC files button and specify the IOC files that you want to use for the task.
You can select multiple IOC files for a single IOC Scan task.
- Click OK to close the dialog box.
If, when creating the IOC Scan task, you upload some IOC files that are not supported by Kaspersky Endpoint Agent then when the task starts, the application will use only supported IOC files.
- To view the list of all IOC files that are included in the IOC collection, as well as to obtain information about each IOC file, do the following:
- Click the link with the names of all downloaded IOC files in the IOC files group of settings.
The IOC contents window opens.
- To view detailed information about an individual IOC file, click the name of the required IOC file in the list of files on the IOC collection tab.
In the window that opens, information about the selected IOC file will be displayed.
- To close the window with information about the selected IOC file, click OK or Cancel.
- To view information about all downloaded IOC files at once, open the IOC data tab.
Information about each downloaded IOC file will be displayed in the workspace of the window.
- If you do not want to use a specific IOC file when the IOC Scan task is executed, on the IOC collection tab, switch the toggle button next to the IOC file name from Include to Exclude.
- Click OK to save the changes and close the IOC contents window.
- Click the link with the names of all downloaded IOC files in the IOC files group of settings.
- To export the created IOC collection, click the Export IOC collection button.
In the window that opens, specify the name of the file and select the folder where you want to save it.
- Click the Save button.
The application creates a ZIP file in the specified folder.
- In the Retrospective IOC scan group of settings configure the settings for :
- In the Retrospective IOC Scan group of settings enable the Perform Retrospective IOC Scan within the interval option.
- Specify the time interval.
During the task execution, the application analyzes data collected during the specified time interval, including the boundaries of the specified interval (from 00:00 on the start date until 23:59 on the end date). The default interval starts at 00:00 on the day preceding the task creation day and ends at 23:59 on the day when the task was created.
If during execution of the IOC Scan task with the Perform Retrospective IOC Scan within the interval option enabled the application does not find any data for the specified time interval to be analyzed, it does not inform about this. In this case, the application shows no indicators of compromise in the task completion report.
- In the Actions group of settings, configure the response actions on detecting the indicator of compromise:
- Select the Take response actions after an indicator of compromise is found check box.
- Select the Isolate device from the network check box to enable network isolation of the device on which indicator of compromise is detected by Kaspersky Endpoint Agent.
- Select the Quarantine and delete check box to quarantine the detected object and remove it from the device.
- Select the Run critical areas scan on the device check box so that Kaspersky Endpoint Agent sends a command to EPP application to scan critical areas on all the devices of the administration group on which indicators of compromise are detected.
If the Quarantine and delete or Run critical areas scan option is enabled, Kaspersky Endpoint Agent may recognize the detected files as infected and delete them from the device in response.
- In the Protection of critical system files group of settings, select the Do not perform actions on critical system files check box if you want to protect critical system files from being quarantined or deleted when an indicator of compromise is detected.
The option is available only if the Quarantine and delete option is selected in the Actions group of settings.
If this option is selected and an object is a critical system file, the application does not perform any actions on this object. This information is logged in the task execution report.
- In the Advanced section, select data types (IOC documents) that you want to analyze during the task execution and configure the additional scan settings:
- In the Select data types (IOC documents) to analyze during IOC scanning group of settings, select the check boxes next to the required IOC documents.
Depending on the loaded IOC files, some check boxes may be disabled.
Kaspersky Endpoint Agent automatically selects data types (IOC documents) for the IOC Scan task in accordance to the contents of the downloaded IOC files. It is not recommended to unselect data types manually.
- If the Analyze file data (FileItem) check box is selected, click the Advanced (FileItem) link and in the FileItem document scan settings window that opens, select the scan areas on the protected device drives where to look for indicators of compromise.
You can select one of the predefined areas, or specify the paths to the desired areas manually.
- Click OK to save the changes and close the FileItem document scan settings window.
- If the Analyze WEL data (EventLogItem) check box is selected, click the Advanced (EventLogItem) link and in the EventLogItem document scan settings window that opens, configure additional event analysis settings:
- Scan only events that are logged within the specified period.
If the check box is selected, only the events that were logged during the specified period will be taken into account during the task's execution.
- Scan events that belong to the following channels.
List of channels to be analyzed during the task's execution.
- Scan only events that are logged within the specified period.
- Click OK to save the changes and close the FileItem document scan settings window.
- In the Select data types (IOC documents) to analyze during IOC scanning group of settings, select the check boxes next to the required IOC documents.
- Click the Save button.
You can start the created task manually or configure a scheduled task start.
Viewing IOC Scan task execution results
This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.
To view the IOC Scan task execution results:
- In the main Kaspersky Security Center Web Console window select Devices → Tasks.
- To open the task settings window, click the task name.
- Select the Application settings tab.
- Select the IOC Scan results section.
- In the Device drop-down list, select the devices, for which you want to view the results of IOC Scan task.
A summary table with the task execution results on the selected devices will be displayed.
If compromise indicators are detected on devices, the Results column displays the compromise indicators detected link.
- If you want to view detailed information on the detected compromise indicators on a specific device, do the following:
- Click the compromise indicators detected link in the row with the name of the desired device.
The IOC Scan results window opens that contains a list of all IOC files used in the task. If there is an object on the selected device that matches a certain compromise indicator, the Status column displays the Match value.
- Click the Match link in the row with the name of the desired IOC file.
The IOC incident card window opens.
The IOC incident card contains information about objects on the device that match the conditions of the processed IOC file, as well as the text of the matched branches or individual conditions from this IOC file.
Viewing the IOC incident card is not available for IOC files for which no matches were detected on the device during scanning.
- Click the compromise indicators detected link in the row with the name of the desired device.