Kaspersky Anti Targeted Attack Platform

Recommendations for processing events

The event window displays recommendations for processing the event in the box between the event tree and the information text for users with the Senior security officer role.

You can follow the following recommendations:

Additionally, you can process the event by clicking the link with the name, path, MD5 or SHA256 hash of the file and the host name while viewing text information about the event in the lower part of the window.

Clicking the link with the file name or file path opens a list in which you can select one of the following actions:

Clicking the MD5 link opens a list in which you can select one of the following actions:

  • Add to filter.
  • Exclude from filter.
  • .
  • Find events.
  • Find alerts.
  • Copy value to clipboard.

Clicking the SHA256 link opens a list in which you can select one of the following actions:

Clicking the link with the host name opens a list in which you can select one of the following actions:

Users with the Security auditor and Security officer roles are not shown recommendations for processing events.

See also

Viewing the table of events

Configuring the event table display

Viewing information about an event

Information about events in the tree of events

Information about the "Process started" event

Information about the "Process terminated" event

Information about the "Module loaded" event

Information about the "Remote connection" event

Information about the "Prevention rule" event

Information about the "Document blocked" event

Information about the "File modified" event

Information about the "System event log" event

Information about the "Changes in the registry" event

Information about the "Port listened" event

Information about the "Driver loaded" event

Information about the "Alert" event

Information about the "Alert processing result" event

Information about the "Interpreted file run" event

Information about the "AMSI scan" event

Information about the "Interactive command input at the console" event

In this section

Following a recommendation to isolate a host

Following a recommendation to prevent a file from running

Following a recommendation to create a task

Page top
[Topic 196810]

Following a recommendation to isolate a host

To follow a recommendation to isolate a host from the network:

  1. In the recommendation box, select Isolate <host name>.

    This opens the host isolation settings window for the host from the event you are working on.

  2. In the Disable isolation after field, enter the time in hours (1 to 9999) during which network isolation of the host will be active.
  3. In the Exclusions for the host isolation rule settings group, in the Traffic direction list, select the direction of network traffic that must not be blocked:
    • Incoming/Outgoing.
    • Incoming.
    • Outgoing.
  4. In the IP field, enter the IP address whose network traffic must not be blocked.

    You can use a proxy server to let Kaspersky Endpoint Agent for Windows connect to Kaspersky Anti Targeted Attack Platform. When you add this proxy server to exclusions, network resources that can be accessed through the proxy server are also added to exclusions. If network resources that are accessed through the proxy server are added to exclusions, but the proxy server itself is not, such exclusions do not work.

  5. If you selected Incoming or Outgoing, in the Ports field, enter the connection ports.
  6. If you want to add more than one exclusion, click Add and repeat the steps to fill in the Traffic direction, IP and Ports fields.
  7. Click Save.

Information about host isolation is displayed in the Endpoint Agents section of the web interface.

You can also create a network isolation rule by clicking the Isolate <host name> link in the alert information and in the Endpoint Agents section of the web interface.

Users with the Security auditor and Security officer roles cannot isolate a host from the network.

See also

Following a recommendation to prevent a file from running

Following a recommendation to create a task

Page top
[Topic 199199]

Following a recommendation to prevent a file from running

To follow a recommendation to prevent a file from running:

  1. In the recommendations box, select Create prevention rule.

    This opens the prevention rule creation window with the MD5 or SHA256 hash of the file from the event you are working on.

  2. Configure the following settings:
    1. State is the state of the prevention rule:
      • If you want to enable the prevention rule, set the toggle switch to On.
      • If you want to disable the prevention rule, set the toggle switch to Off.
    2. Name is the name of the prevention rule.
    3. If you want the program to display a notification about prevention rule triggering to the user of the computer on which the prevention is applied, select the Notify user about blocking file execution check box.
    4. If you want to change the scope of the prevention rule, configure the Prevent on setting:
      • If you want to apply the prevention rule on all hosts of all servers, select All hosts.
      • If you want to apply the prevention rule on selected servers, select the Specified servers option and on the right of the Servers parameter name select the check boxes next to the names of the servers on which you want to apply the prevention rule.

        This option is available only when

        and is enabled.

      • If you want to apply the prevention rule on selected hosts, select the Specified hosts option and list these hosts in the Hosts field.
  3. Click Add.

The file run prevention is created.

Information about the created prevention is displayed in the Prevention section of the web interface.

If you selected the Notify user about blocking file execution check box and an attempt is made to execute a file prevented from running, the user is notified that an execution prevention rule was triggered by this file.

Users with the Security auditor and Security officer roles cannot prevent file execution.

See also

Following a recommendation to isolate a host

Following a recommendation to create a task

Page top
[Topic 199200]

Following a recommendation to create a task

To follow a recommendation to create a task:

  1. Click Create task, and in the recommendation box, expand the list of task types.
  2. Select a task type:

    This opens the task creation window with preset values (for example, host name, file path, MD5 or SHA256 hash of the file) from the event you are working on.

  3. If you want to modify preset values from the event, edit the corresponding fields.
  4. If you want to add a comment for the task, enter it in the Description box.
  5. If you are creating a Kill process, Delete file, Start YARA scan, or Service management task and you want to modify the scope of the task, change the value of the Task for setting:
    • If you want to run the task on all hosts of all servers, select the All hosts option.
    • If you want to run the task on selected servers, select the Specified servers option and on the right of the Servers parameter name select the check boxes next to the names of the servers on which you want to run the task.

      This option is available only when distributed solution and multitenancy mode is enabled.

    • If you want to run the task on selected hosts, select the Specified hosts option and list these hosts in the Hosts field.
  6. Click Add.

The task is created.

Information about the created task is displayed in the Tasks section of the web interface.

Users with the Security auditor and Security officer roles cannot create tasks.

See also

Following a recommendation to isolate a host

Following a recommendation to prevent a file from running

Page top
[Topic 199201]