Kaspersky Unified Monitoring and Analysis Platform
Configuring response with EDR actions

Prerequisites

Before configuring response with EDR actions, make sure that the following conditions are satisfied:

  1. Integration with Kaspersky Security Center is configured.
  2. A separate user has been created in Kaspersky Security Center with rights to perform all tasks.
  3. Integration with Kaspersky Endpoint Security is configured.
  4. The following actions have been performed on the host with the correlator:
    1. Python 3.6 or later and the KlAkOAPI Python package are installed.
    2. The scripts have been downloaded from the link and placed in /opt/kaspersky/kuma/correlator/<Correlator ID>/scripts.
    3. The scripts are connected to Kaspersky Security Center.

      The credentials are not protected, so we recommend using a separate Kaspersky Security Center user created at step 2 for connecting the scripts to Kaspersky Security Center and restricting access to the directory that contains the scripts. To connect the scripts, open the scripts for editing and edit the lines as follows:

      # KSC connection info

      # reads Environment variables by default, change with corresponding values

      # KSC host, string, required

      kscHost = "kscHost"

      # KSC port, required, default is "13299"

      kscPort = "13299"

      # KSC certificate file path, default is False

      kscCert = False

      # KSC user, string, required

      kscUser = "kscUser"

      # KSC password, string, required

      kscPassword = "kscPassword"

Configuring the response

After fulfilling the prerequisites, create a response rule in the KUMA correlator:

  1. In the Resources and services → Correlators section in KUMA, create a correlator or open an existing correlator for editing.
  2. In the correlator creation wizard, at the Response step, click Add response rule to open the Response window, and in that window, fill in the following fields:
    1. In the Name field, specify an arbitrary name for the response rule.
    2. Specify the tenant name in the Tenant field.
    3. In the Type drop-down list, specify the Run script response rule type.
    4. In the Timeout field, specify the number of seconds allotted for the script to finish. If this limit is exceeded, the script is terminated. Set this to 10 minutes.
    5. In the Script name field, enter the name of the script. For example, deleteFile.py.
    6. In the Script arguments field, specify options or event field values that must be passed to the script. You can use single quotes to specify unescaped characters in options. Arguments of each script are described in expandable boxes.

      onDemandScan.py performs a Critical Areas Scan.

      ioCScan.py searches for indicators of compromise.

      quarantineFile.py quarantines a file

      deleteFile.py deletes a file

      getFile.py gets a file

      isolateHost.py isolates the computer from the network

      preventExecution.py prevents execution of objects

      startProcess.py starts a process.

      terminateProcess.py terminates a process

    7. In the Workers field, specify the number of workers that the service can run simultaneously to process response rules in parallel. By default, the number of handlers is the same as the number of virtual processors on the server where the service is installed.
    8. In the Description field, specify an arbitrary description for the response rule.
    9. In the Filter field, specify conditions that events must satisfy for the response rule to be applied.
  3. Save settings and install the correlator service on the server or restart the active correlator to apply the settings.

As a result, when a correlation event with certain fields is received, a response rule is triggered in KUMA, EDR actions are performed, and a task is created in Kaspersky Security Center. You can view the relevant records in Kaspersky Security Center logs and Kaspersky Endpoint Security logs.