Contents
Managing the activity log
Some user actions in the program web interface can cause errors in the operation of Kaspersky Anti Targeted Attack Platform. You can enable logging of user action information in the program web interface and if necessary, view the information by downloading log files.
Enabling and disabling the recording of information in the activity log
To enable or disable the logging of information about user actions in the Kaspersky Anti Targeted Attack Platform web interface to the activity log:
- Select the Reports section, Activity log subsection in the window of the program web interface.
- Do one of the following:
- Set the Activity log toggle switch to the Enabled position if you want to enable the logging of information about user actions in the program web interface.
- Set the Activity log toggle switch to the Disabled position if you want to disable the logging of information about user actions in the program web interface.
This function is enabled by default.
Information is logged for 30 days in the user_actions.log file. After 30 days, the user_actions.log file is saved on the Central Node server in the /var/log/kaspersky/apt-base/ directory with the name user_actions.log<month>. A new file named user_actions.log is created to record information for the current month. Each file is retained for 90 days and then deleted.
To view activity log files, you must download them.
You can configure the logging of information about user actions in the program web interface to a remote log. The remote log is saved on the server on which a SIEM system is installed. The settings of integration with the SIEM system must be configured to write to the remote log.
In distributed solution mode, information about user actions in the application web interface is recorded in the log of the same server for which the users are managing the web interface. Information about the actions of PCN server users that affect the settings of SCN servers is recorded in the PCN server log.
Users with the Security auditor role can only view the settings for logging information to the activity log.
Page topDownloading the activity log file
To download the activity log file:
- Select the Reports section, Activity log subsection in the window of the program web interface.
- Click Download.
Log files are saved on your local computer in your browser's downloads folder. The files are downloaded as a ZIP archive.
In distributed solution mode, you can download log files only for the server for which you are managing the web interface.
Page topContent and properties of CEF messages about user activity in the web interface
The header of each message contains the following information:
- Format version.
Current version number:
0
. Current field value:CEF:0
. - Vendor.
Current field value:
AO Kaspersky Lab
. - Program name.
Current field value:
Kaspersky Anti Targeted Attack Platform
. - Program version.
The current value of the field is
5.0.0-5201
. - Event type.
See the table below.
- Event name.
See the table below.
- Event importance.
Current field value:
Low
.Example:
CEF:0|AO Kaspersky Lab|Kaspersky Anti Targeted Attack Platform|5.0.0-5201|tasks|Managing tasks|Low|
All fields of the CEF message have the "<key>=<value>"
format. The keys, as well as their values contained in a message, are presented in the table below.
Event information in CEF messages
Event type |
Event name and description |
Key and description of its value |
---|---|---|
|
Connecting the Sensor component to the Central Node server, modifying component settings. |
|
|
Connecting the Sandbox component to the Central Node server. |
|
|
Configuring integration with external systems. |
|
|
Configuring participation in Kaspersky Security Network, enabling or disabling the usage of Kaspersky Private Security Network, and configuring integration with Kaspersky Managed Detection and Response. |
|
|
Operations with YARA rules. |
|
|
Operations with IOC rules. |
|
|
Operations with IDS rules. |
|
|
Operations with TAA (IOA) rules. |
|
|
Operations with prevention rules. |
|
|
Operations with scan exclusion rules. |
|
|
Operations with tasks. |
|
|
Network isolation of Endpoint Agent hosts. |
|
|
Modifying Central Node server settings. |
|
|
The set of virtual machine operating systems is changed to <version of the operating system set>. |
|
|
Modifying the settings of Primary Central Node and Secondary Central Node servers in and . |
|
|
Actions on user accounts. |
|
|
Configuring email notifications. |
|
|
Managing the license key. |
|
If an operation is performed on over 30 objects simultaneously, only one entry is logged for this operation. The entry includes the information about the operation and the number of objects on which it was performed.
Page top