Viewing and confirming detections performed using Adaptive Anomaly Control rules
Expand all | Collapse all
To view the list of detections performed by Adaptive Anomaly Control rules:
- In the main menu, go to Operations → Repositories → Rule triggers in Smart Training state.
The list displays the following information about detections performed using Adaptive Anomaly Control rules:
- Administration group
The name of the administration group where the device belongs.
- Virtual Administration Server
Virtual Administration Server that manages the device.
- Device name
The name of the client device where the rule was applied.
- Name
The name of the rule that was applied.
- Status
Excluding—If the Administrator processed this item and added it as an exclusion to the rules. This status remains till the next synchronization of the client device with the Administration Server; after the synchronization, the item disappears from the list.
Confirming—If the Administrator processed this item and confirmed it. This status remains till the next synchronization of the client device with the Administration Server; after the synchronization, the item disappears from the list.
Empty—If the Administrator did not process this item.
- Detections count
The number of detects within one heuristic rule, one process and one client device. This number is counted by Kaspersky Endpoint Security.
- User name
The name of the client device user who run the process that generated the detect.
- Source process path
Path to the source process, i.e. to the process that performs the action (for more information, refer to the Kaspersky Endpoint Security help).
- Source process hash
SHA256 hash of the source process file (for more information, refer to the Kaspersky Endpoint Security help).
- Source object path
Path to the object that started the process (for more information, refer to the Kaspersky Endpoint Security help).
- Source object hash
SHA256 hash of the source file (for more information, refer to the Kaspersky Endpoint Security help).
- Target process path
Path to the target process (for more information, refer to the Kaspersky Endpoint Security help).
- Target process hash
SHA256 hash of the target file (for more information, refer to the Kaspersky Endpoint Security help).
- Target object path
Path to the target object (for more information, refer to the Kaspersky Endpoint Security help).
- Target object hash
SHA256 hash of the target file (for more information, refer to the Kaspersky Endpoint Security help).
- Processed
Date when the anomaly was detected.
To view the properties of a detection:
- In the main menu, go to Operations → Repositories → Rule triggers in Smart Training state.
- Do one of the following:
- In the Name column, click the link with the name of the detection you want to view.
- In the list of detections, select the check box next to the detection you want to view, and then click the Properties button.
The properties window of the selected detection opens, displaying information about it.
You can confirm any detection from the list of detections of Adaptive Anomaly Control rules or from the properties window of a selected detection.
To confirm a detection:
- Select one or several detections in the list of detections, and then click the Confirm button.
- Open the properties window of a selected detection, and then click the Confirm button.
The status of the detection is changed to Confirming. The detection will disappear from the list of detections after the next synchronization of the client device with the Administration Server.
Your confirmation will contribute to the statistics used by the rules. For more information, refer to Kaspersky Endpoint Security for Windows Help.
Page top
[Topic 172650]