Contents
- Managing user-defined rules
- Using indicators of compromise (IOC) and attack (IOA) for Threat Hunting
- Managing user-defined IOC rules
- Viewing the table of IOC files
- Viewing information about an IOC file
- Uploading an IOC file
- Downloading an IOC file to a computer
- Enabling and disabling the automatic use of an IOC file when scanning hosts
- Deleting an IOC file
- Searching for alerts in IOC scan results
- Searching for events using an IOC file
- Filtering and searching IOC files
- Clearing an IOC file filter
- Configuring an IOC scan schedule
- Managing user-defined TAA (IOA) rules
- Viewing the TAA (IOA) rule table
- Creating a TAA (IOA) rule based on event search conditions
- Importing a TAA (IOA) rule
- Viewing custom TAA (IOA) rule details
- Searching for alerts and events in which TAA (IOA) rules were triggered
- Filtering and searching TAA (IOA) rules
- Resetting the TAA (IOA) rule filter
- Enabling and disabling TAA (IOA) rules
- Modifying a TAA (IOA) rule
- Deleting TAA (IOA) rules
- Managing user-defined IDS rules
- Importing a user-defined IDS rule
- Viewing the information of a user-defined IDS rule
- Enabling and disabling the use of an IDS rule when scanning events
- Configuring the importance of alerts generated by the user-defined IDS rule
- Replacing a user-defined IDS rule
- Downloading a user-defined IDS rule file to the computer
- Deleting a user-defined IDS rule
- Managing user-defined YARA rules
Managing user-defined rules
You can configure additional security for the IT infrastructure of the company using TAA, IDS, IOC, and YARA rules.
Users with the Senior security officer role can work with custom TAA, IDS, IOC, and YARA rules: load and delete rule files, view lists of rules, and edit the selected rules.
Users with the Security auditor role can view the lists of custom TAA, IDS, IOC, and YARA rules and properties of selected rules without the possibility of editing.
Users with the Security officer role can view the lists of custom TAA, IOC, and YARA rules and properties of selected rules without the possibility of editing.
Using indicators of compromise (IOC) and attack (IOA) for Threat Hunting
Kaspersky Anti Targeted Attack Platform uses two types of indicators for threat hunting: IOC (Indicator of Compromise) and IOA (Indicator of Attack).
An IOC is a set of data about a malicious object or malicious activity. Kaspersky Anti Targeted Attack Platform uses IOC files conforming to the
standard, which is an open standard for describing indicators of compromise. IOC files contain a set of indicators that are compared to the indicators of an event. If the compared indicators match, the program considers the event to be an alert. The likelihood of an alert may increase if a scan detects exact matches between the data of an object and several IOC files.An IOA (also referred to as a "TAA (IOA) rule") is a rule containing the description of a suspicious activity in the system that could be a sign of a targeted attack. Kaspersky Anti Targeted Attack Platform scans the Events database of the program and marks events that match behaviors described by TAA (IOA) rules. The streaming scan technology is used, which involves continuous real-time scanning of objects being downloaded from the network.
TAA (IOA) rules created by Kaspersky experts are used by the TAA (Targeted Attack Analyzer) technology and are updated alongside the program databases. They are not displayed in the interface of the program and cannot be edited.
You can add user-defined IOC and TAA (IOA) rules using IOC files in the OpenIOC format as well as create TAA (IOA) rules based on event database search conditions.
The following table contains a comparative analysis of indicators of compromise (IOC) and attack (IOA).
Comparison of IOC and IOA indicators
Characteristic |
IOC in user-defined IOC rules |
IOA in user-defined TAA (IOA) rules |
IOA in TAA (IOA) rules created by Kaspersky experts |
---|---|---|---|
Scan scope |
Computers with Kaspersky Endpoint Agent |
Program events database |
Program events database |
Scanning mechanism |
Periodical scan |
Streaming scan |
Streaming scan |
Can be added to exclusions from scan |
None. |
Not needed. Users with the Senior security officer role can edit the text of the indicator in custom TAA (IOA) rules as necessary. |
Yes. |
If you are using the
and , this section displays information for the selected tenant. Page topManaging user-defined IOC rules
You can use IOC files to search indicators of compromise in the event database and on computers with Kaspersky Endpoint Agent installed. For example, if you have received third-party information about a piece of malware spreading, you can:
- Upload an IOC file containing indicators of compromise corresponding to the malware to Kaspersky Anti Targeted Attack Platform.
- Find events corresponding to the criteria of the selected IOC file.
You can view such events, and if you want Kaspersky Anti Targeted Attack Platform to generate alerts for selected events, you can create a TAA (IOA) rule.
- Enable automatic use of the selected IOC file to search indicators of compromise on Kaspersky Endpoint Agent computers.
If while scanning the computers, Kaspersky Anti Targeted Attack Platform discovers indicators of compromise, Kaspersky Anti Targeted Attack Platform generates an alert.
- Configure the schedule for searching for indicators of compromise using IOC files on Kaspersky Endpoint Agent computers.
In distributed solution and multitenancy mode, IOC files can have the following types:
- Local—IOC files uploaded to an SCN server. These IOC files are used to search for indicators of compromise on Kaspersky Endpoint Agent hosts connected to the SCN server.
- Global—IOC files uploaded to the PCN server. These IOC files are used to search for indicators of compromise on Kaspersky Endpoint Agent hosts connected to the PCN server and all SCN servers connected to the PCN server.
To view the list of supported OpenIOC indicators of compromise, you can download this file.
Users with the Senior security officer role can import, delete, download IOC files to their computer, enable or disable the search of indicators of compromise using IOC files, as well as configure the schedule for searching indicators of compromise on computers with Kaspersky Endpoint Agent program installed.
Users with the Security officer and Security auditor roles can view the list of IOC files and information about the selected file, and export IOC files to their computer.
Viewing the table of IOC files
If you are using the distributed solution and multitenancy mode, use the web interface of the PCN or SCN server for which you want to configure parameters.
The table of IOC files contains information about IOC files used for scanning on computers with the Kaspersky Endpoint Agent program installed; you can find the table in the Custom rules section, IOC subsection of the program web interface window.
The table of IOC files contains the following information:
—Importance level that will be assigned to an alert generated using this IOC file.
The importance level can have one of the following values:
– Low importance.
– Medium importance.
– High importance.
- Type—Type of IOC file depending on the program operating mode and the server to which the IOC file was uploaded:
- Local—IOC files uploaded to an SCN server. These IOC files are used to search for indicators of compromise on Kaspersky Endpoint Agent hosts connected to the SCN server.
- Global—IOC files uploaded to the PCN server. These IOC files are used to search for indicators of compromise on Kaspersky Endpoint Agent hosts connected to the PCN server and all SCN servers connected to the PCN server.
- Name—Name of the IOC file.
- Servers—Name of the server with the Central Node component.
- Autoscan—The IOC file is used when automatically scanning Kaspersky Endpoint Agent hosts:
Host scanning using this IOC file can have one of the following statuses:
- Enabled
- Disabled
Viewing information about an IOC file
To view IOC file details:
- In the window of the program web interface, select the Custom rules section, IOC subsection.
This opens the table of IOC files.
- Select the IOC file for which you want to view information.
This opens a window containing information about the IOC file.
The window contains the following information:
- Clicking the Find alerts link opens the Alerts section with the filter condition populated with the name of your selected IOC file.
- Clicking the Find events link opens the Threat Hunting section with the search condition populated with indicators of compromise of your selected IOC file.
- Clicking the Download link opens the IOC file download window.
- Autoscan—The IOC file is used when automatically scanning Kaspersky Endpoint Agent hosts.
- Name—Name of the IOC file.
- Importance—Importance level that will be assigned to an alert generated using this IOC file.
The importance level can have one of the following values:
– Low importance.
– Medium importance.
– High importance.
- Apply to—Displays the name of the tenant and the names of servers associated with events scanned based on this IOC file (in distributed solution and multitenancy mode).
- XML—Displays the IOC file contents in XML format.
Uploading an IOC file
IOC files having UserItem properties for domain users are not supported.
To upload an IOC file:
- In the window of the program web interface, select the Custom rules section, IOC subsection.
This opens the table of IOC files.
- Click Upload.
This opens the file selection window on your local computer.
- Select the file that you want to upload and click Open.
- Specify the following parameters:
- Autoscan—The IOC file is used when automatically scanning Kaspersky Endpoint Agent hosts:
- Enabled
- Disabled
- Name—Name of the IOC file.
- Importance—Importance level that will be assigned to an alert generated using this IOC file:
- Low.
- Medium.
- High.
- Apply to—Name of the tenant and names of the servers which you want to scan using this IOC file (in distributed solution and multitenancy mode).
- Autoscan—The IOC file is used when automatically scanning Kaspersky Endpoint Agent hosts:
- Click Save.
The IOC file will be uploaded in XML format.
Downloading an IOC file to a computer
You can download a previously uploaded IOC file to a computer.
To download an IOC file:
- In the window of the program web interface, select the Custom rules section, IOC subsection.
- This opens the IOC file table. Select the IOC file that you want to download.
This opens a window containing information about the IOC file.
- Depending on your browser settings, click the Download link to save the file to the default folder or specify a folder in which to save the file.
The IOC file will be saved to the computer in the browser's downloads folder.
Enabling and disabling the automatic use of an IOC file when scanning hosts
You can enable or disable the automatic use of an IOC file for searching for indicators of compromise on Kaspersky Endpoint Agent hosts.
To enable or disable the automatic use of an IOC file for searching for indicators of compromise on Kaspersky Endpoint Agent hosts:
- In the window of the program web interface, select the Custom rules section, IOC subsection.
This opens the table of IOC files.
- In the row containing the IOC file whose use you want to enable or disable, in the State column, set the toggle switch to one of the following positions:
- Enabled
- Disabled
Automatic use of an IOC file for searching for indicators of compromise on Kaspersky Endpoint Agent hosts is enabled or disabled.
Users with the Security auditor and Security officer roles cannot enable or disable automatic application of an IOC file when scanning events.
Deleting an IOC file
To delete an IOC file:
- In the window of the program web interface, select the Custom rules section, IOC subsection.
- This opens the IOC file table. Select the IOC file that you want to delete.
This opens a window containing information about the IOC file.
- Click Delete.
The IOC file will be deleted.
Users with the Security auditor and Security officer roles cannot delete IOC files.
Searching for alerts in IOC scan results
To find and view scan results for the selected IOC file:
- In the window of the program web interface, select the Custom rules section, IOC subsection.
This opens the table of IOC files.
- Select the IOC file for which you want to view scan results.
This opens a window containing information about the IOC file.
- Go to the alert database by clicking Find alerts.
The alert table is opened in a new browser tab.
You can also view scan results for all IOC files by filtering alerts by technology name.
Searching for events using an IOC file
To view events found using an IOC file:
- In the window of the program web interface, select the Custom rules section, IOC subsection.
This opens the table of IOC files.
- Select the IOC file to use for searching for events in the event database.
This opens a window containing information about the IOC file.
- Go to the event database by clicking Find events.
The event table is opened in a new browser tab.
Filtering and searching IOC files
To filter or search for IOC files by required criteria:
- In the window of the program web interface, select the Custom rules section, IOC subsection.
- This opens the IOC file table. Do the following depending on the filtering criterion:
The table of IOC files will display only IOC files that match the filter criteria you have set.
You can use multiple filters at the same time.
Clearing an IOC file filter
To clear the IOC file filter for one or more filtering criteria:
- In the window of the program web interface, select the Custom rules section, IOC subsection.
- This opens the IOC file table. Click
to the right of the header of the IOC file table column for which you want to clear the filtering conditions.
If you want to clear several filter conditions, perform the necessary actions to clear each filter condition.
The selected filters are cleared.
The table of IOC files will display only IOC files that match the filter criteria you have set.
Configuring an IOC scan schedule
You can configure the schedule for searching for indicators of compromise using IOC files on Kaspersky Endpoint Agent hosts.
To configure the schedule for searching for indicators of compromise using IOC files on Kaspersky Endpoint Agent hosts:
- In the window of the application web interface, select the Settings section, Endpoint Agents subsection, IOC scanning schedule section.
- In the Start time drop-down lists, select the start time of the indicator of compromise search.
- In the Maximum scan duration drop-down list, select a time limit for completing the indicator of compromise search.
- Click Apply.
The new schedule for searching for indicators of compromise using IOC files on Kaspersky Endpoint Agent hosts becomes active immediately after changes are saved. Results of the indicator of compromise search are displayed in the alert table.
Users with Security auditor and Security officer roles cannot configure the schedule for searching for indicators of compromise using IOC files on Kaspersky Endpoint Agent hosts.
Managing user-defined TAA (IOA) rules
Custom TAA (IOA) rules are created based on event databased search criteria. For example, if you want Kaspersky Anti Targeted Attack Platform to generate alerts for events when a program that you consider unsafe is started on Kaspersky Endpoint Agent computers, you can:
- Generate a search query for the event database.
- Create a custom TAA (IOA) rule based on event search conditions.
When Central Node server receives events matching the created TAA (IOA) rule, Kaspersky Anti Targeted Attack Platform generates alerts.
You can also create a TAA (IOA) rule based on one or multiple event search criteria from the selected IOC file. To do so:
- Upload an IOC file containing indicators of compromise corresponding to the malware to Kaspersky Anti Targeted Attack Platform.
- Find events corresponding to the criteria of the selected IOC file.
- Create a TAA (IOA) rule based on one or more event search criteria from the selected IOC file.
In distributed solution and multitenancy mode, TAA (IOA) rules can have one of the following types:
- Global—Created on the PCN server. These rules are used to scan events on this PCN server and all SCN servers connected to this PCN server. Scanned events belong to the tenant which the user is managing in the program web interface.
- Local—Created on the SCN server. These rules are used to scan events on this SCN server. Scanned events belong to the tenant which the user is managing in the program web interface.
The differences between user rules and Kaspersky rules are summarized in the following table.
Comparison of TAA (IOA) rules
Characteristic |
User-defined TAA (IOA) rules |
Kaspersky TAA (IOA) rules |
---|---|---|
Recommendations on responding to the event |
No |
Yes You can view recommendations in |
Correspondence to technique in |
No |
Yes You can view the description of the |
Display in the TAA (IOA) rule table |
Yes |
No |
Ability to disable database lookup for this rule |
||
Ability to delete or add the rule |
You can delete or add a rule in the web interface of the program |
Rules are updated together with program databases |
Searching for alerts and events in which TAA (IOA) rules were triggered |
Using Alerts and Events links in the TAA (IOA) rule information window |
Using Alerts and Events links in the alert information window |
Users with the Senior security officer role can create, import, delete, enable or disable TAA (IOA) rules, and exclude Kaspersky TAA (IOA) rules from scanning. Users with the Security officer or Security auditor roles can use TAA (IOA) rules to search for signs of targeted attacks, infected and possibly infected objects in the database of events and alerts, and to view the TAA (IOA) rule table and TAA (IOA) rule information.
Viewing the TAA (IOA) rule table
If you are using the distributed solution and multitenancy mode, use the web interface of the PCN or SCN server for which you want to configure parameters.
The table of user-defined TAA (IOA) rules contains information about TAA (IOA) rules that are used to scan events and create alerts; the table is in the Custom rules section, TAA subsection of the program web interface window.
The table contains the following information:
—Importance level that is assigned to an alert generated using this TAA (IOA) rule.
The importance level can have one of the following values:
– Low.
– Medium.
– High.
- Type is the type of the rule depending on the operating mode of the program and the role of the server which generated the rule:
- Global—Created on the PCN server. These rules are used to scan events on this PCN server and all SCN servers connected to this PCN server. Scanned events belong to the tenant which the user is managing in the program web interface.
- Local—Created on the SCN server. These rules are used to scan events on this SCN server. Scanned events belong to the tenant which the user is managing in the program web interface.
- Confidence is the level of confidence depending on the likelihood of false alarms caused by the rule:
- High.
- Medium.
- Low.
The higher the confidence, the lower the likelihood of false alarms.
- Name – name of the rule.
- Servers – name of the server with the Central Node component on which the rule is applied.
- Generate alerts – requirement to store information on alerts based on matching an event from the database with criteria of the rule.
- Enabled – a record is created for the event in the alerts table with Targeted Attack Analyzer (TAA) technology specified.
- Disabled – not displayed in the alert table.
- State – usage status of the rule in event scans:
- Enabled – the rule is being used.
- Disabled – the rule is not being used.
Creating a TAA (IOA) rule based on event search conditions
To create a TAA (IOA) rule based on event search conditions:
- Select the Threat Hunting section in the program web interface window.
This opens the event search form.
- Perform an event search in design mode or source code mode.
- Click Save as TAA (IOA) rule.
This opens the New TAA (IOA) rule window.
- In the Name field, type the name of the rule.
- Click Save.
The event search condition will be saved. In the TAA (IOA) rule table in the Custom rules section, TAA subsection of the web interface, the new rule is displayed with the specified name.
If you want to save event search conditions as a user-defined TAA (IOA) rule, avoid using the following fields:
- IOAId.
- IOATag.
- IOATechnique.
- IOATactics.
- IOAImportance.
- IOAConfidence.
At the time of saving the user-defined TAA (IOA) rule, the program might not have any events containing data for these fields. When events with this data turn up, the user-defined TAA (IOA) rule that you have created earlier will be unable to mark events by these fields.
Users with the Security auditor and Security officer roles cannot create TAA (IOA) rules based on event search conditions.
Importing a TAA (IOA) rule
You can import an IOC format file and use it to scan events and create Targeted Attack Analyzer alerts.
It is highly recommended that you test custom TAA (IOA) rules in a test environment before you import them. Custom TAA (IOA) rules may cause performance issues, in which case stable performance of Kaspersky Anti Targeted Attack Platform is not guaranteed
To import a TAA (IOA) rule:
- In the window of the program web interface, select the Custom rules section, TAA subsection.
This opens the TAA (IOA) rule table.
- Click Import.
This opens the file selection window on your local computer.
- Select the file that you want to upload and click Open.
This opens the New TAA (IOA) rule window.
- Set the State toggle switch to Enabled if you want to enable the rule for scanning the event database.
- On the Details tab, in the Name field, enter the name of the rule.
- In the Description field, enter any additional information about the rule.
- In the Importance drop-down list, select the importance level to be assigned to alerts generated using this TAA (IOA) rule.
- Low.
- Medium.
- High.
- In the Confidence drop-down list, select the level of confidence of this rule based on your estimate:
- Low.
- Medium.
- High.
- Under Apply to, select check boxes corresponding to servers on which you want to apply the rule.
- On the Query tab, verify the defined search conditions. Make changes if necessary.
- Click Save.
The user-defined TAA (IOA) rule is imported into the program.
You can also add a TAA (IOA) rule by saving events database search conditions in the Threat Hunting section.
Viewing custom TAA (IOA) rule details
To display information about the TAA (IOA) rule:
- In the window of the program web interface, select the Custom rules section, TAA subsection.
This opens the TAA (IOA) rule table.
- Select the rule for which you want to view information.
This opens a window containing information about the rule.
The window contains the following information:
- Click the Alerts link to display the alert table in a new browser tab. The alerts are filtered by the Targeted Attack Analyzer technology and the name of the TAA (IOA) rule that you are working on.
- Click the Find events link to display the events table in a new browser tab. The table is filtered by rule name.
- Click the Run query link to display the events table in a new browser tab. The table is filtered by rule name. The event search conditions are populated with information from the TAA (IOA) rule that you are working on. For example,
EventType=Process started AND FileName CONTAINS <name of the rule you are working on>
. You can edit the event search query. - Click the IOA ID link to display the ID that the program assigns to each rule.
IDs cannot be modified. You can copy the ID by clicking the Copy value to clipboard button.
- State is the use of the rule in events database scans.
The Details tab shows the following information:
- Name is the name of the rule that you specified when you added the rule.
- Description is any additional information about the rule that you specified.
- Importance is an estimate of the probable impact of the event on the security of computers or the corporate LAN as specified by the user when the rule was added.
- Confidence is the level of confidence depending on the likelihood of false alarms as defined by the user when the rule was added.
- Type is the type of the rule depending on the role of the server which generated it:
- Global—Created on the PCN server. These rules are used to scan events on this PCN server and all SCN servers connected to this PCN server. Scanned events belong to the tenant which the user is managing in the program web interface.
- Local—Created on the SCN server. These rules are used to scan events on this SCN server. Scanned events belong to the tenant which the user is managing in the program web interface.
- Apply to—Name of servers with the Central Node component on which the rule is applied.
The Query tab displays the source code of the query being checked. Click the Run query link in the upper part of the window to go to the Threat Hunting section and run an event search query.
Searching for alerts and events in which TAA (IOA) rules were triggered
To search and display alerts and events that were created by a user-defined TAA (IOA) rule triggering:
- In the window of the program web interface, select the Custom rules section, TAA subsection.
This opens the TAA (IOA) rule table.
- Select the rule for which you want to view the triggering result.
This opens a window containing information about the rule.
- Do one of the following:
- If you want to view alerts generated by the TAA (IOA) rule triggering, click Alerts to go to the alerts database.
The alert table is opened in a new browser tab.
- If you want to view events generated by the TAA (IOA) rule triggering, click Events to go to the events database.
The event table is opened in a new browser tab.
- If you want to view alerts generated by the TAA (IOA) rule triggering, click Alerts to go to the alerts database.
To search and display alerts and events that were created by a Kaspersky TAA (IOA) rule triggering:
- Select the Alerts section in the window of the program web interface.
This opens the table of alerts.
- Click the link in the Technologies column to open the filter configuration window.
- In the drop-down list on the left, select Contains.
- In the drop-down list on the right, select the (TAA) Targeted Attack Analyzer technology.
- Click Apply.
The table displays alerts generated by the TAA technology based on TAA (IOA) rules.
- Select an alert for which the Detected column displays the name of the relevant rule.
This opens a window containing information about the alert.
- Under Scan results, click the link with the name of the rule to open the rule information window.
- Do one of the following:
- If you want to view alerts generated by the TAA (IOA) rule triggering, click Alerts to go to the alerts database.
The alert table is opened in a new browser tab.
- If you want to view events generated by the TAA (IOA) rule triggering, click Events to go to the events database.
The event table is opened in a new browser tab.
- If you want to view alerts generated by the TAA (IOA) rule triggering, click Alerts to go to the alerts database.
Filtering and searching TAA (IOA) rules
To filter or search for TAA (IOA) rules by required criteria:
- In the window of the program web interface, select the Custom rules section, TAA subsection.
This opens the TAA (IOA) rule table.
- Depending on the filtering criterion, do the following:
The table displays only rules that match the specified criteria.
You can use multiple filters at the same time.
Resetting the TAA (IOA) rule filter
To clear a TAA (IOA) rule filter based on one or multiple filter conditions:
- In the window of the program web interface, select the Custom rules section, TAA subsection.
This opens the TAA (IOA) rule table.
- Click
to the right of that column heading of the rule table for which you want to clear filtering criteria.
If you want to clear several filter conditions, perform the necessary actions to clear each filter condition.
The selected filters are cleared.
The table displays only rules that match the specified criteria.
Enabling and disabling TAA (IOA) rules
Users with the Senior security officer role can enable or disable one or several rules, as well as all rules at once.
To enable or disable the use of a TAA (IOA) rule when scanning events:
- In the window of the program web interface, select the Custom rules section, TAA subsection.
This opens the TAA (IOA) rule table.
- In the row with the relevant rule, select or clear the check box in the State column.
The use of the rule when scanning events is enabled or disabled.
To enable or disable the use of all or multiple TAA (IOA) rules when scanning events:
- In the window of the program web interface, select the Custom rules section, TAA subsection.
This opens the TAA (IOA) rule table.
- Select the check boxes on the left of the rules whose use you want to enable or disable.
You can select all rules by selecting the check box in the row containing the headers of columns.
A control panel appears in the lower part of the window.
- Click Enable or Disable to enable or disable all rules.
The use of the selected rules when scanning events is enabled or disabled.
In distributed solution and multitenancy mode, you can manage only global TAA (IOA) rules on the PCN server. You can manage local TAA (IOA) rules on SCN servers of tenants to which you have access.
Users with the Security auditor and Security officer roles cannot enable or disable TAA (IOA) rules.
Modifying a TAA (IOA) rule
Users with the Senior security officer role can modify custom TAA (IOA) rules. Rules created by Kaspersky cannot be edited.
In distributed solution and multitenancy mode, you can edit only those TAA (IOA) rules that were created on the current server. Consequently, in the web interface of the PCN, you can edit only the rules that were created on the PCN. In the web interface of an SCN, you can edit only the rules that were created on the SCN.
To edit a TAA (IOA) rule:
- In the window of the program web interface, select the Custom rules section, TAA subsection.
This opens the TAA (IOA) rule table.
- Select the rule that you want to modify.
This opens a window containing information about the rule.
- Make the relevant changes.
- Click Save.
The rule settings are modified.
Users with the Security auditor and Security officer roles cannot modify TAA (IOA) rules based on event search conditions.
Deleting TAA (IOA) rules
Users with the Senior security officer role can delete one or more TAA (IOA) rules, or all rules at the same time.
In distributed solution and multitenancy mode, you can delete only those TAA (IOA) rules that were created on the current server. Consequently, in the web interface of the PCN, you can delete only the rules that were created on the PCN. In the web interface of an SCN, you can delete only the rules that were created on the SCN.
To delete a custom TAA (IOA) rule:
- In the window of the program web interface, select the Custom rules section, TAA subsection.
This opens the TAA (IOA) rule table.
- Select the rule that you want to delete.
This opens a window containing information about the rule.
- Click Delete.
This opens the action confirmation window.
- Click Yes.
The rule is deleted.
To delete all or multiple custom TAA (IOA) rules:
- In the window of the program web interface, select the Custom rules section, TAA subsection.
This opens the TAA (IOA) rule table.
- Select the check boxes on the left of the rules that you want to delete.
You can select all rules by selecting the check box in the row containing the headers of columns.
A control panel appears in the lower part of the window.
- Click Delete.
This opens the action confirmation window.
- Click Yes.
The selected rules will be deleted.
You cannot delete TAA (IOA) rules defined by Kaspersky. If you do not want to use a Kaspersky TAA (IOA) rule for scanning, add it to exclusions.
Users with the Security auditor and Security officer roles cannot modify TAA (IOA) rules based on event search conditions.
Managing user-defined IDS rules
In distributed solution and multitenancy mode, custom IDS rules can have one of the following types:
- Global—Created on the PCN server. These rules are used to scan events on this PCN server and all SCN servers connected to this PCN server. Scanned events belong to the tenant which the user is managing in the program web interface.
- Local—Created on the SCN server. These rules are used to scan events on this SCN server. Scanned events belong to the tenant which the user is managing in the program web interface.
Users with the Senior security officer role can import, configure, replace, and delete user-defined IDS rules, as well as add Kaspersky-defined IDS rules to exclusions from scanning. Users with the Senior security officer or Security auditor roles can use IDS rules to search for signs of targeted attacks, infected and possibly infected objects in the alert database, and to view the IDS rule information.
Users with the Security officer role cannot gain access to user-defined IDS rules.
Importing a user-defined IDS rule
You can import a Snort or Suricata file and use it to scan events and create Intrusion Detection System alerts.
It is highly recommended that you test custom IDS rules in a test environment before you import them. Custom IDS rules may cause performance issues, in which case stable performance of Kaspersky Anti Targeted Attack Platform is not guaranteed
For example, loading user-defined rules can cause the following errors:
- The program may create too many IDS alerts.
- If the program cannot record all IDS alerts in time, some network traffic objects may remain unscanned.
- Regular expressions in user-defined rules may impact performance or cause faulty operation of the program.
- Even formally correct user-defined rules may impact performance or cause faulty operation of the program.
IDs and attributes of custom rules may be modified when they are uploaded. Reject and Drop actions are changed to Alert. Rules with the Pass action are deleted
To import a custom IDS rule:
- In the window of the program web interface, select the Custom rules section, IDS subsection.
- This opens the user-defined IDS rule window. Click Import.
This opens the file selection window on your local computer.
- Select the file that you want to upload and click Open.
The user-defined IDS rule is imported into the program.
Viewing the information of a user-defined IDS rule
To view the information of a user-defined IDS rule,
In the window of the program web interface, select the Custom rules section, IDS subsection.
The web interface displays the following information about the IDS rule:
- State—Usage status of the rule in event scans.
- File size—Size of the rule file.
- Last update—Time when the rule was imported.
- Created by—Name of the user whose account was used to import the rule.
- Importance—Importance level that is assigned to an alert generated using this IDS rule.
Enabling and disabling the use of an IDS rule when scanning events
To enable or disable an IDS rule when scanning events:
- In the window of the program web interface, select the Custom rules section, IDS subsection.
- This opens the user-defined IDS rule window.
- Move the State switch to one of the following positions:
- Enabled
- Disabled
The use of the IDS rule when scanning events is enabled or disabled.
Users with the Security auditor role cannot enable or disable IDS rules.
Users with the Security officer role cannot gain access to user-defined IDS rules.
Configuring the importance of alerts generated by the user-defined IDS rule
To configure the importance level that is assigned to alerts generated using the IDS rule:
- In the window of the program web interface, select the Custom rules section, IDS subsection.
- This opens the user-defined IDS rule window. In the Importance drop-down list, select the importance level to be assigned to alerts generated using this IDS rule.
- Low.
- Medium.
- High.
- If necessary, use the State switch to enable this IDS rule.
The importance of alerts generated using this IDS rule is configured.
Users with the Security auditor role cannot configure IDS rules.
Users with the Security officer role cannot gain access to user-defined IDS rules.
Replacing a user-defined IDS rule
You can replace a previously imported Snort or Suricata file and use it to scan events and create Intrusion Detection System alerts.
It is highly recommended that you test custom IDS rules in a test environment before you import them. Custom IDS rules may cause performance issues, in which case stable performance of Kaspersky Anti Targeted Attack Platform is not guaranteed
IDs and attributes of custom rules may be modified when they are uploaded. Reject and Drop actions are changed to Alert. Rules with the Pass action are deleted
To replace a custom IDS rule:
- In the window of the program web interface, select the Custom rules section, IDS subsection.
- This opens the user-defined IDS rule window. Below the rule information, click Replace.
This opens the file selection window on your local computer.
- Select the file that you want to upload and click Open.
The user-defined IDS rule is imported into the program, replacing the previously imported rule.
Users with the Security auditor role cannot replace user-defined IDS rules.
Users with the Security officer role cannot gain access to user-defined IDS rules.
Downloading a user-defined IDS rule file to the computer
You can download a previously imported IDS rule file to your computer.
To download a custom IDS rule file to the computer:
- In the window of the program web interface, select the Custom rules section, IDS subsection.
- This opens the user-defined IDS rule window. Below the rule information, click Download.
The file will be saved to your local computer in the browser's downloads folder.
Deleting a user-defined IDS rule
When working in distributed solution mode, users with the Senior security officer role can delete only a user-defined IDS rule that was imported into the current server. It means that in the PCN web interface, you can only delete a rule that was created on the PCN. In the SCN web interface, you can only delete a rule that was created on the SCN.
To delete a custom IDS rule:
- In the window of the program web interface, select the Custom rules section, IDS subsection.
- This opens the user-defined IDS rule window. Click Delete.
This opens the action confirmation window.
- Click Yes.
The rule is deleted.
You cannot delete IDS rules defined by Kaspersky. If you do not want to use a Kaspersky IDS rule for scanning, add it to exclusions.
Users with the Security auditor role cannot delete user-defined IDS rules.
Users with the Security officer role cannot gain access to user-defined IDS rules.
Managing user-defined YARA rules
You can use YARA rules as YARA module databases to scan files and objects received at the Central Node and to scan hosts that have Kaspersky Endpoint Agent for Windows installed.
In distributed solution and multitenancy mode, custom YARA rules can have one of the following types:
- Global—Created on the PCN server. These rules are used to scan files and objects received at the PCN server and all SCN servers connected to that PCN server. Scanned files and objects belong to the tenant which the user is managing in the program web interface.
- Local—Created on the SCN server. These rules are used to scan files and objects received at the SCN server. Scanned files and objects belong to the tenant which the user is managing in the program web interface.
When managing the program web interface, users with the Senior security officer role can import a YARA rule file into Kaspersky Anti Targeted Attack Platform using the program web interface.
Users with the Security auditor and Security officer roles can only view YARA rules.
Viewing the YARA rule table
The table of user-defined YARA rules contains information about YARA rules that are used to scan events and create alerts; the table is displayed in the Custom rules section, YARA subsection of the program web interface window.
The table contains the following information:
- Created is the rule creation time.
—Alert importance for the Kaspersky Anti Targeted Attack Platform user depending on the impact this alert may have on computer or corporate LAN security based on Kaspersky experience.
By default, alerts generated by uploaded YARA rules are assigned a high level of importance.
- Type is the type of the rule depending on the operating mode of the program and the role of the server which generated the rule:
- Global—Created on the PCN server. These rules are used to scan files and objects received at the PCN server and all SCN servers connected to that PCN server. Scanned files and objects belong to the tenant which the user is managing in the program web interface.
- Local—Created on the SCN server. These rules are used to scan files and objects received at the SCN server. Scanned files and objects belong to the tenant which the user is managing in the program web interface.
- Name – name of the rule.
- File name is the name of the file from which the rule was imported.
- Created by is the name of the user whose account was used to import the rule.
- Servers – name of the server with the Central Node component on which the rule is applied.
- Traffic scan is the usage status of the rule when stream scanning files and objects arriving at the Central Node:
- Enabled – the rule is being used.
- Disabled – the rule is not being used.
Importing YARA rules
To import YARA rules:
- In the window of the program web interface, select the Custom rules section, YARA subsection.
- Click Upload.
This opens the file selection window.
- Select the YARA rules file that you want to upload and click the Open button.
This closes the file selection window and opens the Import YARA rules window.
The maximum allowed size of an uploaded file is 20 MB.
A report is displayed in the lower part of the window. The report contains the following information:
- The number of rules that can be successfully imported.
- The number of rules that will not be imported (if any).
For each rule that cannot be imported, its name is listed.
- Select the Traffic scan check box if you want to use imported rules for streaming scans of objects and data received at the Central Node.
- If necessary, enter any additional information in the Description field.
The Importance field cannot be edited. By default, alerts generated by uploaded YARA rules are assigned a high level of importance.
- Under Apply to, select check boxes corresponding to servers on which you want to apply the rules.
This field is displayed only when you are using the distributed solution and multitenancy mode.
- Click Save.
Imported rules are displayed in the table of YARA rules.
Configuring YARA rule table display
You can show or hide columns and change the order of columns in the table.
To configure the table display:
- In the window of the program web interface, select the Custom rules section, YARA subsection.
This opens the YARA rule table.
- In the heading part of the table, click
.
This opens the Customize table window.
- If you want to show a column in the table, select the check box next to the name of the parameter that you want displayed in the table.
If you want to hide a parameter in the table, clear the check box.
At least one check box must be selected.
- If you want to change the order of columns in the table, move the mouse cursor to the row with the relevant parameter, click
and move the row to its new place.
- If you want to restore default table display settings, click Default.
- Click Apply.
The table display is configured.
Page topViewing YARA rule details
To view YARA rule details:
- In the window of the program web interface, select the Custom rules section, YARA subsection.
This opens the YARA rule table.
- Select the rule for which you want to view information.
This opens a window containing information about the rule.
The window contains the following information:
- Click the Alerts link to display the alert table in a new browser tab. The alerts are filtered by the Targeted Attack Analyzer technology and the name of the TAA (IOA) rule that you are working on.
- The Start YARA scan link opens the task creation window.
- The Download link lets you download a file with YARA rules.
- Rule name is the name of the rule specified in the file.
- Traffic scan is the usage status of the rule when stream scanning files and objects arriving at the Central Node:
- Type is the type of the rule depending on the role of the server which generated it:
- Global—Created on the PCN server. These rules are used to scan files and objects received at the PCN server and all SCN servers connected to that PCN server. Scanned files and objects belong to the tenant which the user is managing in the program web interface.
- Local—Created on the SCN server. These rules are used to scan files and objects received at the SCN server. Scanned files and objects belong to the tenant which the user is managing in the program web interface.
- Importance—Importance level that is assigned to an alert generated using this rule.
By default, alerts generated by uploaded YARA rules are assigned a high level of importance.
- Description is any additional information about the rule that you specified.
- Apply to—Name of servers with the Central Node component on which the rule is applied.
Filtering and searching YARA rules
To filter or search for YARA rules by required criteria:
- In the window of the program web interface, select the Custom rules section, YARA subsection.
This opens the YARA rule table.
- Depending on the filtering criterion, do the following:
The table displays only rules that match the specified criteria.
You can use multiple filters at the same time.
Clearing a YARA rule filter
To clear the YARA rule filter for one or more filtering criteria:
- In the window of the program web interface, select the Custom rules section, YARA subsection.
This opens the YARA rule table.
- Click
to the right of that column heading of the rule table for which you want to clear filtering criteria.
If you want to clear multiple filter conditions, take steps to clear each filter condition individually.
The selected filters are cleared.
The table displays only rules that match the specified criteria.
Enabling and disabling YARA rules
Users with the Senior security officer role can enable or disable one or several rules, as well as all rules at once.
When working in distributed solution and multitenancy mode, you can enable or disable only those YARA rules that were created on the current server. It means that in the web interface of the PCN, you can enable or disable only the rules that were created on the PCN server. In the web interface of an SCN, you can enable or disable only the rules that were created on the SCN server.
If YARA rules with identical names are enabled on the PCN and SCN servers, the PCN rule takes precedence over the SCN rule when scanning files and objects.
To enable or disable a YARA rule for stream scanning files and objects arriving at the Central Node:
- In the window of the program web interface, select the Custom rules section, YARA subsection.
This opens the YARA rule table.
- In the row with the relevant rule, select or clear the check box in the Traffic scan column.
The rule is enabled or disabled for stream scanning files and objects arriving at the Central Node.
To enable or disable all or multiple YARA rules for stream scanning files and objects arriving at the Central Node:
- In the window of the program web interface, select the Custom rules section, YARA subsection.
- Select the check boxes on the left of the rules whose use you want to enable or disable.
You can select all rules by selecting the check box in the row containing the headers of columns.
A control panel appears in the lower part of the window.
- Click Enable or Disable to enable or disable all rules.
Selected rules are enabled or disabled for stream scanning files and objects arriving at the Central Node.
Deleting YARA rules
To delete a YARA rule:
- In the window of the program web interface, select the Custom rules section, YARA subsection.
This opens the YARA rule table.
- Select the rule that you want to delete.
This opens a window containing information about the rule.
- Click Delete.
- This opens the action confirmation window; in that window, click Yes.
The rule is deleted.
To delete all or multiple YARA rules:
- In the window of the program web interface, select the Custom rules section, YARA subsection.
This opens the YARA rule table.
- Select the check boxes on the left of the rules that you want to delete.
You can select all rules by selecting the check box in the row containing the headers of columns.
A control panel appears in the lower part of the window.
- Click Delete.
- This opens the action confirmation window; in that window, click Yes.
The selected rules will be deleted.
Users with the Security auditor and Security officer roles cannot delete YARA rules.