Kaspersky Anti Targeted Attack Platform

Contents

Managing Kaspersky Endpoint Agent using Kaspersky Security Center Web Console

You can centrally manage several protected devices with Kaspersky Endpoint Agent installed, that are included in the administration group, by means of Kaspersky Endpoint Agent Management web plug-in. Kaspersky Security Center Web Console also lets you separately configure the operation settings of each protected device in the administration group.

An administration group is created manually in Kaspersky Security Center Web Console and includes several devices with Kaspersky Endpoint Agent installed, for which the same control and protection settings can be configured. For details on using administration groups, see Kaspersky Security Center Help.

Application settings for an individual protected device cannot be configured if Kaspersky Endpoint Agent operation on this protected device is controlled by an active Kaspersky Security Center policy.

Kaspersky Endpoint Agent can be managed from Kaspersky Security Center Web Console in the following ways:

  • Using Kaspersky Security Center policies. Kaspersky Security Center policies can be used to remotely configure the same protection settings for a group of devices. Task settings specified in the active policy have priority over task settings configured locally in the Application Console or remotely in the device properties window of Kaspersky Security Center Web Console.
  • You can use policies to configure general application settings, Real-Time Protection task settings, Local Activity Control tasks settings, and scheduled system task start settings.
  • Using Kaspersky Security Center group tasks. Kaspersky Security Center group tasks allow remote configuration of common settings of tasks with a limited execution period for a group of devices.
  • You can use group tasks to activate the application, configure On-Demand Scan task settings, update task settings, and Rule Generator for Applications Launch Control task settings.
  • Using tasks for a set of devices. Tasks for a set of devices allow remote configuration of common settings of tasks with a limited execution period for protected devices that do not belong to any administration group.
  • Using the properties window of a single device. In the device properties window, you can remotely configure the task settings for a single protected device included in the administration group. You can configure both general application settings and the settings of all Kaspersky Endpoint Agent tasks if the selected protected device is not controlled by an active Kaspersky Security Center policy.

Kaspersky Security Center Web Console makes it possible to configure application settings and advanced features, and lets you work with logs and notifications. You can configure these settings for a group of protected devices as well as for an individual protected device.

Google Chrome for Windows is required to manage Kaspersky Endpoint Agent using Kaspersky Security Center Web Console.

See also

Installing and uninstalling Kaspersky Endpoint Agent

Kaspersky Endpoint Agent activation

Managing Kaspersky Endpoint Agent using Kaspersky Security Center Administration Console

Managing Kaspersky Endpoint Agent using the command line interface

In this Help section

Managing Kaspersky Endpoint Agent policies

Configuring Kaspersky Endpoint Agent settings

Managing Kaspersky Endpoint Agent tasks

Page top
[Topic 200028]

Managing Kaspersky Endpoint Agent policies

This section describes how to create Kaspersky Endpoint Agent policies and enable policy settings.

In this section

Creating Kaspersky Endpoint Agent policy

Enabling settings in Kaspersky Endpoint Agent policy

See also

Configuring Kaspersky Endpoint Agent settings

Managing Kaspersky Endpoint Agent tasks

Page top
[Topic 193603_1]

Creating Kaspersky Endpoint Agent policy

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

To create a Kaspersky Endpoint Agent policy in the Kaspersky Security Center Web Console:

  1. In the main window, select DevicesPolicies and profiles.
  2. Click the Add button.

    The policy creation wizard starts.

  3. Select the Kaspersky Endpoint Agent application and click Next.
  4. Select the required Kaspersky Endpoint Agent deployment method by selecting the appropriate check boxes:
    • Integration with Kaspersky Sandbox
    • Endpoint Detection and Response Optimum
    • Endpoint Detection and Response Expert (KATA EDR), Kaspersky Industrial CyberSecurity for Networks.

    Policy type and integration with Kaspersky Sandbox and KATA EDR cannot be selected in Kaspersky Security Center Cloud Console.

  5. Click Next.
  6. On the General tab, you can perform the following actions:
    • Change the policy name.
    • Select policy status:
      • Active. After the next synchronization, the policy will be active on the computer.
      • Inactive. Backup policy. An inactive policy can be made active, if required.
      • Out-of-office. The policy will become active when the computer leaves the corporate network.
    • Configure the policy settings inheritance:
      • Inherit settings from parent policy. If this option is enabled, the policy settings will be inherited from the upper-level policy. The policy settings cannot be modified if the Force inheritance of settings in child policies option is enabled in the parent policy.
      • Force inheritance of settings in child policies. If this option is enabled, the parent policy settings will be applied to child policies. In the properties window of the child policy, the Inherit settings from parent policy option is automatically enabled and cannot be disabled.
  7. On the Application settings tab, you can configure Kaspersky Endpoint Agent policy settings.
  8. Click the Save button.
Page top
[Topic 200417]

Enabling settings in Kaspersky Endpoint Agent policy

When you configure Kaspersky Endpoint Agent policy settings, by default these settings are saved, but are not applied until you enable them.

You can enable settings for the groups where these settings are located. You can enable either individual groups of settings or all groups of settings within one policy.

To enable the group of settings in Kaspersky Endpoint Agent policy:

  1. Open the policy properties window.
    1. In the main Kaspersky Security Center Web Console window select DevicesPolicies and profiles.
    2. Select the policy you want to configure.
    3. In the <Policy name> window that opens, select the Application settings tab.
  2. Select the section and group of settings to which the required setting belongs.
  3. In the upper right corner of the settings group, change the switch from Undefined to Enforce.

All the settings of the group will be applied in the policy.

See also

Creating Kaspersky Endpoint Agent policy

Page top
[Topic 193098][Topic 194326_1]

Opening Kaspersky Endpoint Agent settings window

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

To open the Kaspersky Endpoint Agent policy settings window:

  1. In the main Kaspersky Security Center Web Console window select DevicesPolicies and profiles.
  2. Select the policy you want to configure.
  3. In the <Policy name> window that opens, select the Application settings tab.

To open the Kaspersky Endpoint Agent settings window for an individual device:

  1. In the main Kaspersky Security Center Web Console window select DevicesManaged devices.
  2. Select the device.
  3. In the <Device name> window that opens, select the Applications tab.
  4. Select Kaspersky Endpoint Agent.
  5. In the window that opens, select the Application settings tab.

    If an active Kaspersky Security Center policy is applied to a device and blocks changes to the application settings, these settings cannot be edited in the Application settings window, except for the network isolation settings.

    The settings of automatic network isolation can be configured in the policy properties, and the settings of network isolation on demand (manually enabled settings) can be configured in the properties of an individual device.

Page top

[Topic 206439]

Configuring Kaspersky Endpoint Agent security settings

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

To ensure maximum security of the IT infrastructure in your organization, you can configure access of users and third-party processes to Kaspersky Endpoint Agent. To do so, you can:

See also

Opening Kaspersky Endpoint Agent settings window

Configuring Kaspersky Endpoint Agent connection settings to a proxy server

Configuring Kaspersky Security Center as a proxy server for Kaspersky Endpoint Agent activation

Configuring Kaspersky Endpoint Agent policy type

Configuring KSN usage in Kaspersky Endpoint Agent

Configuring integration between Kaspersky Endpoint Agent and KATA Central Node

Configuring integration between Kaspersky Endpoint Agent and Kaspersky Managed Detection and Response

Configuring storage settings in Kaspersky Endpoint Agent

Configuring failure diagnosis

In this Help section

Configuring user permissions

Enabling Password protection

Enabling and disabling Self-Defense

Page top
[Topic 199459]

Configuring user permissions

Expand all | Collapse all

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

You can grant access to Kaspersky Endpoint Agent to individual users or groups of users. As a result, only specified users will be able to manage settings or services of the application.

To configure user permissions:

  1. Do one of the following:
    • Open the application properties window for an individual device.
      1. In the main Kaspersky Security Center Web Console window select DevicesManaged devices.
      2. Select the device.
      3. In the <Device name> window that opens, select the Applications tab.
      4. Select Kaspersky Endpoint Agent.
      5. In the window that opens, select the Application settings tab.
    • Open the policy properties window.
      1. In the main Kaspersky Security Center Web Console window select DevicesPolicies and profiles.
      2. Select the policy you want to configure.
      3. In the <Policy name> window that opens, select the Application settings tab.
  2. In the Application settings section select the Security settings subsection.
  3. In the User permissions for application service management group of settings, click the Configure button next to the name of the required setting (User permissions for application management or Configure user permissions for application management).

    To add users and user groups, specify the security descriptor strings using the

    .

  4. If you configure the policy settings, in the upper right corner of the group of settings, change the switch from Undefined to Enforce.
  5. Click OK.
  6. Click the Save button.

See also

Enabling Password protection

Enabling and disabling Self-Defense

Page top
[Topic 199460]

Enabling Password protection

Expand all | Collapse all

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

Unrestricted user access to the application and its settings can reduce the security level of the device. Password protection is a means to limit user access to the application.

To enable password protection:

  1. Do one of the following:
    • Open the application properties window for an individual device.
      1. In the main Kaspersky Security Center Web Console window select DevicesManaged devices.
      2. Select the device.
      3. In the <Device name> window that opens, select the Applications tab.
      4. Select Kaspersky Endpoint Agent.
      5. In the window that opens, select the Application settings tab.
    • Open the policy properties window.
      1. In the main Kaspersky Security Center Web Console window select DevicesPolicies and profiles.
      2. Select the policy you want to configure.
      3. In the <Policy name> window that opens, select the Application settings tab.
  2. In the Application settings section select the Security settings subsection.
  3. In the Password protection group of settings select the Apply password protection check box.
  4. Enter a password and confirm it.

    It is recommended to select a password that meets the following requirements:

    • The password must be at least 8 characters long.
    • The password must not contain the user's account name.
    • The password must not match the name of the device on which Kaspersky Endpoint Agent is installed.
    • The password must contain characters from at least three of the following groups:
      • uppercase characters (A-Z);
      • lowercase characters (a-z);
      • numbers (0-9);
      • special characters (!$#%).
  5. If you configure the policy settings, in the upper right corner of the group of settings, change the switch from Undefined to Enforce.
  6. Click OK.
  7. Click the Save button.

Password protection is now enabled. If a user attempts to perform a password protected action, the application will prompt the user to enter the password.

The application does not check the strength of the specified password. We recommend that you use third-party tools to verify the strength of the password. The password is considered strong enough if verification results confirm that the password cannot be guessed for at least 6 months.

The application does not prohibit login attempts after many attempts of entering an incorrect password.

See also

Configuring user permissions

Enabling and disabling Self-Defense

Page top
[Topic 199461]

Enabling and disabling Self-Defense

Expand all | Collapse all

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

The Self-Defense mechanism of Kaspersky Endpoint Agent provides protection from malware that tries to lock or delete the application. The Self-Defense mechanism prevents the alteration or deletion of application files on the hard drive, memory processes, and entries in the system registry.

To enable or disable Self-Defense:

  1. Do one of the following:
    • Open the application properties window for an individual device.
      1. In the main Kaspersky Security Center Web Console window select DevicesManaged devices.
      2. Select the device.
      3. In the <Device name> window that opens, select the Applications tab.
      4. Select Kaspersky Endpoint Agent.
      5. In the window that opens, select the Application settings tab.
    • Open the policy properties window.
      1. In the main Kaspersky Security Center Web Console window select DevicesPolicies and profiles.
      2. Select the policy you want to configure.
      3. In the <Policy name> window that opens, select the Application settings tab.
  2. In the Application settings section select the Security settings subsection.
  3. In the Self-defense group of settings, enable or disable the Enable self-defense for application modules in memory setting.
  4. If you configure the policy settings, in the upper right corner of the group of settings, change the switch from Undefined to Enforce.
  5. Click OK.
  6. Click the Save button.

The Self-Defense mechanism is now enabled or disabled.

See also

Configuring user permissions

Enabling Password protection

Page top
[Topic 199462]

Configuring Kaspersky Endpoint Agent connection settings to a proxy server

Expand all | Collapse all

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

Proxy server connection settings are used for updating databases, activating the application, and external services.

If you want to Use proxy server with the specified settings when connecting to KATA, Kaspersky Industrial CyberSecurity for Networks or Kaspersky Sandbox server, make sure that the Connect using the proxy server if specified in the general settings option is selected when configuring integration with KATA, Kaspersky Industrial CyberSecurity for Networks or Kaspersky Sandbox. This option is not selected by default.

To configure proxy server connection settings:

  1. Do one of the following:
    • Open the application properties window for an individual device.
      1. In the main Kaspersky Security Center Web Console window select DevicesManaged devices.
      2. Select the device.
      3. In the <Device name> window that opens, select the Applications tab.
      4. Select Kaspersky Endpoint Agent.
      5. In the window that opens, select the Application settings tab.
    • Open the policy properties window.
      1. In the main Kaspersky Security Center Web Console window select DevicesPolicies and profiles.
      2. Select the policy you want to configure.
      3. In the <Policy name> window that opens, select the Application settings tab.
  2. In the Application settings section select the Security settings subsection.
  3. Select one of the following proxy service usage options:
    • Do not use proxy server.
    • Automatically detect proxy server address.
    • Use proxy server with specified settings.
  4. If you select the Automatically detect proxy server address option, the proxy server for further telemetry transmission will be detected automatically.
  5. If you select the Use proxy server with specified settings option, specify the address and port of the proxy server you want to connect to in the Server name or IP address and Port fields.

    The default port number is 8080.

  6. If you want to use NTLM authentication to connect to the proxy server:
    1. Select the Use NTLM authentication by user name and password check box.
    2. In the User name field, enter the name of the user, whose account will be used for proxy server authentication.
    3. In the Password field, enter the password for connecting to the proxy server.

      You can make password characters visible by clicking Show to the right of the Password field.

  7. If you do not want to use the proxy server for internal addresses of your organization, select the Bypass proxy server for local addresses check box.
  8. If you configure the policy settings, in the upper right corner of the group of settings, change the switch from Undefined to Enforce.
  9. Click OK.
  10. In the policy properties window, click Save.

Proxy server connection settings are now configured.

See also

Configuring Kaspersky Security Center as a proxy server for Kaspersky Endpoint Agent activation

Opening Kaspersky Endpoint Agent settings window

Configuring Kaspersky Endpoint Agent security settings

Configuring Kaspersky Security Center as a proxy server for Kaspersky Endpoint Agent activation

Configuring Kaspersky Endpoint Agent policy type

Configuring KSN usage in Kaspersky Endpoint Agent

Configuring integration between Kaspersky Endpoint Agent and KATA Central Node

Configuring integration between Kaspersky Endpoint Agent and Kaspersky Managed Detection and Response

Configuring storage settings in Kaspersky Endpoint Agent

Configuring failure diagnosis

Page top
[Topic 199759]

Configuring Kaspersky Security Center as a proxy server for Kaspersky Endpoint Agent activation

Expand all | Collapse all

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

To enable usage of Kaspersky Security Center as a proxy server for the application activation:

  1. Do one of the following:
    • Open the application properties window for an individual device.
      1. In the main Kaspersky Security Center Web Console window select DevicesManaged devices.
      2. Select the device.
      3. In the <Device name> window that opens, select the Applications tab.
      4. Select Kaspersky Endpoint Agent.
      5. In the window that opens, select the Application settings tab.
    • Open the policy properties window.
      1. In the main Kaspersky Security Center Web Console window select DevicesPolicies and profiles.
      2. Select the policy you want to configure.
      3. In the <Policy name> window that opens, select the Application settings tab.
  2. In the Application settings section select the Security settings subsection.
  3. In the Licensing group of settings, select the Use Kaspersky Security Center as a proxy server when activating the application check box.
  4. If you configure the policy settings, in the upper right corner of the group of settings, change the switch from Undefined to Enforce.
  5. Click OK.
  6. In the policy properties window, click Save.

Kaspersky Security Center usage as a proxy server for Kaspersky Endpoint Agent activation is now enabled.

Page top

[Topic 199760]

Configuring Kaspersky Endpoint Agent policy type

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

Selecting Kaspersky Endpoint Agent's policy type is necessary in order for the list of settings displayed in the policy to correspond to the selected Kaspersky Endpoint Agent deployment method.

To configure the policy type:

  1. Open the policy properties window.
    1. In the main Kaspersky Security Center Web Console window select DevicesPolicies and profiles.
    2. Select the policy you want to configure.
    3. In the <Policy name> window that opens, select the Application settings tab.
  2. In the Application settings section select the Management and interface subsection.
  3. In the window that opens, select the required Kaspersky Endpoint Agent deployment method by selecting the appropriate check boxes:
    • Integration with Kaspersky Sandbox
    • Endpoint Detection and Response Optimum
    • Endpoint Detection and Response Expert (KATA EDR), Kaspersky Industrial CyberSecurity for Networks

    Policy type and integration with Kaspersky Sandbox and KATA EDR cannot be selected in Kaspersky Security Center Cloud Console.

  4. Click ОК.

The policy type has been changed. The policy contains the settings for the selected Kaspersky Endpoint Agent deployment method.

Page top
[Topic 200211]

Configuring KSN usage in Kaspersky Endpoint Agent

Expand all | Collapse all

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

To protect your computer more effectively, Kaspersky Endpoint Security uses data received from users around the globe. Kaspersky Security Network is designed to receive this data.

Kaspersky Security Network (KSN) is an infrastructure of cloud services that provide access to the online Kaspersky Knowledge Base that contains information about the reputations of files, web resources, and software. The use of data from Kaspersky Security Network ensures faster responses by the

to objects that are not yet listed in anti-virus application databases, improves performance of some protection components, and reduces the likelihood of false positives.

Participation in Kaspersky Security Network allows Kaspersky to quickly acquire information about the types and sources of objects that are not yet listed in anti-virus application databases, develop methods for neutralizing such objects, and reduce the number of false positives.

When you use Kaspersky Security Network, certain statistical data collected while Kaspersky Endpoint Agent is running is automatically sent to Kaspersky. Files, or parts of files, that may be exploited by intruders to harm the computer or data can be also sent to Kaspersky to be further examined.

No personal data is collected, processed, or stored. The types of data that Kaspersky Endpoint Agent sends to Kaspersky Security Network are described in the KSN Statement.

Participation in Kaspersky Security Network is voluntary. KSN usage is disabled by default. After enabling KSN usage, you can disable this option at any time.

Starting from version 3.10,

(also referred to as KMP) usage cannot be configured by means of Kaspersky Endpoint Agent. If usage of the KMP service was enabled in the previous Kaspersky Endpoint Agent version, the KMP service continues functioning after the application is updated to version 3.10 and later. After the application update, you can disable the KMP service only using Kaspersky Endpoint Agent Administration Plug-in or Kaspersky Endpoint Agent Web Plug-in of versions earlier then 3.10.

To enable KSN usage:

  1. Do one of the following:
    • Open the application properties window for an individual device.
      1. In the main Kaspersky Security Center Web Console window select DevicesManaged devices.
      2. Select the device.
      3. In the <Device name> window that opens, select the Applications tab.
      4. Select Kaspersky Endpoint Agent.
      5. In the window that opens, select the Application settings tab.
    • Open the policy properties window.
      1. In the main Kaspersky Security Center Web Console window select DevicesPolicies and profiles.
      2. Select the policy you want to configure.
      3. In the <Policy name> window that opens, select the Application settings tab.
  2. In the Kaspersky Security Network section, click the Read terms and conditions of the KSN Statement link and perform the following actions:
    1. In the right part of the window, review the terms and conditions of the KSN Statement.
    2. If you agree with terms and conditions of the Statement, select the I confirm that I have fully read, understood, and accept the terms and conditions of this Kaspersky Security Network Statement check box.
    3. Click OK.
  3. Select the Enable Kaspersky Security Network usage check box.
  4. If you want to use Kaspersky Security Center for telemetry transmission, select the check box.
  5. If you configure the policy settings, in the upper right corner of the group of settings, change the switch from Undefined to Enforce.
  6. Click OK.
  7. In the policy properties window, click Save.

KSN usage is enabled.

See also

Opening Kaspersky Endpoint Agent settings window

Configuring Kaspersky Endpoint Agent security settings

Configuring Kaspersky Endpoint Agent connection settings to a proxy server

Configuring Kaspersky Security Center as a proxy server for Kaspersky Endpoint Agent activation

Configuring Kaspersky Endpoint Agent policy type

Configuring integration between Kaspersky Endpoint Agent and KATA Central Node

Configuring integration between Kaspersky Endpoint Agent and Kaspersky Managed Detection and Response

Configuring storage settings in Kaspersky Endpoint Agent

Configuring failure diagnosis

Page top
[Topic 199776]

Configuring integration between Kaspersky Endpoint Agent and KATA Central Node

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

This section contains information on how to configure integration between Kaspersky Endpoint Agent and the KATA Central Node component using the Kaspersky Security Center Web Console.

In this Help section

Configuring data submission settings

Configuring request throttling settings

Enabling and disabling integration with KATA Central Node

Configuring trusted connection with KATA Central Node

Configuring synchronization settings between Kaspersky Endpoint Agent and KATA Central Node

Page top
[Topic 206114]

Configuring data submission settings

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

To configure data submission settings:

  1. Open the policy properties window.
    1. In the main Kaspersky Security Center Web Console window select DevicesPolicies and profiles.
    2. Select the policy you want to configure.
    3. In the <Policy name> window that opens, select the Application settings tab.
  2. In the Telemetry collection servers section, select the General settings subsection.

    The General settings window opens.

  3. In the Data submission settings group, do the following:
    • Specify the value in the Events transmission period (sec.) field.
    • Specify the value in the Maximum number of events in a package field.
  4. In the upper right corner of the settings group, change the switch from Undefined to Enforce.

    The default switch position is Enforce.

  5. Click OK.

See also

Configuring request throttling settings

Enabling and disabling integration with KATA Central Node

Configuring trusted connection with KATA Central Node

Configuring synchronization settings between Kaspersky Endpoint Agent and KATA Central Node

Page top
[Topic 206806]

Configuring request throttling settings

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

The request throttling feature allows restricting the flow of events with low importance from Kaspersky Endpoint Agent to the Central Node component.

To configure the request throttling settings:

  1. Open the policy properties window.
    1. In the main Kaspersky Security Center Web Console window select DevicesPolicies and profiles.
    2. Select the policy you want to configure.
    3. In the <Policy name> window that opens, select the Application settings tab.
  2. In the Telemetry collection servers section, select the General settings subsection.

    The General settings window opens.

  3. In the Request throttling group of settings, you can perform the following actions:
    • Select or clear the Enable request throttling check box to enable or disable the feature.

      This feature is enabled by default.

    • Specify the value in the Maximum number of events per hour field.

      The application analyzes telemetry data flow and restricts transmission of events with low importance if the number of transmitted events tends to exceed the value specified in this field. The default value is 3000 events per hour.

    • Specify the value in the Percentage of event limit excess field.

      If the flow of events of the same type with low importance exceeds the threshold value specified in this field as a percentage of the total number of events, transmission of events of this type is restricted. You can specify a value from 5% to 100%. The default value is 15%.

  4. In the upper right corner of the settings group, change the switch from Undefined to Enforce.

    The default switch position is Enforce.

  5. Click OK.
Page top
[Topic 206807]

Enabling and disabling integration with KATA Central Node

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

If you use Nginx as a proxy server between a device with Kaspersky Endpoint Agent installed and KATA server, configure the client_max_body_size setting. The value of the client_max_body_size setting must be equal to the maximum size of the object sent by Kaspersky Endpoint Agent to KATA for processing. Otherwise, Nginx will not send objects whose size exceeds the specified value. The default value is 1 MB.

To enable or disable integration with the KATA Central Node component:

  1. Open the policy properties window.
    1. In the main Kaspersky Security Center Web Console window select DevicesPolicies and profiles.
    2. Select the policy you want to configure.
    3. In the <Policy name> window that opens, select the Application settings tab.
  2. In the Telemetry collection servers section, select the Integration with KATA subsection.

    The KATA integration window opens.

  3. In the Connection settings group, do one of the following:
    • To enable integration with KATA Central Node:
      1. Select the Enable KATA integration check box.
      2. In the List of KATA servers settings group, for one or more KATA servers, specify the IP address or full domain name of the KATA server, as well as the port for connecting to the server.

        Kaspersky Endpoint Agent connects to the first server in the list. If the connection does not succeed, Kaspersky Endpoint Agent connects to the second server and so on down the list.

    • To disable integration with KATA Central Node, clear the Enable KATA integration check box.
  4. Enable or disable the Connect using the proxy server if specified in the general settings option.

    This option is disabled by default. The application connects to the KATA server only directly and does not use the general proxy server connection settings. You can enable this option if you want the application to use the general proxy server connection settings when connecting to the KATA server.

  5. In the upper right corner of the settings group, change the switch from Undefined to Enforce.

    The default switch position is Enforce.

  6. Click OK.

Integration with KATA Central Node is enabled or disabled.

See also

Configuring data submission settings

Configuring request throttling settings

Configuring trusted connection with KATA Central Node

Configuring synchronization settings between Kaspersky Endpoint Agent and KATA Central Node

Page top
[Topic 206808]

Configuring trusted connection with KATA Central Node

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

To configure trusted connection between Kaspersky Endpoint Agent and KATA Central Node, perform the following actions on Kaspersky Endpoint Agent side:

  1. Open the policy properties window.
    1. In the main Kaspersky Security Center Web Console window select DevicesPolicies and profiles.
    2. Select the policy you want to configure.
    3. In the <Policy name> window that opens, select the Application settings tab.
  2. In the Telemetry collection servers section, select the Integration with KATA subsection.

    The KATA integration window opens.

  3. In the Connection settings group, select the Use pinned certificate to protect connection check box.
  4. Click the Add new TLS certificate button.

    The window for adding a new TLS certificate opens.

  5. Perform one of the following actions to add a TLS certificate:
    • Add a certificate file. Click Upload, and in the window that opens, select the certificate file and click Open.
    • Copy and paste the contents of the certificate file to the TLS certificate data field.

    Kaspersky Endpoint Agent may have only one KATA server TLS certificate. If you have added a TLS certificate before and then add a TLS certificate once again, only the last added certificate is valid.

  6. Click OK.

    Information about the added TLS certificate is shown in the TLS certificate data group of settings.

  7. If you want to configure additional connection protection by a user certificate, do the following:
    1. Select the Secure connection with the client certificate check box.
    2. Click the Load Crypto-container button.
    3. In the window that opens select the PFX archive and click Open.
    4. In the Crypto-container password field, enter the password for the PFX archive.
    5. Click OK.
  8. In the upper right corner of the settings group, change the switch from Undefined to Enforce.

    The default switch position is Enforce.

  9. Click OK.

A Trusted connection to the KATA server is now configured.

The TLS certificate file must satisfy the following requirements:

  • The file must contain the certificate itself and a private encryption key for the connection.
  • The file must be in PEM or DER format.
  • The private key length must be 2048 bits or longer.

For more details about preparing TLS certificates for import, refer to OpenSSL documentation.

See also

Configuring data submission settings

Configuring request throttling settings

Enabling and disabling integration with KATA Central Node

Configuring synchronization settings between Kaspersky Endpoint Agent and KATA Central Node

Page top
[Topic 206809]

Configuring synchronization settings between Kaspersky Endpoint Agent and KATA Central Node

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

To configure synchronization settings between Kaspersky Endpoint Agent and KATA Central Node:

  1. Open the policy properties window.
    1. In the main Kaspersky Security Center Web Console window select DevicesPolicies and profiles.
    2. Select the policy you want to configure.
    3. In the <Policy name> window that opens, select the Application settings tab.
  2. In the Telemetry collection servers section, select the Integration with KATA subsection.

    The KATA integration window opens.

  3. In the Additional settings group, configure the following settings:
    • Timeout (sec.). Specify the maximum KATA server response timeout. The default value is 10 seconds.
    • Send synchronization request to KATA server every (min.). Specify the time interval for sending requests for synchronization Kaspersky Endpoint Agent settings and tasks with KATA Central Node. You can specify a value from 1 to 60 minutes. The default value is 5 minutes.
    • Select or clear the Use TTL period when sending events check box. The check box is cleared by default.

      If the check box is selected, Kaspersky Endpoint Agent does not send information about the processes that are started again to the KATA server. Kaspersky Endpoint Agent does not consider the launch of the process as repeated if the process is started after the end of the TTL period.

    • If you select the Use TTL period when sending events check box, specify the time in the TTL period (min.) field. The default value is 1440 minutes.
  4. In the upper right corner of the settings group, change the switch from Undefined to Enforce.

    The default switch position is Enforce.

  5. Click OK.

See also

Configuring data submission settings

Configuring request throttling settings

Enabling and disabling integration with KATA Central Node

Configuring trusted connection with KATA Central Node

Page top
[Topic 206810]

Configuring EDR telemetry settings

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

This section contains information on how to configure:

  • for EDR about application processes, which Kaspersky Endpoint Agent processes and sends to a server with the KATA Central Node or Kaspersky Industrial CyberSecurity for Networks component.
  • Optimization of the volume of EDR telemetry that Kaspersky Endpoint Agent processes and sends to a server with the Kaspersky Industrial CyberSecurity for Networks component.
  • Exclusions for EDR telemetry about network communications, which Kaspersky Endpoint Agent processes and sends to a server with the Kaspersky Industrial CyberSecurity for Networks component.

In this Help section

Enabling and configuring exclusions for and optimization of sent EDR telemetry about application processes

Enabling and configuring exclusions for sent EDR telemetry about network communications

Page top
[Topic 206175]

Enabling and configuring exclusions for and optimization of sent EDR telemetry about application processes

Expand all | Collapse all

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

You can enable and configure exclusions for and optimization of EDR telemetry about application processes using Kaspersky Security Center Web Console, in the properties of an individual device or in the policy settings for a group of devices.

Exclusions for EDR telemetry about application processes are available when Kaspersky Endpoint Agent is integrated with servers where KATA Central Node or Kaspersky Industrial CyberSecurity for Networks is installed.

Kaspersky Endpoint Agent does not analyze or send data on excluded application processes to the server with KATA Central Node or Kaspersky Industrial CyberSecurity for Networks installed.

Optimization of the volume of EDR telemetry about application processes can be managed (enabled / disabled) when Kaspersky Endpoint Agent is integrated with servers where Kaspersky Industrial CyberSecurity for Networks is installed.

If optimization of the volume of EDR telemtry is enabled, Kaspersky Endpoint Agent does not send events with 102 (basic communications) and 8 (network activity of a process) codes for the Microsoft SMB protocol and the Network Agent process klnagent.exe regarding processes of applications on a server where KATA Central Node or Kaspersky Industrial CyberSecurity for Networks is installed.

To enable and configure exclusions for and optimization of the volume of EDR telemetry on application processes:

  1. Do one of the following:
    • Open the application properties window for an individual device.
      1. In the main Kaspersky Security Center Web Console window select DevicesManaged devices.
      2. Select the device.
      3. In the <Device name> window that opens, select the Applications tab.
      4. Select Kaspersky Endpoint Agent.
      5. In the window that opens, select the Application settings tab.
    • Open the policy properties window.
      1. In the main Kaspersky Security Center Web Console window select DevicesPolicies and profiles.
      2. Select the policy you want to configure.
      3. In the <Policy name> window that opens, select the Application settings tab.
  2. In the EDR telemetry section, select Excluded processes.

    The Excluded processes window opens.

  3. In the Exclusions settings group, enable the Use exclusions setting to enable use of EDR telemetry exclusions.
  4. Configure optimization of the volume of EDR telemetry:

    When Kaspersky Endpoint Agent is integrated with servers where KATA Central Node is installed, optimization of the volume of EDR telemetry should always be enabled.

    • Disable the Optimize the amount of telemetry setting if you want Kaspersky Endpoint Agent to send events with codes 102 (basic communications) and 8 (the process's network activity) for the Microsoft SMB protocol, WinRM service, and the Network Agent process klnagent.exe.
    • Enable the Optimize the amount of telemetry setting if you want Kaspersky Endpoint Agent to not send events with codes 102 (basic communications) and 8 (the process’s network activity) for the Microsoft SMB protocol and the Network Agent process klnagent.exe.

    If the Use exclusions setting is disabled, Kaspersky Endpoint Agent does not send events with codes 102 (basic communications) and 8 (the process's network activity) for the Microsoft SMB protocol and the Network Agent process klnagent.exe, regardless of the value of the Optimize the amount of telemetry setting.

  5. Create a list of exclusions:
    1. Click the Add button.
    2. In the Rule properties window that opens, configure the exclusion settings:

      Exclusion settings are applied using a logical AND.

      To create an exclusion, specify the value in the Full path field and select at least one event type in the Use this exclusion for the following event types list.

      If the Network events value is selected for the Use this exclusion for the following event types criterion, specify the full path to the file in the Full path field.

      The object for which you create an exclusion must be available on the protected device at the time the exclusion settings are applied. For example, if you first configure exclusion for a specific application, and then install that application on the protected device, this exclusion will not be applied.

      1. In the Process information section, specify the values in the following fields:
        • Full path. Full path to the file, including its name and extension. You can use file masks (using the ? and * characters), as well as system environment variables.
        • Command line text. Command line to run the object.
        • Parent folder path. The path to the folder where the file is located.
      2. In the File properties section, specify the values in the following fields:
        • File description. The value of the FileDescription parameter from the resource of the RT_VERSION type (VersionInfo).
        • Original file name. The value of the OriginalFilename parameter from the resource of the RT_VERSION type (VersionInfo).
        • File version. The value of the FileVersion parameter from the resource of the RT_VERSION type (VersionInfo).
      3. In the File checksums section, specify the values in the following fields:
        • MD5. MD5 hash of the file.
        • SHA256. SHA256 hash of the file.
      4. In the Use this exclusion for the following event types list, select at least one value:
        • File modification.
        • Network events.
        • Interactive input in the console.

          This event type is selected by default.

        • Loading the process module.
        • Changes in the Registry.
    3. Click OK to save the changes and close the Rule properties window.

      The new exclusion is created and displayed in the list of exclusions.

    4. If you need to export the exclusion list to an XML file, click the Export button.
    5. If you need to import the exclusion list from an XML file, click the Import button.
    6. If you need to modify an exclusion, click the Modify button.
    7. If you need to delete an exclusion from the list, select the exclusion and click the Delete button.
  6. If you are configuring the policy settings, make sure that the switch in the upper right corner of the group of settings is turned on. It is the default position of the switch.
  7. Click OK to save the changes.
Page top
[Topic 207214]

Enabling and configuring exclusions for sent EDR telemetry about network communications

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

You can configure exclusions for EDR telemetry about network communications using Kaspersky Security Center Web Console, in the properties of an individual device or in the policy settings for a group of devices.

Exclusions for EDR telemetry about network communications are applied when Kaspersky Endpoint Agent is integrated with servers where Kaspersky Industrial CyberSecurity for Networks is installed.

Kaspersky Endpoint Agent does not analyze or send data matching exclusion settings to the server with KATA Central Node or Kaspersky Industrial CyberSecurity for Networks installed.

To enable and configure EDR telemetry about network communications:

  1. Do one of the following:
    • Open the application properties window for an individual device.
      1. In the main Kaspersky Security Center Web Console window select DevicesManaged devices.
      2. Select the device.
      3. In the <Device name> window that opens, select the Applications tab.
      4. Select Kaspersky Endpoint Agent.
      5. In the window that opens, select the Application settings tab.
    • Open the policy properties window.
      1. In the main Kaspersky Security Center Web Console window select DevicesPolicies and profiles.
      2. Select the policy you want to configure.
      3. In the <Policy name> window that opens, select the Application settings tab.
  2. In the EDR telemetry section, select Excluded network communications.

    The Excluded network communications of the process window opens.

  3. In the Exclusions settings group, enable the Use exclusions setting to enable use of EDR telemetry exclusions.
  4. Create a list of exclusions:
    1. Click the Add button.
    2. In the Rule properties window that opens, configure the exclusion settings.

      Exclusion settings are applied using a logical AND.

      1. In the Name field, enter the name of the exclusion.
      2. In the Direction drop-down list, select the direction of network traffic.
      3. In the Protocol drop-down list, select the network protocol.
      4. If you select a custom protocol, in the Number field, enter the network protocol number.
      5. Select the Local port OR range check box and enter the port number or number range.

        For incoming connections (in the Direction drop-down list, Incoming is selected), enter the port or range of ports for the local device.

        For outgoing connections (in the Direction drop-down list, Outgoing is selected), enter the port or range of ports for the remote device.

        The values 1–65535 are available for port numbers.

        The values 1–10, 20–30000 and 1–65535 are available for a range of ports.

        Limitations:

        • For network connections of a local device running the Windows XP operating system, you can specify only a single port, because Windows XP does not support a range of ports.
        • For network connections of a remote device running the Windows XP operating system, you can specify a range of ports, but only the first port in the specified range is correctly applied, because Windows XP does not support a range of ports.
      6. Select the Remote port OR range check box and enter the port number or number range.

        For incoming connections (in the Direction drop-down list, Incoming is selected), enter the port or range of ports for the remote device.

        For outgoing connections (in the Direction drop-down list, Outgoing is selected), enter the port or range of ports for the local device.

        The values 1–65535 are available for port numbers.

        The values 1–10, 20–30000 and 1–65535 are available for a range of ports.

        Limitations:

        • For network connections of a local device running the Windows XP operating system, you can specify only a single port, because Windows XP does not support a range of ports.
        • For network connections of a remote device running the Windows XP operating system, you can specify a range of ports, but only the first port in the specified range is correctly applied, because Windows XP does not support a range of ports.
      7. Select the Local address check box and enter the network address of the device for which Kaspersky Endpoint Agent will not analyze or send EDR telemetry about network traffic in accordance with the exclusion settings.

        For incoming exclusions (in the Direction drop-down list, Incoming is selected), enter the network address for the local device.

        For outgoing connections (in the Direction drop-down list, Outgoing is selected), enter the network address of the remote device.

        For IP addresses, only addresses in IPv4 format are supported.

      8. Select the Remote address check box and enter the network address of the device for which Kaspersky Endpoint Agent will not analyze or send EDR telemetry about network traffic in accordance with the exclusion settings.

        For incoming connections (in the Direction drop-down list, Incoming is selected), enter the network address for the remote device.

        For outgoing connections (in the Direction drop-down list, Outgoing is selected), enter the network address for the local device.

        For IP addresses, only addresses in IPv4 format are supported.

      9. Create the list of application for which Kaspersky Endpoint Agent will not analyze or send EDR telemetry about network traffic in accordance with the exclusion settings.
        1. Select the Applications check box.
        2. In the field below, specify the path to the executable file of the application you want to add to the list. You can enter the path manually or with the help of the Browse button.
        3. Click the Add button.
        4. For each application you want to add to the list, repeat steps 2 and 3 of the guide.
        5. If necessary, remove an application from the list:
          1. Select the application in the list.
          2. Click the Delete button.
      10. Click OK to save the changes and close the Rule properties window.

        The new exclusion is created and displayed in the list of exclusions.

    3. If you need to modify an exclusion, click the Modify button.
    4. If you need to delete an exclusion, select the exclusion and click the Delete button.
  5. If you are configuring the policy settings, make sure that the switch in the upper right corner of the group of settings is turned on. It is the default position of the switch.
  6. Click OK to save the changes.
Page top
[Topic 243221]

Configuring integration between Kaspersky Endpoint Agent and Kaspersky Managed Detection and Response

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

Before performing the following steps, get the MDR configuration file. It contains a configuration file (BLOB) required for integration.

By downloading the Kaspersky Managed Detection and Response configuration file, you agree to automatically send the data from the device with Kaspersky Endpoint Security installed to Kaspersky for processing. Do not download the configuration file if you do not want the transmitted data to be processed.

If you want Kaspersky Endpoint Agent to process data about events generated by Kaspersky Industrial CyberSecurity for Networks and send this data to Kaspersky Managed Detection and Response, configure interaction with Kaspersky Security Center in the settings of Kaspersky Industrial CyberSecurity for Networks. For detailed information on configuring interaction between the applications, refer to the Kaspersky Industrial CyberSecurity for Networks documentation.

To configure integration between Kaspersky Endpoint Agent and Kaspersky Managed Detection and Response using the Kaspersky Security Center Web Console:

  1. Open the Kaspersky Security Center Web Console.
  2. Open the DevicesPolicies and profiles tab.
  3. In the list of policies, select the name of Kaspersky Endpoint Agent policy that you want to configure.

    This opens the policy settings window.

  4. Enable KSN Usage.

    Open the main window of the Kaspersky Security Center Web Console.

  5. In the Administration Console tree, configure the Private KSN settings (for information on configuring Kaspersky Security Network proxy server settings, refer to Kaspersky Security Center Help).

    Download the Kaspersky Managed Detection and Response configuration file with the pkcs7 extension that is included in the mdr_config.zip archive.

  6. To continue configuring integration between Kaspersky Endpoint Agent and Kaspersky Managed Detection and Response, open the main window of the Kaspersky Security Center Web Console.
  7. Open the DevicesPolicies and profiles tab.
  8. In the list of policies, select the name of Kaspersky Endpoint Agent policy that you want to configure.

    This opens the policy settings window.

  9. On the Application settings tab, select Managed Detection and Response.
  10. In the Managed Detection and Response settings group, do the following:
    1. Switch the toggle button to Managed Detection and Response enabled.
    2. Click the Upload configuration file (BLOB) button and select the BLOB configuration file to load.
    3. In the User identifier field, enter an arbitrary value.
    4. In the upper right corner of the settings group, change the switch from Undefined to Enforce.
  11. Click Save to save the changes.

Integration between Kaspersky Endpoint Agent and Kaspersky Managed Detection and Response is configured.

MDR operation when using Kaspersky Endpoint Agent simultaneously with Kaspersky Endpoint Security

Kaspersky Endpoint Security 11 or later with the current database version supports interaction with MDR. In Kaspersky Endpoint Security 11.6.0 or later, interaction with MDR is available immediately after installation.

If you use Kaspersky Endpoint Agent to work with MDR and install Kaspersky Endpoint Security of the version that supports interaction with MDR or update Kaspersky Endpoint Security 11 or later databases to the current version, MDR stops working with Kaspersky Endpoint Agent and becomes available for work with Kaspersky Endpoint Security. At that:

  • Switching between Kaspersky Endpoint Agent and Kaspersky Endpoint Security is performed in quiet mode.
  • Kaspersky Endpoint Agent allows for configuring settings for interaction with MDR, but these settings are not applied on the device.
  • If Kaspersky Endpoint Security is not available (for example, you uninstalled the application), MDR can start working with Kaspersky Endpoint Agent if you restart the Kaspersky Endpoint Agent service.
  • The Managed Detection and Response component remains in the Running status in Kaspersky Endpoint Agent settings on the device, since Kaspersky Endpoint Agent continues to communicate with MDR (for example, to resume working with the solution if necessary).

Page top

[Topic 200416]

Configuring storage settings in Kaspersky Endpoint Agent

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

This section describes how to configure the quarantine settings and data synchronization settings with the Administration Server by means of Kaspersky Endpoint Agent Management plug-in.

See also

Opening Kaspersky Endpoint Agent settings window

Configuring Kaspersky Endpoint Agent security settings

Configuring Kaspersky Endpoint Agent connection settings to a proxy server

Configuring Kaspersky Security Center as a proxy server for Kaspersky Endpoint Agent activation

Configuring Kaspersky Endpoint Agent policy type

Configuring KSN usage in Kaspersky Endpoint Agent

Configuring integration between Kaspersky Endpoint Agent and KATA Central Node

Configuring integration between Kaspersky Endpoint Agent and Kaspersky Managed Detection and Response

Configuring failure diagnosis

In this section

About Kaspersky Endpoint Agent quarantine

About quarantine management in Kaspersky Endpoint Agent

Configuring quarantine settings and restoration of objects from quarantine

Configuring data synchronization with the Administration Server

Page top
[Topic 196788_1]

About Kaspersky Endpoint Agent quarantine

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

Quarantine is a special local repository on the device. The user can put files considered dangerous to the computer into quarantine. Quarantined files are stored in an encrypted form and therefore do not compromise your device's security.

By default, the local quarantine is located in the %ALLUSERSPROFILE%\Kaspersky Lab\Endpoint Agent\<application version>\Quarantine folder. By default, the objects restored from quarantine are stored in the %ALLUSERSPROFILE%\Kaspersky Lab\Endpoint Agent\<application version>\Restored folder.

Kaspersky Security Center generates a common list of quarantined objects on devices with Kaspersky Endpoint Agent installed. Network Agents on the devices submit information about quarantined files to the Administration Server.

Kaspersky Security Center Network Agent does not copy files from quarantine to the Administration Server. All objects are stored on protected devices with Kaspersky Endpoint Agent installed. Objects are restored from the quarantine also on the protected devices.

See also

About quarantine management in Kaspersky Endpoint Agent

Configuring quarantine settings and restoration of objects from quarantine

Configuring data synchronization with the Administration Server

Page top
[Topic 193277_1]

About quarantine management in Kaspersky Endpoint Agent

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

You can use Kaspersky Security Center to configure quarantine settings, view the properties of the quarantined objects on the protected devices, delete quarantined objects, and restore objects from Quarantine. For detailed information on managing the quarantined objects using Kaspersky Security Center, refer to Kaspersky Security Center documentation.

In order for Kaspersky Endpoint Agent to send data about quarantined objects to Kaspersky Security Center Administration Server, the corresponding option must be enabled in the quarantine settings in Kaspersky Endpoint Agent policy. This option is enabled by default.

Using the command line interface on the device, you can view information about quarantine settings and properties of the quarantined objects.

Kaspersky Endpoint Agent quarantines object under the system account (SYSTEM).

Quarantined objects can be removed using the command line interface only with the permissions of the local account of the protected device user.

See also

About Kaspersky Endpoint Agent quarantine

Configuring quarantine settings and restoration of objects from quarantine

Configuring data synchronization with the Administration Server

Page top
[Topic 196988_1]

Configuring quarantine settings and restoration of objects from quarantine

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

To configure quarantine settings:

  1. In the main Kaspersky Security Center Web Console window select DevicesPolicies and profiles.
  2. Select the policy you want to configure.
  3. In the <Policy name> window that opens, select the Application settings tab.
  4. In the Repositories section select the Quarantine subsection.
  5. In the Quarantine settings section configure the quarantine settings:
    1. In the Quarantine folder field, enter the path to where you want to create the Quarantine folder on the devices or click Browse and select the path.

      The default path is %SOYUZAPPDATA%\Quarantine\. The Quarantine folder is created on all devices with Kaspersky Endpoint Agent at the following path: %ALLUSERSPROFILE%\Kaspersky Lab\Endpoint Agent\4.0.

      The value of the %ALLUSERSPROFILE% variable depends on the operating system of the device where Kaspersky Endpoint Agent is installed.

      Example:

      If the device has the Windows 7 operating system installed and Kaspersky Endpoint Agent is installed on drive C, the path to the Quarantine folder will be:

      C:\ProgramData\Kaspersky Lab\Endpoint Agent\4.0\Quarantine

    2. To configure the maximum quarantine size, select the Maximum Quarantine size (MB) check box and specify the maximum size of quarantine in megabytes or select it from the list.

      For example, you can set the maximum quarantine size to 200 MB.

      When the maximum quarantine size is reached, Kaspersky Endpoint Agent will publish the corresponding event on Kaspersky Security Center server and in the Windows Event Log, but will not stop quarantining new objects.

    3. To specify the quarantine threshold (the space in quarantine remaining until the maximum quarantine size is reached), select the Threshold value for space available (MB) check box.

      For example, you can set the quarantine threshold value to 50 MB.

      When the quarantine threshold is reached, Kaspersky Endpoint Agent will publish the corresponding event on the Kaspersky Security Center server and in the Windows Event Log, but will not stop quarantining new objects.

  6. In the Restoring objects from Quarantine section, in the Target folder for restored objects field, specify the path to create the folder for objects restored from quarantine.

    The default path is %SOYUZAPPDATA%\Restored\. The Restored folder is created on all devices with Kaspersky Endpoint Agent at the following path: %ALLUSERSPROFILE%\Kaspersky Lab\Endpoint Agent\4.0.

    The value of the %ALLUSERSPROFILE% variable depends on the operating system of the device where Kaspersky Endpoint Agent is installed.

    Example:

    If the device has the Windows 7 operating system installed and Kaspersky Endpoint Agent is installed on drive C, the path to the folder with the objects restored from quarantine will be:

    C:\ProgramData\Kaspersky Lab\Endpoint Agent\4.0\Restored

  7. If you configure the policy settings, in the upper right corner of the group of settings, change the switch from Undefined to Enforce.
  8. Click Apply and OK.

The quarantine settings and the folder for restoring objects from quarantine have been configured.

See also

About Kaspersky Endpoint Agent quarantine

About quarantine management in Kaspersky Endpoint Agent

Configuring data synchronization with the Administration Server

Page top
[Topic 199788]

Configuring data synchronization with the Administration Server

Expand all | Collapse all

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

You can configure synchronization of data on quarantined objects on managed devices with Kaspersky Security Center Administration Server.

To configure data synchronization with the Administration Server:

  1. Do one of the following:
    • Open the application properties window for an individual device.
      1. In the main Kaspersky Security Center Web Console window select DevicesManaged devices.
      2. Select the device.
      3. In the <Device name> window that opens, select the Applications tab.
      4. Select Kaspersky Endpoint Agent.
      5. In the window that opens, select the Application settings tab.
    • Open the policy properties window.
      1. In the main Kaspersky Security Center Web Console window select DevicesPolicies and profiles.
      2. Select the policy you want to configure.
      3. In the <Policy name> window that opens, select the Application settings tab.
  2. In the Repositories section select the Synchronization with Administration Server subsection.
  3. Select the Data about quarantined objects on managed devices.
  4. Click OK.
  5. Click the Save button.

Data synchronization with the Administration Server is configured.

See also

About Kaspersky Endpoint Agent quarantine

About quarantine management in Kaspersky Endpoint Agent

Configuring quarantine settings and restoration of objects from quarantine

Page top
[Topic 199789]

Configuring failure diagnosis

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

Kaspersky Endpoint Agent does not automatically create a folder for storing trace or dump files on the device. Specify a folder that is already available on the device.

To configure failure diagnosis:

  1. Open the application properties window for an individual device.
    1. In the main Kaspersky Security Center Web Console window select DevicesManaged devices.
    2. Select the device.
    3. In the <Device name> window that opens, select the Applications tab.
    4. Select Kaspersky Endpoint Agent.
    5. In the window that opens, select the Application settings tab.
  2. In the Application settings section select the Failure diagnosis subsection.
  3. To enable logging of debug information to the trace files:
    1. Enable the Write debug information to trace files option.
    2. In the Trace files folder field, specify the path to the folder on the device where the application saves the trace files.

      Make sure that the specified folder is available on the managed device. Otherwise, the debug information will not be saved.

    3. In the Maximum trace file size (MB) field, specify the file size in megabytes.

      The default value is 50 MB. When the specified file size is reached, the application continues writing to a new file.

  4. If you want the application to overwrite old trace files:
    1. Enable the Overwrite old trace files option.
    2. Enter the desired value in the Maximum number of files per trace log field.

      The default value is 1 file. When the specified number of files is reached, the application overwrites old files, starting with the oldest one. The specified limit is applied separately for each Kaspersky Endpoint Agent process being debugged, so the total number of files for all processes may exceed the specified value.

  5. To enable logging of dump files:
    1. Enable the Create dump files option.
    2. In the Dump files folder field, specify the folder to save the dump files.

      Make sure that the specified folder is available on the managed device. Otherwise, the debug information will not be saved.

  6. Click OK.

Failure diagnostics is configured and enabled for all Kaspersky Endpoint Agent processes that are currently running. Failure diagnostics files will be generated in the folders you specified.

Page top

[Topic 200424][Topic 193604_1]

Creating tasks

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

To create a task:

  1. In the main Kaspersky Security Center Web Console window select DevicesTasks.
  2. Click the Add button.

    The task creation wizard will start.

  3. In the Application drop-down list, select Kaspersky Endpoint Agent.
  4. In the Task type drop-down list, select the required task type and follow the wizard instructions.
  5. To change the default values of the task settings immediately after its creation, select the Open task details when creation is complete check box on the Finish task creation page.

    If you do not select this check box, the task will be created with the default settings. You can subsequently change these settings at any time for the following task types:

  6. Click Finish.

The task will be created and displayed in the list of tasks.

You can start the created task manually or configure a scheduled task start.

Page top

[Topic 195882]

Viewing the table of tasks

To view the list of tasks,

select DevicesTasks in the main Web Console window.

A list of tasks appears. The tasks are grouped by the names of the applications for which they are created.

Page top

[Topic 195909]

Deleting a task from the list

To remove tasks from the list of tasks on Kaspersky Security Center server:

  1. In the main Kaspersky Security Center Web Console window select DevicesTasks.

    A list of tasks appears.

  2. In the list of tasks, select the check boxes next to the tasks that you want to delete.
  3. Click the Delete button.

    The action confirmation window opens.

  4. Click Yes.

The selected tasks will be deleted from the list.

Page top

[Topic 195910]

Configuring task schedule settings

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

To configure the scheduled task start:

  1. In the main Kaspersky Security Center Web Console window select DevicesTasks.
  2. To open the task settings window, click the task name.
  3. On the Schedule tab in the General section, change the toggle button from Schedule disabled to Run by schedule.
  4. In the Frequency drop-down list select one of the following options: At specified time, Every hour, Every day, Every week or On application launch.
  5. If you select the At specified time option, specify the day and time to start the task.
  6. If you select one of the following options: Every hour, Every day or Every week, configure the following settings:
    1. In the Every field, specify the task run frequency. For example, once a day or twice a week on Tuesdays and Thursdays.
    2. In the Start time and Start date fields, select the date and time from which the schedule applies.
  7. To configure advanced schedule settings, select the Advanced section and perform the following steps:
    1. If you want to set maximum timeout for the task execution, select the Quit task, running longer than check box and specify the number of hours and minutes after which the task will automatically terminate.
    2. If you want the task schedule to be valid until a certain date, select the Cancel schedule from check box and specify the expiration date for the schedule.
    3. If you want the application to start the tasks that were not completed on time as soon as possible, select the Run missed tasks check box.
    4. If you want to avoid simultaneous access of a large number of devices to the Administration Server as well as to run the task on workstations not precisely according to the schedule, but randomly within a certain time interval, select the Randomize the task start time within the interval check box and specify the start interval in minutes.
  8. Click the Save button.

Page top

[Topic 195973]

Starting tasks manually

The application starts tasks according to the schedule specified in the properties of each task. You can start the task manually at any time.

To start a task manually:

  1. In the main Kaspersky Security Center Web Console window select DevicesTasks.
  2. In the list of tasks, select the check box next to the task that you want to start.
  3. Click Start.

The task will be started. You can check the task status in the Status column or by clicking the Result button.

Page top

[Topic 195912]

Creating Kaspersky Endpoint Agent activation tasks

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

You can activate Kaspersky Endpoint Agent using a license key from the Kaspersky Security Center key store. For detailed information on managing license keys using Kaspersky Security Center, refer to the Kaspersky Security Center Help.

To create Kaspersky Endpoint Agent activation task:

  1. In the main Kaspersky Security Center Web Console window select DevicesTasks.
  2. Click the Add button.

    The task creation wizard will start.

  3. In the Application drop-down list, select Kaspersky Endpoint Agent.
  4. In the Task type drop-down list, select Application activation.
  5. In the Task name field, specify the display name of the task.
  6. To create a task for devices of a specific Administration Server group, perform the following actions:
    1. In the Selecting devices to which the task is assigned group of settings, select the Group of devices option and click Next.
    2. Select the desired Administration Server group and click Next.
  7. To create a task for specific devices using a range of IP addresses, NetBIOS names, DNS names, or to select devices from the list of devices detected in the network by the Administration Server, perform the following actions:
    1. In the Selecting devices to which the task is assigned group of settings, select the Selected or imported from the list option and click Next.
    2. Add devices to the list by the required criteria and click Next.
  8. To create a task for devices of a specific selection, perform the following actions:
    1. In the Selecting devices to which the task is assigned group of settings, select the Selection option and click Next.
    2. Select the desired selection from the list and click Next.
  9. In the Select a license key window, select the required license key from the list of Kaspersky Security Center keys available in the key storage.
  10. If you want to add this license key as an additional one to automatically renew the license, select the Use as additional key check box.
  11. Click Next.
  12. In the Selecting an account to run a task window, select the desired account and click Next.
  13. To change the default values of the task settings immediately after its creation, select the Open task details when creation is complete check box on the Finish task creation page.
  14. Click Finish.

The task will be created and displayed in the list of tasks.

You can start the created task manually or configure a scheduled task start.

Page top

[Topic 200386]

Configuring Database and application module update task

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

Task creation is performed before, as an individual step.

If you selected the Open task details when creation is complete check box on the Finish task creation page during the task creation, proceed to step 4 of the following instruction.

To configure the Database and application module update task settings:

  1. In the main Kaspersky Security Center Web Console window select DevicesTasks.
  2. To open the task settings window, click the task name.
  3. Select the Application settings tab.
  4. Select the Connection settings section.
  5. If you use Kaspersky Security Center, in the Update source group of settings, select one of the following options:
    • Kaspersky Security Center Administration Server.
    • Kaspersky update servers.
    • Custom HTTP or FTP servers or network folders.
  6. If you use Kaspersky Security Center Cloud Console, in the Update source group of settings, select one of the following options:
    • Distribution points. Devices with Network Agent installed are used as the update source.

      Detailed information on using the distribution points is available in the Kaspersky Security Center Cloud Console Help.

    • Kaspersky update servers. Kaspersky update servers are used as the update source.
  7. If required, select the Use Kaspersky update servers if specified servers are not available check box.

    Not available in Kaspersky Security Center Cloud Console.

  8. If you select Custom HTTP or FTP servers or network folders as database update source, do the following:

    Not available in Kaspersky Security Center Cloud Console.

    1. Click the Settings link to open the Custom update sources window.
    2. Add the update sources to the list by following these steps:
      1. Click the Add button.
      2. In the dialog box that opens, in the Web address field, enter the address of the update server (HTTP or FTP), or the path to the network folder or local folder containing the update files, and click OK.
      3. If you want to use the database update source, switch the toggle button next to its address to Enable.

        Follow the same steps to add each update source.

      4. Click OK.

        The Custom update sources window closes.

  9. Select the Update settings section.
  10. In the Update settings section, select the conditions for the application to check for the availability of application module updates:
    • Do not check for updates. Kaspersky Endpoint Agent will not check the availability of application module updates.
    • Only check for availability of critical software modules updates. Kaspersky Endpoint Agent will check the availability only for important application module updates.
    • Download and install critical software modules updates. Kaspersky Endpoint Agent will check the availability of application module updates and download and install critical application module updates.
  11. If you want the application to display a notification about all scheduled application modules updates available in the update source, select the Receive information about available scheduled application module updates check box.
  12. Click the Save button.

You can start the created task manually or configure a scheduled task start.

See also

Creating tasks

Viewing the table of tasks

Deleting a task from the list

Configuring task schedule settings

Starting tasks manually

Creating Kaspersky Endpoint Agent activation tasks

Managing Standard IOC Scan tasks

Configuring the Quarantine file task

Configuring the Delete file task

Configuring the Run process task

Configuring the Terminate process task

Page top
[Topic 199816]

Managing Standard IOC Scan tasks

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

Standard IOC Scan tasks are group or local tasks that are created and configured manually in Kaspersky Security Center or through the command line interface. IOC files prepared by the user are used to run the tasks.

Only the files with IOC rules can be specified for the IOC Scan task. Files with other types of rules are not supported for the IOC Scan task.

This section provides instructions on how to manage Standard IOC Scan tasks.

See also

Creating tasks

Viewing the table of tasks

Deleting a task from the list

Configuring task schedule settings

Starting tasks manually

Creating Kaspersky Endpoint Agent activation tasks

Configuring Database and application module update task

Configuring the Quarantine file task

Configuring the Delete file task

Configuring the Run process task

Configuring the Terminate process task

In this Help section

Requirements for IOC files

Supported IOC terms

Configuring Standard IOC Scan task

Viewing IOC Scan task execution results

Page top
[Topic 194312_1]

Requirements for IOC files

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

When creating IOC Scan tasks, consider the following requirements and limitations related to

:

  • Kaspersky Endpoint Agent supports IOC files with the ioc and xml extensions. These files use open standard for IOC description – OpenIOC versions 1.0 and 1.1.
  • Only the files with IOC rules can be specified for the IOC Scan task. Files with other types of rules are not supported for the IOC Scan task.
  • If, when creating the IOC Scan task, you upload some IOC files that are not supported by Kaspersky Endpoint Agent then when the task starts, the application will use only supported IOC files.
  • If, when creating the IOC Scan task, none of the downloaded IOC files is supported by Kaspersky Endpoint Agent, the task can be started, but as a result of the task execution, no indicators of compromise will be detected.
  • Semantic errors and IOC terms and tags in IOC files that are not supported by the application do not cause the task execution errors. The application just does not detect matches in such sections of IOC files.
  • that are used in the same IOC Scan task must be unique. The presence of IOC files with the same identifier can affect the correctness of the task execution results.
  • The size of a single IOC file must not exceed 3 MB. Using larger files results in the failure of IOC Scan tasks. In this case, the total size of all added files in the IOC collection can exceed 3 MB.
  • It is recommended to create one IOC file per each threat. This makes it easier to read the results of the IOC Scan task.

The table below shows the features and limitations of the OpenIOC standard supported by the application.

Features and limitations of the OpenIOC standard versions 1.0 and 1.1

Supported conditions

OpenIOC 1.0:

is

isnot (as an exclusion from the set)

contains

containsnot (as an exclusion from the set)

OpenIOC 1.1:

is

contains

starts-with

ends-with

matches

greater-than

less-than

Supported condition attributes

OpenIOC 1.1:

preserve-case

negate

Supported operators

AND

OR

Supported data types

date: date (applicable conditions: is, greater-than, less-than)

int: integer number (applicable conditions: is, greater-than, less-than)

string: string (applicable conditions: is, contains, matches, starts-with, ends-with)

duration: duration in seconds (applicable conditions: is, greater-than, less-than)

Data types interpretation details

The following data types are interpreted as string: Boolean string, restricted string, md5, IP, sha256, base64Binary.

The application supports interpretation of the Content parameter specified as intervals for the following data types: int and date:

OpenIOC 1.0:

Using the TO operator in the Content field:

<Content type="int">49600 TO 50700</Content>

<Content type="date">2009-04-28T10:00:00Z TO 2009-04-28T16:00:00Z</Content>

<Content type="int">[154192 TO 154192]</Content>

OpenIOC 1.1:

Using the greater-than and less-than conditions

Using the TO operator in the Content field

The application supports interpretation of the date and duration data types if the indicators are specified in the ISO 8601, Zulu time zone, UTC format.

Supported IOC terms

The full list of supported IOC terms is provided in a separate table.

See also

Supported IOC terms

Configuring Standard IOC Scan task

Viewing IOC Scan task execution results

Page top
[Topic 194662_1]

Supported IOC terms

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

The file that can be downloaded by the following link contains a table with a full list of supported IOC terms of the OpenIOC standard.

DOWNLOAD IOC_TERMS.XLSX FILE

Page top

[Topic 199237_1]

Configuring Standard IOC Scan task

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

Task creation is performed before, as an individual step.

If you selected the Open task details when creation is complete check box on the Finish task creation page during the task creation, proceed to step 4 of the following instruction.

Only the files with IOC rules can be specified for the IOC Scan task. Files with other types of rules are not supported for the IOC Scan task.

To configure the Standard IOC Scan task settings:

  1. In the main Kaspersky Security Center Web Console window select DevicesTasks.
  2. To open the task settings window, click the task name.
  3. Select the Application settings tab.
  4. In the IOC scan settings section, configure the IOC collection by following these steps:
    1. In the IOC collection group of settings click the Redefine IOC files button.
    2. In the dialog that opens, click the Add IOC files button and specify the IOC files that you want to use for the task.

      You can select multiple IOC files for a single IOC Scan task.

    3. Click OK to close the dialog box.

      If, when creating the IOC Scan task, you upload some IOC files that are not supported by Kaspersky Endpoint Agent then when the task starts, the application will use only supported IOC files.

    4. To view the list of all IOC files that are included in the IOC collection, as well as to obtain information about each IOC file, do the following:
      1. Click the link with the names of all downloaded IOC files in the IOC files group of settings.

        The IOC contents window opens.

      2. To view detailed information about an individual IOC file, click the name of the required IOC file in the list of files on the IOC collection tab.

        In the window that opens, information about the selected IOC file will be displayed.

      3. To close the window with information about the selected IOC file, click OK or Cancel.
      4. To view information about all downloaded IOC files at once, open the IOC data tab.

        Information about each downloaded IOC file will be displayed in the workspace of the window.

      5. If you do not want to use a specific IOC file when the IOC Scan task is executed, on the IOC collection tab, switch the toggle button next to the IOC file name from Include to Exclude.
      6. Click OK to save the changes and close the IOC contents window.
    5. To export the created IOC collection, click the Export IOC collection button.

      In the window that opens, specify the name of the file and select the folder where you want to save it.

    6. Click the Save button.

      The application creates a ZIP file in the specified folder.

    7. In the Retrospective IOC scan group of settings configure the settings for :
      1. In the Retrospective IOC Scan group of settings enable the Perform Retrospective IOC Scan within the interval option.
      2. Specify the time interval.

        During the task execution, the application analyzes data collected during the specified time interval, including the boundaries of the specified interval (from 00:00 on the start date until 23:59 on the end date). The default interval starts at 00:00 on the day preceding the task creation day and ends at 23:59 on the day when the task was created.

        If during execution of the IOC Scan task with the Perform Retrospective IOC Scan within the interval option enabled the application does not find any data for the specified time interval to be analyzed, it does not inform about this. In this case, the application shows no indicators of compromise in the task completion report.

    8. In the Actions group of settings, configure the response actions on detecting the indicator of compromise:
      1. Select the Take response actions after an indicator of compromise is found check box.
      2. Select the Isolate device from the network check box to enable network isolation of the device on which indicator of compromise is detected by Kaspersky Endpoint Agent.
      3. Select the Quarantine and delete check box to quarantine the detected object and remove it from the device.
      4. Select the Run critical areas scan on the device check box so that Kaspersky Endpoint Agent sends a command to EPP application to scan critical areas on all the devices of the administration group on which indicators of compromise are detected.

      If the Quarantine and delete or Run critical areas scan option is enabled, Kaspersky Endpoint Agent may recognize the detected files as infected and delete them from the device in response.

    9. In the Protection of critical system files group of settings, select the Do not perform actions on critical system files check box if you want to protect critical system files from being quarantined or deleted when an indicator of compromise is detected.

      The option is available only if the Quarantine and delete option is selected in the Actions group of settings.

      If this option is selected and an object is a critical system file, the application does not perform any actions on this object. This information is logged in the task execution report.

  5. In the Advanced section, select data types (IOC documents) that you want to analyze during the task execution and configure the additional scan settings:
    1. In the Select data types (IOC documents) to analyze during IOC scanning group of settings, select the check boxes next to the required IOC documents.

      Depending on the loaded IOC files, some check boxes may be disabled.

      Kaspersky Endpoint Agent automatically selects data types (IOC documents) for the IOC Scan task in accordance to the contents of the downloaded IOC files. It is not recommended to unselect data types manually.

    2. If the Analyze file data (FileItem) check box is selected, click the Advanced (FileItem) link and in the FileItem document scan settings window that opens, select the scan areas on the protected device drives where to look for indicators of compromise.

      You can select one of the predefined areas, or specify the paths to the desired areas manually.

    3. Click OK to save the changes and close the FileItem document scan settings window.
    4. If the Analyze WEL data (EventLogItem) check box is selected, click the Advanced (EventLogItem) link and in the EventLogItem document scan settings window that opens, configure additional event analysis settings:
      • Scan only events that are logged within the specified period.

        If the check box is selected, only the events that were logged during the specified period will be taken into account during the task's execution.

      • Scan events that belong to the following channels.

        List of channels to be analyzed during the task's execution.

    5. Click OK to save the changes and close the FileItem document scan settings window.
  6. Click the Save button.

You can start the created task manually or configure a scheduled task start.

Page top

[Topic 199817]

Viewing IOC Scan task execution results

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

To view the IOC Scan task execution results:

  1. In the main Kaspersky Security Center Web Console window select DevicesTasks.
  2. To open the task settings window, click the task name.
  3. Select the Application settings tab.
  4. Select the IOC Scan results section.
  5. In the Device drop-down list, select the devices, for which you want to view the results of IOC Scan task.

    A summary table with the task execution results on the selected devices will be displayed.

    If compromise indicators are detected on devices, the Results column displays the compromise indicators detected link.

  6. If you want to view detailed information on the detected compromise indicators on a specific device, do the following:
    1. Click the compromise indicators detected link in the row with the name of the desired device.

      The IOC Scan results window opens that contains a list of all IOC files used in the task. If there is an object on the selected device that matches a certain compromise indicator, the Status column displays the Match value.

    2. Click the Match link in the row with the name of the desired IOC file.

      The IOC incident card window opens.

      The IOC incident card contains information about objects on the device that match the conditions of the processed IOC file, as well as the text of the matched branches or individual conditions from this IOC file.

      Viewing the IOC incident card is not available for IOC files for which no matches were detected on the device during scanning.

See also

Requirements for IOC files

Supported IOC terms

Configuring Standard IOC Scan task

Page top
[Topic 206803]

Configuring the Quarantine file task

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

If you suspect that an infected or probably infected file is on the computer, you can isolate it by moving it to quarantine.

Task creation is performed before, as an individual step.

If you selected the Open task details when creation is complete check box on the Finish task creation page during the task creation, proceed to step 4 of the following instruction.

To configure the Quarantine file task settings:

  1. In the main Kaspersky Security Center Web Console window select DevicesTasks.
  2. To open the task settings window, click the task name.
  3. Select the Application settings tab.
  4. In the Specify the file to be Quarantined drop-down list, select one of the following values: Specify the file by full path or Specify the file by folder path and checksum.
  5. If you select the Specify the file by its full path option, specify the value in the File full path field.
  6. If you select the Specify the file by folder path and checksum option, configure the following settings:
    • In the Checksum type drop-down list, select one of the following values: MD5 or SHA256.
    • Specify the value in the File checksum field.
    • Specify the value in the File folder path field.
  7. In the Actions after quarantining file group of settings, select whether the file must be deleted from the protected device after quarantining.

    If the file is locked by another process, the file will only be deleted after the device has been rebooted.

  8. In the Protection of critical system files group of settings, select the Do not perform actions on critical system files check box if you want to exclude critical system files from the task scope.

    If this option is selected and an object is a critical system file, the application does not perform any actions on this object. This information is logged in the task execution report.

  9. Click the Save button.

You can start the created task manually or configure a scheduled task start.

If the file is locked by another process, the task will be displayed with the Completed status, but the file itself will only be quarantined after the device has been restarted. It is recommended to check whether the task was completed successfully after the device has been restarted.

The Quarantine file task may fail with the Access denied error if you try to quarantine an executable file that is currently running. To solve this problem, create the Terminate process task for this file and try to create a Quarantine file task again.

Page top

[Topic 195916]

Configuring the Delete file task

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

Task creation is performed before, as an individual step.

If you selected the Open task details when creation is complete check box on the Finish task creation page during the task creation, proceed to step 4 of the following instruction.

To configure the Delete file task settings:

  1. In the main Kaspersky Security Center Web Console window select DevicesTasks.
  2. To open the task settings window, click the task name.
  3. Select the Application settings tab.
  4. In the File to delete list, click the Add button.
  5. The File to delete dialog box opens.
  6. In the Specify the file to delete drop-down list, select one of the following values: Specify the file by its full path or Specify the file by its folder path and checksum.
  7. If you select the Specify the file by its full path option, specify the value in the File full path field.
  8. If you select the Specify the file by folder path and checksum option, configure the following settings:
    • In the Checksum type drop-down list, select one of the following values: MD5 or SHA256.
    • Specify the value in the File checksum field.
    • Specify the value in the File folder path field.
    • Select the Including subfolders check box for the application to delete all occurrences of the object not only in the specified folder, but also in all its subfolders.
  9. Click OK to add the specified object to the File to be removed list.

    You can specify several objects for deletion in one Delete file task.

  10. In the Protection of critical system files group of settings, select the Do not perform actions on critical system files check box if you want to exclude critical system files from the task scope.

    If this option is selected and an object is a critical system file, the application does not perform any actions on this object. This information is logged in the task execution report.

  11. Click the Save button.

You can start the created task manually or configure a scheduled task start.

If the file is locked by another process, the task will be displayed with the Completed status, but the file itself will only be deleted after the device has been restarted. It is recommended to check whether the file was deleted successfully after the device has been restarted.

Deleting a file from a connected network drive is not supported.

Page top

[Topic 195917]

Configuring the Run process task

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

Using the Run process task, you can run the required application or command on the device.

Task creation is performed before, as an individual step.

If you selected the Open task details when creation is complete check box on the Finish task creation page during the task creation, proceed to step 4 of the following instruction.

To configure the Run process task settings:

  1. In the main Kaspersky Security Center Web Console window select DevicesTasks.
  2. To open the task settings window, click the task name.
  3. Select the Application settings tab.
  4. To run the application using the command line (cmd.exe) or execute a command, type the required command in the Executable command field.
  5. If you want to run the application directly, do the following:
    1. Specify the path to the application executable file in the Working folder field.
    2. Specify the keys for running the application in the Arguments field.
  6. Click the Save button.

You can start the created task manually or configure a scheduled task start.

Page top

[Topic 195918]

Configuring the Terminate process task

This section provides information related to Kaspersky Endpoint Agent for Windows. This information may be partially or completely inapplicable to Kaspersky Endpoint Agent for Linux. For complete information about Kaspersky Endpoint Agent for Linux, please refer to the Help of the solution that includes the application: Kaspersky Anti Targeted Attack Platform or Kaspersky Managed Detection and Response.

If you believe that a process running on the device could threaten the security of the device or the corporate LAN, you can terminate the process.

Task creation is performed before, as an individual step.

If you selected the Open task details when creation is complete check box on the Finish task creation page during the task creation, proceed to step 4 of the following instruction.

To configure the Terminate process task settings:

  1. In the main Kaspersky Security Center Web Console window select DevicesTasks.
  2. To open the task settings window, click the task name.
  3. Select the Application settings tab.
  4. In the File full path field specify the path to the file of the process that you want to terminate.
  5. In the Checksum type drop-down list, select one of the following values: Not specified, MD5 or SHA256.
  6. If you select MD5 or SHA256, specify the value in the Checksum field.
  7. If you want the application to consider the character case in the path to the process file, select the Path is case sensitive check box.
  8. In the Protection of critical system files group of settings, select the Do not perform actions on critical system files check box if you want to exclude critical system files from the task scope.

    If this option is selected and an object is a critical system file, the application does not perform any actions on this object. This information is logged in the task execution report.

  9. Click the Save button.

You can start the created task manually or configure a scheduled task start.

Page top

[Topic 195919]