Professional Documents
Culture Documents
KL 025.5 Katakedr v0.6 en
KL 025.5 Katakedr v0.6 en
KL 025.5 Katakedr v0.6 en
Administration
KL 025.5
Kaspersky
Anti Targeted
Attack.
Kaspersky
Endpoint
Detection and
Response
Administration
Technical training
1
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response.
Administration
ed
Table of contents
ut
Acronyms and conventions ..................................................................................................................... 4
1. Introduction ...................................................................................................................................... 5
ib
1.1 Featured products and applications ................................................................................................. 5
1.2 Threat landscape .............................................................................................................................. 6
r
1.3 Challenges in building an information security system ..................................................................12
1.4 Approaches to building a cybersecurity system .............................................................................14
st
Comprehensiveness .......................................................................................................................14
Understanding the corporate business processes .........................................................................18
Adaptability .....................................................................................................................................19
di
1.5 The tasks KATA Platform helps the customer to solve ..................................................................21
2. Pre-deployment ............................................................................................................................ 24
re
2.1 Main capabilities .............................................................................................................................24
2.2 Applications and components ........................................................................................................25
Central node ...................................................................................................................................27
or
Sensor ............................................................................................................................................28
Sandbox..........................................................................................................................................29
Kaspersky Endpoint Agent .............................................................................................................30
Cluster. Architecture .......................................................................................................................31
Optimum vs expert framework .......................................................................................................32
d
Cluster ............................................................................................................................................53
1
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response.
Administration
ed
Central node activation ...................................................................................................................78
Downloading updates to the central node ......................................................................................79
Creating users ................................................................................................................................79
Authentication under Active Directory accounts .............................................................................82
ut
Connecting a central node to a Sandbox .......................................................................................83
Connecting a sensor to the central node ........................................................................................87
3.4 Distributed installation ....................................................................................................................88
ib
Primary central node ......................................................................................................................88
Companies in the distributed mode ................................................................................................89
Connecting secondary central nodes .............................................................................................90
r
Users in a distributed installation ....................................................................................................92
st
3.5 Kaspersky Endpoint Agent installation ...........................................................................................93
Installation using KSC ....................................................................................................................95
Local installation of Kaspersky Endpoint Agent .............................................................................98
di
Integration with the endpoint protection application .....................................................................104
Kaspersky Endpoint Agent policy in Kaspersky Security Center .................................................105
Configuring agents that are not connected to Kaspersky Security Center ..................................110
Protection against interference with Kaspersky Endpoint Agent..................................................112
re
Activating Kaspersky Endpoint Agent ..........................................................................................113
Successful installation and proper configuration of Kaspersky Endpoint Agent: expected result 116
Kaspersky Endpoint Agent update task .......................................................................................119
Exclusions.....................................................................................................................................144
Dashboard ....................................................................................................................................146
List of alerts ..................................................................................................................................147
co
2
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response.
Administration
ed
Delete a file ...................................................................................................................................188
Get forensics ................................................................................................................................189
Service management ....................................................................................................................190
Running a program remotely ........................................................................................................191
Scanning computers for IOC ........................................................................................................192
ut
Scanning computers against YARA rules ....................................................................................193
Get process memory dump/system memory dump .....................................................................194
Get disk image ..............................................................................................................................195
ib
Get registry key ............................................................................................................................196
Get NTFS metafiles ......................................................................................................................197
Task results ..................................................................................................................................198
File storage and scanning results .................................................................................................198
r
Response specifics in a distributed installation ............................................................................199
st
6. Sandbox analysis results ......................................................................................................... 201
6.1 Sandbox alert card .......................................................................................................................201
di
6.2 Results of analysis in a virtual environment .................................................................................202
6.3 Sandbox debug information..........................................................................................................204
3
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response.
Administration
ed
Administration server KSC Administration Server
ut
C&C Command and Control center
ib
DBMS DataBase Management System
r
EDR Endpoint Detection and Response
st
EPP Endpoint Protection Platform
IS Information Security
di
IT Information Technology
KATA Kaspersky Anti Targeted Attack
re
KEA Kaspersky Endpoint Agent
4
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response.
Administration
ed
1. Introduction
ut
ib
1.1 Featured products and applications
r
st
di
re
or
e d
pi
co
Kaspersky Endpoint Detection and Response (KEDR) helps to collect and analyze data about
activities on the network endpoints, identify dangerous activities, contain an attack and eradicate
indicators of compromise with remote response tools.
Both products have the same server infrastructure, which performs different functions depending on the
license. That's what we mean when talking about a single KATA platform. KATA platform includes the
to
following servers:
— Central node,
— Sensor,
— Sandbox.
t
This version of the course covers KATA 5.0 and KEDR 5.0. Versions of the server components are based
No
on the KATA version; therefore, the Central Node, Sensor and Sandbox studied in this course have
version 5.0.
5
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 1. Introduction
Administration
Endpoint agents installed on the network hosts play a critical role in KEDR (but not in KATA). This course
ed
covers the agent version fully compatible with KEDR 5.0: Kaspersky Endpoint Agent (KEA) 3.14.
ut
and configure Kaspersky Endpoint Agent. In this version of our course, we use the KSC web
console.
— Kaspersky Endpoint Security (KES) for Windows 11.11 — because you can integrate the KES
ib
component with the KATA platform.
This course does not elaborate on how Kaspersky Security Center works. We provide detailed
instructions only for operations related to KEDR. To gain a deeper understanding of how KSC works, we
r
recommend that you take our course on network security basics: KL 002 Kaspersky Endpoint Security.
st
1.2 Threat landscape
di
re
or
e d
pi
co
be
Before we start scrutinizing KATA Platform products, let’s talk about threats that our customers face, why
standard tools may be insufficient to cope with them, and how we can counteract them.
to
Let's start with the threat landscape. These days, infrastructures have outgrown a protected perimeter. A
part of the customer's infrastructure or services can be hosted in a private or public cloud, some
employees work remotely, partners and contractors may also connect remotely, many employees use
their own devices for work, and so on. A customer's infrastructure is represented as groups of objects and
services (Infrastructure, Apps, Endpoints and others) in the figure. Attack vectors are also quite
t
No
6
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 1. Introduction
Administration
numerous: weak passwords, insiders, spam, etc. If we juxtapose these two lists, we will get a matrix of
ed
the threat landscape, which contains a threat at almost every intersection. For example:
1. Zero-day vulnerability — AD: no one is immune from new vulnerabilities in services, and such
a situation can lead to a successful attack. If you look at the statistics of new vulnerabilities
appearing in software, you will notice that it is growing steadily.
ut
2. Unpatched devices — Windows endpoints: unpatched devices are devices that are known to
be vulnerable to specific types of attacks on their software, but measures have not been taken to
eliminate this threat. Unfortunately, the process of vulnerability scanning and patch management
ib
is not always in place in every company, and attackers quite often don't even need to look for
zero-day vulnerabilities to penetrate; they can simply scan devices, find vulnerable ones and
take advantage of them.
r
3. Weak password — contractors: contractors, subcontractors and partners often have access to
the customer's network and services these days. In this case, it is very important to grant
st
granular access according to the principle of least privilege and to control connection methods.
Thus, the threat landscape is currently quite vast and will continue to grow; new services and related
di
threats will appear, which must be repelled.
re
or
e d
pi
co
be
The total cost of damage from attacks on customers' IT infrastructure is growing from year to year. For
example, recent attacks on enterprises include:
— Accenture — LockBit encrypted about 2500 computers, approximately 6 TB of information.
to
7
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 1. Introduction
Administration
If you look at these attacks, you may notice that despite the differences in industries, approaches to
ed
incident detection and response, used technical means and processes, they have some common
features:
— These companies possessed something the attackers wanted (data, money).
— These companies definitely had some cybersecurity budget and personnel.
ut
Does this mean that these companies are some kind of exception to the rule, they made mistakes and
paid for them? Rather no than yes. Numerous successful attacks that are widely covered in the news
(and uncountable incidents that we will never know about) occur due to flaws in information security
ib
systems, but mostly because state-of-the-art targeted attacks are difficult to resist even for a large
company.
r
st
di
re
or
e d
pi
co
Advanced persistent threats, or targeted attacks, are difficult to detect and prevent, because they are:
1. Stealthy and evasive. Adversaries can use specially prepared malware as well as legitimate
software. When attackers use legitimate software, it is extremely difficult to identify malicious
activity without collecting additional information about actions and context, because an action
be
performed using such software can turn out to be either malicious or benign. For example, the
Get-ADUser cmdlet provides data on domain users. This operation can be legitimate when
performed by an administrator, or malicious if an unknown account tries to undertake it from an
endpoint where the protection application has been disabled.
2. Targeted. Large organizations are a lucrative target, but should a small company beware of
targeted attacks? Is there a threshold below which there's no risk because the cost of the attack
to
will exceed the potential profit? The answer to the first question is ‘yes’, and to the second
question, ‘no.’ A supply chain attack is a very popular way to penetrate a large network via a less
secure partner/supplier/contractor company. In this case, adversaries profit from access to a
more attractive goal rather than from data or money of the company they are hacking (which
would not worth the resources spent). According to Trellix Advanced Threat Research Report
t
(January 2022), PsExec is one of the most popular tools used by attackers (it was detected in
No
8
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 1. Introduction
Administration
ed
ut
ibr
st
di
Targets of APT attacks
re
or
Potential targets of attackers include confidential information, money, disruption, and so on. Taking into
account the supply chain attacks, we can assume that targeted attacks can be directed at almost any
organization, regardless of its size, field, or value of its resources.
d
Various studies, for example, IBM “X-Force Threat Intelligence Index 2022”, show statistics on the sectors
of attacked companies. You can see that not only obvious sectors such as Finance or Government
e
become targets, but also less conspicuous ones, for example, Retail.
pi
co
be
t to
No
9
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 1. Introduction
Administration
Let’s study an example of an APT attack. In January 2022, Kaspersky ICS CERT revealed a wave of
ed
targeted attacks on the military industries and private companies in some Eastern European countries
that might have been aimed at cyber espionage:
1. Initial infection
ut
Adversaries penetrated enterprise networks with the help of well-prepared phishing email
messages, which used internal information of the attacked organization that is not available in
public sources. This means that attackers did preparatory work in advance (for example,
information could have been obtained during previous attacks on the organization or its
ib
employees, or on organizations or individuals who work with it).
Attached Microsoft Word documents contained malicious code exploiting vulnerability CVE-
2017-11882. This vulnerability permits executing any code — in the investigated attacks, this
r
was the main module of PortDoor malware — without additional user actions.
st
When run, PortDoor collects general information about the infected system and sends it to the
malware control server. If the infected system is of interest to attackers, they use the PortDoor
functionality to remotely control the system and install additional malware.
di
2. Additional malware
The attackers used multiple backdoor applications at once — probably to maintain a
communication channel with the infected system in case a security solution detects and removes
re
some of the malware modules. All these backdoors provide extensive functionality for controlling
the infected system and collecting confidential data.
Five out of the six backdoors found on infected systems (PortDoor, nccTrojan, Logtu, Cotx and
DNSep) had been previously used in attacks that other researchers attributed to APT TA428.
The sixth backdoor turned out to be new and had not been encountered in other attacks.
or
3. Attack development
Having gained a foothold on the first system, attackers spread malware to other computers on
the network; to access them, they used results of network scanning, as well as previously stolen
d
credentials.
The Ladon hacker utility popular in China was used in the attack. It combines tools for scanning
e
the network, finding and exploiting vulnerabilities, password attacks, etc. Attackers also actively
used standard utilities included with the Microsoft Windows operating system.
pi
The final stage of the attack was access to the domain controller and full control over all
workstations and servers of the organization.
The attackers actively used dll hijacking and process hollowing techniques to avoid detection by
co
security software.
4. Data theft
Having obtained permissions of a domain administrator, the attackers searched for documents
and other files containing confidential data of the attacked organization and then uploaded them
to their servers deployed in several countries. The same servers were used as first-level
be
https://securelist.com/targeted-attack-on-industrial-enterprises-and-public-institutions/107054/#
t
No
10
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 1. Introduction
Administration
ed
ut
r ib
st
di
re
or
Let’s study another example of an APT attack:
— A PowerShell command loads a PowerShell script from a remote server and executes it.
— In the next step, the script downloads three additional files from the same remote server: 1.bat,
d
— syn.exe is a program that loads 1.dll. Module 1.dll is the payload, a backdoor that Fortinet
analysts named Milestone; its code is based on Gh0st RAT/Netbot Attacker and packed with
pi
Themida.
— The backdoor copies itself into %APPDATA%\newdev.dll and creates service msupdate2 in the
registry.
co
be
t to
No
11
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 1. Introduction
Administration
ed
ut
r ib
st
di
re
or
We have figured out what attacks exist and who they are aimed at; analyzed some examples; and now
d
it's time to discuss what problems a customer faces when building an information security system to
counter contemporary threats:
e
most of the attacker's activity remains hidden; and if we don't see it, we cannot control or stop it.
Also, if we can see the final steps and successfully counter them, it does not mean that the
situation will remain as it is. This will last only until the attackers perform an action that we cannot
co
detect, which may take an hour, a day or a month; then they will reach their goal.
A real-life example:
— A customer detects a malicious program on a corporate computer.
— Deletes it.
be
— The customer detects malware on another computer within their network a day after the first
incident.
— Deletes it.
— A day later, the situation repeats.
to
— This continues until the customer analyzes this cybersecurity incident and reveals the entire
chain of the attack, after which they were able to stop it.
2. No clear plan of action.
There might be a situation when a customer does not have a clear plan of action for various
t
cybersecurity incidents, or employees are not familiar with it. This may lead to the following
No
consequences:
— Employees' actions may be too hasty (delete a file or delete a virtual machine without having
analyzed the threat).
12
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 1. Introduction
Administration
— Employees' actions may be too slow (it may take time for an employee to figure out how to
ed
best act in a particular situation).
— Communications between employees/departments can take a long time (an insider may be
found during an investigation and interaction with the IT service and the physical security
service will be necessary in order to promptly restrict employee’s access to the corporate
ut
services and premises, which may require various approvals).
— If a procedure is not clearly described or well-mastered, an employee may simply make a
mistake in a hurry; the human factor becomes critical.
ib
3. Lack of resources.
Customers quite often don't have the necessary resources to work with various cybersecurity
systems. As a result, although systems generate the necessary information on incidents and
r
provide the necessary functionality for threat analysis and prevention, employees simply don't
st
have time to use it because of heavy workload.
A real-life example:
— A customer has a SIEM system deployed.
di
— It generates about 400 alerts daily.
— Only two specialists work with this system, who have other duties too.
re
— As a result, there is no time for configuring and fine-tuning the system, alerts are created but
are not processed, incidents are neither investigated nor responded.
— The result from the SIEM implementation is negative, taking into account its cost.
4. Lack of understanding of what to protect.
or
Even if a company has all the necessary resources to investigate incidents, but there is no
understanding of which processes and resources are critical for the company, the results of the
information security department work will be unsatisfactory. When making any decisions in
information security, it is always necessary to take into account what impact this will have on the
d
company's business. This helps in prioritizing threats as well as when implementing protective
measures.
e
For example, what if the corporate print server is unavailable for 1 day? For a software
development company, this is unpleasant, but the key business processes will work all right, the
pi
damage is minimal. For a bank office, this is critical, because the key business processes will be
affected: signing contracts, issue of loans (everything where paper documents are required).
When prioritizing threats, analysts must focus on threats that can potentially cause maximal
co
damage.
be
t to
No
13
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 1. Introduction
Administration
ed
ut
ib
r
st
di
re
or
We have discussed challenges that companies face when building an information security system and
d
Comprehensiveness
pi
An information security system should be comprehensive. This means that technical means or skilled
personnel are not enough. Three components are required:
co
1. People. Skilled personnel are required to perform tasks in an integrated information security
system, which is not as simple as it may sound, considering a constant shortage of cybersecurity
professionals on the labor market. Also, don't forget that ordinary users very often become the
first line of defense, and probability and criticality of incidents depends on their cybersecurity
awareness; so, in addition to hiring information security specialists, it is equally important to
educate all company personnel.
be
2. Processes. Again, without a clear understanding of what steps employees should take in every
situation, they will not be able to act efficiently.
3. Technologies. There are usually no questions about this. To perform their tasks, specialists need
appropriate tools that have the required functionality and usability.
t to
No
14
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 1. Introduction
Administration
ed
ut
r ib
st
di
re
or
To build a comprehensive information security system, you must understand how an attack on an
organization develops; when an incident is detected, you need to realize what stage the adversaries are
at, what tools they use and what they may do next. There are many methods for analyzing attack steps;
the Kill Chain model is one of them.
d
1. Reconnaissance.
The cybercriminals begin by gathering information about the organization from open sources,
pi
social networks, etc. They are interested in everything to do with business processes, IT/IS
systems and company problems. On the company’s website or a job search website, they find
information about vacancies in the IT or cybersecurity department with a description of the
co
systems that candidates need to know. On LinkedIn, there are details of IT staff, including their
skills and successfully completed projects. Next, they find these people in Facebook and learn
even more about what they do at the company. It is possible to go even further and find ex-
employees who have been fired and feel offended: they are likely to tell a lot of interesting
details. Finally, using free tools such as DNS lookup etc., they get information about the
company’s IP addresses and external resources.
be
Now the cybercriminals know everything they need about the operating systems, applications,
anti-malware and anti-spam protection, firewalls, DBMS and other systems used by the
organization. In short, know what to attack and what security mechanisms need to be bypassed.
2. Weaponization.
to
The cybercriminals select the method of attack and prepare the tools to execute it. Let it be a
PDF document with a proposal for collaboration on a new product. They know about the anti-
malware applications used to protect endpoints and mail servers. Therefore, they need to
prepare a malicious object able to evade just one or a few particular security products, which
simplifies the task. The cybercriminals find an exploit kit and after a few test runs create a PDF
t
file that escapes detection by the anti-malware applications installed at the victim company.
No
When a company employee receives and opens the file, it will exploit a vulnerability in the PDF
reader software to establish a connection to the C&C center over the internet. The result will be
full access to the computer.
15
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 1. Introduction
Administration
3. Delivery.
ed
At the third stage, the malicious object is delivered to a company employee. This is where social
engineering comes into play.
Through the corporate website or social networks, or even by ringing the company’s call center,
ut
they make a list of employees who deal with new suppliers. The cybercriminal phones one of
them, tells a ‘story,’ and forwards a business proposal, that selfsame PDF file.
If the cybercriminals are in luck, the malicious file will reach the recipient intact. The user opens
the file, inadvertently infecting the machine and establishing a connection to the C&C center. If
ib
this does not occur, criminals will need to phone the employee once more to find out what
happened. If the file was blocked by an anti-malware application or the message was not
delivered, the cybercriminal can complain about problems with the mail system and offer to send
r
the file to the private mail account of the employee, who will then open it at the office or at home
on the work laptop. In this instance, there are fewer levels of protection, so the chances of
st
delivery are higher.
4. Installation and spreading.
di
As soon as the employee receives the file and opens it, the system becomes infected. Then the
malware modules propagate throughout the network under the criminals’ control and infect other
machines.
re
5. Command and control.
The infected computers establish a connection to the C&C server. Now the cybercriminals have
control over the computers, including systems used to perform banking operations.
6. Accomplishing the task.
or
The cybercriminals achieve the objective: obtain the details of thousands of bank cards and sell
them to the customer who ordered the crime.
7. Disappearance.
d
The final stage is to erase every trace of the operation: files, log records, etc. This phase is
optional and is not always carried out. One of specifics of targeted attacks is that they pursue not
only near-term, but also long-term aims. In this case, a near-term objective is to steal a database
e
with financial details of the users. A long-term objective is to keep doing it in the future.
pi
From the victim’s viewpoint, the situation does not look good. At the first two stages (pre-compromise),
the company is rather powerless to do anything but keep an eye on the information about itself that is
published on the internet. It is almost impossible to know that someone is gathering information and
co
preparing an attack. At the next stages, it is vital, yet still insufficient to apply traditional protection
methods. They will help in the event of a mass attack, but if the attack is targeted, the intruder will bypass
at least some of them after a series of attempts.
The only option here is to consider a new approach to protection using not only tools for blocking certain
malicious objects or network packages, but ones able to detect indicators of targeted attacks against the
be
organization. In any event, company employees need to be made more aware of the IT threats.
t to
No
16
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 1. Introduction
Administration
ed
ut
r ib
st
di
re
or
Information security specialists worldwide constantly monitor and analyze activities of cybercrime groups.
Their tactical and strategic objectives are scrutinized, described and classified. A result of this work is the
MITRE ATT&CK knowledge base of adversary tactics and techniques.
While Kill Chain considers 5 major stages of adversaries’ actions starting with intrusion, MITRE ATT&CK
d
These objectives are named tactics in the MITRE ATT&CK classification. Known methods of achieving
the goal are listed and described for each tactic. These methods are named techniques.
t
The MITRE ATT&CK knowledge base (a so-called matrix) is a useful tool for understanding the nature of
a malicious activity and predicting further steps of an attack.
No
17
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 1. Introduction
Administration
ed
ut
rib
st
di
re
or
Understanding the corporate business processes
Another important factor when building an information security system is understanding the company’s
business processes.
d
To build efficient protection, it is critically important to understand what exactly we need to protect, how
e
business processes are organized, which of them are crucial, which employees and which information
systems participate in them.
pi
This information is equally important when designing the information security system and when
investigating incidents, for example:
co
— When you design a cybersecurity system, you must understand which data or services are most
critical for the company and build the system based on this information and taking into account
the level of risk that is considered acceptable for these resources. Suppose, 4-hour downtime of
an organization's website will lead to reputational and monetary losses of several hundred
thousand dollars and critical business processes will be affected. Taking into account this fact
and likelihood of such an incident, we can design an information security system that will prevent
be
this risk with high probability, provided that the cost of implementing and maintaining this system
is lower than the potential damage. There are various formulas that help calculate risk reduction.
— When you investigate an incident, information about the protected objects and their criticality can
be useful in various cases:
— Additional information for incident analysis;
to
— Incident prioritization;
— Ability to predict the attacker's goals.
t
No
18
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 1. Introduction
Administration
ed
ut
rib
st
di
re
or
Adaptability
One more important factor when building an information security system is adaptability.
d
Whichever approach to security you adopt, it is important to understand that it is a continuous cyclic
process, which includes prevention, detection, response and prediction rather than one-time activities. To
e
ensure proper protection, companies should use solutions and services that cover all of them:
— Prevent: a set of policies, products and processes that prevent an attack. The main purpose of
pi
this category is to reduce the attack surface and block dangerous activity before harm is done to
the company.
— Detect: functionality for detecting attempted and actual intrusions missed by tools in the previous
co
category due to the active use of masking techniques. The main purpose of this category is to
detect the spread of an attack to minimize the damage. Ideally, the company should presume
being under attack already, with systems having been compromised.
— Respond: the skills and tools required for investigating and eliminating problems detected by the
solution in the previous category. The results of the investigation should propose measures to
be
19
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 1. Introduction
Administration
ed
ut
ib
r
st
di
re
or
In a projection onto the adaptive security strategy, Kaspersky Anti Targeted Attack Platform and
Kaspersky Endpoint Detection and Response detect targeted attacks that endpoint protection
applications may overlook. KATA detects threats in the network traffic. KEDR detects threats on
endpoints.
d
Kaspersky Endpoint Detection and Response also provides response tools: permits you to remotely
isolate a host from the network, request files for analysis, stop and start processes, prohibit starting
e
specific files, etc. KATA does not contain any response tools.
pi
20
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 1. Introduction
Administration
ed
ut
r ib
st
di
re
or
We have described typical cybersecurity tasks; now, let's see how KATA Platform can help solve them:
d
— Company management:
e
— Heads of department:
— Increasing efficiency and, as a consequence, an opportunity to receive additional resources;
co
21
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 1. Introduction
Administration
ed
ut
rib
st
di
re
or
Let’s talk about taxonomy of protection solutions in order to position KATA Platform correctly:
— Traditional protection is classified as Endpoint Protection Platform (EPP) solutions. Their task is
to automatically block and resolve all threats that can be detected 100% algorithmically and thus:
— Make it more difficult for adversaries to create undetectable tools;
d
The following Kaspersky Endpoint Security for Business products pertain to this class of
solutions: Kaspersky Endpoint Security (for Windows, Linux, Mac), Kaspersky Security for
pi
— Endpoint Detection and Response (EDR) is a class of solutions that detect potentially dangerous
co
but not 100% malicious activity on network endpoints and provide cybersecurity experts with
extended decision-making context and incident response tools.
Kaspersky Endpoint Detection and Response belongs to this class of solutions.
— Network Traffic Analyzer (NTA) is a class of solutions that analyze network traffic and detect
indicators of malicious or suspicious activity.
be
22
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 1. Introduction
Administration
ed
ut
rib
st
di
re
or
When working with KATA Platform, you must take into account approaches to building an information
security system: comprehensiveness, adaptability, understanding of business processes.
This step is very important, because you cannot properly design an information security system
or organize processes without it.
e
2. Integrate KATA Platform into the corporate cybersecurity system and processes.
pi
At this stage, KATA Platform is integrated into the information security system and you configure
technical interaction between them, as well as between KATA Platform and IT systems. You also
need to create organizational norms for the system operation and maintenance.
co
3. As part of operational activities, identify threats, eliminate them and minimize damage to the
company.
Operational work is underway: incident detection, investigation and response to attacks.
4. Adapt processes, cybersecurity and IT systems to prevent incidents in the future.
be
Last but not least: adapt all systems and processes based on the information received to prevent
recurrence of the same incidents in the future.
t to
No
23
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
2. Pre-deployment
ed
ut
2.1 Main capabilities
rib
st
di
re
or
e d
pi
environment, YARA — to files extracted from traffic and mail messages and downloaded via
links in email messages;
— Provides detailed information about detections in the web console;
— Permits searching Kaspersky Threat Intelligence Portal for additional information about the
to
detected objects.
— Automatically checks telemetry for suspicious activity using the Targeted Attack Analyzer
technology;
No
24
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
ed
— Isolate the host from the network,
— Prevent file execution,
— Delete a file,
ut
— Quarantine a file,
— Upload a file to the centralized storage,
ib
— Kill a process,
— Run a program,
— Get forensic data,
r
— Get process or system memory dumps,
st
— Get disk image;
— Applies various detection technologies to files in the centralized storage: anti-malware scanning,
di
reputation check, digital signature check, emulation in a virtual environment, YARA;
— Permits searching Kaspersky Threat Intelligence Portal for additional information about the
detected objects;
re
— Permits scanning the telemetry database and endpoints for indicators of compromise.
— Sensors provide integration with the customer’s network infrastructure. A sensor receives
network, web and mail traffic. Then it performs preliminary scanning: analyzes network packets
25
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
and links, extracts files from traffic and forwards them together with metadata to central node for
ed
more detailed analysis.
— Endpoint agents are installed on workstations and servers running Microsoft Windows or Linux.
The program collects data about processes’ activities, file and registry operations, as well as
about the established connections. The collected data is sent to the central node for further
ut
analysis. A central node can command its agents to contain dangerous activity.
In this course, we describe only KEA for Windows; KEA for Linux serves the same purposes, but
its functionality is somewhat less extensive.
ib
— Central node is the main component of the system. It receives data from sensors and agents,
performs in-depth analysis, detects anomalous activity on endpoints, stores and publishes the
results. It also interacts with the sandbox servers (sends objects for analysis).
r
— A sandbox server is a special hypervisor with a set of virtual machines running several different
st
versions of operating systems and most common applications. The virtual machines are started
when a central node sends a task to analyze an object’s behavior. The file or link is transferred
to a virtual machine and is run there. All actions are logged and then analyzed. A sandbox
di
scrutinizes executable files, office documents, scripts and multimedia files.
— Web interface is the main security tool for monitoring and studying the results of analysis
performed by the KATA and KEDR products. This component is implemented as a web server
re
on central node; you can connect to it using any popular web browser.
Sensor, central node and sandbox are separate1 physical or virtual servers. All connections between
KATA/KEDR applications (components) are protected by TLS. Connections between the central nodes
and sensors are additionally protected with IPsec.
or
KATA is connected to the network non-intrusively (without interrupting the data flow). Inline connection is
not supported. The solution analyzes mirrored traffic and copies of objects without significantly affecting
the network. The KATA platform is designed primarily for analyzing organization’s incoming or outgoing
traffic. Internal traffic analysis is not an anticipated use case.
e d
pi
co
be
t to
No
1The central node has most of the sensor capabilities; for this reason, a dedicated sensor server is not needed in some
environments
26
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
Central node
ed
ut
r ib
st
di
re
or
A central node is the main element of KATA and KEDR products, which:
e
In large organizations with numerous computers, a distributed installation with several central nodes that
constitute a hierarchy and are managed from a single console is possible.
The central node also supports cluster architecture; we'll talk about this later.
t to
No
27
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
Sensor
ed
ut
ibr
st
di
re
or
In the KATA product, a sensor provides integration with the customer’s infrastructure. It receives objects
d
for scanning from network switches, proxy servers, mail servers and mail gateways. It scans all traffic
using the Intrusion Detection System technology (based on Suricata opensource IDS rules). It extracts
e
objects from traffic, checks addresses using the URL Reputation technology and sends files to the central
node. It also extracts metadata from mirrored traffic and sends them to the central node to detect
suspicious activities.
pi
A sensor can be built into a central node or installed on a dedicated server. There can be several
dedicated sensors on a network.
co
In KEDR, a sensor acts exclusively as a proxy that forwards telemetry from endpoint agents to the central
node. This feature can help, for example, optimize telemetry traffic from a regional office to the
organization's headquarters.
be
t to
No
28
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
Sandbox
ed
ut
rib
st
di
re
or
Sandboxing is a technology that analyzes objects’ behavior in a virtual environment. KATA and KEDR
d
products use a proprietary sandbox based on Kaspersky automatic malware detection technologies,
which the company has used internally for more than 15 years and is constantly improving.
e
A sandbox is an individual device that ‘does not know’ about other KATA/KEDR servers. It is the central
node that sends objects for analysis and retrieves the results. A KATA/KEDR Sandbox server can only
pi
work with a KATA/KEDR Central Node. Other Kaspersky solutions can be integrated with a similar
product named Kaspersky Sandbox.
co
When a central node receives files that sensors have extracted from corporate traffic and email, it sends
executable files, office documents, scripts and multimedia files to the sandbox server for scanning.
If a sandbox receives a link from mail traffic, it starts a web browser and opens the link there. If it receives
a link from the network traffic, it downloads the file and tries to run it.
be
The sandbox implemented in KATA/KEDR can run objects within Windows and Linux virtual machines.
The following types of virtual machines are used:
— Windows 10 64-bit,
— Windows 7 64-bit,
— Windows XP 32-bit,
to
Sandbox requires a dedicated server, it cannot be built into a central node or sensor. Kaspersky Anti
Targeted Attack and Kaspersky Endpoint Detection and Response can have multiple sandbox servers.
t
No
29
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
ed
ut
ibr
st
di
re
or
An endpoint agent is software installed on Windows/Linux computers that collects data about programs’
d
and users’ activities. This data is sent to central node, where the Targeted Attack Analyzer technology
processes it and generates alerts about suspicious activities.
e
Endpoint agents collect the following data from the network hosts:
pi
— Processes’ activities;
— File operations;
— Operations with the registry;
— Network activities;
co
Endpoint agents also perform the tasks that security personnel send from the central node web console:
— Isolate a computer from the network (with exclusions);
be
30
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
Cluster. Architecture
ed
ut
ib
r
st
di
re
or
The Central node component can be deployed as a failover cluster, which consists of servers with 2 roles:
d
storage and processing servers. Fault tolerance is achieved due to data duplication between storage
servers and redundancy of computing resources: when a server fails, another server with the same role
e
A cluster must include at least 4 servers: 2 storage servers and 2 processing servers. You can scale the
pi
cluster to increase the amount of processed traffic or the number of connected hosts, but we recommend
that you add servers with the same hardware configuration to the cluster. Otherwise, a proportional
increase in performance is not guaranteed.
co
If a processing server is configured to receive mirrored traffic from SPAN ports, when this server fails,
SPAN traffic will not be processed.
The cluster uses Ceph (an open source software-defined distributed file system), which imposes its
requirements on the disk subsystem where telemetry and files will be stored:
be
31
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
ed
ut
rib
st
di
re
or
KATA Platform and KEDR are not the only Kaspersky solutions that offer extended detection and
d
response capabilities against advanced threats. KATA and KEDR are powerful data collection and
analysis tools that require high level of expertise to be used efficiently.
e
Not all companies have such experts. With this in mind, Kaspersky offers solutions that automate most of
the analysis, but provide comparable capabilities for advanced threat detection and manual response:
pi
Kaspersky Sandbox (KSB) and Kaspersky Endpoint Detection and Response Optimum (KEDR
Optimum).
co
Of course, a highly qualified analyst armed with KATA and KEDR will be able to detect more stealth
attacks and discover more information about threats’ penetration and propagation across the network.
KATA and KEDR constitute expert framework, while Kaspersky Sandbox and KEDR Optimum pertain to
optimum framework. Both frameworks offer solutions to similar issues, but for professionals who possess
different qualifications, with different levels of detail, depth of context and hardware requirements.
be
At the same time, to make it easier for customers to migrate from a simpler solution to a more complex
one when they improve their skills, both frameworks partly share the same applications.
Let’s take a quick look at what unites and differentiates these frameworks.
to
The main server of the expert framework is the KATA Central Node. It coordinates the entire solution:
— The main management console is running on the central node, which is used for analysis and
processing of alerts in both KATA and KEDR.
t
— In the KATA product, the central node receives and analyzes traffic (by itself or via a dedicated
sensor).
No
— The central node sends objects to a KATA sandbox server for analysis and retrieves the results.
32
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
— In the KEDR product, endpoint agents installed on the network computers are connected to the
ed
central node and:
— Send telemetry to the central node;
— Receive commands from the central node and implement incident response.
ut
— Telemetry and alert databases are located on the central node.
The main server of the optimum framework is Kaspersky Security Center Administration Server:
ib
— The main alert analyzing and processing tool is the Kaspersky Security Center web console.
— The alert database is connected to the Kaspersky Security Center server.
— In the KEDR Optimum product, endpoint agents installed on the network computers are
r
connected to the Kaspersky Security Center server and:
st
— Send telemetry to the Kaspersky Security Center server;
— Receive response commands from the Kaspersky Security Center server.
di
— In the Kaspersky Sandbox product, endpoint agents send files for analysis directly from the
network computers to the sandbox server.
The endpoint agent mentioned in the descriptions of both frameworks is the same application. An
re
endpoint agent can be configured to interact with Kaspersky Security Center, or KEDR central node, or
with both servers at the same time.
operation to the central node. In the optimum framework, endpoint agents send only telemetry
directly related to detections of Kaspersky Endpoint Security (or another Kaspersky protection
application).
e
— In the expert platform, all telemetry is collected by an endpoint agent. In the optimum framework,
pi
an endpoint agent receives telemetry from the Kaspersky security solution installed on the
computer.
As a result, in the expert framework, an endpoint agent operates autonomously, does not require any
co
additional applications and can coexist with third-party security solutions on a computer. In the optimum
framework, an endpoint agent does not do anything by itself; it closely interacts with the Kaspersky
Security Center Network Agent and the Kaspersky security application installed on the device and for this
reason cannot work alongside third-party security tools.
be
The sandbox server mentioned within both frameworks is not the same application. The KATA Sandbox
employed in the expert framework and Kaspersky Sandbox that pertains to the optimum framework use
the same technology when analyzing files in a virtual environment, but differ in how they receive files for
analysis, operating systems used for analysis and details of the returned results:
— KATA Sandbox accepts files only from a KATA/KEDR central node, analyzes them on a few
operating systems (Windows XP, 7, 10, Astra Linux 1.7, CentOS 7.8) and returns a detailed
to
You can use neither KATA Sandbox in the optimum framework, nor Kaspersky Sandbox in the expert
framework.
33
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
Kaspersky Security Center takes part in the KEDR product too, but it plays a complementary role there. It
ed
facilitates installation and configuration of endpoint agents on the network computers. If a customer does
not use Kaspersky Security Center, administrators can deploy endpoint agents and configure their
interaction with Kaspersky EDR Central Node using other methods, but this may require somewhat more
time and effort.
ut
rib
st
di
re
or
e d
Also, considering that some customers are interested in the expert framework, but cannot deploy the
KATA/KEDR platform locally, another version of the expert framework was created: Kaspersky EDR
pi
Server requirements
to
Central node
Requirements for the central node depend on the load. In KATA, we are talking about objects extracted
from traffic and the traffic coming to the central node that acts as a sensor. In KEDR, about the number of
t
34
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
ed
ut
ibr
st
di
re
or
The minimum configuration of a KEDR central node for production use is as follows:
— Memory: 64GB;
— CPU: 8 logical cores;
— Operating system drive: 1TB RAID 1 or RAID 10 with 100 ROPS2 and 1000 WOPS; 3
d
— Drive for data storage4: RAID 10 with 300 ROPS and 200 WOPS.
e
pi
co
be
t to
No
35
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
ed
ut
ibr
st
di
re
or
The space required for storing telemetry from agents depends on several variables:
— Number of endpoints,
— Data retention time (days).
d
36
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
Load on the channel through which endpoint agents send telemetry to the central node:
ed
— Average = 0.02Mbps;
— Peak = 0.1Mbps.
An endpoint agent connects to the central node periodically and sends data. Telemetry is sent as events
ut
every 30 seconds or more frequently. Response commands and their results are transmitted during
scheduled synchronizations (every 5 minutes by default).
If the server is inaccessible (for example, the user has taken the laptop to a business trip), the gathered
ib
data will be stored locally and sent to the central node as soon as connection can be established.
r
st
di
re
or
e d
pi
co
37
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
ed
ut
rib
st
di
re
or
The minimum configuration of a central node for production use of KATA without dedicated sensors and
KEDR is as follows:
— Memory: 96GB;
— CPU: 12 logical cores;
d
— Operating system drive: 1.9TB RAID 1 or RAID 10 with 100 ROPS and 1000 WOPS;
— Drive for data storage: RAID 10 with 300 ROPS and 200 WOPS.
e
A central node can run on either a physical or a virtual server. Installation on a virtual server is only
pi
38
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
ed
ut
ib
r
st
di
re
The minimum configuration of a central node for production use of KATA without dedicated sensors and
or
KEDR is as follows:
— Memory: 96GB;
— CPU: 12 logical cores;
— Operating system drive: 1.9TB RAID 1 or RAID 10 with 100 ROPS and 1000 WOPS;
d
— Drive for data storage: RAID 10 with 300 ROPS and 200 WOPS.
e
If you need to process a large volume of traffic, you can deploy a dedicated sensor. For example, to
process 4Gbit/s, you will need a sensor with the following specifications:
pi
— Memory: 32GB;
— CPU: 48 logical cores.
When planning the installation, take into account the network connections that the central node will need
co
to establish:
— Inbound connections:
— KATA and KEDR:
— TCP 22 for SSH connections to the server;
be
TCP 443 for connections from KSMG, KLMS, KWTS and external systems that use API;
— TCP 6379 for synchronizing cache of scanned objects with sensors;
— TCP 8081 for receiving files, messages and URLs from sensors;
— TCP 10000 for receiving network traffic metadata from sensors (for targeted attack
analyzer).
t
— Only KEDR:
No
39
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
ed
— TCP 5432 for data exchange between the central nodes in a distributed installation;
— TCP 8444 for providing additional data to the primary central node in a distributed
installation.
—
ut
Outbound connections:
— KATA and KEDR:
— TCP 80 for downloading updates from Kaspersky servers or from a user-defined source;
ib
— TCP 443 for downloading updates from Kaspersky servers, KSN requests and
connections to the sandbox server;
— SMTP port for email notification;
— SIEM port for sending alerts and information about components’ status to SIEM;
r
— UDP 161 for requesting sensors’ status data.
st
— In a distributed installation:
— TCP 443 for authentication requests to the primary central node in a distributed
installation;
di
— TCP 5432 for data exchange between the central nodes in a distributed installation;
— TCP 8444 for requesting additional data from secondary central nodes in a distributed
installation.
re
Connections between sensors and the central node, as well as between central nodes are protected with
IPSec in a distributed installation. To allow these connections on the firewall, configure allow rules for
UDP ports 500 and 4500, as well as for ESP protocol (IP protocol 50) and authentication headers (IP
protocol 51).
or
If you plan to use the central node as a sensor, consider the sensor’s network connections as well.
Sensor
e d
pi
co
be
t to
No
40
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
Minimum hardware requirements for a sensor (for processing mirrored traffic 100 Mbps):
ed
— RAM: 16GB;
— CPU: 4 logical cores;
— Drive: RAID 1300GB;
— Network adapter: 1Gbps for management, communications with the central node and receiving
ut
objects for scanning from the mail system and proxy servers;
— Another network adapter: to receive a copy of network traffic with the bandwidth corresponding
to the traffic volume.
ib
A sensor can run on a physical or virtual server. Installation on a virtual server is only supported for
VMware ESXi 6.7, 7.0.
r
When installing a sensor (or a central node that will be used as a sensor as well) in VMware vSphere
environment, you can encounter the following situations:
st
— If SPAN traffic is sent to VMXNET3 virtual interface, the sensor may truncate network packets.
By default, a sensor awaits packets with MTU 1600 maximum, while VMXNET3 interface
supports packets with MTU of up to 65535.
di
— If network traffic contains packets from several VLANs, configure the virtual switch to accept
packets with different VLAN IDs. A sensor may fail to receive a part of traffic because of a
misconfigured switch of the virtual network to which it is connected.
— Inbound:
— KATA and KEDR:
re
When planning the installation, consider the network connections that the sensor establishes:
or
— TCP 22 for administrator’s connections to the server via SSH;
— UDP 161 to accept requests about the status of components and databases from the
central node.
— Only KATA:
d
— TCP 443 for accepting connections from endpoint agents (if the sensor acts as a proxy).
— Outbound:
co
— TCP 443 for communication with KSN servers and downloading updates via https;
— TCP 995 (or TCP 110 for non-secure connections) for connecting to the mail server and
downloading messages if POP3 integration with the mail system is used;
— TCP 6379 to synchronize cache of scanned objects with the central node;
— TCP 8081 for sending objects (files and mail messages) to the central node;
— TCP 10000 for sending traffic metadata to the central node (for Targeted Attack
to
Analyzer).
— Only KEDR:
— TCP 4443 for redirecting endpoint agents’ data to the central node.
t
No
41
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
Distributed installation
ed
ut
ibr
st
di
re
or
But this imposes additional requirements on PCN. For example, 1000 endpoints, 1 fps and 200 Mbit/s will
require 16 additional GB of RAM and 8 additional processor cores.
pi
co
be
t to
No
42
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
Cluster
ed
ut
ibr
st
di
re
A cluster must include at least 4 servers: 2 storage servers and 2 processing servers. If you want to
handle traffic from 15,000 hosts with Kaspersky Endpoint Agent, you need at least 2 storage servers and
or
2 processing servers. To process traffic from 30,000 Kaspersky Endpoint Agents, you need at least 2
storage servers and 3 processing servers.
Each server in a cluster must have 2 network adapters: for cluster and external subnets. The cluster
subnet must operate at 10Gbit/s. The external subnet must operate at 1Gbit/s.
e d
pi
co
be
to
The minimum amount of RAM for a processing server is 256GB, and 128GB for a storage server.
t
No
The minimum number of logical cores for a processing server is 48, and for a storage server, 16.
43
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
Sandbox
ed
ut
ib
r
st
di
re
or
Sandbox requirements depend on the estimated load. To calculate the configuration precisely, we
recommend that you conduct pilot testing under full load.
d
The following Sandbox server configuration is designed to handle 5 email messages per second, 2Gbit/s,
e
5000 hosts:
— RAM: 80GB;
pi
— CPU: two 8-core Intel Xeon processors with Hyper-Threading (16 logical cores);
— Two 300GB disks;
— Network adapter: 1Gbps for management and communications with the central node;
co
— Another network adapter: 1Gbps for accessing the internet from within virtual machines.
Only Intel processors are supported, AMD processors are not.
Sandbox can run on a physical server or in VMware ESXi virtual environment. Other virtual environments
are not supported5.
be
HDD 300GB.
44
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
Implement the described configuration when setting up the virtual machine. Only the processor frequency
ed
can be modified: you can set the frequency to 2.2 GHz or higher. If the virtual machine has a different
configuration, correct installation and operation of the Sandbox component is not guaranteed.
If you plan to deploy several sandbox servers, we recommend that you use the same hardware and the
ut
same sets of virtual machines on them to balance the load.
ib
— The first network adapter is used as a management interface and receives scan tasks from the
central node:
— Allow incoming connections on TCP port 22 to be able to connect to the server via the SSH
r
protocol.
st
— Allow incoming connections on TCP port 443 to receive data from the central node.
— Allow incoming connections to port 8443 to receive connections to the sandbox web console.
di
Only port 443 is designed for day-to-day operation. Ports 8443 and 22 are necessary for setup
and troubleshooting, but are not used for interactions with the central node or object scanning.
— Another network interface is required for analyzing object behavior and database updates:
re
— Deny access to the organization’s local network to protect the network from objects under
analysis;
— Provide unrestricted access to the internet.
or
On the second interface, it is preferable to disable any limitations and traffic filtering to enable the
processed objects freely establish internet connections. This way, it will be easier to catch
activities of malicious modules attempting to poll the network or connect to their command
center.
d
A sandbox can also scan objects without the second interface. In this case, virtual machines receive
access to ‘fake internet’ organized by a special virtual machine available in Sandbox. The likelihood of
e
45
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
ed
КЕА 3.14 for Windows
ut
ibr
st
di
re
or
d
In the KEDR solution, special agents installed on computers collect data for analysis and detecting
suspicious or dangerous activity. Let’s consider the requirements for KEA 3.14 for Windows.
e
46
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
ed
— Windows Server 2019 Essentials / Standard / Datacenter 64-bit;
— Windows Server 20H2 Standard Core / Datacenter Core 64-bit;
— Windows Server 2022 Standard / Datacenter 64-bit.
ut
Supported Embedded operating systems:
— Windows Embedded Standard 7 SP1 32/64-bit
ib
КЕА 3.12 for Linux
r
st
di
re
or
e d
pi
— Processor: 2GHz;
— RAM: 512MB;
— Free hard drive space: 1GB
— Alt 8 SP Server;
— Alt Server 9;
No
— Alt Workstation 9;
— Goslinux 7.17;
— RED OS 7.3.
47
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
2.4 Scaling
ed
Resource calculation
ut
It is important to evaluate how many and what kind of resources KATA/KEDR servers will need based on
the estimated load prior to starting the deployment.
ib
To calculate resources required for a pilot deployment, use the calculator at
https://support.kaspersky.com/KATA/5.0/en-US/194858.htm.
The hardware requirements for the server where the Central Node and Sensor components will be
r
installed depend on:
st
— Processed traffic volume;
— Number of processed email messages per second;
— Number of hosts with Kaspersky Endpoint Agent.
di
When calculating the hardware requirements for the Sensor component, remember that a sensor’s
processing capability is limited to 4Gbit/s.
re
The hardware requirements for a Sandbox server depend on the type and volume of traffic being
processed and on the time allocated for checking an object (1 hour by default). To reduce this time, a
more powerful server or several sandbox servers are required.
or
When planning, take growth potential into consideration.
Configuration examples
d
Central node
e
It's better to overkill and allocate more resources than necessary to the servers. In the end, it is pragmatic
co
to expect that the volume of processed information will increase over time.
To avoid underestimation, you should understand the requirements for minimum, average and maximum
load. First of all, pay attention to memory and processor. Disk space is much easier to increase without
reinstalling the system.
be
In KEDR installations where the entire load consists of telemetry coming from endpoint agents, the
minimum configuration of the central node is:
— 64GB of RAM;
— 8 logical processor cores.
to
If KEDR is supposed to work with 5,000 endpoints, its central node requires:
— 96GB of RAM;
t
The maximal configuration of a KEDR central node able to process data from 15,000 endpoints requires:
— 192GB of RAM;
— 32 logical processor cores.
48
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
In a hybrid installation of KATA and KEDR where the central node acts as a sensor and processes not
ed
only telemetry from the endpoints, but also network traffic, the minimum configuration is as follows:
— 96GB of RAM;
— 12 logical processor cores.
ut
This configuration is designed for 1000 hosts, 200Mbps of raw mirrored traffic and 1 email message per
second.
A central node processing telemetry from 10,000 endpoints, 1Gbps raw traffic and 2 email messages per
ib
second requires:
— 192GB of RAM;
— 40 logical processor cores.
r
st
If the traffic volume exceeds 1Gbps, we recommend that you allocate a dedicated sensor for processing
raw mirrored traffic.
di
If the expected load falls somewhere between the described configurations, select the parameters
calculated for a heavier load to be on the safe side.
re
Sensor
In Kaspersky Endpoint Detection and Response configurations, a dedicated sensor only proxies
connections between the endpoint agents and the central node, does not perform complex calculations
and therefore does not require a lot of resources.
or
A sensor can proxy telemetry of 15,000 endpoints. For this purpose, the sensor will need:
— 16GB of RAM;
— 8 logical processor cores.
d
If there are no more than 10,000 endpoints, the following configuration will suffice:
e
— 16GB of RAM;
— 4 logical processor cores.
pi
In Kaspersky Anti Targeted Attack installations, a sensor needs additional resources to process network
traffic. Analysis of raw mirrored traffic consumes most resources. As far as email messages and ICAP
co
objects are concerned, the sensor forwards them to the central node almost without pre-processing.
Minimal traffic processing (up to 100Mbps if there are fewer than 10,000 endpoints) does not increase the
sensor requirements, the following configuration is still enough:
— 16GB of RAM;
—
be
A full-fledged sensor configuration capable of handling 4Gbps of raw mirrored traffic is as follows:
— 32GB of RAM;
— 48 logical processor cores.
t
If the sensor is expected to process a traffic of more than 2Gbps, allocate one logical core for handling
network interrupts, as described in the help https://support.kaspersky.com/KATA/5.0/en-US/212016.htm.
No
If the volume of processed traffic exceeds 1Gbit/s, we recommend that you allocate at least 600GB of
disk space.
49
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
Sandbox
ed
A physical server can process up to 5 e-mail messages per second, 2000 Mbit/s of mirrored traffic and
telemetry from 5000 computers with Kaspersky Endpoint Agent.
ut
This will require:
— 2 Intel Xeon processors (8-core HT);
— 80GB of RAM;
—
ib
2 HDD 300GB each.
To achieve the specified performance, set the following characteristics when installing the Sandbox
component on a VMware ESXi virtual machine:
r
— Intel Xeon processor (15-core HT);
st
— 32GB of RAM;
— HDD 300GB.
di
You also need to adjust the virtual machine settings as follows:
— Enable nested virtualization;
— Set High Latency Sensitivity;
re
— Reserve all RAM;
— Reserve the entire CPU resource pool.
When installing the Sandbox component on a VMware ESXi virtual machine, limit the number of
simultaneously running virtual machines to 12.
or
Let us study a KEDR installation without a KATA license. Processing and visualization of data about
pi
You can connect up to 15,000 EDR agents (endpoint agents) to a central node. If there are more
co
endpoints in your organization, use a distributed installation with several central nodes.
If the customer does not have another sandbox solution or is interested in the results of an independent
analysis, they will benefit from a deployment scheme with two servers: a central node and a sandbox.
In this deployment scheme, the central node and sensor components are installed on the same server or
cluster. This server or cluster receives traffic, performs preliminary traffic analysis and deep analysis of
extracted files. As a result, components detect signs of targeted attacks on the organization's IT
to
infrastructure.
One sandbox server is sufficient for almost any Kaspersky Endpoint Detection and Response installation.
t
In this case, sandbox only receives files from analysts who investigate incidents, and the load is low.
No
50
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
This model is suitable for pilots and deployment at the main site when:
ed
— One server is able to capture traffic, perform in-depth analysis and process data from endpoints
(bandwidth up to 1 Gbps, with or without endpoint agents);
— There is no need to analyze traffic at remote sites;
ut
— Remote sites access the internet via the main site;
— Network, web and mail traffic can be captured using a single device.
ib
Additional sensors
r
If the organization has remote offices, their computers don't have to be connected to the central node
directly. It may be inconvenient because of the necessity to create too wide firewall exceptions. Instead,
st
you can deploy a sensor in a remote office, connect endpoint agents to it and connect the sensor to the
central node located at the headquarters. In this configuration, the sensor will automatically transfer data
from endpoint agents to the central node. You can connect up to 15,000 endpoint agents to a sensor.
di
The limit of 15,000 endpoint agents per central node does not depend on the agents’ connection method:
directly or via a sensor acting as proxy. If 10,000 endpoint agents are connected to the central node via 2
sensors acting as proxy, you can additionally connect up to 5,000 endpoint agents directly.
re
To use KATA functionality, you may need to use a dedicated sensor that captures traffic, runs initial
analysis, extracts files and forwards them to central node for in-depth analysis. There can be several
dedicated sensors.
or
This scheme is used for deployment on a main site where:
— One server is unable to capture traffic and run in-depth analysis (bandwidth more than 1Gbps);
— One device is unable to capture traffic from all mail servers, mail gateways, proxy servers and
network switches.
d
The central node can also capture traffic and perform initial analysis. This enables you to install a
e
dedicated sensor only on a remote site where traffic needs to be analyzed. At the headquarters, traffic will
be captured by the central node, which must be powerful enough to combine the two roles and must be
pi
able to retrieve traffic from all the necessary sources. If the headquarters’ bandwidth exceeds 1 Gbps, a
dedicated sensor is also necessary there in addition to the central node.
Traffic between the central node and a sensor equals 15% of SPAN traffic plus 100% of ICAP and email
co
As traffic from mail and proxy servers does not put any significant additional load on either sensor or
central node, you can send it to any of these servers.
be
For example, you can send all traffic (SPAN, mail and proxy) to sensor and leave only the object
scanning functions on the central node. Alternatively, with the same hardware specifications, you can
send only SPAN traffic to sensor, while mail messages and traffic from proxy server can go to the central
node directly. Both options can work equally well and the preferred choice will depend on the network
topology.
to
The required sandbox servers’ capacity in a KATA installation will depend on the amount and types of
files in the traffic.
To process an intense stream of files in the traffic, it will be necessary to concurrently run many virtual
machines on the sandbox server. At the same time, the number of virtual machines that may be running
t
on the sandbox server simultaneously is limited by the server’s hardware resources. If the stream of files
No
51
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
requires starting more virtual machines, you will have to scale up the sandbox’s resources. Two methods
ed
can help to achieve this:
— Add hardware resources to the server: RAM, more processors or more powerful processors,
etc.;
—
ut
Increase the number of sandbox servers.
This approach is simpler, because you don't need to change anything in the currently running
servers
ib
If traffic volume requires using more than one sandbox server, connect them all to the central node. The
central node will then distribute the load between the sandbox servers.
r
Distributed installation
st
You can connect up to 15,000 endpoint agents to a central node. A network of a large organization can
di
have more endpoints, and any of them can become an entry point for criminals.
To be able to receive and process information about local activity on more than 15,000 computers, you
will need several central nodes. In this case, to gather information about threats and response tools within
re
a single console (rather than individual consoles of different central nodes), use the distributed mode. In
this mode, one of the central nodes is made primary and other central nodes are connected to it as
secondary. All management and monitoring will be concentrated in the console of the primary central
node.
or
The requirements for primary and secondary central nodes in Kaspersky Endpoint Detection and
Response installations are the same as the requirements for a dedicated central node in a standard non-
distributed installation.
KEDR imposes small load on the sandbox. To a first approximation, you can consider that one sandbox
d
server with 48 simultaneously running virtual machines is sufficient for any KEDR installation.
e
A KATA installation where all traffic is sent to a single central node (directly or via dedicated sensors), has
the following traffic processing limits:
pi
— Up to 20 files per second from external systems via KATA REST API.
To process heavier traffic, you will need an installation where more than one central node processes
objects.
For example, if you want to scan 8Gbps of traffic, you will need at least 2 central nodes. Also note that a
be
central node cannot process more than 1Gbps of traffic by itself, and raw traffic will need to be processed
on dedicated sensors. Additionally, consider the network topology: how the organization’s external traffic
is routed and how to divide it into multiple streams for scanning by several sensors. The topology can
impose additional limitations on the number and location of sensors.
to
You can organize central nodes into a distributed KATA/KEDR installation to process all alerts from a
single console of the primary central node.
The requirements for a secondary central node in a distributed Kaspersky Anti Targeted Attack
installation are the same as in a non-distributed installation. The requirements for a primary central node
t
to which 10 or more secondary central nodes are connected are described in the online help
https://support.kaspersky.com/KATA/5.0/en-US/194458.htm.
No
A distributed KATA/KEDR installation will almost certainly require more than one sandbox server. To
optimize sandbox utilization, you can connect all central nodes to all sandbox servers.
52
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 2. Pre-deployment
Administration
Cluster
ed
You can connect up to 15,000 endpoint agents to a central node. A network of a large organization can
have more endpoints, and any of them can become an entry point for criminals.
ut
To receive and process information about local activity from more than 15,000 computers, you can
consider not only a distributed installation schema, but also deploying the central node on a cluster.
To process traffic from 30,000 Kaspersky Endpoint Agents, you need at least 2 storage servers and 3
ib
processing servers.
r
st
di
re
or
e d
pi
co
be
t to
No
53
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
3.1 Planning
ib
In most cases, KEDR deployment consists of two steps:
r
1. Install the central node (and sandbox if necessary);
st
2. Install Kaspersky Endpoint Agent on computers and connect them to the central node.
The latter step requires more time and effort. Kaspersky Security Center provides you with ready-to-use
di
handy tools, which make installation and configuration much easier. Even if your organization does not
use Kaspersky Security Center, consider installing it to optimize the deployment of Kaspersky Endpoint
Agent. All Kaspersky Security Center features involved require neither activation nor a special license.
re
Depending on the total number and location of computers, deployment may require more servers for
connecting all endpoint agents:
— In large organizations where the number of computers exceeds the capacity of a single central
node (15,000), multiple central nodes will need to be deployed and joined into a common
or
structure (distributed mode) to collect and process telemetry from all computers.
— In large organizations where the number of computers exceeds the capacity of a single central
node (15,000 hosts), but is less than 30,000 hosts, you can deploy the central node on a cluster
to collect and process telemetry from all computers.
d
— To connect computers located outside the network perimeter, use an additional server deployed
in the DMZ. For security reasons, it is better to deploy a KATA sensor in the DMZ and use it as a
e
central node in each office. When exchanging data, central nodes mainly replicate lists of EDR
agents (endpoint agents), alerts and settings.
Computers’ telemetry is stored in the local database of the central node to which they are
co
connected and is not replicated between the central nodes. However, when you search for
events using the Threat Hunting tool, each query is copied to all central nodes and the search
results are sent to the primary central node to be displayed in its console. Anyway, this data is
significantly less than a continuous flow of telemetry from endpoints.
— In a small office, you can use a sensor as a proxy for security reasons. In this case, you don't
be
need to allow all computers to connect to the central node located in the headquarters; instead,
you can grant this permission to the sensor only.
A sensor does not reduce traffic that goes from endpoint agents to the central node.
Prior to deploying Kaspersky Anti Targeted Attack, examine the customer's network infrastructure:
1. First, gather information about the customer’s network:
t
— Remote offices;
— Channels’ bandwidth;
— Connections between the head office and remote sites.
54
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
KATA analyzes the company’s incoming and outgoing network traffic. We recommend that you
ed
analyze both network and mail traffic.
2. Determine ways of integrating with the infrastructure and the location of relevant devices and
servers:
ut
— Receive mirrored traffic from network devices;
— Retrieve copies of objects from proxy servers;
— Retrieve copies of mail messages from mail servers or receive messages from mail
ib
gateways;
— Receive data from Kaspersky Secure Mail Gateway, Kaspersky Security for Linux Mail
Server or Kaspersky Web Traffic Security.
r
st
Avoid receiving the same traffic from different sources.
3. Calculate the hardware configuration of KATA servers using the information about the
infrastructure from the previous steps
di
When planning, please consider that:
— There can be one or several sensors on one network;
re
— A server can combine the roles of central node and sensor;
— We recommended that you scan both network and mail traffic rather than only one of them;
— Kaspersky Secure Mail Gateway can act as a sensor and capture mail traffic;
— Kaspersky Web Traffic Security can substitute for integration with the proxy server;
— If necessary, you can use a distributed installation with several central nodes.
or
The central node, sensor and sandbox components can be installed in any order.
When you install the central node on a cluster, it is important to install a storage node first; then you can
pi
55
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
Deployment on a virtual infrastructure has the following limitations. The Central Node and Sensor
ed
components support only VMware ESXi 6.7 and 7.0.
ut
— Supported CPU: Intel Xeon.
ib
Installing a storage server
r
st
di
re
or
e d
pi
co
To start installing the storage server of a central node cluster, insert the installation disk in the server or
mount an ISO image. Boot the server from it and wait for the installation to begin automatically. During
the central node installation, Ubuntu Server 20.04.5 operating system will be deployed with the necessary
packages.
be
The system will prompt you to select the type of server that you plan to install; a storage server is always
installed first, so choose type 1. After that, the system will prompt if this node is the first node of a cluster
or if we are adding this node to an existing cluster. Select type 1, because this is the first node of a new
cluster.
to
After that, confirm that you are ready to read the license agreement.
t
No
56
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ib
r
st
di
re
Select the language of the license agreement. The installation language is English; the license agreement
may also be available in other languages. Read and click I accept if you agree. The administrator must
or
accept the License Agreement to continue installing the product.
e d
pi
co
be
to
Select a drive to install the central node operating system. The installer will map the drive and install the
operating system and software required for the central node.
t
We recommend that you use a dedicated partition on a high-performance RAID array for data storage.
No
For more information, see the section devoted to deployment planning above and the online help. You will
select drives for storing data later during the installation.
57
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ibr
st
di
re
or
Select the internal interface that will be used for communications between the cluster nodes and the
external interface for communications with external systems.
For the external interface, you can get network settings using DHCP or set them statically: specify the ip
d
Specify the password for the admin account that you will use to configure the cluster and access it locally
or via ssh.
pi
co
be
t to
No
58
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
Installing a processing server
ut
ib
r
st
di
re
To start installing the storage server of a central node cluster, insert the installation disk or mount the ISO
or
image to the server. Boot the server from it and wait for the installation to begin automatically. During the
central node installation, Ubuntu Server 20.04.5 operating system will be deployed with the necessary
packages.
The system will prompt you to select the type of server that you plan to install; for a processing server,
d
select type 2.
e
After that, confirm that you are ready to read the license agreement.
pi
co
be
t to
No
59
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
Select the language of the license agreement. The installation language is English; the license agreement
ed
may also be available in other languages. Read and click I accept if you agree. The administrator must
accept the License Agreement to continue installing the product.
ut
ib
r
st
di
re
or
Select a drive to install the central node operating system. The installer will map the drive and install the
operating system and software required for the central node.
d
60
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
Select the internal interface that will be used for communications between the cluster nodes and the
ed
external interface for communications with external systems.
For the external interface, you can get network settings using DHCP or set them statically: specify the ip
address, subnet mask and gateway.
ut
Specify the password for the admin account that you will use to configure the cluster and access it locally
or via ssh. The password must match the password that you entered when installing the first storage
node of the cluster.
ib
Enable the node to capture traffic if necessary; if you need to receive traffic from the SPAN interface,
select y.
r
Cluster configuration
st
di
re
or
e d
pi
co
checkbox) and its password that you specified during the installation of the first storage node.
The Cluster page shows the connected nodes and their statuses.
t to
No
61
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ib
r
st
di
In the Server Configuration section, specify the planned values:
re
or
— Number of agents;
— Mail traffic volume;
— SPAN traffic volume.
d
The system will show the estimated size of the event database and storage. You can edit these values.
Click Configure to start setting up the cluster. After the configuration is completed, you will be able to log
e
on to the Administrator account with the Administrator password (select the Local Administrator
checkbox).
pi
co
be
t to
No
62
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
Now you can use the interface to work with the central node.
ed
Installing a central node on a single server
ut
Installing a central node on a single server doesn’t differ much from a cluster installation, except that all
components are installed on the same server.
Installation procedure:
ib
1. To start installing the central node server, insert the installation disk or mount the ISO image to
the server. Boot the server from it and wait for the installation to begin automatically. During the
central node installation, Ubuntu Server 20.04.5 operating system will be deployed with the
r
necessary packages.
st
2. The system will prompt you to select the type of server that you plan to install; if you need to
install the non-cluster variant of the central node, select type 3.
3. After that, confirm that you are ready to read the license agreement.
di
4. Select the language of the license agreement. The installation language is English; the license
agreement may also be available in other languages.
re
5. Read and click I accept if you agree. The administrator must accept the License Agreement to
continue installing the product.
6. Select a destination drive for product installation from the list. The installer will map the drive and
install the operating system and software required for the central node.
or
7. Confirm the installation
8. Then select subnets for the cluster and the product.
9. Specify the external interface. You can get network settings using DHCP or set them statically:
specify the ip address, subnet mask and gateway.
d
10. Specify the password for the admin account that you will use to configure the cluster and access
it locally or via ssh.
e
12. Enable the node to capture traffic if necessary; if you need to receive traffic from the SPAN
interface, select y.
13. Specify at least 1 NTP server.
co
14. To configure the central node, open https://<ip-address>:8443 in a browser, where https://<ip-
address> is the central node address; to log on, use the admin account (select the Local
Administrator checkbox) and its password that you specified during the installation of the first
storage node.
15. In the Server Configuration section, specify the planned values:
be
— Number of agents;
— Mail traffic volume;
— SPAN traffic volume.
to
The system will show the estimated size of the event database and storage. You can edit these
values. Click Configure to start setting up the central node. After the configuration is completed,
you will be able to log on to the Administrator account with the Administrator password (select
the Local Administrator checkbox).
t
No
63
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
Sensor installation
ed
ut
ib
r
st
di
Sensors are installed from the same image as central nodes.
re
To start a sensor installation, insert the installation disk or mount the ISO image to the server. Boot the
or
server from it and wait for the installation to begin automatically. During the central node installation,
Ubuntu Server 20.04.5 operating system will be deployed with the necessary packages.
The system will prompt you to select the type of server that you plan to install; for sensor, select type 4.
d
After that, confirm that you are ready to read the license agreement.
e
pi
co
be
t to
No
64
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
Select the language of the license agreement. The installation language is English; the license agreement
ed
may also be available in other languages. Read and click I accept if you agree. The administrator must
accept the License Agreement to continue installing the product.
ut
ib
r
st
di
re
or
Select a drive to install the central node operating system. The installer will map the drive and install the
operating system and software required for the central node.
d
Select the internal interface that will be used for cluster communications and the external interface for
communications with external systems.
65
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
For the external interface, you can get network settings using DHCP or set them statically: specify the ip
ed
address, subnet mask and gateway.
Specify the password for the admin account that you will use to configure the cluster and access it locally
or via ssh.
ut
ibr
st
di
re
or
e d
You can log on to the sensor management interface using the admin account locally or using ssh.
co
be
t to
No
66
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
Sandbox installation
ed
ut
ibr
st
di
re
or
— Hardware:
— Hypervisor: VMware ESXi 6.7, 7.0;
e
— RAM: 32GB;
— Hard drive space: 300GB.
co
67
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ib
r
st
di
re
To start the sandbox installation, insert the installation disk in the server or mount an ISO image. Boot the
or
machine from it. Select Install product to disk or wait for installation to begin automatically.
Kaspersky Anti Targeted Attack/Kaspersky Endpoint Detection and Response sandbox is installed with
the CentOS 7.9 operating system and the required software packages. Update repositories are disabled
on the system. Only updates issued by Kaspersky can be installed.
d
Select the language of the End User License Agreement and Privacy Policy. The installation language is
e
English; the license agreement and the privacy policy may also be available in other languages. Read
and click I accept if you agree. If the administrator does not accept any of the two, the installation will be
pi
aborted.
co
be
t to
No
68
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
Select the destination drive. The installer maps the selected drive and installs the CentOS operating
ed
system, which includes packages required for the sandbox server operation.
If the administrator cancels the process before the operating system and software has been installed and
restarts the installer later, the installation process will begin from the first step (EULA language selection).
ut
Select a name for the sandbox server. This name is not important because it is not used anywhere. You
will use the IP address to connect a central node to the sandbox. However, a server must have a name,
and you need to specify it.
rib
st
di
re
or
e d
pi
Select the network interface where sandbox will accept administrator’s connections and connections from
the central node that will send objects for scanning and request the results.
co
This is the management interface. Specify an IP address and a subnet mask for it.
For optimal operation, the sandbox server needs another interface for the virtual machines (on which
objects’ behavior is analyzed) to access the internet. This interface is configured via the sandbox web
be
69
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ibr
st
di
re
At the next step, add a DNS server and specify its IP address. If necessary, add other DNS servers.
or
The sandbox server uses DNS settings only to download updates.
Virtual machines that analyze potentially dangerous objects use other name resolution settings that are
not in any way related to the organization's infrastructure.
e d
pi
co
be
t to
No
Then specify the route for the sandbox server to communicate with the network from which the
administrator will connect to the sandbox web interface after the installation.
70
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
If the administrator’s computer is located in the same subnet as the sandbox, the route is of no
ed
importance. If the administrator will connect from another subnet, specify the address of the gateway that
will be able to transfer packets from the sandbox to this subnet.
So far, you have configured only the management interface, therefore, specify a gateway accessible from
ut
the management interface. You will be able to modify the configured routes in the web console later.
r ib
st
di
re
or
d
Set the minimum password length for sandbox accounts. The default value is 12 characters. You cannot
e
Then specify the user name and password of the sandbox administrator. The password must:
pi
The default name of the administrator account is admin. Usernames are case-sensitive.
be
The administrator account has the right to log on to the operating system locally (or via SSH) and log on
to the sandbox web console. No other accounts are required for sandbox use cases.
t to
No
71
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
rib
st
di
The sandbox server setup has been completed.
re
or
There is no Back button in the installation wizard. To modify mistyped parameters, either start
the installation from scratch, or finish the installation as is and reconfigure the parameters via the text
console or the sandbox web interface.
d
The management console opens when you log on to the sandbox server locally or via SSH after a
successful installation.
e
A sandbox server is not fully operational immediately after the installation. It is designed to run files sent
pi
for scanning within virtual machines, log local and network activity of the virtual machine, analyze activity
logs and make a conclusion if the file is dangerous.
To be able to do this, the sandbox server must host ready-to-run virtual machines. Images of these virtual
co
machines are supplied as ISO files that you need to upload through the sandbox web interface.
Also, to be able to examine suspicious objects in an optimal manner, you need to configure an additional
interface through which these objects will access the internet from inside the virtual machines. This is also
done in the web interface.
be
To connect to the sandbox web console, in a browser’s address bar, type https://<sandbox IP
address>:8443.
A sandbox protects connections using a self-signed certificate by default and you will have to confirm a
security exception in the browser. You can replace the certificate of the server in its settings.
to
To log on to the server, use the account that you created during the installation. By default, this account is
named admin.
All sandbox settings are available in its web console. The administrator can:
t
72
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
— Upload virtual machine images;
— Export settings and logs;
— Change the administrator’s password;
— Restart or shut down the server;
— Select the interface language.
ut
The text (ssh) console is mostly necessary for troubleshooting. For example, if you incorrectly specified
network settings and cannot open the web console, log on to the sandbox server locally and reconfigure
ib
the network.
In the sandbox web console, you can modify the network settings specified during the installation:
r
— Server name;
— DNS server addresses;
st
— IP address of the management interface;
— Routes.
di
re
or
e d
pi
co
be
All connections between KATA servers are protected with TLS. To ensure that KATA servers trust the
certificates with which TLS connections are protected, it is important that time coincide on all servers6.
To set time for the sandbox server, select the time zone and specify the date and time. We recommend
that you specify NTP servers to make sure the time is synchronized automatically on the KATA servers.
t to
6If all servers are located within the same time zone, the same time must be set on them. If they are located in different time
No
zones, the difference in time between the servers must exactly match their time zone differences.
73
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ib
r
st
di
We recommend that you have two interfaces on the sandbox server:
—
re
or
One for administration and receiving data from the central node (the management interface);
— The other for the samples being analyzed to access the internet (the internet interface).
If there is only one interface, it will be used for interaction with central node and management; samples
will not have internet access.
d
We recommend that you allow samples being analyzed to access the internet. A malicious object could
connect to a C&C server or download an attack module. Additional information about the object’s
e
functionality will raise the level of detection and assist incident investigation.
pi
Block network access to the company from this interface to protect the network and other KATA servers
from objects being analyzed. Do not scan traffic that passes through this interface by any security
products, including KATA.
co
To connect the sandbox’s virtual machines to the internet, in the Internet interface section, select the
necessary interface and configure for it:
— IP address;
— Subnet mask;
—
be
Gateway address.
The gateway address specified for this internet interface will be used only within the virtual machines. The
operating system of the sandbox server uses the routes (including the default route) specified on the
Static routes page.
to
First, the list of static routes contains only the default route specified for the management interface during
the installation.
All in all, to operate properly, sandbox server needs routes for the following directions:
—
t
— To the specified DNS servers to be able to resolve names of Kaspersky update servers;
— To the subnet from which the administrator connects to web interface or to the text interface over
SSH.
74
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
Depending on the network topology, all these directions can be covered by the default route alone, or
ed
require configuring several static routes.
Only the sandbox operating system uses routes from this list. Virtual machines (within which potential
malicious files are run) use settings of the internet interface that we described earlier in this guide.
ut
If the sandbox has an internet interface connected to an isolated internet channel, we recommend that
you configure static routes as follows:
— In the settings of the default route 0.0.0.0/0, specify the name of the internet interface and
ib
address of the internet interface gateway;
— Set up individual routes (via the management interface) to the central node and to the subnet
from which administrators connect.
r
st
With this configuration, the sandbox will establish outgoing connections only via the isolated internet
interface.
di
re
or
e d
pi
co
The sandbox server is installed without virtual machines. Images of virtual machines are available as ISO
be
The administrator only needs to click a few buttons in the web console and specify the path to the ISO
to
Sandbox only works with special Kaspersky ISO images. Moreover, each Sandbox version uses different
images. Do not try to upload a custom ISO image to the sandbox, the server will reject it.
t
No
75
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
— Windows 10 64-bit;
ed
— Astra Linux 1.7;
— CentOS 7.8.
Various versions of office software, web browsers and some other popular programs are installed on
ut
each virtual machine. Different versions of applications are used in different operating systems.
To improve the detection rate and receive more data for incident investigation, we recommend that you
add all necessary images to the system. The following combinations are available:
ib
— Windows XP 32-bit, Windows 7 64-bit, Windows 10 64-bit;
— Windows XP 32-bit, Windows 7 64-bit, Windows 10 64-bit, Astra Linux 1.7;
— Windows XP 32-bit, Windows 7 64-bit, Windows 10 64-bit, CentOS 7.8.
r
If you skip some image, the system will not work.
st
To upload a virtual machine image to the server, click the Upload button in the sandbox web interface or
copy the ISO file with the image to the folder /var/opt/kaspersky/apt/files, for example, using the secure
di
copy protocol (SCP).
To extract virtual machine files from the image and prepare it for operation, click the button Create VM.
After extracting files from the image, sandbox activates Microsoft and Adobe software. The licenses are
re
included with KATA/KEDR Sandbox. The customer does not need to purchase any additional licenses.
Read the Microsoft and Adobe license agreements for disk images and click I accept the terms if you
agree. The respective license agreement is displayed when you add each image to the system. For Astra
or
Linux, you also need to read its license agreement and click I accept the terms if you agree. When you
install a virtual machine with CentOS 7.8, a license agreement window does not open, because you don't
need to accept a license agreement to use this operating system.
As soon as all images have been added, click Install ready VMs and wait for the environment to be
d
prepared. This is the final step of the sandbox server installation process, after which the server will be
operational.
e
In total, it takes several hours to load images to the server and prepare the virtual machines for operation.
pi
During the preparation, the sandbox creates user files in the virtual machines and simulates traces of
user activity to add fresh creation and access timestamps to documents. Afterwards, the sandbox takes
snapshots of virtual machines that it will use for analysis.
co
Sandbox updates snapshots every day to ensure that there are always fresh traces of user activity inside
each virtual machine to make malicious objects ‘believe’ that they get inside a normal computer in an
organization’s network rather than in a virtual environment.
Sandbox virtual machines are configured in a way that malicious objects cannot easily ‘understand’ that
be
To complete the installation, specify the maximum number of virtual machines that the sandbox will be
able to run concurrently when analyzing files.
to
The default value for the number of simultaneously running VMs is 48. The maximum value is 200.
Every file is usually scanned on several types of virtual machines. Additionally, Sandbox can collect file
behavior data in two modes:
— Full logging mode, when the sandbox collects more detailed data for analysis, but cannot watch
t
— Quick scan mode with fewer details, but longer effective monitoring.
76
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
On which virtual machines and in which mode to scan an object depends on the object type (document,
ed
script, executable file, URL) and where it came from (traffic, mail, manually uploaded by an analyst).
Decision-making logic can be updated together with threat detection databases.
ut
3.3 Activation and initial setup
ib
The central node web interface is the primary tool of security personnel who work with Kaspersky Anti
Targeted Attack/Kaspersky Endpoint Detection and Response. To use it, make sure one of the following
browsers is installed on your computer:
r
— Mozilla Firefox for Linux,
st
— Mozilla Firefox for Windows,
— Google Chrome for Windows,
— Google Chrome for Linux,
— Edge (Windows),
di
— Safari (Mac).
The Kaspersky Anti Targeted Attack/Kaspersky Endpoint Detection and Response web interface is
re
protected against Cross-Site Request Forgery (CSRF) and only works if the user’s web browser sends
the Referer header with HTTP POST requests. That is why you must make sure your browser does not
modify the Referer header in HTTP POST requests. If the internet connection uses a proxy server, it must
not modify this header either.
or
To open the central node web console, enter https://<central node IP address>:8443 (or just
http://<central node IP address> and the central node will automatically redirect you to the secure page).
Use the Administrator account to log on to the server. The admin account, under which you can log on
locally or via ssh, has access only to the configuration page of the central node.
d
When you log on to the web console under the Administrator or admin account, select the Local
e
You will be able to create additional accounts for administrators and security personnel later. Do not
select the Local administrator checkbox for them.
If the web console is open on any page other than the Dashboard and the user is inactive for more than
co
77
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ibr
st
di
re
or
Without a license, the central node neither downloads database updates, nor sends requests to
Kaspersky Security Network, nor uses any other detection technology. Also, many sections of the web
interface are hidden.
d
You can install a license on a central node via its web interface. Sensors periodically connect to it to
check if a license is available. Sandbox accepts files only from a central node in Kaspersky Anti Targeted
e
Attack/Kaspersky Endpoint Detection and Response; if the central node is not activated, Sandbox does
not receive or scan anything. A Sandbox does not need to be activated separately.
pi
co
be
t to
No
78
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
To add a license, log on to the web console as administrator and go to Settings | License. In the KATA
ed
or KEDR area, click Import and specify the license key file. After the file is uploaded, the following will be
displayed in the console:
— Serial number,
— Activation date,
ut
— Expiration date,
— Remaining days.
Central nodes don't support activation codes in Kaspersky Anti Targeted Attack/Kaspersky Endpoint
ib
Detection and Response.
You will be able to change or delete the key file later if such a need arises.
r
When a license expires, databases stop updating and KSN becomes inaccessible.
st
Downloading updates to the central node
di
re
or
e d
pi
co
be
Creating users
There are local logon accounts for the central node, sensor and sandbox in Kaspersky Anti Targeted
t
Attack/Kaspersky Endpoint Detection and Response. These accounts are created during the servers’
No
installations. To change their passwords on the central node after the installation, click on the account
name in the web interface and select Change Password. To change password of the sandbox server
administrator, open the sandbox text console and select Change the system administrative account
password.
79
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
The web interface administrator role is designed for configuration and troubleshooting server issues. It is
ed
not designed for setting up attack detection parameters or processing alerts.
Attack detection setup and monitoring is what security personnel are responsible for. You can create
accounts for them in the central node administrator's web console, in Settings | Users.
ut
r ib
st
di
re
or
e d
Kaspersky Anti Targeted Attack/Kaspersky Endpoint Detection and Response supports the following user
roles that have different privileges in the web interface:
pi
— An administrator is responsible for the product configuration and maintenance, but does not work
with security events;
— The local administrator (Administrator) is responsible for the product configuration and
co
maintenance, does not work with security events, but can manage distributed mode;
— The local administrator (admin) is required for initial configuration;
— A senior security officer has the rights to configure detection technologies and process alerts, but
cannot access the settings related to servers’ interaction with each other or with the customer's
be
infrastructure;
— (Ordinary) security officers are not allowed to reconfigure detection technologies and can access
only some of the alerts in the web interface. They cannot see details of VIP alerts;
— An auditor has read access to all interface sections.
t to
No
80
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
r ib
st
di
re
or
When creating an account, type a password that must:
— Be different from the username;
— Conform to the length restriction specified during the installation;
— Contain at least 3 out of 4 types of characters: lower-case letters (a-z), upper-case letters (A-Z),
d
A user can possess only one role. An account cannot be deleted; its role cannot be changed either; but
you can change the password or block an account.
pi
The web interface administrator created during the central node installation has the same permissions as
administrators created via the web console. But the account of the initially created administrator is not
visible in the list of web console users, it cannot be disabled, and when you log on to the web console
co
Only this initially created ‘local' web interface administrator (Administrator) can reconfigure a distributed
installation (make a central node primary and connect secondary central nodes to the primary central
node).
be
t to
No
81
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ibr
st
di
re
or
To avoid creating additional local accounts for employees who work with KATA/KEDR, you can configure
integration with Active Directory.
d
To integrate:
e
82
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
With integration in place, you can select a Domain user account when creating a new system user.
ed
In this case, SSO will work when this domain user authenticated on a workstation opens `KATA interface.
ut
rib
st
di
re
or
To use SSO:
d
— The DNS name of the central node must be added to the Local Intranet zone.
pi
To scan objects on a sandbox server, you need to connect a central node to it. During the connection,
servers exchange their certificates and the administrator confirms authenticity of these certificates. Later,
the central node will establish secure connections to the sandbox and both servers will verify their
respective identities using the saved certificates.
A central node can be connected to several sandbox servers, and several central nodes can also be
be
You can connect a central node to a sandbox server during the installation. You will also be able to do it
later, for example, if you need to:
— Connect the central node to a new sandbox server;
to
By default, KATA servers use self-signed certificates created during the installation. You can replace
them with the customer’s certificates, but all connections between the servers will need to be authorized
anew.
t
No
If time differs across the Kaspersky Anti Targeted Attack/Kaspersky Endpoint Detection and Response
servers, it may hamper verifying the certificate, and you will not be able to connect the central node to the
sandbox. Before connecting servers to each other, make sure the same time is configured on them (when
83
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
converted to UTC). To avoid issues because of different time settings, configure all servers to use the
ed
same NTP server.
ut
r ib
st
di
re
or
When connecting a central node and a sandbox, send a connection request from the central node and
d
Security officer accounts are not allowed to connect the central node to a sandbox.
pi
The central node will establish a TLS connection to the specified address; if it succeeds, the
sandbox server certificate fingerprint will be displayed.
4. Compare this certificate fingerprint with the fingerprint of the actual certificate on the sandbox
server.
be
If you have typed the sandbox IP address correctly, the fingerprint that you see in the central
node console must coincide with the fingerprint of the sandbox server displayed in the sandbox
web console on the KATA Authorization page.
If the fingerprints mismatch, it may mean that:
— You have mistyped the IP address; make sure the IP address entered on the central node
to
coincides with the sandbox server IP address (it is displayed in the sandbox web console on
the KATA Authorization page).
— Someone or something intercepts secure connections via certificate spoofing (man-in-the-
middle). Ask the IT department whether they use secure connection analysis tools, and if no,
congratulations! You’ve detected an attack on the customer’s network.
t
No
5. If the sandbox certificate fingerprints match, send a connection request. For this purpose, in the
central node console, specify a name for the sandbox server and click the Add button.
84
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
The central node will send a connection request to the sandbox; it will be displayed in the
ed
sandbox web console on the KATA Authorization page. The central node certificate fingerprint
will also be displayed in the request on the sandbox side.
ut
r ib
st
di
re
or
d
6. Compare the certificate fingerprint in the request on the sandbox side with the central node
certificate fingerprint from its own web console.
e
The central node certificate fingerprint is displayed in its web console on the Settings |
Certificates page.
pi
If the fingerprints mismatch, proceed to incident response: someone spoofs certificates in the
network to intercept secure connections.
co
7. If the central node certificate fingerprints coincide, accept the request on the sandbox side. For
this purpose, click Accept in the request and then click the Apply button at the bottom of the
page.
The connection status will change to Approved on the central node. In the future, you will be able
to withdraw connection authorization from either sandbox or central node if necessary.
be
t to
No
85
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ibr
st
di
re
After connecting the sandbox to the central node, you can configure downloading updates from the
following sourses:
or
— Kaspersky secure update servers;
— Kaspersky update servers;
— Custom server (http only).
e d
pi
co
be
to
86
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
If there is a dedicated sensor in your installation, it must be connected to a central node. The connection
principle is the same as between a central node and a sandbox.
ut
A sensor can be connected to one central node only, but you can connect several sensors to a single
central node. If there are several central nodes and several sensors in an installation, different sensors
may be connected to different central nodes.
ib
As certificates are verified during the authentication, make sure the same time is configured on the sensor
and central node (if converted to UTC).
r
st
di
re
or
e d
pi
co
The sensor will try to establish a secure connection to the specified address. In case of success,
the sensor will display the central node certificate fingerprint.
4. Verify authenticity of the central node certificate.
Make sure the fingerprint that sensor shows coincides with the actual central node certificate
to
fingerprint. You can find the fingerprint of the central node certificate in Settings | Certificates.
If the fingerprints mismatch, start investigating a man-in-the-middle attack.
5. If the fingerprints coincide, select OK in the sensor text console. It will send a connection request
to the central node.
t
Upon sending the request, the sensor will display a window with its own certificate fingerprint.
No
6. Compare the sensor’s certificate fingerprint with the fingerprint displayed in the request on the
central node.
87
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
You can find the request in the web console of the central node administrator on the Sensor
ed
servers page. To view the certificate in the request, click the Certificate fingerprint link in the
request.
If the fingerprints mismatch, investigate the incident.
ut
7. If the fingerprints coincide, accept the request on the central node side: click Accept in the
request.
ib
3.4 Distributed installation
r
Primary central node
st
di
re
or
e d
pi
The role of primary or secondary central node is selected after the installation. All central nodes are
co
The transformation takes some time. The user session will be terminated automatically and you will need
to log on to the web console again when the transformation completes.
t
The new role of the central node is displayed on the logon page and at the bottom of the side menu in the
No
web console.
88
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
Assigning the PCN role to a server is irreversible. After you change the server role to PCN, you will not be
ed
able to change it neither to SCN nor to standalone server. If you need to change the role of such a server,
you will need to reinstall the program.
ut
ibr
st
di
re
or
e d
Distributed installations are also used by MSP when a service provider analyzes and processes threats
pi
for multiple customers. In this case, the primary central node is fully managed by the service provider,
each customer must have at least one central node, and the customers’ central nodes must be connected
as secondary central nodes to the service provider's central node.
co
Companies are used to separate access in this case. An administrator of the primary central node creates
company objects for all connected organizations as well as for the service provider in the web console.
When a secondary central node is connected, the administrator of the primary central node indicates
which company it belongs to. You cannot connect a secondary central node without selecting a company
for it.
be
If an ordinary company uses distributed mode because it has a lot of computers or heavy traffic or
because of network topology, you will still need to create at least one company and assign all central
nodes to this company. You can also create fictitious companies for departments within the organization
and use them to differentiate access.
t to
No
89
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
r ib
st
di
re
or
The primary central node must already be prepared before you start configuring a secondary central
d
node.
e
administrator.
2. Open the Operation mode section and switch the mode to Distributed solution.
3. Select the Secondary Central Node role for the server.
co
4. In the PCN IP field, type the IP address of the primary central node and click Get certificate
fingerprint.
The certificate fingerprint of the primary central node will appear on the Operation mode page.
5. Compare it with the certificate fingerprint of the primary central node in the console of the
be
90
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
r ib
st
di
re
or
7. Make sure the connection request has appeared on the Operation mode page of the primary
central node console.
8. Compare the central node certificate fingerprint from the request with the certificate fingerprint in
the console of the respective central node.
d
9. If the fingerprints match, click the Accept button in the primary central node console.
e
10. Select the company (tenant) to which the secondary central node belongs and click Accept
again.
pi
If a distributed installation is configured within a single customer's network, you can specify the same
company for all central nodes.
co
In MSP use cases where one company manages protection of several other companies, create the
company to which a secondary central node belongs before you accept a connection request from it. To
create a company, open the primary central node's local administrator console and click the Add button
on the Operation mode page.
be
All connected secondary central nodes are displayed on the Operation mode page of the primary central
node, grouped by companies. On a secondary central node, this page displays the address of the primary
central node to which it is connected.
Transformation of a central node into secondary is reversible. To make a secondary central node stand-
alone, click the Disconnect button on its Operation mode page.
to
Normally, a secondary central node may need to be disconnected in the following cases:
— To upgrade central nodes, disconnect all secondary central nodes from the primary central node,
upgrade them and reconnect.
t
— To rename a company of a secondary central node, disconnect the secondary central node and
No
91
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ibr
st
di
re
or
In distributed mode, only the primary central node needs to be activated with a license. Secondary central
nodes automatically receive the license from the primary central node and show it in the Settings |
d
License section. You can delete or replace a license on a secondary central node.
e
You can manage users only on the primary central node. Secondary central nodes receive list of users
from the primary central node. Any web console user accounts that were on a central node before it
became secondary are deleted, except for the local administrator account.
pi
Access settings for companies and secondary central nodes appear in the settings of security personnel
accounts on the primary central node (compared to the stand-alone mode). Administrator accounts have
co
In a distributed installation, the main management console is the console of the primary central node. All
users configured in the primary central node settings have access to the primary central node web
console.
be
The MSP use case also assumes that the customer's employees process their company's alerts (or
monitor processing) from the primary central node's web console. To restrict their access to other
companies’ alerts, choose which companies they can work with in the properties of their accounts.
Company-specific access is available only for security personnel accounts. An administrator created in
to
the primary central node web console has access to web consoles of all its secondary servers. It is not
possible to create an administrator for a specific company, but each secondary central node always has a
local administrator account through which the customer can change any system settings.
By default, security officer accounts are only allowed to log on to the primary central node web console,
t
where they can see aggregate information from all secondary servers. There is the SCN web interface
checkbox in the account settings, which permits logging on to a secondary central node’s web console.
No
This may be necessary for changing individual settings of a server such as YARA rules or custom IDS
rules, which are loaded to each server independently.
92
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
If distributed mode is used within a single company where access control is not required, all security
ed
officer accounts can access all alerts via the primary central node console.
ut
ibr
st
di
re
or
d
93
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
In Kaspersky EDR Expert, the central node receives telemetry from endpoint agents, analyzes it and
ed
sends response commands initiated by security personnel to the endpoint agents. However, the central
node does not have any tools for remote installation, activation and configuration of endpoint agents.
We recommend that you install and manage endpoint agents using Kaspersky Security Center. Endpoint
ut
agents can also be deployed and configured without KSC, but KSC simplifies everything a lot.
ib
— Remotely install Kaspersky Endpoint Agent;
— Activate Kaspersky Endpoint Agent with a key or activation code;
— Propagate the central node connection settings to all endpoint agents;
r
— Receive events about endpoint agents’ operation and status.
st
Kaspersky Security Center even duplicates some of the response functions. The KSC console enables
you to isolate a computer from the network or revoke isolation, create and run indicator of compromise
scan tasks.
di
The results of IoC scan tasks created through the KSC console are only available in the KSC console.
They are not sent to the Kaspersky Endpoint Detection and Response central node.
re
or
e d
pi
co
be
You can install Kaspersky Endpoint Agent either in a centralized manner via KSC, or from its distribution
to
package (locally or remotely). Even if KSC is not used at your company, it is advisable to install it for KEA
deployment, given that it does not require purchasing any additional licenses.
t
No
94
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ibr
st
di
re
or
To install Kaspersky Endpoint Agent, use a remote installation task or wizard for the Kaspersky Endpoint
d
There are many methods to start the remote installation wizard in Kaspersky Security Center, and its
steps will slightly vary depending on the context. For details, consult technical training KL 002 ‘Kaspersky
Endpoint Security and Management’ or Kaspersky Security Center documentation.
pi
Here, we will study how to install Kaspersky Endpoint Agent on a computer presuming that the Kaspersky
Security Center Network Agent is already installed on it.
co
First, download the Kaspersky Endpoint Agent 3.14 for Windows package to Kaspersky Security Center.
be
t to
No
95
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ibr
st
di
re
or
Then add the Kaspersky Endpoint Agent 3.14 plug-in to the Kaspersky Security Center web console.
e d
pi
co
be
t to
Create a remote installation task and make sure the installation has succeeded.
No
96
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ib
r
st
di
re
or
After a successful installation, Kaspersky Endpoint Agent will appear in the list of managed applications in
the computer properties in the Kaspersky Security Center console.
In the properties of a managed computer in the Kaspersky Security Center console, you can:
d
Kaspersky Security Center and are not available in the Kaspersky Endpoint Detection and
Response web console.
pi
Pay attention to the Components section in the Kaspersky Endpoint Agent properties. The
module responsible for interaction with the Kaspersky Endpoint Detection and Response central
node is named Threat Detection and Response. After you configure connection to the central
node and activate Kaspersky Endpoint Agent with a license key, this module should have the
Running status.
—
be
Stop and start Kaspersky Endpoint Agent using the buttons located above the list in the
Applications section.
To stop or start Kaspersky Endpoint Agent on several computers simultaneously, use the KSC task Start
or stop application.
to
To display Kaspersky Endpoint Agent events from all (or some) computers, create an event selection on
the Monitoring & Reporting | Event Selections page of Kaspersky Security Center web console and
configure event filtering conditions.
t
No
97
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
Local installation from a stand-alone package
ut
ibr
st
di
re
or
d
To install KEA from a stand-alone package, first create the stand-alone package in KCS, then deliver it to
e
98
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
rib
st
di
re
or
You can install Kaspersky Endpoint Agent locally on a computer using the installation wizard or the
command line.
d
The installation wizard starts when you run the EndpointAgent.msi file. It includes the following steps:
e
1. The first step is to accept the License Agreement and Privacy Policy.
pi
2. The second step of the installation allows you to change the installation folder for Kaspersky
Endpoint Agent executables.
By default, Kaspersky Endpoint Agent installs its executable files and libraries to %Program Files
co
(x86)%\Kaspersky Lab\Endpoint Agent. If you want the KEA files to be located in a different
folder for some reason, specify its path on the Destination folder page of the wizard. This will
not change the location of Kaspersky Endpoint Agent configuration files and other service files,
which are always stored in %ProgramData%\Kaspersky Lab\Endpoint Agent
3. The third installation step allows you to specify a key to activate the KEDR functionality in
be
Kaspersky Endpoint Agent. If the key is located in the folder from which EndpointAgent.msi was
started, the installer will pick it up automatically.
You can also activate KEA after the installation.
4. The fourth step completes the installation.
t to
No
99
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ib
r
st
di
re
or
If you want to install Kaspersky Endpoint Agent without running the wizard, use the following command:
d
— SKIPCVEWINDOWS10=1 permits skipping the check for the required Windows update on the
computer.
— ADDLOCAL=<Core, KATA, SB, All> allows you to select which components to install.
be
A detailed log is created during the installation. By default, it is located in the %TEMP% folder of the user
who started the installation. If the installation completes successfully, the following records will appear at
the end of the log: “Product: Kaspersky Endpoint Agent – Installation completed successfully” and
“Installation success or error status: 0”.
t to
No
100
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
Installation results
ed
ut
r ib
st
di
re
or
By default, the product is installed to the folder %ProgramFiles%\Kaspersky Lab\Endpoint Agent. The
following services will appear in the list of services:
d
The executable files of these services are soyuz.exe and proton.exe. Don't be surprised when you
co
Kaspersky Endpoint Agent has a self-defense mechanism that blocks attempts of third-party processes
to:
— Modify, delete, or change access rules for executable and service files.
be
Kaspersky Endpoint Agent installs two drivers to collect telemetry from the computer:
to
— klncap.sys collects network events such as establishing incoming and outgoing connections,
opening ports, and others
— klsnsr.sys collects various events about activities on the computer:
— File creation;
t
— Running processes;
— Changes in the Windows registry;
No
7 The central node address and connection port are not included in the self-defense scope.
101
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
— Events added to Windows logs;
— And some others.
Both drivers use Event Tracing for Windows (ETW) to collect events.
ut
Data collection is regulated by special filters that define monitoring areas (disk, registry, event logs, etc.)
and exclusions. The Kaspersky Endpoint Security update task can update these filters. In other words,
the list of events that endpoint agents collect and send to the central node is not hard-coded, it may
ib
change over time, for example, when Kaspersky experts analyze new targeted attacks and methods used
by attackers.
r
st
di
re
or
e d
pi
co
By default, the folder with Kaspersky Endpoint Agent executables is located at %Program Files
(x86)%\Kaspersky Lab\Endpoint Agent. agent.exe is an important KEA executable module that provides
interface for command line management. We will tell you why it is necessary and how to use it later in this
course.
be
Kaspersky Endpoint Agent settings and service data are located in the
folder %ProgramData%\Kaspersky Lab\Endpoint Agent. It is useful to know about the following folders:
— %ProgramData%\Kaspersky Lab\Endpoint Agent\4.0\Bases contains update files for the
Endpoint Agent. You can check the file dates to find out when the agent was last updated.
— %ProgramData%\Kaspersky Lab\Endpoint Agent\4.0\Settings contains endpoint agent
to
configuration files in XML format. Among other settings, you can find telemetry collection filters
here.
— %ProgramData%\Kaspersky Lab\Endpoint Agent\4.0\Policy contains the settings of the policy
configured on Kaspersky Security Center. The file dates show if the agent's policy has been
t
changed recently.
—
No
102
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
Another obvious place to consult when checking endpoint agent’s health is Windows Event Log.
ed
Kaspersky Endpoint Agent events are logged to Applications and services
logs\Kaspersky\Security\Soyuz8\Product and Applications and services
logs\Kaspersky\Security\Sensor Diagnostics\Operational. The main thing to watch out for is error
messages. In particular, you can find license validation errors here.
ut
Kaspersky Endpoint Agent local management interface
r ib
st
di
re
or
e d
pi
The agent.exe utility helps reconfigure Kaspersky Endpoint Agent and check its status. In particular,
agent.exe allows you to:
— Install or remove a license key;
co
This is an incomplete list of capabilities. The following command outputs the complete list of commands
and parameters:
agent.exe --help
The main contexts and commands are listed at the beginning of the help output. Additional parameters for
to
The command line interface allows you to configure Kaspersky Endpoint Agent to work with the KEDR
Expert solution without using Kaspersky Security Center:
t
8 In this case, soyuz refers to the name of the Kaspersky Endpoint Agent’s service executable: soyuz.exe
103
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
This is important because some network computers may not be managed through Kaspersky Security
ed
Center.
Users can accidentally misconfigure settings using the command line interface; therefore, you should
restrict access to it. Of course, a persistent user with local administrator permissions and physical access
ut
to the device can damage any program. However, you can use a password to restrict access to the
agent.exe utility. You can set it in the Kaspersky Security Center policy or locally by the following
command:
ib
agent.exe –password
r
st
di
re
or
e d
pi
co
To receive detections from endpoint protection applications via telemetry, enable the component
Integration with Kaspersky Anti Targeted Attack Platform:
— In the installation package before the installation;
be
104
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
Creating a policy
ut
ib
r
st
di
re
or
d
To configure the central node connection parameters through Kaspersky Security Center, create a
Kaspersky Endpoint Agent policy. It is not created automatically; the administrator should create it
manually.
e
One policy created in the Managed devices node will be sufficient for all endpoint agents connected to a
pi
single central node. If you have installed another central node and want to reconnect some endpoint
agents to the new address, move them to a dedicated group on the KSC server and create another policy
for this group.
co
Prior to creating a KEA policy, make sure the respective management plug-in is installed in the KSC
console.
To check if the KEA plug-in is installed, open the administration server properties and switch to Console
Settings | Web Plug-ins.
be
If the KEA plug-in is not installed, you can install it through the application download interface available in
the KSC Console:
1. On the side menu, go to Console Settings | Web Plug-ins;
2. Click Add and select the necessary plug-in;
to
After the plug-in is installed, create a policy for Kaspersky Endpoint Agent:
1. Go to Devices | Policies and profiles and select the target group of devices;
t
105
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
Only active policies are enforced on computers. Inactive policies can serve as templates.
ed
You will always be able to open the policy properties and change its status from active to inactive or vice
versa.
ut
Connection settings in the policy
ibr
st
di
re
or
e d
both the central node settings and the endpoint agent policy.
5. Save the policy settings.
But first make sure the switch in the upper right corner of the window is in the Enforce position and the
lock appears closed on the icon. If the switch is set to Undefined, the settings will not be applied.
to
This is all you need to set up in the policy to make endpoint agents connect to the central node and be
displayed in its web console.
t
No
106
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ib
r
st
di
re
The central node can accept only secure connections from endpoint agents. Additionally, endpoint agents
or
establish secure connections only to a trusted central node. This protects endpoint agents from non-
legitimate response commands.
For a central node to be trusted, the central node certificate must match the certificate specified in the
Kaspersky Endpoint Agent settings.
d
To specify the node’s address and certificate, either use a policy in Kaspersky Security Center or run the
e
107
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
You can download the certificate of the central node in the Settings | Certificates | Server Certificate
ed
section of the web interface.
After that, open the KEA policy, go to Telemetry Collection servers | KATA integration, select Use
pinned certificate to secure connection and add the downloaded certificate. The policy will show
ut
information about this certificate.
ib
r
st
di
re
or
e d
If certificates are not used, the central node accepts connections from any agent.
pi
You can improve security by configuring the central node to verify the agent's certificate. In this case, not
only the endpoint agent will authenticate the central node’s certificate, but the central node will also verify
the authenticity of the certificate with which the agent connects. As a result, the central node will not
co
accept connections from unknown agents (meaning, agents that connect with an unknown certificate).
To use this connection mode, enable it on the central node and in the endpoint agents’ settings. This
mode is disabled everywhere by default. Additionally, you need to create a certificate for endpoint agents
(a certificate and its private key) and then specify this certificate in the central node settings and in the
endpoint agents’ settings. In this scheme, all agents use the same certificate.
be
t to
No
108
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ibr
st
di
re
or
You can download the client certificate from the web interface of the central node, on the Settings |
Certificates | Endpoint Agent Certificates page. The certificate will be downloaded in the pfx format.
e d
pi
co
be
t to
No
After that, open the KEA policy, go to Telemetry Collection servers | KATA integration, select Secure
connection with client certificate and add the downloaded certificate.
109
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
Center
ut
ibr
st
di
re
or
d
You can configure all Kaspersky Endpoint Agent settings available in the policy locally too, using the
agent.exe utility. This method comes in handy when configuring Endpoint Agent on computers that are
e
To configure connection to the central node, run agent.exe with the --message-broker=enable
parameter. The address and certificate of the central node are specified by additional parameters:
— --type=kata specifies the connection type; it is required
co
Even if you just want to change one of the parameters, repeat the main parameter --message-
broker=enable and the parameter --type=kata. For example, to add a client certificate, use the
following command:
t
certificate=client.pfx
110
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ibr
st
di
re
or
To display the configured settings, carry out
agent.exe --message-broker=show
d
When reading the output, pay attention to the following parameters in addition to those listed above:
— kata.tls — the expected value is true if secure connection is enabled
e
111
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ib
r
st
di
re
or
Since the agent.exe utility has extensive functionality, it is a good practice to protect it with a password.
d
To do so, open the KEA policy, go to Application Settings | Application settings | Security settings
and select Apply password protection, then set the password.
e
pi
co
be
t to
No
112
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
Activation using KSC
ut
r ib
st
di
re
or
d
To activate Kaspersky Endpoint Agent via Kaspersky Security Center, you can use one of the following
e
methods:
—
pi
Enable automatic deployment for the Kaspersky Endpoint Detection and Response key.
This will install the key on all managed computers.
— Deploy the key with a special key installation task.
co
In all three cases, add your key to the key storage on the KSC administration server in advance:
1. In the KSC console, go to Operations | Licensing | Kaspersky Licenses.
2. Click Add | Add key file.
to
3. Click the button Select key file to specify the Kaspersky Endpoint Detection and Response key
file, the same that you used to activate the central node.
You can also enable automatic key distribution to managed computers here: select the
Automatically distribute license key to managed devices checkbox. This checkbox is also
t
A key for which automatic distribution is enabled will be automatically delivered to all computers
connected to the administration server where Kaspersky Endpoint Agent is installed. The key is
distributed when the KSC agent synchronizes with the KSC server (once every 15 minutes by default).
113
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
The key is sent only to those computers where Kaspersky Endpoint Agent has not yet been activated.
ed
Automatic distribution does not replace a previously installed key with the new key if the old one is still
valid.
Automatic distribution is the easiest to configure, but it is not flexible enough. If you want to replace a
ut
previously installed key with a new one while the old key has not expired yet, or if you want to install the
key only on some specific computers, automatic key distribution will not help.
Why might anybody need to install a key only on some specific computers? Think about a service
ib
provider that has multiple customers. In this case, they will have multiple licenses as well, one per each
customer, and it will be important to activate Kaspersky Endpoint Agent on each customer’s computers
with their license key. KSC provides several ways to solve this issue and one of them is to use key
installation tasks where you can specify the list of target computers.
r
st
Another example is a company where all network endpoints use Kaspersky Sandbox, and some of them
additionally use Kaspersky Endpoint Detection and Response. Both solutions use the same Endpoint
Agent installed on all machines. However, the Kaspersky Endpoint Detection and Response license key
must only be installed on some particular computers to ensure that the license limit is not violated.
di
To install Kaspersky Endpoint Detection and Response key by a task:
1. Go to Devices | Tasks in the KSC console.
re
2. Click Add to create a new task.
3. In the wizard, select the Activation of application task type under Kaspersky Endpoint Agent.
4. Select the computers where you want to activate Kaspersky Endpoint Agent.
or
You can select individual computers from the KSC structure of managed devices, a group of
computers, or specify computers’ names or IP addresses.
5. Select the option Activate with a key file or code9 and then click the button Select to specify
the key.
d
You can either select a key from the administration server storage or specify the path to a key
file on the disk.
e
The wizard checks whether the key can be used with the selected application and its expiration
pi
a new key as an additional key in advance, the endpoint agent will continue to use the old key
until it expires and then will immediately switch to the new key.
6. Finish creating the task, run it and wait for the results.
Another way to activate Kaspersky Endpoint Agent via Kaspersky Security Center is to place the key into
be
In the package properties, you can specify only a key, a code cannot be specified.
t to
No
9You can activate Kaspersky Endpoint Agent with a code as well; however, since a central node can only be activated with a
key, we consider activation with a key as the main use case
114
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ibr
st
di
re
or
To activate Kaspersky Endpoint Security without KSC, use the agent.exe command line interface on the
target computer. You can specify either key or code:
d
For activation with a code to succeed, the computer must have access to Kaspersky activation servers on
pi
the internet.
To display information about the current license, carry out the following command:
To delete an installed key or code (prior to replacing it with a new one), execute the following command:
115
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
Endpoint Agent: expected result
ut
ibr
st
di
re
or
d
Once you have installed endpoint agents, connected them to the central node and activated, the agents
are ready to operate. You can check the agents’ health from the Kaspersky Security Center console or
e
from the central node web console. Different tools provide different information about the agent's work.
pi
To check the status of Kaspersky Endpoint Agent installation on all computers, use the Kaspersky
software version report. To check the status of the Threat Detection and Response module, use the
report about status of Kaspersky application components. Consult Monitoring & Reporting | Reports.
co
be
t to
No
116
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
ed
ut
ibr
st
di
re
or
In the central node web console, connected agents are displayed on the Endpoint Agents page, where
you can see their status and license availability. To check if the central node receives telemetry from
agents, on the Threat Hunting page, enter a request that will for sure match expected telemetry, for
example: HostIP != 1.1.1.1
e d
pi
co
be
t to
No
117
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
If an endpoint agent cannot connect to the central node for some reason, you will understand this by the
ed
Last connection parameter. If the agent does not connect for more than a day, its status changes to
Warning, and after 7 days, to Critical.
Additionally, the central node web console displays the activation status of each endpoint agent. If a
ut
license key is not installed or has expired, the License key status will show this.
The central node does not display an authentication error if, for example, an agent tries to connect with a
wrong client certificate, or without a client certificate, or cannot connect because the central node
ib
certificates mismatch.
r
st
di
re
or
e d
pi
To check whether Kaspersky Endpoint Agent is running locally on a computer, carry out the following
co
command: agent.exe --product state. To check the central node connection settings, use the
command: agent.exe --message-broker show
To verify that the endpoint agent is collecting telemetry to be sent to the central node, execute the
command:
This command shows how many (and which) events the endpoint agent logged. Pay special attention to
the Throttled category. These are events that the endpoint agent discarded and has not sent to the
central node because the telemetry collection quota was exceeded. You can configure event quotas in
the Kaspersky Endpoint Agent policy.
t
No
118
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 3. KATA platform deployment
Administration
To see all possible errors of the agent's connections to the central node, carry out the following command
ed
to enable tracing:
ut
Look for connection errors within the log of the proton.exe process. For example, search for the IP
address of the central node, or for the error or failed words.
ib
Kaspersky Endpoint Agent update task
r
st
di
re
or
e d
pi
co
A Kaspersky Endpoint Agent update task is not created by default, but it is required, and you need to
create it manually to be able to receive filters for collecting telemetry and KSN connection parameters.
To create it, go to Tasks | + Add | Kaspersky Endpoint Agent | Databases and Modules Update.
be
t to
No
119
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
4. KATA operation
ed
ut
4.1 Connecting to traffic sources
ib
To forward data to Kaspersky Anti Targeted Attack Platform for analysis, configure the network devices,
mail gateways and proxy and mail servers on the infrastructure side.
A KATA sensor can use one, a few or all integration types. If you need to process several types of traffic,
r
but a single sensor is insufficient because of the infrastructure specifics, deploy two or more sensors. The
st
central node can act as a sensor too, if necessary.
Kaspersky Secure Mail Gateway and Kaspersky Security for Linux Mail Server can also supply mail traffic
to a central node. And Kaspersky Web Traffic Security can supply web traffic.
di
Network traffic
re
or
e d
pi
co
be
You can copy network traffic using either SPAN or ERSPAN technology, depending on the network
to
architecture.
t
No
120
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
Connection
ed
ut
ibr
st
di
re
or
We recommend that you use a dedicated interface to receive mirrored traffic (or a few interfaces, to
receive traffic from different sources).
d
Mirroring is the duplication of packets from one or more ports on a network switch to a dedicated interface
e
connected to the analyzer. It is used to monitor traffic for security purposes or to evaluate performance of
the equipment.
pi
To receive mirrored traffic, one of the sensor network interfaces is switched to ‘promiscuous’ mode and is
connected to a mirror port on the switch. In non-promiscuous mode, an Ethernet interface filters link layer
packets. When it receives a frame, it drops it unless the frame is addressed to that interface's MAC
co
address or is a broadcast addressed frame. When connected to a mirror port, the network card will
receive a huge amount of packets destined for other network endpoints. To ensure that packets are not
discarded, the interface is switched to promiscuous mode, whereby it begins to accept all packets.
To activate traffic capturing on the central node, go to Sensor servers, open the properties of the built-in
sensor of the central node — localhost — and switch to the SPAN traffic processing section. Enable
be
SPAN traffic scanning for the necessary interface and select Capture thread.
t to
No
121
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
ed
ut
ib
r
st
di
re
or
To activate traffic capturing on the sensor, in its text console, open Program settings | Configure traffic
capture | Setup capture interfaces. Then select the interfaces for traffic capture and press ENTER.
If the sensor (or central node) is a virtual machine, allow promiscuous mode in the settings of the virtual
d
Once you have configured the sensor or central node to receive traffic for analysis, route traffic to the
e
Enable traffic mirroring on the network switch through which inbound and outbound traffic passes. The
KATA platform is not designed to scan internal network traffic; therefore, sensors are not connected to
access-layer switches.
co
Connect the sensor interface that is set to promiscuous mode to a mirror port on the switch. Several
interfaces can be activated on the sensor to receive traffic from several ports of the same switch or from
several switches.
Traffic can be mirrored using SPAN, RSPAN, and ERSPAN technologies; you can also receive a raw
be
122
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
Health check
ed
ut
ibr
st
di
re
or
You can consult the administrator's web console to check whether Kaspersky Anti Targeted Attack is
receiving mirrored traffic.
d
First of all, make sure traffic capturing is enabled. For this purpose, open the Sensor servers section
e
where dedicated sensors are displayed along with the sensor integrated into the central node. A check
mark in the SPAN column indicates that a traffic capturing interface is configured on the sensor.
pi
To verify that not only traffic capture is enabled, but also traffic is actually being scanned, look at the
Dashboard. If you select the SPAN interface source in the Processed widget, it will show the volume of
traffic received through the SPAN interface. Each SPAN interface is a separate source.
co
To additionally verify that Kaspersky Anti Targeted Attack analyzes traffic and retrieves objects for
scanning, pay attention to the URLs and Files values in the Processed widget.
Alternatively, you can email or download over HTTP an EICAR test file and check if an alert with the
be
Pay attention to the error messages at the top of the Dashboard page. They may include errors related
to processing mirrored traffic: for example, packet loss messages. In this case, check the load on the
sensor (or central node) resources and make sure the hardware configuration of the sensor (central
node) is commensurate with the traffic volume.
t to
No
123
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
ed
ut
ib
r
st
di
re
or
To exclude some traffic from scanning, you can use a pcap filter.
d
/tmp/1
Open the resulting file in a text editor, edit the pcap_filter section and upload it back:
co
124
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
ICAP traffic
ed
Operation principles
ut
ibr
st
di
re
The Internet Content Adaptation Protocol (ICAP) was initially developed to provide anti-malware
or
protection and content filtering for internet access via a proxy server, but later it became more
widespread. Today it is used to detect malicious content in data storage systems, capture traffic in case
of integration with data leakage prevention systems, etc.
It employs a client-server interaction model. The ICAP client is an endpoint through which traffic is
d
relayed. The system that performs analysis and processing is the ICAP server. The server receives data
from the client, processes them and returns the result to the client.
e
The decision about which data to forward to the server for processing is taken on the client side and
pi
depends entirely on its implementation. The operating mode is also determined on the client side. To
interact with a sensor, the proxy server must be switched to Response Modification (RESPMOD) mode. A
sensor can analyze data from several ICAP clients.
co
Cybercriminals can use a secure channel to bypass firewalls and proxy servers that have anti-malware
protection. When they connect to an endpoint inside the network, they send a command to download a
malicious object or copy sensitive information. These connections are checked on the proxy server side
based on the man-in-the-middle technique.
be
Secure connection scanning works as follows: when a user enters a website name beginning with HTTPS
in a browser, the corporate proxy server accepts the connection from the client and establishes a
connection with the web server, starting a TLS session. The proxy server receives a certificate from the
web server to set up an encrypted channel. But instead of forwarding this certificate to the client, the
proxy server generates its own certificate and sends it to the client to set up the channel. After the secure
connection is established, all data that the end user accesses on a web server are decrypted on the proxy
to
server, inspected, then encrypted again (with a different key) and forwarded to the client. What is
important is that the proxy server must support this mechanism and the clients must trust its certificate. If
the mechanism is supported, extracted objects will be sent to sensor for analysis.
Note that a sensor receives less information via ICAP than when connected through the SPAN port due
t
to restrictions imposed by the protocol. However, it is an important source of information that should not
No
125
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
Connection
ed
ut
ib
r
st
di
re
or
Decide whether to use integration with the proxy server via ICAP. If yes, all interfaces not set up to
receive mirrored traffic can accept objects from the proxy server.
d
ICAP integration with proxy may be required, for example, to be able to scan files and links in secure
e
HTTPS traffic. Kaspersky Anti Targeted Attack sensors cannot analyze secure HTTPS protocol in
mirrored traffic as it is. However, an organization can configure its proxy server to decrypt HTTPS and
pi
transfer files from traffic to Kaspersky Anti Targeted Attack for scanning via ICAP.
Generally, the sensor can accept files to be scanned via ICAP not only from a proxy server, but also from
any system that supports ICAP. For example, many storages can submit files being accessed for
co
scanning via ICAP. However, you should take into account the resulting additional load on Kaspersky Anti
Targeted Attack servers. Kaspersky experts can advise on licensing and hardware requirements for this
use case.
To make Kaspersky Anti Targeted Attack analyze objects passing through the proxy server, activate
be
ICAP on the proxy server, and specify the address of the ICAP server where objects are to be delivered.
The operating mode is Response modification.
You can find the address of the Kaspersky Anti Targeted Attack ICAP server on the central node in
Sensor servers | localhost (or another connected sensor) | ICAP integration with proxy server. The
address is displayed in the following format: icap://<sensor IP address>:1344/av/respmod
to
On many proxy servers and appliances, it is sufficient to activate the functionality of the ICAP client and
specify the server address.
t
No
126
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
In Squid, for example, ICAP protocol is configured in the squid.conf 10 configuration file as follows:
ed
icap_enable on
icap_send_client_ip on
icap_service service_resp respmod_precache bypass=1 icap://<sensor IP
address>:1344/av/respmod
ut
adaptation_access service_resp allow all
rib
st
di
re
or
e d
pi
You can also enable ICAP integration using the sensor console: go to Program settings | Configure
ICAP integration and select Enabled.
co
be
t to
No
127
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
ed
ut
ib
r
st
di
re
or
It is also possible to extract user data from the ICAP protocol: User Agent, User Name.
Health check
d
You can make sure ICAP traffic is processed in the same way as with other network data sources:
e
1. In the Sensor server section of the administrator's web console, verify that at least one sensor
has the ICAP mark.
pi
2. On the Dashboard, select the ICAP source and make sure data is being processed and URLs
and Files values are increasing.
co
You can also download the EICAR test file over HTTP (or HTTPS if encrypted traffic scanning is
configured on the proxy server) and check if an ICAP alert appears in the security specialist's web
console.
be
t to
No
128
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
Email messages
ed
ut
r ib
st
di
re
or
It is important to choose the best method of integration with the mail system when deploying Kaspersky
Anti Targeted Attack. Kaspersky Anti Targeted Attack can receive email messages for scanning in
d
several ways:
— SPAN (pre-processing non-encrypted SMTP).
e
KATA preprocessor11 (on a sensor or central node that has the sensor role) recognizes the
SMTP protocol in a mirrored copy of traffic and can extract email messages from it.
pi
You can use this integration method only for mirrored traffic with non-encrypted SMTP protocol.
This situation is not rare. Although SMTP secured with TLS should be preferred, in practice,
encryption is often used only at the mail gateway level for connections to external SMTP servers,
co
while non-encrypted SMTP traffic, which is easier to analyze, is used within the network.
Anyway, it makes sense to use this integration only if all other integration methods cannot be
used for some reason. SPAN traffic is unreliable. Quality of Service (QoS) policies are typically
used on contemporary network equipment. According to such a policy, different packets have
different processing priority on the router or switch. Mirrored traffic is non-critical for the network
be
operation and usually has the lowest priority. Under high load, network equipment will drop
mirrored packets first, and KATA will not be able to correctly extract messages.
— POP3.
The administrator configures the mail system to send a hidden copy of all messages to a special
to
mailbox in the organization's domain and also configures the sensor or central node to pick up
messages from that mailbox using the POP3S protocol.
This method fits all email systems where you can create a rule to forward a hidden copy to a
dedicated inbox. In particular, Microsoft Office 365.
t
No
129
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
On the other hand, customer’s IT and IS departments don't always readily agree to use POP3. It
ed
is an old protocol, which has security issues. It is often completely disabled in the customer’s
mail system.
— SMTP.
ut
The administrator configures the mail system to send a hidden copy of all messages to a mailbox
in a fictitious domain and specifies the sensor (or central node) as the mail server for this
fictitious domain. At the same time, the administrator configures the sensor (or central node) to
receive SMTP email.
ib
This option is suitable for mail systems deployed at the customer’s site, which are completely
managed by IT. It may not fit cloud mail services where you cannot configure a fictitious (virtual)
domain for forwarding message copies.
r
SMTP integration does not have the drawbacks of POP3 integration. Although SMTP is old, it is
st
still the most common emailing protocol.
With this integration method, KATA receives messages as a mail server rather than a mail client
and does not generate unnecessary receive/read notifications.
di
— Kaspersky Secure Mail Gateway (KSMG) or Kaspersky Security for Linux Mail Server (KLMS). 12
It can only be configured if the customer already uses Kaspersky Secure Mail Gateway or
Kaspersky Security for Linux Mail Gateway or plans to purchase one of these products together
re
with KATA.
Integration with KSMG/KLMS has a significant advantage when compared with the other
methods. KSMG/KLMS can block dangerous messages based on the KATA scan results.
With all other integration methods, KATA only informs about a threat post factum, but cannot
or
prevent delivering a dangerous message to the addressee.
It is important to set up only one method of mail retrieval to avoid overloading Kaspersky Anti
Targeted Attack servers. Disable all other methods of receiving email.
e d
pi
co
be
t to
No
12 KSMG/KLMS integration falls out of the scope of this course. Please refer to the online help of the respective products
130
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
ed
ut
rib
st
di
re
or
Create a mailbox on the mail server (you will need to specify its credentials when setting up the sensor),
activate POP3(S) access to it and add a rule that will secretly copy all or some messages. On Microsoft
d
Disable sending duplicate read receipts for this mailbox. Otherwise, senders will receive read notifications
when sensor downloads message copies rather than when actual addressees receive them.
pi
To check configuration on Microsoft Exchange, run Exchange Management Shell and carry out the
following command:
co
POP3 protocol is disabled in many organizations because it is not deemed necessary and IT/IS may
to
dislike the idea to enable it specifically for KATA. That is why, other things being equal, it is best to use
SMTP integration.
POP3 integration is recommended if other integration methods cannot be used, for example, in some
versions of Office 365.
t
No
131
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
ed
ut
r ib
st
di
re
or
To configure POP3 integration in the central node interface, go to Sensor servers | localhost (or another
connected sensor) | POP3 Integration, change the status to Enabled and specify the mailbox access
d
parameters:
—
e
— Password;
— Mailbox scanning interval;
— Settings for the use of certificates to establish a secure connection.
co
By default, the sensor (standalone or combined with a central node) connects to the mailbox every 2
seconds and downloads all messages. They don't remain in the mailbox. Up to 3000 messages are
downloaded per session. If there are more messages, the backlog plus newly arrived messages are
downloaded during the next session in 2 seconds. After downloading, the sensor 13 parses each message:
extracts the header, body and attachments. Attached files and links are of most interest.
be
t to
No
132
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
ed
ut
ibr
st
di
You can also enable ICAP integration in the sensor console: go to Program settings | Configure POP3
Integration, select Enabled, then enter the connection parameters.
In the described integration method, the sensor acts as a mail client that receives messages for scanning
via POP3. Kaspersky Anti Targeted Attack also supports an alternative (and often preferred) integration
to
method where the sensor acts as a mail server and receives copies of mail messages via SMTP.
In the context of POP3 or SMTP integration with the mail system, the sensor does not intercept the
corresponding protocols, but receives copies of mail messages to be scanned via one of these protocols.
The mail system must be configured to send copies to the sensor.
t
A sensor can also retrieve mail messages sent via unsecured SMTP protocol from raw traffic using the
No
SPAN interface; but this method is neither recommended nor related to a POP3 or SMTP integration with
the mail system.
133
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
To use SMTP mail integration, on the mail gateway, specify the address where to send copies of all mail
ed
messages, for example, BCC to sensor@abc.local, where abc.local is a special domain created for
scanning mail messages rather than the mainstream organization’s domain. Next, on the mail gateway,
specify the sensor (or central node) as the mail server (MX) for this domain.
ut
Once a message arrives to the mail gateway, the original message will be sent to the respective mail
server (for example, mail.abc.lab) and the addressee will receive it. A message copy will be sent to
sensor@abc.local and it will be the sensor that will receive it.
ib
Configuring SMTP integration
r
st
di
re
or
e d
pi
co
On the Kaspersky Anti Targeted Attack side, configure the sensor (or central node) to receive SMTP
email messages as a mail server. In the central node interface, go to Sensor servers | localhost (or
another connected sensor) | SMTP Integration, change the status to Enabled and specify the following
connection parameters:
— Destination Domains are domains whose messages the sensor will accept. If nothing is
be
specified, the sensor will accept messages destined for any domains.
— Clients are hosts or subnets from which the sensor will accept messages. If nothing is specified,
the sensor will accept messages only from all local subnets.
— Message size limit;
— Client TLS security level;
— Whether to request the client’s TLS certificate.
t to
No
134
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
ed
ut
ibr
st
di
re
You can also enable SMTP integration through the console of the sensor itself: go to Program settings |
Configure SMTP Integration and select Enabled, then enter the data required for connection.
or
e d
pi
co
be
to
The maximum size of a message that the sensor will accept is 100MB by default.
t
No
135
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
ed
ut
r ib
st
di
re
or
Pre-processing of SMTP protocol and extracting email messages from SPAN traffic are enabled by
default. If you configure another method of integration with email, disable pre-processing SMTP protocol
d
for SPAN traffic to prevent scanning the same messages twice and save resources.
e
To disable SMTP protocol parsing, save the settings into a file for editing:
pi
Open the resulting file in a text editor, edit the traffic section and upload it back:
You can also disable extracting other objects from SPAN traffic in the same way if the server receives
them via other channels. For example, if all http traffic passes through a proxy server that forwards files to
Kaspersky Anti Targeted Attack via ICAP, you can disable http protocol parsing for the SPAN traffic.
t to
No
136
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
ed
ut
ibr
st
di
re
or
You can also disable intercepting email in SPAN traffic in the sensor interface: Program settings |
Configure traffic capture | Setup capture protocols. Leave only the necessary protocols selected.
Health check
d
To make sure mail scanning is operational, use the administrator's web console:
e
1. In the Sensor servers section, make sure at least one sensor has a POP3 or SMTP check
mark. This means that POP3 or SMTP mail integration is actually enabled.
pi
2. Then check if the sensor is receiving and processing mail messages. To do so, on the
Dashboard page, in the Processed widget, select the POP3 or SMTP source and make sure
the graph shows that messages arrive.
co
Alternatively, email the EICAR test file and verify that a POP3 or SMTP alert appears in the security
specialist’s web console.
Pay attention to the error messages at the top of the Dashboard page: they may include errors related to
be
137
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
ed
ut
rib
st
di
re
or
— IDS detects network attacks in network traffic (SPAN) using updatable and custom rules. It is
based on Suricata.
e
— The anti-malware engine uses updatable signatures to scan files extracted from email, web or
network traffic.
— Mobile Attack Analyzer uses machine learning methods to detect files dangerous for mobile
co
platforms.
— Sandbox executes files in virtual machines and analyzes their activity to detect dangerous files,
including those downloadable via links.
— YARA classifies files extracted from traffic according to custom YARA rules.
be
Let's look at how detection technologies work and how you can test them.
t to
No
138
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
ed
ut
ibr
st
di
re
or
For some detection technologies, you can write custom rules. Also, some technologies don't function
without connection to KSN.
139
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
Third-party IDS rules are often included in public reports on detected attacks or malware; you can also
ed
find them in other open sources and analytical reports.
It is important to analyze which of them are really useful, which sources can be trusted and whether
information about what these rules detect is reliable, rather than simply add all third-party rules that you
ut
can find.
ib
r
st
di
re
or
e d
To import third-party IDS rules, go to Custom rules | IDS, click Import and upload your file with third-
pi
You can upload only one file. If you need to make some changes, download the existing file, edit it, and
then upload it to KATA using the Replace button.
co
be
t to
No
140
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
ed
ut
ib
r
st
di
re
or
Kaspersky Anti Targeted Attack and Kaspersky Endpoint Detection and Response products are delivered
d
without YARA rules and apply rules uploaded by a senior security officer.
e
Yara is a multi-platform tool for detecting and classifying malware families. Its creator Victor Alvarez
describes his system as “the pattern matching Swiss knife for malware researchers,” adding that “YARA
is to files what Snort (Suricata) is to network traffic”. The tool has indeed become fairly widespread in the
pi
Yara can detect not only malware, but also utilities that evade anti-malware blocking by not having a
co
malicious component. Such utilities can have an undeclared or secondary functionality that may be used
during an attack. These are indicators of compromise. The system administrator must be informed about
indicators of compromise in the corporate traffic. For example, remote management or password
harvesting tools.
Yara rules don't have to be created manually. There are online generators that analyze an uploaded file
be
and help create rules based on the strings from this file that have not been encountered in any known
legitimate software.
Conditions in Yara rules are strings that describe malware or another object in the form of text and/or hex
sequences. Each description is followed by a logical expression defining the conditions that the object
t to
No
141
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
must satisfy. A standard rule is specified as follows: first the name and a description of the rule, then the
ed
variables, and lastly the match conditions.
rule RuleNameHere
{
meta:
ut
strings:
$a =
$b =
ib
condition:
$a logical operator $b
}
r
st
Rules can be interconnected. One of the conditions for an object to satisfy a rule can be that it satisfies
another rule earlier in the list.
In the simplest case, you need to name the rule (for example, ‘TestRule’). Enter the text and hex
di
variables: $my_text_string and $my_hex_string. Specify the match condition: detection of one of the
variables ($my_text_string or $my_hex_string).
re
rule TestRule
{
strings:
$my_text_string = "malware"
$my_hex_string = { 6e 65 77 20 76 69 72 75 73 }
or
condition:
$my_text_string or $my_hex_string
}
If the “malware” text or the hex sequence “6e 65 77 20 76 69 72 75 73” is detected in an object, an alert
d
will be created.
Detection of the Eicar test virus looks as follows. Here, the ‘meta’ information section is added, which
e
contains information about the rule, but does not affect the rule itself.
pi
rule Eicar_test
{
meta:
co
A sophisticated threat cannot be described using just one rule. Several rules are necessary.
t to
No
142
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
ed
ut
ibr
st
di
re
or
To import third-party YARA rules, go to Custom rules | YARA, click Import and upload your file with
third-party YARA rules.
You can upload several files with YARA rules, not just one (which is the case with IDS). KATA will
d
process each rule from each file separately and will allow users to manage each individual rule: enable or
disable it, view related events and download the rule.
e
pi
co
be
t to
No
143
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
Exclusions
ed
ut
ib
r
st
di
re
or
If an IDS rule creates too many trifle alerts, you can disable it by creating an exclusion.
d
To create an exclusion, in the IDS alert card, click the Add to exclusions link in the Recommendations
area on the right. The exclusion is named by the rule name and contains all the attributes of the rule. You
e
All configured exclusions are listed in the Settings | Exclusions section, on the IDS Exclusions tab.
pi
An exclusion disables the rule for all traffic. You cannot disable a rule for a specific address or address
range.
co
be
t to
No
144
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
ed
ut
ib
r
st
di
re
or
If false positives occur, create an exclusion rule. You can use the following criteria in such a rule:
— MD5,
— Format,
— URL mask,
d
— Recipient email,
— Sender email,
e
— Source IP or subnet,
— Destination IP or subnet,
—
pi
User agent.
co
be
t to
No
145
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
Dashboard
ed
ut
ibr
st
di
re
The first thing a security specialist sees in a central node's console is the Dashboard section with
statistics. By default, all widgets available for the installed licenses are displayed:
—
or
KATA and KEDR:
— Alerts by status;
— Alerts by importance;
— VIP alerts by importance;
d
— Alerts by technology.
e
— KATA:
— Alerts by attack vector (source);
pi
— Domains;
— IP addresses;
co
— TAA rules.
By default, statistics are displayed for the current date and show only unprocessed alerts. You can adjust
the statistics period in the upper right corner. You can also save the currently displayed statistics to a
PDF file.
to
The widgets with hosts and TAA rules show the statistics of tagged telemetry events instead of alerts.
You can select the rules’ importance level to filter data. Since individual events cannot be either
processed or unprocessed, contents of these widgets don't depend on the Processed switch at the top of
the page.
t
No
All widgets show 10 (or fewer) of the most commonly encountered values. All lists are interactive in the
widgets: you can click a technology name, address, domain, or TAA rule to automatically open the list of
alerts or telemetry events filtered by the selected value.
146
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
List of alerts
ed
ut
r ib
st
di
re
or
Perhaps the main tool of a security specialist is the Alerts table. A historical list of alerts from the newest
to the oldest is displayed here.
d
— VIP Status — only senior security officers can see details of these alerts and process them. A
senior security officer can assign the VIP status manually; also, the central node can assign it
pi
— Alert details that depend on the detection technology. This can be the name of a file involved,
URL, or the number of computers where the dangerous activity has been detected.
— Source and destination address for traffic alerts. These can be email addresses for mail alerts or
IP addresses for web traffic alerts.
be
Alert processing status. All alerts are created in the New status, which is additionally marked with
a red dot. You can assign an alert to a security specialist; after that, the State column will display
the employee's account and a yellow dot. The specialist will eventually process the alert and it
will be marked with a green dot and the employee's name.
147
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
By default, processed alerts are hidden. To show or hide processed alerts, use the Processed switch at
ed
the top of the page. It influences not only the alerts displayed in the table, but also statistics above the
table and contents of widgets on the Dashboard page.
Personnel can filter the table by any field or by multiple fields at once. You can configure complex
ut
conditions in the filters. In the filter of the Details field, you can configure conditions for various alert
attributes.
A senior security officer can process several (or all) alerts simultaneously. For this purpose, select
ib
multiple alerts using the checkboxes on the left. A non-senior security officer can process alerts only one
by one.
r
General alert properties
st
di
re
or
e d
pi
co
All attributes of alerts originating from various sources and technologies are listed in the product's online
help.
be
Let's have a closer look at an alert card and study the attributes that are common to various types of
alerts. The following information is displayed at the top of all alerts:
— State — alert processing status; it can be New, In process or Processed.
— Importance of an alert is defined by the detection technology and you cannot adjust it. For some
to
detection technologies, a security specialist can pre-configure the importance level of custom
rules, but once an alert card is created, its importance cannot be changed.
— Data source is where the alert originates. For traffic detections, it shows the sensor type —
SPAN, ICAP, SMPT, POP3 — and the address of the server that received the data (sensor or
t
central node).
No
In TAA alerts, the source is specified as ENDPOINT without the computer’s address.
In alerts related to a file requested via KEDR, the source is specified as ENDPOINT plus the
computer name.
148
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
ed
— Time created is the timestamp when the alert was created.
— Time updated is the time when data was last added to the card.
For many types of alerts, a single card accumulates data with similar incidents over 24 hours
ut
instead of creating numerous alerts. Time updated does not depend on the alert processing
status, but only reflects addition of new incident details to the card.
For IDS and file-related alerts, there is the Recommendations area on the right that shows the
ib
recommended activities in the form of links. For example, you can easily find other alerts with the same
attributes using the links: other alerts for the same file or the same computer.
r
If you are using KATA and KEDR at the same time, you can find telemetry events by network alert
attributes in the Recommendations area and you can use KEDR tools to isolate the related host from the
st
network if the endpoint agent is installed on it.
di
re
or
e d
pi
co
be
If an alert pertains to a file or URL, a security specialist can easily find additional information about this
object in Kaspersky Threat Intelligence Portal.
to
To go to the Threat Intelligence portal, use the menu that opens when you click an MD5 or SHA256 hash.
Special authentication by username and certificate is implemented in the portal, since it is only accessible
through a subscription fee.
Each Kaspersky Anti Targeted Attack or Kaspersky Endpoint Detection and Response license includes a
t
limited subscription to Threat Intelligence, with the right to perform 1000 searches per year.
No
The portal contains various information about a file that has the specified checksum. In which regions it
was detected, when, under which names and in which folders. For an executable file, its parent and child
149
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
processes are listed. This helps understand whether the file is dangerous. You can use the information
ed
available on the portal when searching for indicators of compromise related to a detected file.
ut
ib
r
st
di
re
or
Kaspersky Threats portal (https://threats.kaspersky.com/) also provides information about various files
d
URL Reputation
pi
The URL Reputation technology is applied to links extracted from traffic. A so-called preprocessor (a
special module responsible for processing traffic on the sensor or central node) employs this technology.
co
APT Preprocessor extracts objects and metadata from network, web, and mail traffic, and then relays the
data to the local KSN URL Reputation module on sensor (or central node) for further analysis. The
preprocessor performs the following functions:
— Receives mirrored traffic from network devices. Analyzes HTTP, FTP, DNS and SMTP protocols.
Extracts objects and metadata from them.
be
This way, the sensor receives traffic, after which the preprocessor analyzes one of the copies of
the traffic by parsing the HTTP, FTP, DNS and SMTP protocols and extracting objects and
metadata from them.
— Interacts with proxy servers and receives objects from HTTP and FTP traffic over ICAP. HTTPS
to
traffic can also be scanned if the proxy server supports TLS certificate spoofing.
— Interacts with mail servers over POP3(S) and downloads copies of email messages.
— Interacts with the mail gateway over SMTP(S) and receives copies of email messages.
t
In addition to files, the preprocessor extracts URL addresses from the corporate traffic (network, mail, and
web) and checks them using the URL reputation technology. URL Reputation check is implemented as a
No
150
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
query sent to Kaspersky Security Network, where the transmitted URL hash is checked against the
ed
following lists:
— APT-related addresses;
— Malicious URLs (including botnet C&C-related hosts);
— Phishing URLs.
ut
The check results are stored in the local KSN cache on the sensor in accordance with the TTL value
returned with the results. If the lifetime has not expired and a previously scanned link is extracted from the
traffic again, the cached result is used to improve performance. The request is not sent to Kaspersky
ib
Security Network anew. Requests are only sent for new links.
Kaspersky Anti Targeted Attack also checks active links in office documents, but the scanning is
r
performed by the anti-malware engine on the central node rather than by the URL reputation module on
the sensor.
st
Based on the described principles of URL Reputation operation, in order to check the module health,
access a URL that belongs to a detectable category and make sure an alert by the URL Reputation
di
technology appears in the web console.
You can use http://www.kaspersky.com/test/wmuf as a test URL. This is a special test URL that
Kaspersky products recognize as malicious.
—
Open the URL in a browser;
Email a message with this URL in the body.
re
You can use one of the following methods to intercept this URL in the traffic:
—
or
The URL Reputation module works only through queries that a special KSN client (another module of
Kaspersky Anti Targeted Attack/Kaspersky Endpoint Detection and Response) sends to Kaspersky
Security Network.
d
The KSN client functionality is divided between the KSN file reputation module, which belongs to the
central node, and the KSN URL reputation module that pertains to the sensor. The central node checks
e
files against the cloud database so as not to overload the sensor, because files will be sent to the central
node for further analysis in any case.
pi
If Kaspersky Security Network is inaccessible, the URL Reputation technology will not work. Information
about updates and KSN status is displayed in the web interface of any account. Go to the Dashboard
page and see if there are any error messages at the top. These statuses are updated every 10 minutes.
co
You can find details of KSN connection errors in the log /var/log/kaspersky/apt-
swarm/ksn_proxy/ksn_proxy.log.
IDS
be
Kaspersky Anti Targeted Attack uses the Suricata14 intrusion detection system to detect indicators of
dangerous activity in the network traffic.
Suricata is a multiplatform network intrusion detection and prevention system with open-source code. It is
to
used in information security products: firewalls, IDS/IPS devices, DLP and SIEM solutions.
Suricata logs and analyzes network packets in real time. During the analysis, traffic is scanned using
rules; afterwards, the action preconfigured by the analyst is taken. The system can detect a variety of
t
No
14 https://suricata-ids.org/
151
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
attacks, scans and probes, such as attempts to inject malware, buffer overflows attacks, attacks on web
ed
applications, etc.
Suricata operates inside Kaspersky Anti Targeted Attack Platform in passive mode: logs suspicious
packets, but does not block them. This is because a sensor is not connected inline to the network.
ut
The database of rules is supplied with the solution and is periodically updated via the internet. It includes
rules created by Kaspersky experts. A senior security officer can add custom rules via the central node
web interface.
ib
Suricata rules are applied to all raw traffic received through the mirror port. When Suricata receives a
packet, it extracts network and transport layer data from link layer protocols, normalizes them and
analyzes for suspicious activity.
r
st
A Suricata rule consists of two parts: header and options. The header contains the action, protocol,
source, direction, target address and ports. Options specify additional scan settings and rule information.
There can be quite a few settings, including IP packet size, flags in TCP headers, byte sequence, depth
of content scanning, etc. A rule generally looks as follows:
di
action protocol source_ip source_port direction destination_ip
destination_port (options)
re
Here is an example of a rule that warns about HTTP fragments containing the word “violence” that come
through HTTP ports from an external network to an internal network. The ‘nocase’ parameter means that
the analysis is case-insensitive. A warning appears specifying the reason: ‘Violence word matched’. The
variables $EXTERNAL_NET, $HOME_NET and $HTTP_PORTS are used to describe the external
or
network (where the attacks are presumed to originate), the internal network (which needs to be protected)
and the HTTP ports. The variables are set in a configuration file, which also specifies the path to the file
with the rules.
Detecting sophisticated threats requires a set of rules, not just one. A few or several dozen rules may be
needed.
pi
Based on the described principles of IDS technology operation in Kaspersky Anti Targeted Attack, to
check its health, generate traffic that matches an IDS detection rule configured in the product. There are
three ways to achieve this:
co
— Write a custom test rule and upload it to the product. A test rule can be extremely simple and
can, for example, react to any connection to a particular IP address:
alert tcp any any -> any any (msg:"access to 192.0.2.233"; content:
"192.0.2.233"; sid:1001001;)
be
Once the rule is loaded, it will be sufficient to connect to the specified address and make sure
there is an IDS alert with the respective details on the list. At this writing, for example, the
following query works:
nslookup bandtester.com
to
— Use the fact that Kaspersky IDS rules include a rule that describes downloading the EICAR test
string.
Open a page that contains the EICAR test string using HTTP and make sure the respective alert
appears in the security specialist's web console.
t
The HTTP protocol is important here, because Kaspersky Anti Targeted Attack cannot analyze
No
secure traffic. Even if the proxy server sends objects from HTTPS traffic to Kaspersky Anti
Targeted Attack via ICAP, these files and links have already been extracted from raw traffic, and
the IDS technology is not applied to them.
152
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
Anti-malware engine
ed
Files and links that Kaspersky Anti Targeted Attack modules extract from traffic, as well as files that
analysts request from network endpoints using Kaspersky Endpoint Detection and Response tools, are
queued to the central node where the APT Collector module processes them.
ut
APT Collector receives objects to be checked and sorts them. It adds the detection results returned by
sensors’ technologies to the alerts database. It filters files against an allowlist and then queues for
scanning by the anti-malware engine. The anti-malware engine receives objects from the collector,
ib
unpacks if necessary15, scans and decides which other technologies need to be used for scanning.
r
— Signature analysis,
st
— Statistical analysis,
— Heuristic analysis,
— Emulation, etc.
di
If necessary, the anti-malware component relays requests to Kaspersky Security Network for additional
scanning. Answers received from KSN have priority over the results that the anti-malware engine returns.
If the anti-malware engine considers a file to be malicious and Kaspersky Security Network responds that
re
the file is clean, the file will be considered clean and the malicious object detection event will not appear
in the web interface. If the anti-malware engine recognizes a file as clean and the KSN returns the
response that the file is infected, the file will be considered infected and the corresponding alert will
appear in the web interface.
or
Kaspersky Security Network query results are stored in the local KSN cache according to the time-to-live
value. The TTL value arrives with each response from Kaspersky Security Network. If the time-to-live has
not expired, and the central node receives a previously scanned file again, the cached data is used to
improve performance. The request is not sent to Kaspersky Security Network anew.
d
Files whose reputation is not clear yet (non-popular files or files that have only appeared recently) are
queued for rescanning. There is always risk that criminals may avoid detection by creating a file for a
e
specific organization and specific protection applications. If the first scanning detects nothing, repeated
scanning has higher chances thanks to new data that arrive with updates and are available in KSN.
pi
Files queued for rescanning will be scanned repeatedly in 1, 2, 4, 8 and 16 weeks (7, 14, 28, 56 and 112
days). The queue size is limited to 300GB by default. In a large organization, this may be insufficient and
newer files may displace older ones before all planned rescanning is completed.
co
If one of the file scanning technologies (anti-malware engine, YARA or the sandbox server) recognizes a
file as malicious and this file has a digital signature, the APT-Certcheck module will check its signature.
The scan is performed using the certificate database supplied with the solution. The database contains
information about trusted, untrusted and expired certificates. Scanning results are added to the alert and
be
Based on the above, in order to check health of the anti-malware engine, you need to send a file that the
anti-malware engine considers malicious to the scan queue. Traditionally, EICAR test file (www.eicar.org)
is used for this. It is a special file that does not perform any dangerous actions, but anti-malware
applications recognize it as malicious.
to
To check health of the anti-malware engine in Kaspersky Anti Targeted Attack, download eicar.com from
the official website (the HTTPS protocol is used by default). If Kaspersky Anti Targeted Attack does not
receive files downloaded via HTTPS from the proxy server, email the downloaded eicar.com. The
respective alert should appear in the central node web console.
t
No
15 Up to 32 nesting levels
153
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
To check health of the anti-malware engine in Kaspersky Endpoint Detection and Response, simply click
ed
the Upload button on the Storage page of the security specialist’s web console and upload the
eicar.com test file to the storage.
Sandbox
ut
The decision whether to scan a file on a sandbox server is made by the anti-malware engine. The
decision logic is supplied with anti-malware databases and is regularly improved to achieve optimal
ib
results. If the anti-malware engine considers that a file needs to be checked using the sandbox
technology, it creates a file scan task for the sandbox and queues it. A special sandbox agent handles
this queue.
r
The sandbox agent interacts with the sandbox server. The agent receives tasks for scanning files and
st
links from the anti-malware engine and sends them to the server, which analyzes their behavior in
the Windows environment. On sending an object, it receives a job id, which it uses to retrieve the result
during the next connection. The sandbox server does not establish connections to the central node.
di
Virtual machines running Windows XP16, Windows 717 64-bit, Windows 10 64-bit, Astra Linux 1.7 and
CentOS 7.8 operating systems are available on the sandbox device. Each machine includes a set of
various versions of popular business applications, such as Microsoft Office, Adobe Reader, Flash Player,
re
web browsers, etc. A file is scanned in parallel on a few types of virtual machines. To send a file to the
next image, the system does not need to wait for the previous one to finish scanning it. It is the anti-
malware engine of the central node that decides on which virtual machine types a file will be scanned.
When a file is running on a virtual machine, its actions are logged. The collected data is stored outside
e
the virtual machine and the machine is deleted as soon as scanning completes. New virtual machines are
created from daily updatable snapshots to check each new file.
pi
The collected data are analyzed for malicious or suspicious activity, including exploitation of
vulnerabilities, evasion techniques and attempts to connect to command-and-control (C&C) servers. A
special Scanner component analyzes execution logs and artifacts. The IDS Suricata module (the same as
co
Both components, Scanner and IDS (Suricata) use regularly updatable databases for analysis. Kaspersky
Security Network is not used for analysis.
be
The sandbox agent collects the analysis results. It connects to the sandbox approximately once a second
and requests the results of the sent tasks. The sandbox server does not connect to the central node or
network endpoints so as not to compromise other machines if the sandbox server itself is compromised.
Kaspersky Endpoint Detection and Response provides the easiest way to test a sandbox. Just upload
any executable file to the storage using the respective button. Even if the file is clean, the console will
t
No
16 Windows XP was chosen because some workstations still use it although Microsoft withdrew support for it in April 2014. No
support means no updates or patches for vulnerabilities in the system. That makes it a target for cybercriminals.
17 Support for Windows 7 was discontinued in January 2020, and an Extended Security Updates program was available to
organizations until 2022. In any case, end of support does not mean that customers stop using the operating system.
154
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
display the file scanning results and you will be able to download an archive with all analysis artifacts
ed
(execution logs, process memory dumps, etc.)
In Kaspersky Anti Targeted Attack, it's not so easy to check a sandbox’s health. You can email an
archived executable, but if the file is clean, the analysis results will not be published in the web console.
ut
4.3 Processing alerts
ib
Alert processing status
r
st
When working in the web interface, security personnel may perform the following actions about events:
— Send data about an event to Kaspersky. To do so, copy data about the event to the clipboard
and then email or send using any other method. Data about an event may contain information
di
that can be considered confidential; therefore, we recommend that you ask the security
department of your organization whether these data can be sent outside.
— Assign the VIP status to the event.
re
— Assign the event to yourself or to another security specialist.
— Mark the event as processed.
— Add a comment to an event. For example, what was found out as a result of the investigation.
or
Revision history is displayed for all alerts. For example, a new alert appeared, then it was assigned for
processing to a security specialist, who closed it and added a comment. Each action has a timestamp.
d
Scanning algorithm
Kaspersky Anti Targeted Attack receives data from the organization's network, web and mail traffic. You
can use all or just some of these types of traffic. One or more sensors located in different network
segments or on different sites capture traffic:
— After you switch one of the sensor interfaces to promiscuous mode and connect it to the switch
be
port where packets from other ports are duplicated, sensor starts to receive raw traffic. Traffic is
processed by the intrusion detection system (IDS) and preprocessor concurrently. The
preprocessor extracts objects and metadata from the HTTP, FTP, DNS and SMTP protocols.
— Sensors support interaction with the proxy server via ICAP. In this case, the preprocessor
receives objects from the HTTP and FTP protocols, as well as HTTPS, if the administrator has
configured TLS certificate spoofing on the proxy server.
to
— When integrated with the mail system using the POP3 protocol, the sensor periodically queries
the mailbox where all or part of the mail messages are copied. Downloads these messages and
extracts attached files and links from the message body.
—
t
With SMTP mail integration, the sensor receives copies of email messages over SMTP(S) from
the mail gateway and extracts files and links from them.
No
The preprocessor then sends links extracted from the traffic to the local KSN URL reputation module for
preliminary analysis, and extracted files and metadata to the central node for in-depth analysis.
155
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
Preliminary analysis
ed
The KSN URL reputation module on a sensor receives requests from the preprocessor to check links
extracted from network, web and mail traffic. It consults the local KSN cache to check whether these links
belong to the following types of resources:
ut
— Targeted attack related hosts;
— Malicious URLs (including those related to botnet C&C servers);
— Phishing URLs.
ib
If the cache does not contain data about the link, the request is sent to the KSN cloud database.
The sensor’s IDS module analyzes raw traffic for signs of intrusion into the corporate infrastructure. The
r
sensor sends the alerts generated by the URL reputation and IDS technologies to the central node.
st
Detailed study
The central node checks the files and links extracted by the preprocessor and sends some of them to the
di
sandbox server.
The APT collector of the central node receives files from a sensor, checks them against the allowlist and
re
queues for scanning by the anti-malware engine.
The anti-malware engine scans all files for viruses, worms, Trojans and other types of malicious and
unsolicited objects that pose a risk to the company. Signature analysis, heuristic analysis, emulation and
other detection technologies are employed. Active links are also scanned in documents.
or
If an archive is analyzed (regardless of how many nesting levels it contains), or any other compound
object, the anti-malware engine extracts its contents. 32 nesting levels are supported by default. The anti-
malware engine can extract passwords for archives from the message body or apply passwords from the
list configured by the administrator.
d
Some files are copied into a special storage and are rescanned periodically. 300GB of space is allocated
e
to this storage on the central node. If the storage is full, 10% of files are deleted (the oldest ones).
The anti-malware engine not only scans a file, but also decides which other technologies need to check it.
pi
File copies are added to the respective queues and scanned by various technologies simultaneously:
— The Yara module detects indicators of compromise. Yara scans all files. To activate this module,
the system administrator must create, test and add custom rules.
co
— Files are sent to the sandbox server, which analyzes their behavior in a Windows/Linux
environment. A sandbox agent deployed on the central node sends files and retrieves the
results.
The central node does not need to wait for a module to finish scanning before starting another check. The
be
total size of all queues is 20,000 objects, or 100GB of drive space. When a queue is full, 10% of the
oldest files are deleted (this increases the Unprocessed indexes on the dashboard).
So, executable, archive, office, multimedia and some other file types are scanned by the anti-malware
engine and Yara engine. At the same time, these files are sent to the sandbox for payload analysis.
to
The KSN file reputation service checks files after the anti-malware engine and the sandbox server. There
is a KSN cache on the central node and files are first checked against it; only after that, a request is sent
to the cloud.
t
If one of the technologies recognizes an executable file that has a digital signature as malicious, the
central node additionally checks its signature against the certificate database. The APT Certcheck
No
156
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
Malicious files get quarantined. 300GB of hard drive space is allocated for the quarantine on the central
ed
node.
ut
The sandbox server scans files and links in the Windows/Linux environment.
Files are queued on the central node and then transferred to the sandbox when it frees resources for
running another instance of a virtual machine. The sandbox agent is responsible for sending objects to
ib
the sandbox and receiving the results. If the arrival rate of objects is higher than the processing rate,
meaning, the server cannot cope with the load, the queue will grow. The scanning time will increase
accordingly, which will be displayed on the Dashboard in the administrator's console (but not in the
security officers’ consoles).
r
st
The sandbox can run each file on several types of Windows/Linux virtual machines. Types of the
necessary virtual machines are selected by the anti-malware engine of the central node. Files are
scanned on different virtual machines concurrently. The sandbox logs all actions and network activity of
the sample, saves the data outside the virtual machine and powers it off.
di
Depending on the scan settings specified by the central node, the sandbox can scan files in two modes:
— Full logging mode collects as many details about activity within the virtual machine as possible,
re
but compromises on the sample observation period.
— Quick scan mode logs fewer details, but observes the sample approximately 10 times longer
than the Full logging mode. The Quick Scan Mode does not consume more time thanks to
special technologies.
or
The scanner of the sandbox server analyzes the activity logs and new files extracted from the virtual
machines, and the IDS module (similar to that of the sensor) checks the captured network traffic. The
sandbox agent collects the scanning results and all artifacts received during analysis. The central node
has a dedicated storage for the results that it receives from the sandbox server. The size of this storage is
d
300GB.
e
If a sandbox receives a link from mail traffic, it starts a web browser and opens the link there. If it receives
a link from the network traffic, it downloads the file and tries to run it.
pi
Publication of results
All technologies send their alerts to the central node where they are stored in a database managed by
co
PostgreSQL. Alerts by multiple technologies about the same file are combined into one. Alerts by the
URL Reputation technology for the same URL over 24 hours are combined into a single alert. All matches
of the same IDS rule over 24 hours are also combined into a single alert.
Caching results
be
To avoid scanning the same files repeatedly, the central node cache scanned objects. Different object
types (executable files, multimedia files, scripts, links) are cached for a different time.
To not only avoid scanning already scanned files again, but also not to transfer them another time to the
central node, the sensor regularly downloads a copy of cache from the central node.
to
The cache is stored in the memory in a high-performance non-relational Redis database. To synchronize
it, the sensor connects to the central node on TCP port 6379. The connection is protected with IPSec.
t
No
157
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
ed
IDS
When IDS detects a threat in network traffic, the respective alert shows the following data in addition to
ut
general detection attributes:
— Detection technology: IDS,
— Threat name according to Snort/Suricata classification,
—
ib
Threat name according to Kaspersky classification,
— Captured traffic that matched the rule (in the PCAP format),
— Traffic data (without headers) that matched the rule (in base64 encoding),
— List of network detection events for this rule over 24 hours since the alert was created,
r
— IDS database version.
st
To download captured traffic with all headers in PCAP format, click the Download PCAP file link in the
Recommendations pane on the right. The data file without headers is also available: click the Download
IDS artifact link. The file is in JSON format, and the data is Base64 encoded.
di
The Rule details area of the card displays detailed information about the matched rule. The analyst can
study these details and decide whether this activity is dangerous for the organization.
re
If an IDS rule generates too many trifle alerts, you can create an exclusion for it: click Add to exclusions.
An exclusion applies to all traffic. You cannot make a narrow exclusion that only ignores traffic to or from
a specific address.
or
What gets into IDS artifact depends on the traffic capture settings configured in the text console of the
sensor (or central node in the sensor role). By default, an IDS artifact contains only the data from the
HTTP request that triggered an IDS rule.
The Network event section of an IDS alert lists network connections that matched the rule. The table
d
shows the source and destination IP addresses for each connection. For HTTP traffic, the HTTP request
and User agent are displayed. For DNS traffic, the requested name is displayed.
e
An IDS alert accumulates network events that match the same IDS rule over 24 hours. Meaning, if there
was a suspicious request at 13:00 and then another request to the same address and with the same
pi
parameters at 22:30, there will be no separate alert for the second request; instead, its details (time,
source address, User agent) will be added to the Network event section of the previous alert. If the first
alert has already been processed by that time, the central node will return it to the same specialist with
co
All IP addresses and names of the Network event section are links that search for related telemetry
(Kaspersky Endpoint Detection and Response) and alerts (Kaspersky Anti Targeted Attack). The links in
the Recommendations pane on the right allow you to search for related events and alerts by addresses
or names from the Network event section.
be
URL Reputation
URL Reputation alerts don't have the Recommendations pane, but you can search for related events
and alerts using the shortcut menu that opens when you click the IP address or URL in the alert details.
to
SPAN).
No
The Alert details section shows known details of the network request where the URL was detected. This
can be a part of HTTP traffic, DNS query, or email message details.
158
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
If the URL was detected in the network (not mail) traffic, the Alert details section will show all requests to
ed
that URL over 24 hours. If another match is detected in more than 24 hours since the first event, a new
alert will be created.
If a threat is detected in an email message, the following information about the message will be displayed
ut
below the standard alert header:
— Email from,
— Email recipients,
— Email subject,
ib
— Email headers.
The message text is not displayed in the alert. Each mail message generates a new alert.
r
File alerts
st
If the file was detected by AM, SB or YARA, the Object information area displays md5 and sha256
checksums of the detected malicious file, its type and size, as well as a button for downloading the file to
di
the security specialist’s computer.
There is a button below the file name that allows you to search the tip.kaspersky.com portal for the file’s
checksum. Kaspersky Threat Intelligence Portal provides advanced information about threats. For
re
example, you can find names and checksums of other files that are often detected together and pertain to
the same attack. You can also find a list of names that this file has had, where from it has been
downloaded, in which countries and regions it was found most often, when it was detected for the first
time and other details.
or
If you click the checksum, another shortcut menu will open that also contains a link to the Threat
Intelligence Portal and other actions:
— Copy the checksum to the clipboard;
d
— Search the Threat Hunting database for events where the checksum is mentioned (Kaspersky
Endpoint Detection and Response).
pi
Execution prevention and searching within the database of events require a KEDR license.
co
The Network event section provides information about the network activity where the file was
intercepted. As a rule, it is an HTTP or FTP request to a server and the table shows the request type and
the server address, as well as the User agent and the user name if this information was included in the
traffic (the proxy server can specify the user name in the ICAP protocol).
The Scan results section lists the results of scanning the file by all technologies: anti-malware engine
be
(AM), YARA (if the analyst has uploaded rules to the server) and sandbox. For each technology that
considers the file to be dangerous, all threats that the file matches are listed. Click a threat name (for AM
and SB technologies) to open its description in the threats.kaspersky.com portal.
The Recommendations pane also shows related alerts. The attributes by which related alerts are
searched for depend on the file source. You can always manually search for a file’s checksum to check if
to
it has already appeared in another traffic type (for example, in email messages). If the file was detected in
network traffic, you can search for alerts with the same address or computer name.
t
No
18Kaspersky is not responsible for the information about files at https://virustotal.com. The users make the decision whether to
use this resource on their own account.
159
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 4. KATA operation
Administration
If you use Kaspersky Endpoint Detection and Response, you can also use the Recommendations pane
ed
to automatically search the Threat Hunting database for events by alert attributes: checksum, IP address
and name of the computer related to the traffic.
If the file was found in a mail message, the alert card contains the message attributes and allows you to
search for other alerts with the same attributes — sender address or recipient address — through the
ut
Recommendations pane.
ibr
st
di
re
or
e d
pi
co
be
t to
No
160
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
5. KEDR operation
ed
ut
5.1 KEDR detection technologies
ib
r
st
di
re
or
e d
pi
— IOC detects indicators of compromise on network computers based on custom rules in OpenIOC
format.
— YARA uses custom rules to scan files and processes on computers, as well as files in the central
node storage.
be
Targeted Attack Analyzer checks data retrieved when monitoring endpoint activity to detect indicators of
targeted attacks on the company’s IT infrastructure.
Targeted Attack Analyzer receives information about endpoints’ behavior from the endpoint agents.
Kaspersky Endpoint Agents inform the central node about launched processes, executable modules or
t
files, established network connections, file activities, changes in the registry, events written to Windows
Event Log and interactive keyboard input in command shells.
No
161
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
These data are added to the database, compiled and analyzed in real time. Targeted Attack Analyzer
ed
uses various rules to detect dangerous activities, and the rules are regularly updated in the database.
Security personnel can also add custom rules for telemetry analysis.
Two classes of TAA rules are used in Kaspersky Endpoint Detection and Response. Some rules are
aimed at detecting indicators of attacks. If endpoint’s activity matches one of these rules, the central node
ut
creates a TAA alert.
Other rules don't create alerts, but add tags to events. You can see these tags when analyzing telemetry
ib
events in the Threat Hunting section of the web console. Tags help analysts faster navigate through
numerous events and decide which activity needs investigation and which does not.
Tagging rules cover, for example, actions that fall within the MITRE ATT&CK classification. Tags with
r
technique names complement TAA alerts and help make decisions about which steps to take in response
st
to the attack.
Detection rules also add tags. An event can have multiple tags added by tagging rules and detection
rules.
di
To check health of the TAA technology, simulate an activity that matches a TAA rule (either detection or
tagging) on one of the computers.
re
If you want a non-synthetic alert, run the certutil.exe system utility with the -decode19 option on a
computer. This will result in a suspicious_certutil_usage_decoding TAA alert.
or
e d
pi
co
be
to
Some detection technologies allow analysts use custom rules, and some don't. IOC and YARA
technologies work only with custom rules.
t
No
19Adversaries often use this method to decode Base64-encoded malware. System administrators sometimes use this utility too,
but relatively rarely and mostly on their own computers or servers. If certutil -decode is run on a computer of an ordinary
employee, it is suspicious and must be investigated
162
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
ibr
st
di
re
or
Some technologies operate locally on computers, and some, on KATA servers. The TAA, SB and AM
technologies are used only on KATA servers.
163
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
To efficiently use Threat Hunting, you need the corresponding qualification and experience. However,
ed
even a less experienced security specialist can use Threat Hunting to search for indicators of
compromise.
Lists of indicators of compromise are often included in public reports about detected attacks or malware.
ut
Specifically, you can find them in the reports published on the securelist.com Kaspersky website, which
provides state-of-the-art information about threats.
Indicators of compromise are also available together with APT reports in the Threat Intelligence Portal.
ib
The subscription included with Kaspersky Anti Targeted Attack and Kaspersky Endpoint Detection and
Response only provides relatively old reports. Purchase a full-fledged subscription to be able to access
the latest reports.
r
Indicators include names and checksums of malicious modules, control server addresses, typical registry
st
keys. You can easily use all these parameters in Threat Hunting to check whether they have been logged
within the endpoint agents’ events.
When importing TAA rules, keep in mind that they may affect the system’s performance.
di
Some rules don't require creating alerts. In this case, don't select the Generate alerts option.
re
When you import custom TAA rules, some conditions may not be supported. In this case, the rule will be
imported, but the system will ignore unsupported conditions.
IoC import
or
e d
pi
co
be
to
You can use rules when searching computers for IOC via endpoint agents. You can only import indicators
t
from a file in OpenIOC format. You cannot save a Threat hunting search as a custom IOC rule.
No
You cannot edit search conditions in the loaded rules. They must be edited before importing. But you can
change the importance level and the indicator name in its properties. You can also select or clear the
Autoscan checkbox.
164
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
Rules where Autoscan is enabled are applied when searching network endpoints for indicators. Rules
ed
where Autoscan is disabled are not used when scanning endpoints. In fact, Autoscan allows you to
disable a rule without deleting it. This can be useful if you need to reduce resource consumption on
endpoints when running searches.
ut
You can click Find alerts in an IOC card to find all alerts created by this rule. The Find events link
uploads the rule conditions into Threat hunting for retrospective telemetry search. To save the rule as an
OpenIOC file, click the Download file link.
ib
IOC scanning schedule
r
st
di
re
or
e d
pi
co
The central node supports exactly one configuration for searching endpoints for indicators of compromise.
The scanning is performed once a day at the time specified in Settings | IOC scanning schedule. The
Start time is specified in the UTC time zone. You cannot change the zone. The Maximum scan
duration is specified in hours.
You cannot set any other scanning parameters. All computer drives are scanned. Search for registry keys
be
is performed throughout the whole registry. Therefore, scanning can take a long time and should be run
overnight.
If indicators of compromise are detected on a computer, the results are displayed as alerts in the central
node web console. For each IOC rule, a separate alert is created with the importance level defined in that
to
rule. Endpoint agents send the results after the task completes rather than while it is running.
If scanning detects indicators of compromise on the computers, the central node creates an alert by the
IOC technology with the importance level of the matched indicator.
t
No
165
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
ibr
st
di
re
or
You can have suspicious files automatically sent for deeper analysis.
d
Files are sent for scanning when specific (not just any) system (non-custom) TAA rules are triggered.
e
— Sandbox,
— YARA.
co
be
t to
No
166
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
r ib
st
di
re
or
The central node investigates endpoint activity using the Targeted Attack Analyzer component. Data are
collected from endpoint agents, grouped and analyzed for the purpose of identifying suspicious behavior.
d
All information for Targeted Attack Analyzer is stored on the central node in a special database and
security personnel can use it for manual analysis.
e
A single alert can include events from many network endpoints; they are listed below in the Hosts section
pi
ENDPOINT is specified as the source of a TAA alert, along with the timestamp of the first event that
triggered the TAA rule.
co
The Scan results section of a Targeted Attack Analyzer alert shows the name of the TAA rule that
telemetry matched. Click the rule name to open its description, which contains:
— Description of dangerous activity;
be
— Description of possible legitimate use of the operations that triggered the rule.
t
No
167
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
TAA detection events
ut
ibr
st
di
re
or
e d
After the rule name, a TAA alert card lists the network endpoints where events that match the rule were
detected. The number of such events is specified for each endpoint.
pi
The central node accumulates all events that match a TAA rule from all hosts over 24 hours within a
single TAA alert card. If an alert has been processed and then new events appeared, the central node
reassigns the alert to the specialist who processed it with the status In process.
co
Activity details, such as file names or launch parameters, are not displayed on the card. To find them, you
need to search the Threat hunting database. The Find events link below the list of network endpoints
automatically searches for the TAA rule ID over the period that the card covers: 24 hours after the first
logged event. This search will show events from all computers. To find events from a specific computer,
click the computer name in the card.
be
You can change the search criteria in the Threat Hunting results: click any value in any column to either
add it to the search criteria or exclude it from the search.
t to
No
168
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
ib
r
st
di
re
or
Click an event in the search results to display a card with the event details and a visualization of the event
tree. Initially, both the card and the visualization pane show the selected event and its parent process.
d
The card contains numerous event attributes, such as operation type, file name and checksums, size,
e
digital signature, the user who performed the operation and others. The full list of displayed attributes
depends on the event type (operation type) and is described in the KATA Platform online help.
pi
Most attributes are interactive in an event card. Click an attribute to search for other events that have the
same attribute or alerts with that attribute. The search results open in a new tab to keep the main analysis
intact.
co
At the top of an event card, below the visualization pane, there is a toolbar with response commands. You
can isolate the respective computer from the network, create an execution prevention rule for the file,
create remote response tasks: delete the file, stop the process and others.
be
The event graph above the event card is also interactive. Click a process in the graph to display the
process launch event card and its parent process. Thus, by clicking parent processes, you can
completely ‘unwind’ the sequence of processes from the operating system start.
The number of events from the Threat hunting database that are related to each process is shown next to
the respective process name. These events, for example, contain information about files created by the
to
process, child processes that it started, established network connections, access to the registry, etc.
To open a menu that lists event types and the number of events of each type, click the arrow to the right
of an event counter in the graph. Click an event category or All events to display the list of events below
the graph.
t
No
The following is specified for each event: its timestamp, type and other details that depend on the event
type. For example, for a Process started event, the following is displayed: name of the child process
executable, its MD5 and SHA256 checksums (under the respective links) and the TAA tags of varying
importance. A TAA tag shows that the child process activity matches a TAA rule.
169
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
You can filter the list to hide trivial events and leave more interesting ones. For this purpose, either click
ed
one of the headings and manually adjust the conditions, or click any event attribute in the table; the
context menu that will open allows you to show only events with the same attribute value, or, on the
contrary, hide such events.
ut
An analyst can add interesting events to the graph to better visualize activity development on the
computer. To achieve this, hover (but not click) the mouse cursor over the event line. A dull eye icon will
appear to the left of the event logging time. If you click the eye, it will become bright and the event will be
added to the graph next to its parent process.
ib
To remove an event from the graph, either click the eye in the list of events again or hover over the event
on the graph, wait for the red diagonal cross to appear next to the event name and click this icon.
r
This way, an analyst can study details of events associated with the initial alert: unwind the chain of
st
parent processes, find other child processes, created files and network connections.
You can click any attribute of any event and search the Threat hunting database for this attribute to start a
new investigation chain. The search results open in a new tab to keep the current investigation intact.
di
Tracking the chain of events
re
or
e d
pi
co
be
You can select a list of events related to each process and, if necessary, add them to the investigation
to
170
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
ib
r
st
di
re
or
If Endpoint Agent is installed within Kaspersky Endpoint Security, in addition to processes’ activity, it will
also send Kaspersky Endpoint Security detections, including so-called silent detections, which are hidden
d
KES detections get in the TAA database as ordinary events by endpoint agent. You can find them via
Threat Hunting, but don't expect to see them in the Alerts list.
pi
Information about KES detections can help evaluate the damage caused by the threats or add weight to
related events. Or, on the contrary, notify the analyst that the local security tool successfully blocked the
attack and the incident does not need to be investigated.
co
You can search for Kaspersky Endpoint Security events using the EventType = Detect processing result
condition. Description of such events includes the detection time, threat name according to the Kaspersky
Endpoint Security classification and the last action applied.
be
t to
No
171
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
TAA exclusions
ed
ut
ibr
st
di
re
or
If a TAA rule produces too many trifle alerts, you can create an exclusion for it. Exclusions are only
supported for updatable TAA rules. If you want to disable or delete a custom TAA rule, you can do it in
d
To create an exclusion from a TAA rule that arrived with updates, in an alert card, click the rule name in
the Scan results area. In the rule description that opens, click the button Add to exclusions.
pi
co
be
t to
No
172
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
ibr
st
di
re
or
If necessary, you can create an exclusion from a TAA rule with additional conditions. To do so, when creating an
exclusion, select Exclude rule – Based on conditions and specify the necessary conditions.
e d
pi
co
be
t to
No
All configured exclusions are listed in the Settings | Exclusions section, on the TAA Exclusions tab.
You can remove an exclusion from this page if you need to apply the rule to incoming telemetry again.
173
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
Threat hunting
ed
ut
ib
r
st
di
re
or
Threat hunting is a powerful detection tool in skilled hands. An experienced analyst can form complex
search conditions and find clear indicators of compromise as well as implicit indicators of attack.
d
Endpoint agents inform the central node about various events on the endpoints: the launch of processes,
e
loaded libraries, installation of services and drivers, file changes, creation and modification of registry
keys, established connections. Security personnel can search these data.
pi
In the search conditions, an analyst can configure event attributes, comparison operators and values with
which the selected attribute is to be compared.
co
Attributes may include computer name, its address, file name, file path, checksum, modification or
creation timestamp, name of the parent process, name of the loaded library and others, including event
types in Windows log and threat detection events by Kaspersky Endpoint Security.
Various comparison operators may be used, such as ‘Equals’, ‘Not Equals’, ‘Contains’, ‘Starts with’, ‘Ends
be
You can use an arbitrary string or number for a search condition value depending on the attribute type.
For some attributes, values are fixed and are displayed in a list.
An analyst can join conditions with AND and OR operators. For a more complex search, you can group
to
conditions first and then use logical operators AND and OR to combine the groups.
In addition to search conditions, you can specify a time interval in the upper-right corner of the Threat
Hunting page. The default value is Last day. An analyst can limit the search to one hour or specify an
arbitrary interval.
t
No
174
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
ib
r
st
di
re
or
You can save any Threat hunting search conditions as a custom rule for the Targeted Attack Analyzer
technology. TAA rules are essentially search conditions for events with suspicious attributes, such as
d
running certutil with the urlcache parameter, which permits saving a file to the computer using a
system utility.
e
Kaspersky experts create updatable TAA rules based on their experience in detecting indicators of
pi
Security personnel may discover new attack methods in telemetry collected from network endpoints. For
co
example, when investigating detected suspicious activities, they can notice a suspicious activity that has
not been detected automatically because it is a new attack technique that has never been previously
used.
In this case, the information security specialist can describe this activity using the threat hunting search
parameters and save as a custom TAA rule.
be
Custom rules are applied similarly to downloadable TAA rules: to all new events that arrive from network
endpoints in real time. If an event matches conditions of a rule, it receives a tag with the rule name. Such
events are easy to spot in the Threat Hunting search results.
If you believe that a custom rule describes dangerous activity that requires investigation, you can select
to
the Generate alerts checkbox for it. In this case, the central node will create TAA alerts when the rule is
matched.
You can also specify an importance level and a confidence level for each custom rule. Confidence is
essentially the likelihood that the described activity is malicious.
t
No
For example, executing certutil with the -decode parameter can be a part of an attack, but IT
specialists can also use it in a script. For an event like this, you can select the Medium confidence level.
In general, confidence depends not only on the activity itself, but also on the practices adopted by the
175
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
organization. If IT specialists are not allowed to use certutil with the -urlcache or -decode
ed
parameter, this activity may have the High level of confidence for that organization.
The importance reflects the potential danger of the described activity. It defines the color of the event’s
icon and the importance of alerts if the Generate alerts checkbox is selected for this rule.
ut
You can find custom TAA rules in User rules | TAA. An information security specialist can disable rules
that are no longer useful or adjust a rule’s attributes: name, importance and confidence levels, select or
clear the Generate alerts checkbox.
ib
You can also import rules from a file in OpenIOC format. You can find these files in reports about attacks,
in data feeds by Kaspersky or other vendors and in public sources.
r
You cannot change search criteria in a rule. Instead, you can click the Run query link in the rule card to
st
load the rule to Threat hunting, edit the search conditions there and save them as a new TAA rule.
Run query loads the rule conditions into Threat hunting and allows you to search the entire telemetry
database for matching events. The Find events link also generates a search in Threat hunting, but only
di
searches for events that have this rule’s tag. The tag is assigned only to those events that were being
processed when the rule was active. Events that had been collected before the rule was created cannot
have its tag.
re
In other words, you can use Run query to search the telemetry database retrospectively. Find events
searches for events tagged by the rule. Find alerts searches for alerts created according to this rule.
You can create exclusions for downloadable TAA rules. Custom TAA rules cannot have exclusions. If a
or
custom rule generates many useless tags or alerts, fine-tune it, disable or delete.
The TAA technology of the central node compares the events sent by endpoint agents with TAA rules.
Events that match a rule receive the corresponding tag. You can see these tags on the event card in the
e
Threat Hunting search results. Depending on the rule settings, the central node can also create alerts.
pi
Telemetry events come almost continuously from computers. Event sending is configured in Kaspersky
Endpoint Agent policy or local KEA settings if the computer is not managed via KSC.
In the policy, these parameters are located in the Application Settings | Telemetry collection servers |
co
by default. As soon as 1024 events accumulate in the buffer, the endpoint agent starts a new
event transfer session (even if the previous session took place less than 30 seconds ago).
In other words, the agent starts a new event transfer session when either of the two conditions is met:
when the Event transmission period passes, or the buffer accumulates the number of events equal to
to
Events can also be written to the send queue, which is stored on the disk in the endpoint agent data
folder. Thus, if the central node is inaccessible, events are queued. When the connection is restored, the
endpoint agent sends events from the queue in chronological order: oldest first.
t
The default settings of Kaspersky Endpoint Agent don't guarantee that all locally collected events will be
No
delivered to the central node. Priority is given to smooth operation of the central node, which may become
overloaded with too much telemetry. If too many events are logged on a computer, the endpoint agent
can discard some of them.
176
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
ib
r
st
di
re
This behavior is configured in the KEA policy: KATA integration | General settings, the Throttling
or
settings area:
— Event throttling — this checkbox enables or disables discarding ‘extra’ events; it is selected by
default.
— Maximum events per hour is the maximum number of events that will be sent; 3000 by default.
d
— Percent of exceeding the limit of events is the maximum percentage of events of the same
category, 15% by default. If percentage of some events exceeds the specified threshold, all other
events of this category will be discarded (until the category share decreases as events of other
pi
categories accumulate).
You can find event categories in the online help or carry out the following command to display them:
co
— HttpResponse,
— ListenPort,
— LoadImage,
— NetworkConn (Network connection),
— ProcessCreate,
— ProcessExit,
to
If Threat hunting evidently lacks events for the full picture when you analyze suspicious activities, this
No
may mean that you should adjust the Event throttling settings. Try increasing the overall limit or the
relative limit for events of the same category. The agent.exe utility can help you configure computers that
are not managed via Kaspersky Security Center.
177
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
ib
r
st
di
re
or
As soon as security personnel detect indicators of an attack, they should react immediately. In a well-
d
organized information security department, there must be a well-thought-out and well-run incident
response procedure. This procedure may include, for example, the following measures:
e
Analyze code of the malicious files and find out what they do.
— Collect various information required for incident analysis and response.
Kaspersky Endpoint Detection and Response tools help implement these measures.
be
t to
No
178
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
From the central node console
ut
rib
st
di
re
or
d
For Kaspersky Endpoint Detection and Response to be able to isolate a computer from the network,
endpoint agent with completely activated EDR functionality must be installed on it.
e
A senior security officer can isolate a computer using its properties in the list of endpoint agents in the
pi
central node console, or on any other page of the console where the computer name is displayed. For
example, a senior security officer can activate network isolation using the shortcut menu of a computer
name in an alert properties, or in an event properties on the Threat Hunting page.
co
Endpoint Agent uses the Windows packet filter to isolate the computer from the network. Network
isolation blocks all incoming and outgoing packets and connections except for those for which exclusions
are specified.
— DNS and DHCP protocols to ensure that the computer remains operational and, in particular,
that the endpoint agent is able to communicate with the central node.
— For services and processes of Kaspersky Endpoint Agent and other Kaspersky applications that
can be installed on the computer:
to
20The exclusion applies to the klnagent.exe process, which communicates with the Kaspersky Security Center server, but does
not apply to the klnagchk.exe process, which is used for troubleshooting (to check connection to the Kaspersky Security Center
server).
179
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
A senior security officer can also create any other exclusion manually, using a simple list of settings:
ed
— Traffic direction — ‘Outgoing’, ‘Incoming’ or ‘Incoming/Outgoing’ (the direction of packet sending
or established connections).
— IP — you can only specify individual IP addresses. Stands for the address of a remote computer
ut
which you need to allow packets or connections to/from.
— Ports — port number or a range of ports. Available only for ‘Incoming’ and ‘Outgoing’. If a port is
specified, TCP connections to this port will be allowed; if a port is not specified, any packets and
connections will be allowed to or from the specified IP.
ib
For example, a senior security officer can allow incoming connections to connect to the computer's
desktop for in-depth investigation.
r
When applying isolation, Kaspersky Endpoint Agent notifies the local user that the computer will be
st
isolated from the network and lists the configured exclusions.
Exclusions can be adjusted after the computer has already been isolated. Since built-in exclusions don't
di
prevent the endpoint agent from communicating with the central node, it will be able to receive and apply
the new settings.
When applying isolation, the senior security officer also specifies when it will be disabled automatically.
re
The default value is 8 hours, which should be sufficient for investigating most incidents.
The countdown also begins from scratch when the Kaspersky Endpoint Agent service is restarted on the
computer.
d
Isolated computers are marked with a special icon in the list of endpoint agents: a red brick in a red circle.
However, if several hundreds or thousands of endpoints are connected to the central node, finding an
e
To quickly find isolated computers, use the filter available in the properties of the Host heading in the list
of endpoint agents. Select the Show isolated Endpoint Agents only option in the filter and the list will
display only isolated computers. In the properties of an isolated computer, you can see a red isolation
warning in the upper part of the window.
co
An isolated computer continues to receive commands from the central node because endpoint agent
connections are never subject to isolation. This permits a senior security officer to cancel isolation at any
time or modify exclusion settings while maintaining isolation.
be
If a computer where Endpoint Agent is installed is connected to Kaspersky Security Center, you can
enable and revoke isolation via the KSC console.
to
To cancel network isolation, open the computer properties in the KSC Console and then open the
Kaspersky Endpoint Agent properties (in the Applications section). In the KEA properties, open Network
isolation | General settings. The Isolate current device from the network checkbox controls isolation
from the network. You can also turn off informing the user about applied isolation. For this purpose, clear
the checkbox Notify a device user when device is isolated from the network.
t
The central node console does not permit disabling user notifications and by default users will be
No
180
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
You can configure isolation exclusions in the KEA properties, in Network isolation | Exclusions. Unlike
ed
the central node web console, where exclusions can only be configured in terms of the source and
destination IP address and port, the KSC console additionally allows you to specify the protocol and make
exclusions for a particular executable.
ut
You can also create exclusions using preset profiles in the KSC console, which cover most Microsoft
services such as Active Directory LDAP, Kerberos, Remote Procedure Call, Remote desktop and others.
r ib
st
di
re
or
e d
pi
Isolation of a compromised host is the first step when mitigating a threat. It is equally important to prohibit
co
The policies available in the Prevention section serve this purpose. A senior security officer can prohibit
accessing a file using the shortcut menu of its checksum anywhere in the central node console, for
example, in the threat description or in the Threat Hunting event properties.
be
You can block access to files only by checksum. It can be either MD5 or SHA256. You can additionally
specify the following in the properties of an execution prevention rule:
— Rule name (not a file name);
— Whether to show the user a message about blocked access;
to
— Rule scope — all or selected computers. To select a computer, type a part of its name, wait for
the list of computers with matching names to appear and select the computer on the list. You can
select as many computers as you want.
In a distributed installation, you can also select all hosts of a specific central node for the scope.
t
No
181
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
r ib
st
di
re
or
All the configured execution prevention rules are listed in the Prevention section. You can also adjust
their settings here:
— Enable or disable rules;
— Edit their parameters: scope, checksum value;
d
Blocking applies only to the following file types and operations with files:
— Executable files;
pi
It makes little sense to block documents for all applications. Access to documents is blocked for those
applications that may be vulnerable to unauthorized code execution.
t to
No
182
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
Kill a process
ed
ut
r ib
st
di
re
or
When urgent threat containment measures have been taken, you can more leisurely analyze the situation
d
on the compromised and isolated computers. Kaspersky Endpoint Detection and Response tasks will
help you.
e
To counter an active threat, use the Kill process task. It has the following parameters:
pi
— Path to file is the main parameter of a task, you cannot create one without it. You can specify
only full file path; environment variables and wildcards are not supported.
— MD5/SHA256 is an optional parameter that helps identify a malicious process that masquerades
co
You can create a Kill process task from events in Threat hunting. Process start event description
contains a path to the process executable. When you click a file path, a menu opens where you can
create tasks. Alternatively, there is a toolbar above the event card in Threat hunting and you can create a
Kill process task from the Create a task menu.
to
When you create a task from an event, you don't need to enter the file path, it is substituted automatically
from the event attributes.
After a Kill process task runs, you can find its results in the Tasks node. You will see whether the
t
operation succeeded or failed for each computer. Usually, an operation fails because there is no such a
No
183
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
ibr
st
di
re
or
Sometimes, as a result of exploiting a vulnerability, attackers manage to inject malicious code into a
system process in the memory. This is often the svchost.exe process that can be compromised using a
network vulnerability.
d
A regular Kill process task allows you to specify only the full file path and its checksum, but does not
allow you to distinguish between multiple processes having the same executable file. If you specify the
svchost.exe process in such a task, it will try to stop all svchost.exe system processes, which is
e
undesirable.
pi
To stop a specific process using its PID, first identify the compromised process using Threat hunting
tools. Then you will be able to create a Kill unique process task using the Create a task button or from
the shortcut menu of the executable file path in the card. The task automatically populates the Process
co
ID, File path, MD5/SHA256 and Host parameters using the values from the card. The resulting task will
only stop the process that has this particular Process ID, meaning, it will stop the compromised process
and will not interfere with other similar processes.
You cannot manually specify a Process ID in a Kill process/Kill unique process task.
be
t to
No
184
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
r ib
st
di
re
or
If an analyst finds a suspicious file during an investigation, it makes sense to check it using the central
d
node technologies. The results of analyzing a file on the sandbox server may be particularly informative.
e
The Get file task serves this purpose. It has the same parameters as the Delete file and Quarantine file
tasks, with two differences:
pi
— The Send for scanning checkbox permits loading a file from a computer and scanning it
immediately. If you clear this checkbox, the file will only be copied to the storage, and you will be
able to scan it later.
co
The Get file task does nothing to the file on the computer. If the analyst has strong reasons to expect that
the file may be dangerous, it is better to use the Quarantine file task. If further analysis adds confidence,
you can create a Delete file task and distribute it to all computers throughout the network.
be
t to
No
185
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
Quarantine a file
ed
ut
ibr
st
di
re
or
It may be premature to delete all detected malicious files. One copy of each unique file should be
d
quarantined so that you can analyze its code and behavior to better understand potential damage and
find additional indicators of the attack: addresses of command and control servers, names and
e
The Quarantine file task serves this purpose; it places the target file into a special protected storage on
pi
the computer. You will be able to send such a file to the central node for analysis or save it to the
analyst's computer. If analysis shows that the file is not malicious, you will be able to recover it.
co
be
t to
No
186
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
ib
r
st
di
re
or
A special task Restore file from quarantine serves this purpose. You can configure it on the Tasks
page.
You can see which files are locally quarantined on endpoints in Storage | Quarantine. A security
d
Operations are performed when the endpoint agent synchronizes with the central node, every 5 minutes
co
by default. The results of an operation will be delivered during the next synchronization.
be
t to
No
187
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
Delete a file
ed
ut
r ib
st
di
re
or
When investigating an incident, an analyst can find malicious executable files and service files associated
d
with them on computers. It makes sense to quarantine one copy of each malicious file for further
investigation. All other copies should be deleted from all computers. You can also delete non-executable
e
files related to the attack. For example, files with registry dumps that attackers could have saved to
extract passwords.
pi
The Delete file task perfectly suits this purpose. It has almost the same parameters as a Kill process
task:
— Path to file is the main parameter of a task, you cannot create one without it. You can specify
co
only full file path; environment variables and wildcards are not supported.
— MD5/SHA256 is an optional parameter that helps identify a malicious process that masquerades
as a legitimate process of the same name.
— Description — arbitrary explanatory text.
be
You can create a Delete file task, like other tasks, from an event in Threat hunting: using the toolbar
to
above the event card or from the menu that opens when you click a file name in the event description.
t
No
188
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
Get forensics
ed
ut
r ib
st
di
re
or
You can get lists of files, processes and autorun points from the selected Kaspersky Endpoint Agent for
d
Information type defines data that will be collected. Select one, several or all checkboxes:
— Processes list, if you want to retrieve the list of processes running on the host at the moment
pi
when the host with Kaspersky Endpoint Agent boots or when a user logs on.
— File list, if you want to get the list of files stored in a specific folder or on the entire host at the
time of task running.
be
t to
No
189
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
Service management
ed
ut
ibr
st
di
re
or
— Start,
— Stop,
e
— Pause,
— Resume,
pi
— Delete,
— Modify startup type.
co
be
t to
No
190
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
ib
r
st
di
re
or
If the described tasks are insufficient for a full-fledged incident response, Kaspersky Endpoint Detection
d
and Response additionally provides the Run program task that permits you to remotely carry out any
command or start any program on a computer.
e
— The executable file to run on the computer. The file must be located on the target machine. The
task does not permit selecting a file on your computer, copying it to the target computer and
running it there.
co
The Run program task can be started on all computers together or on the selected computers.
be
When a Run program task is performed, the agent sends the return code and standard output streams
and errors to the central node. All of this is shown separately for each computer on the task card. For
example, to consult contents of the standard output stream, click the Standard output link. It will open in
a new tab.
t to
No
191
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
ibr
st
di
re
or
First of all, before you scan hosts for indicators of compromise (IOC), go to Custom rules | IOC and set
d
The scan schedule is configured in Settings | Endpoint Agents | IOC scanning schedule.
192
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
ibr
st
di
re
or
To scan computers against YARA rules, go to Custom rules | YARA, select the necessary rules and
d
click Start YARA Scan. In the pane that opens, you will be able to add other rules to the task, edit the
scan scope, specify exclusions, limit the execution time and draw up the list of target computers.
e
You can also create a task to scan computers against YARA rules from the Tasks page: click Add and
select Start YARA Scan.
pi
co
be
t to
No
193
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
ib
r
st
di
re
or
To get a process memory dump or a system memory dump, go to the Tasks page, click Add and select
d
— MD5/SHA256;
— Description;
— Host (the target computer).
co
— Description;
— Host (the target computer).
You can work with the received dumps using third-party tools, for example, WinDbg or Volatility
Framework.
t to
No
194
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
ib
r
st
di
re
or
To get a disk image, go to Tasks, click Add and select Get data | Disc image.
d
— Share path (the network folder where to save the disk image);
— User name of an account that has access to the network folder;
pi
You can open the received disk image using third-party tools, for example, OSFMount.
be
t to
No
195
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
ibr
st
di
re
or
To get a registry key, go to Tasks, click Add and select Get data | Registry Key.
d
— Registry Key;
— Description;
pi
196
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
ed
ut
ibr
st
di
re
or
To get NTFS metafiles, go to Tasks, click Add and select Get data | NTFS metafiles.
d
— Metafiles,
— Volume,
pi
— Description,
— Host (the target computer).
co
be
t to
No
197
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
Task results
ed
ut
r ib
st
di
re
or
All tasks that security personnel have created are displayed in the Tasks section. You can see tasks
created from alert and event cards here, and you can create a task of any type except Kill unique
d
All tasks are single-use in Kaspersky EDR Expert. They don't have a schedule and cannot be re-run
e
manually. If you need to repeat an operation, there is the Duplicate button in the task properties that
creates a new task and copies settings into it. You will be able to adjust the settings before running the
pi
task.
As tasks are one-time, the task list also acts as a task log. The list shows the tasks that specialists
co
created and run. However, the task list is not a reliable audit tool, because you can delete tasks from it.
Click a task to open its results. Errors are typically displayed as Windows return codes 21. Here are some
of the codes that may appear in the task results:
— 3 — The system cannot find the path specified.
— 5 — Access is denied.
be
If an analyst runs a Get file task with the Send for scanning checkbox selected during an investigation,
the results will be shown in the Tasks section, in the card of the Get file task. In the task properties, you
will see the results of scanning the file by all technologies. If a threat is detected in a file, it will be added
to the list of alerts.
t
No
21 https://docs.microsoft.com/en-us/windows/win32/debug/system-error-codes
198
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
Full scan results are always displayed, even if threats have not been detected. In particular, if a file was
ed
scanned in the sandbox, an analyst will have all details about the file running within the virtual machines.
Even if automatic analysis does not reveal anything, an experienced virus analyst will be able to identify
suspicious actions in the file running report.
ut
You can also see the scanning results in Storage | Files. All files requested using Get file tasks are
stored here, and if an analyst scanned a file, the results are also displayed in the file card.
You can scan any files manually, not only those requested from an endpoint using the Get file task. To
ib
do so, click the Upload button in the upper-right corner of the Storage | Files page. The files uploaded
this way will be scanned, but alerts will not be generated for them.
On the Storage | Files page, security personnel can perform the following actions with files:
r
— Save a file to a senior security officer's computer;
st
— Rescan;
— Delete.
di
To retrieve a file quarantined locally on a network computer, go to the Storage | Quarantine page.
re
Distributed mode assumes that security personnel mainly work with the primary central node console.
This console consolidates data from all secondary central nodes.
or
Lists of alerts, computers, tasks, execution prevention rules and other objects are replicated between the
databases of primary and secondary central nodes. As a result, they are shown in the primary central
node console even if connection with the secondary central node is temporarily lost.
Databases with telemetry from endpoint agents are large and it makes no sense to replicate them.
d
Instead, the primary central node requests telemetry from secondary central nodes in real time. The
results are sent back within the same connection.
e
You can grant security personnel access to individual web consoles of secondary central nodes in their
account settings. This will allow them, for example, perform response activities if the primary central node
pi
is inaccessible.
The databases of telemetry events are not replicated between central nodes in a distributed installation.
Data about activities that arrive from endpoint agents are stored in the TAA database of the central node
to which they are connected.
be
A security specialist can search telemetry databases for events of all endpoints of the selected company
using the primary central node web console. The primary central node sends queries to port 8444 of
secondary central nodes and thus receives results from them. If connection to a secondary central node
is lost when the search is performed, its data will be inaccessible.
Some alert details are also loaded from secondary central nodes in real time via requests to port 8444.
to
Endpoint agents
The list of endpoint agents in the primary central node console shows the computers connected to all
t
central nodes of the company (or all companies, if it is a service provider). A senior security officer can
No
apply all EDR tools to them, including ‘Isolate from network’, provided the primary central node has
connection to the secondary central node to which the computer is connected.
199
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 5. KEDR operation
Administration
Storage
ed
The storage of the primary central node shows objects from all central nodes of the selected company.
Senior security officers can save objects to their computers regardless of the central node which the
endpoint agent that locally stores an object is connected to.
ut
Tasks, execution prevention rules, detection rules
ib
In a distributed installation, there can be senior security officer accounts that have access to the web
console of a particular secondary central node within the company. They can create response tasks and
execution prevention rules in the secondary central node's console. These tasks and settings are local
and only apply to the central node in whose console they have been created.
r
st
At the same time, a senior security officer can create company-wide tasks and rules in the primary central
node's console. These rules and tasks are global and apply to all central nodes of the company.
The primary central node console shows global and local tasks and rules and indicates which secondary
di
central node they belong to. The primary central node console permits disabling or modifying only global
rules. Local rules can only be disabled in the local console of their secondary central node.
re
A secondary central node console displays its local tasks and rules, as well as global tasks and rules
created for the company in the primary central node console. You can disable or change only local rules
here. Global rules are provided for informational purposes only.
or
e d
pi
co
be
t to
No
200
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 6. Sandbox analysis results
Administration
ed
ut
6.1 Sandbox alert card
ib
r
st
di
re
or
e d
pi
If a threat was detected by a sandbox server, the Scan results section of the alert will list all threats that
the sandbox detected in the file. There is the Sandbox detect button below the list of threat names
detected by scanning technologies, which opens a more detailed description of the results. The detailed
description shows on which virtual machines the file was scanned and which dangerous actions were
co
detected.
Most of the objects are processed on several types of virtual machines. If the sandbox detects nothing, no
data is displayed in the web interface. If the sandbox detects a malicious object or suspicious behavior,
you can click the Sandbox detect button to open a card with additional sandbox analysis results:
be
— Information about the object (file name, file size, md5, digital signature);
— Names of the detected threats;
— Scanning timestamp and version of the Scanner and IDS components’ databases that were used
when analyzing logs and artifacts of object execution in the virtual environments.
to
Below, object processing results are given for each of the virtual machines used for scanning:
— Dangerous activity log;
— A graph of dangerous activity that shows relationships between dangerous activities and the
source object;
— Network activity logs (HTTP, DNS and IDS);
t
201
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 6. Sandbox analysis results
Administration
ed
ut
ib
r
st
di
re
or
The Activity list displays suspicious actions detected during the file execution. Each activity has an
d
importance level indicated by the icon on the left. Classification according to MITRE ATT&CK is also
provided for most actions.
e
File activity is represented as a tree. The leftmost event is the file start on the virtual machine. All
subsequent file actions are also shown in the tree: started child processes, created and started files, child
processes’ activity. Dangerous operations are classified according to MITRE ATT&CK.
be
Then there are three network activity logs that overlap to some extent, but highlight different aspects of
network activity.
HTTP activity log shows HTTP requests from the virtual machine. The URL, server IP address and
request type (GET, POST, etc.) are shown for each request.
to
IP addresses and URLs are interactive: click them to search for related events and alerts or go to
Kaspersky Threat Intelligence Portal, where you can find geographical information about the server's
address or name.
t
Search for related alerts opens a new tab with a filtered list of alerts. Search for related events pertains to
No
Kaspersky Endpoint Detection and Response functionality. It also opens a new tab with auto-defined
search options. The analyst can edit the conditions to expand or narrow the search.
202
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 6. Sandbox analysis results
Administration
The URL context search looks for the entire URL and does not necessarily find connections to another
ed
page of the same server or connections to another malicious server with the same request. When
analyzing threats, search for the URL and if nothing is found, change the search parameters: leave only
the server name or only a part of the URL.
ut
ib
r
st
di
re
or
d
IDS activity log partly repeats HTTP activity log, but provides relative URLs without the server name;
e
contextual search can yield different results in this case than the search for the full URL.
pi
The IDS activity log also includes the Source IP, but it is the IP address of the virtual machine on an
isolated service network on the sandbox server, which is not particularly interesting.
The DNS activity log shows successful attempts to resolve a remote host name.
co
All network logs may include legitimate activities of the virtual machine’s operating system.
be
t to
No
203
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 6. Sandbox analysis results
Administration
ed
ut
ibr
st
di
re
or
There is a Download full log button in a sandbox scan results card below each virtual machine’ logs.
This log has the JSON format and lists all operations performed on the virtual machine during the
analysis. This log can help the analyst reproduce the complete sequence of actions that preceded
d
204
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 6. Sandbox analysis results
Administration
If the interpreted results of scanning a file on the sandbox server, which are displayed in the web
ed
interface, are insufficient for the security personnel to understand what was going on and make a decision
about the incident, they can consult the Debug info. Debug information also includes all logs and artifacts
received when monitoring the file’s activity in the virtual environment.
ut
Debug info is a password-protected zip archive that contains a set of artifacts collected as a result of
scanning the files in the sandbox. To unpack the archive, use the password infected. The folder is named
after the file’s md5 hash.
ib
Within the archive, you will find:
— task0, task1, task2 and task3 folders that contain scan results after running the file on different
virtual machines and in different modes. A file is not always run on all types of virtual machines
r
and the archive may contain less than four folders; sometimes, there is only the task0 folder.
st
— multitask_result.json — formatted results of scanning the file on all virtual machines.
— meta is a file with the link (if a link was scanned).
— sandbox_config.json — sandbox configuration: on which virtual machines to run a sample, how
di
to run it (as an executable file, script, document, or a link to be opened in a browser), how long to
scan and in which mode (full logging or quick scan).
re
or
e d
pi
co
be
If you open any of taskX folders, it will contain the following data:
— execution_log — a brief execution log in JSON format.
— internal_tracing_report — a ZIP archive with system artifacts (screenshots, DLL libraries, created
files, etc.)
to
Unpack the internal_tracing_report archive to find the list of files extracted from virtual machines. These
No
files may include new files saved to the drive, virtual machine’s screenshots, memory dumps and
contents of memory buffers.
205
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 6. Sandbox analysis results
Administration
Files are anonymized and represented by running numbers. To check which objects they are, consult the
ed
files.list file. The second column contains the file name; the third, its original name; and the first one, file
type:
— DROP — files that appeared in the process of sample execution (extracted from itself,
transformed from other objects, or downloaded from the internet).
ut
— DUMP — a tar archive with the process memory dump (the archive is named after the process).
— BUFFER — a tar archive with the process memory buffer dump.
— OTHER — a screenshot of a virtual machine in the PNG format.
rib
st
di
re
or
e d
pi
Unpack the pcap_postproc_report archive to find a detailed log of the file’s network activity. report.xml
represents information about network connections. The result folder contains files downloaded from the
co
internet. The files are depersonalized and numbered. Search the report.xml log for the name (number) of
a depersonalized file to find the original file name and URL from which it was downloaded.
be
t to
No
206
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
ed
ut
7.1 VIP status
ibr
st
di
re
or
e d
pi
VIP group comes in handy if it is undesired to show non-senior security personnel details of alerts related
to top managers or some departments. Even email message subjects may contain information that
requires special access permissions.
co
You can also use the VIP status simply to highlight important alerts. These alerts are displayed in a
separate widget on the Dashboard, and there is a special indicator for them in the statistics above the list
of alerts.
A senior security officer configures conditions for assigning the VIP status in the Settings | VIP status.
be
207
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
ed
ut
rib
st
di
re
or
A VIP alert is marked with a star . Only senior security officers are allowed to monitor them. Other
security personnel will see these alerts in the list, but will not be able to view their details.
A senior security officer, in addition to the ability to see all details of a VIP alert, can manually assign and
d
remove the VIP status. Only a senior security officer can mark a VIP alert as processed.
e
pi
co
be
t to
No
208
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
ed
ut
rib
st
di
re
or
Kaspersky Anti Targeted Attack and Kaspersky Endpoint Detection and Response can scan password-
d
protected archives and documents. The anti-malware module of the central node scans password-
protected archives. A password-protected document with a list of possible passwords is sent to the
e
sandbox, which specifies the passwords when opening the document in the appropriate editor.
If a protected object is attached to a message, the analyzing module tries to substitute the message text
pi
Additionally, senior security officers can draw up a list of passwords that will be tried on all protected
co
objects, not only those emailed. Trying passwords from a long dictionary requires significant
computational recourses; for this reason, you can add only 50 passwords to the list.
50 passwords are too few to cover any significant part of typical passwords that you can find on the
internet. The main purpose of this list is not to detect threats in files downloaded from the internet.
be
The main use case for this list is to check documents in internal document workflow systems. In
organizations, especially in financial institutions like banks, homeware is often used for workflows and
document protection. Also, these systems are often based on outdated methods. A modified email
system can be used for exchange; and password-protected archives, for protection. Passwords are
changed in a regular and centralized manner in such a system. Security personnel can add these
to
passwords to the central node settings to be able to detect malicious documents spreading within the
organization.
t
No
209
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
ed
Use cases
ut
Kaspersky Anti Targeted Attack and Kaspersky Endpoint Detection and Response provide the capability
to send objects for scanning (by all technologies, including sandbox) to central node via REST API. You
can also use KEDR threat response functionality in this manner.
ib
The main use case for this capability is to scan objects that KATA cannot extract from traffic for some
reason. In organizations with high security requirements, protected document workflow systems are used,
some of which are developed in-house. These organizations can implement their own ‘sensor’ that will
r
send files to the central node similarly to Kaspersky Secure Mail Gateway or Kaspersky Web Traffic
st
Security.
Another integration option is to implement response to threats detected by a third-party system through
KEDR.
di
REST API supports several operation types in KATA/KEDR:
—
re
Scanning objects sent by third-party systems;
— Sending alerts to third-party systems;
— Managing response actions.
To be able to send files via REST API, connect the computer that will do it as an external system to the
central node. You will need:
— The identifier of the external sensor in UUID format. Any UUID will do, for example, from the
to
https://uuidgenerator.net website
— A pair of encryption keys (public and private) for authentication and protecting transferred files. A
pair of 2048-bit RSA keys, which you can create, for example, using the following commands:
210
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
ed
openssl x509 -req -sha256 -days 365 -in server.csr -signkey server.key
-out server.crt
ut
With an identifier and a pair of encryption keys, you can send a connection request to the central node.
There is no special command for a connection request in the API of Kaspersky Anti Targeted Attack. Any
API command sent from a new address becomes a request.
ibr
st
di
re
or
e d
pi
The simplest command that you can send is a scan result request. It is the HTTP GET command sent to
a special URL with the central node address:
co
https://<central node
address>:443/kata/scanner/v1/sensors/<UUID>/scans/state
Where UUID is the ID that you generated for your external sensor.
be
You can manually send such a request using the curl utility:
where cert.pem and server.key are the prepared certificate and private key of the external sensor.
The expected response to the first command sent is 401 Unauthorized. A connection request will appear
in the central node administrator's console on the External systems page. Make sure the IP address,
UUID and certificate fingerprint in the request are the same as those used in the REST API command. If
t
The default name template for external systems is System <ID>. The administrator can rename external
systems.
211
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
ed
ut
ibr
st
di
re
or
Also, remember that requests can be sent not only via the standard Curl utility, but also using any other
means, for example, Postman, which may be more convenient at the testing stage.
212
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
ed
To send a file scan task to the central node, use the HTTP POST method, URL https://<central node
address>:443/kata/scanner/v1/sensors/<UUID>/scans and the following parameters:
— scanId — task identifier. It can be a number or a string. What is important is that it must differ
ut
from identifiers of previously sent tasks;
— objectType — file;
— content — with curl, use the @<file path> format for file contents.
ib
You can manually send such a request using the curl utility:
r
curl --cert <path to the TLS certificate file> --key <path to the
private key file> -X POST "<URL of the server with the Central Node
st
component>:<port, 443 by default>/kata/scanner/v1/sensors/<sensorID>
/scans?sensorInstanceId=<sensor instance ID>" -F "content=<path to the
file you want to scan>" -F ScanId=<id of the scan request> -F
di
"ObjectType=file"
re
Sent files are scanned by all technologies available on the central node. If a threat is detected in a file, the
central node generates an alert with the source EXTERNAL <external system name>.
If an organization uses API to send documents from their internal workflow system, it is important not only
or
to detect dangerous files, but also to automatically delete them from the system.
An external system can receive scan results by using the HTTP GET method with the following address:
curl --cert <path to the TLS certificate file> --key <path to the
private key file> -X GET<URL of the server with the Central Node
pi
An answer to such a request will be the list of 'scanId, state’ pairs in json format.
It is the third-party system that is to process the results. It is also supposed to delete tasks whose results
have been processed by sending the DELETE command to
be
curl --cert <path to the TLS certificate file> --key <path to the
to
private key file> -X DELETE "<URL of the server with the Central Node
component>:<port, 443 by default>/kata/scanner/v1/sensors/<sensor ID>
/scans/<Scan ID>"
213
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
ed
Requesting the scan results by task ID returns only a binary result. This is enough for processing the file
on the side of the system that sent it.
ut
If you need extended information about detections, it is available via the REST command detects (use
the curl utility, for example):
curl --cert <path to the TLS certificate file> --key <path to the
ib
private key file> -X GET "<URL of the server with the Central Node
component>:<port, 443 by default>/kata/scanner/v1/sensors/<sensor ID>
/detects?detect_type=<one or more detection technologies>&limit=<number
of detections in the response>&token=<request id>"
r
st
The central node returns all alerts in response to such a request, including those processed, from the
oldest to the newest, but no more than 1000. The response contains all alerts’ attributes in json format,
including, for example, information about file scanning on sandbox virtual machines (without the debug
archive).
di
1000 alerts, mainly oldest and already processed, is most likely not what you would like to see when
sending a request. That is why the detects command supports additional filtering parameters:
re
— detect_type allows filtering by detection technology and takes the following values: am, sb, ids,
url_reputation, yara; you can specify several technologies separated by commas.
— limit allows you to request a limited number of alerts, from 0 to 10000 (1000 by default if the limit
is not explicitly set).
or
The token parameter of the detects command helps request new alerts. It is slightly more complicated
than the described filters.
Any response to the detects command includes the token parameter with some value. If you repeat the
d
query and specify the token from the previous response, the new response will contain only new alerts
that were not included in the response with the token value specified in the request.
e
If the new response contains alerts, the token value will change, and you will be able to use it in the next
pi
You may need to obtain a list of Kaspersky Endpoint Agent hosts to be able to respond to threats. To
request information about hosts that run Kaspersky Endpoint Agent, use the HTTP GET method:
Upon successful request processing, the list of hosts with Kaspersky Endpoint Agent will be displayed.
You can also request information about hosts with the specified parameters: IP address, name or ID. You
can specify one, several or all parameters:
— sensor_id — unique identifier of the Kaspersky Endpoint Agent host;
to
"https://<KATA_IP>:443/kata/response_api/v1/<UUID>/sensors?ip=<ENDPOINT
_IP>"
214
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
ed
After we have received the list of hosts with KEA, we may need to perform some action on the target host
to respond to a threat. For example, isolate it from the network.
ut
To create such a request, use the HTTP POST method; the request body contains JSON formatted
commands.
ib
CURL -k --<path to the TLS certificate file> --key <path to the private
key file> -X POST "<URL address of the server with the Central Node
component>:<port, 443 by default>/kata/response_api/v1
r
/<external_system_id>/settings?sensor_id=<sensor_id>&settings_type=
st
network_isolation" -H 'Content-Type: application/json' -d '
{
"settings": {
"autoTurnoffTimeoutInSec": <network isolation time>}
di
}
'
re
Expected success response code: 200 Operation completed successfully.
7.4 Reports
or
Report templates
e d
pi
co
be
t to
No
The central node web console permits configuring and creating custom reports. The general principle:
first configure a template and then you will be able to create a report to this template.
215
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
Templates are created in the Reports section on the Templates tab. After installation, there are no
ed
templates. Security personnel are supposed to create them manually.
When you create a template, an editor opens, which permits adding arbitrary static text to the template,
as well as static images and dynamic tables and charts that will be generated based on the alerts’ data.
ut
In the table settings, you can select which alert attributes to display and also configure a filter with
parameters such as alert status, importance, VIP status and the technology that detected the threat.
ib
In the chart settings, you can select only its type. All charts show alerts distribution by a particular
parameter: importance, source, technology. Chart contents don't depend on the table contents. A chart
shows the distribution of all alerts over the selected period. The period is not configured in a template;
you select it when generating the report.
r
st
Generating reports to templates
di
re
or
e d
pi
co
After you have created a template, you can generate reports for various time periods. However, you must
be
understand that alerts are not stored in the database forever and as new alerts arrive, old ones get
deleted from the database. If the stream of new alerts is very intensive, effective alert storage time can be
about a month or even less.
216
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
ed
Alert notifications
ut
ib
r
st
di
re
or
e d
To configure notifications about alerts, switch to Settings | Notifications in the web interface of a senior
security officer and add a rule. Specify the following:
pi
— Recipients’ email addresses (notifications about detected threats may contain personal data,
therefore, notifications are recommended to be sent to employees allowed to access this
information);
— Message subject (you can add the %importance% macro to include the alert importance);
co
217
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
ed
ut
ibr
st
di
re
or
In the program operation notification settings, specify the addressees, subject and components about
e
218
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
The central node can email notifications about detected threats and server components’ malfunctioning.
ed
Notifications are disabled by default.
A senior security officer configures the recipients of alert notifications. An administrator configures the
recipients of error notifications and the mail server connection settings for all notifications.
ut
To specify how to send, open the web console of the central node administrator and go to Settings |
Notification | Mail configuration. Specify:
— Mail server address (IP or name);
ib
— SMTP port;
— Sender’s email address;
— Authentication username and password;
r
— Whether to use TLS to encrypt the connection.
st
The Validate TLS encryption checkbox allows you to connect to the mail server with the specified
settings and download its certificate. When sending notifications, the central node will check if the mail
server’s certificate matches the downloaded copy.
di
7.6 Integration with SIEM
re
The central node of Kaspersky Anti Targeted Attack/Kaspersky Endpoint Detection and Response can
send information about detected threats and status (heartbeat) events to an external Security Information
or
and Event Management (SIEM) system using Syslog.
Initial connection
e d
pi
co
be
t to
219
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
ed
4. Specify the address, protocol and port for connecting to the SIEM server in the Host/IP,
Protocol and Port fields.
5. Specify an arbitrary identifier in the Host ID field to be able to quicker find KATA/KEDR events in
ut
the SIEM console.
6. Specify the frequency of sending Heartbeat messages to SIEM. The default value is 10 minutes.
7. Optional: Upload the TLS certificate if authentication of event sources is required in SIEM.
ib
After that, the central node will send all new alerts in Common Event Format to the SIEM server.
In addition to alerts, central node sends information about the status of server components to SIEM.
r
Information about endpoint agents’ status is not sent. By default, the status information is sent every 10
st
minutes. You can adjust this value in the Heartbeat field.
Events in SIEM
di
Information about each detected threat is transferred as an individual syslog message in CEF format. If it
is the Targeted Attack Analyzer module that detects a threat, information about it is sent in several
re
separate syslog messages in CEF format.
The maximum size of a syslog message about an alert is 32 KB by default. Messages that exceed the
limit are truncated.
or
Header of each syslog message about an alert contains the following information:
— Format version. Current version number: 0. Current field value: CEF:0.
— Manufacturer. Current field value: AO Kaspersky Lab.
— Application name. Current field value: Kaspersky Anti Targeted Attack Platform.
— Application version. Current field value: 5.0.0-5201.
d
— Alert importance. Acceptable field values: Low, Medium, High or 0 (for heartbeat messages).
— Additional information.
pi
Version 0
Device Vendor AO Kaspersky Lab
Device Product Kaspersky Anti Targeted Attack Platform
be
Severity 0
Extension Message details in the “key=value” format
t
No
220
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
ed
Key Description Sample
dvc Device IPv4 Address 10.28.0.55
ut
rt Receipt Time Nov 19 2018 18:10:03
Vendors can describe their keys. In particular, heartbeat events use the following keys:
ib
Key Value
Name of the component that has the specified number.
r
Names have the following format: <component
st
type>_<server address>, for example, ids_127.0.0.1
KasperskyLabKATAcomponentName stands for the IDS component on the central node from
which the message arrived. Component types are: ksn,
bases, snort, avEngine, quarantine, sandbox, taa,
di
riskScore
Status of the component that has the specified
number. It can have the following values: 0 if
re
KasperskyLabKATAcomponentState everything is OK, or non-zero if the component
malfunctions
Events contain all alert attributes: partially in standard CEF fields, partially in custom fields if the CEF
or
format does not provide the necessary attribute.
221
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
You can send data about the load on the CPU and RAM of central nodes and sensors to external
ed
systems that support SNMP.
ut
2. In the SNMP settings area, set the Use SNMP switch to Enabled.
3. Choose the Protocol version: v2c or v3.
4. Specify additional integration parameters.
ib
If you have selected protocol version v2c, in the Community string field, specify the password that will
be used for connecting to Kaspersky Anti Targeted Attack Platform.
r
If you have selected v3, do the following:
st
1. In the Authentication protocol field, select one of the following options for verifying validity and
integrity of data transmitted to the external system:
— MD5
di
— SHA256
2. In the User name box, specify the account to be used for authentication.
3. In the Password field, type its password.
re
4. In the Privacy protocol field, select one of the following encryption types:
— DES
— AES
or
5. In the Password field, specify the encryption password.
To configure SNMP in the sensor interface, enter the abovementioned parameters in System
administration | SNMPd monitoring settings.
e d
Logs
co
For troubleshooting, you can check system logs and/or run a script that collects diagnostic data in
Kaspersky Anti Targeted Attack/Kaspersky Endpoint Detection and Response.
To view system logs, switch to Technical support mode and use the operating system tools to analyze the
logs. The logs of Kaspersky Anti Targeted Attack/Kaspersky Endpoint Detection and Response modules
be
are located in the folder /var/log/kaspersky/. Each server stores its own logs.
— per-install.log.
t
No
222
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
ed
ut
ib
r
st
di
re
or
To start the script that collects diagnostic data on a central node or sensor, open its text management
console, go to Technical Support Mode and run the kata-collect utility.
d
The result will be saved in the /tmp/collect folder, in a file named collect.tar.gz. Before sending information
e
to the technical support, delete any data that you consider to be confidential from the archive.
pi
co
be
t to
No
223
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
You can save sandbox logs via its web interface. In the Administration section, next to System log,
ed
click the Download button and wait. The web console starts a script to collect logs and archive them,
which may require a few minutes. When the archive with logs is ready, the browser where the web
console is opened will prompt you to save the file.
ut
Exporting alert details
Sometimes alert details are required for sending a request to Kaspersky technical support. There is a link
ib
at the bottom of each alert card that permits copying all details as text.
r
7.9 Updates
st
Updating the central node
di
Databases are updated for the following components of Kaspersky Anti Targeted Attack and Kaspersky
Endpoint Detection and Response:
re
— Anti-Malware Engine on Central Node;
— Targeted Attack Analyzer on Central Node;
— APT Certcheck22 on Central Node;
— IDS on Sensor (Central Node) and Sandbox;
or
— Scanner of logs and artifacts on the sandbox server (software of guest virtual machines is not
updated).
The license is checked prior to running the update task. The task will not run without a valid license. After
the update, the new set of databases is validated without stopping the scan of the existing set. If the new
d
set is validated, the module starts using it. If not, the product continues to use the existing set of
databases.
e
Databases are updated automatically on central nodes and sensors every 30 minutes. To run the update
task manually on the central node, in the administrator’s web console, open Settings | General settings
pi
and click Start in the Database update area. You can also change the update source here.
Kaspersky Anti Targeted Attack/Kaspersky Endpoint Detection and Response servers support three
co
In the same section, Settings | General settings, you can specify proxy settings for accessing the
to
internet. The proxy server is used for downloading updates and accessing KSN servers.
Sometimes connecting through a proxy server results in unstable operation of the KSN subsystem;
diagnostic messages inform about that in the web console. In this case, you can use the apt-settings-
manager utility to increase the timeout for KSN connections.
t
No
22 A module that additionally checks certificates with which malicious files are signed
224
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
In general, KSN may require an exclusion for Kaspersky addresses on the proxy server for stable
ed
operation.
Sensor updates
ut
On a sensor, it is the IDS subsystem that requires updates. A sensor can download updates from
Kaspersky servers or from a custom source. If a sensor is located at the same site as its central node, the
best choice is to update from the central node. If a sensor is located in a remote office, it makes sense to
ib
update it from Kaspersky servers on the internet.
Sandbox updates
r
st
A sandbox uses updates when analyzing samples’ activity logs, their network activity and files that they
created.
di
A sandbox can download updates from Kaspersky servers on the internet or from the address specified
by the administrator. A custom update source must have a correct structure and contain the necessary
files.
re
A central node can act as an update source: automatically download updates for sandboxes and make
them accessible over HTTP (via the standard TCP port 80).
All central nodes authorized on a sandbox server are listed below the custom source textbox. To
configure updating sandbox from a central node, click the necessary central node address, and the
or
respective update address will appear in the source address field.
Endpoint Agents also have an update mechanism. The update task downloads the following data for the
e
agents:
— List of KSN servers is required to send agent activity statistics to KSN.
pi
Agents don't send all computer events to the central node. This would result in unreasonably
high load on the network and central node. Instead, agents use special filters prepared by
Kaspersky experts. Each event type has an inclusion filter and an exclusion filter. The agent logs
only events that match the inclusion filter conditions and don't match the exclusion filter
conditions.
be
Kaspersky experts change filters from time to time to reduce the load on the central node or to
expand data collection considering new adversary tactics and techniques. New filters are
typically released once in a few weeks, but may also be released more often.
— Patches for agent executables.
to
Endpoint agents are supplied with a pre-configured set of filters that will work without an update task.
However, to optimize performance of the system that detects indicators of attacks, we recommend that
you create and configure an endpoint agent update task in KSC.
A Kaspersky Endpoint Agent update task is not created automatically and must be configured by the
t
— The source of updates: Kaspersky Security Center, Kaspersky update servers, or a custom
HTTP, FTP or SMB server.
— Module update parameters; an administrator can disable updating executable modules.
225
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
— Schedule where you can specify an update interval (from hours to weeks or months).
ed
Telemetry filters are released once every few weeks; however, we recommend that you run the
update task daily just in case. Updates for executable modules are released even rarer.
ut
7.10 Saving and restoring settings
ib
Kaspersky Anti Targeted Attack/Kaspersky Endpoint Detection and Response servers provide the ability
to back up the settings so that you can restore them quickly if the configuration is corrupted. Settings are
exported individually on each server from the management console.
r
st
You can save central node and sensor configuration only using the text console. Open System
administration | Backup/Restore settings, select New and confirm your choice. A script will run that will
save all the settings from the management console to the /home/admin/apt_backup folder in the
data_kata_<date-time>.tar.gz format.
di
The script does not save the telemetry database, license key or web interface settings.
re
Sandbox server settings can be saved from its web console. Go to the Administration section and click
Export in the Settings area. The web console will run the respective script on the sandbox server and
save the result in the settings-<date-time>.tar.gz file on the administrator’s machine.
or
7.11 Upgrade
d
New versions of KATA Platform are released approximately once a year and affect the server part of
KATA and KEDR Expert solutions. Endpoint agents may be released more frequently because Kaspersky
Endpoint Agent is used in a wide list of solutions.
e
— Only for the version that immediately precedes the new release.
— Sensors and sandboxes must be reinstalled.
So, central node settings will only remain in place when you upgrade from 4.1 to 5.0. If you are using an
earlier version, upgrade the versions sequentially: 3.7 → 3.7.1, 3.7.1 → 3.7.2, 3.7.2 → 4.0, 4.0 → 4.1.
be
Before updating the Central Node component, first run the kata-upgrade-preparation script on the server.
This script is included in the distribution.
You can upgrade the PCN server without any preparations. After the upgrade, the PCN server
will belong to the same tenant as before.
— If you want to upgrade an SCN server, change its role from SCN to a standalone Central Node
server before the upgrade. Then upgrade this standalone Central Node server.
t
After the upgrade, you will be able to reassign the SCN role to the servers and select the tenant
to which each SCN server belongs.
No
226
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
After an upgrade, all users who have the Administrator role are granted access to the web interface of the
ed
PCN and all SCN servers. To restore granular access to SCN web interfaces after the upgrade, in the
web interface of the PCN server:
1. Add the necessary organizations.
ut
2. Configure access of user accounts with the Senior Security Officer and Security Officer roles to
the organizations and servers.
3. Delete all SCNs temporarily disconnected from the PCN during the upgrade.
ib
4. Reconnect all the necessary SCNs to the PCN.
The program will prompt you to choose an organization for each SCN server.
r
When ready, user access to the SCN web interfaces will be configured.
st
Specifics of updating Kaspersky Anti Targeted Attack Platform from version 4.1 to version 5.0:
— After you upgrade Kaspersky Anti Targeted Attack Platform to version 5.0, you will need to re-
di
add the license keys.
— Custom layouts are not preserved on the Dashboard after an upgrade.
— Network interface parameters are not preserved either. If you want to use network interfaces to
re
receive mirrored SPAN traffic, configure traffic capturing after the upgrade.
— Data of the Sensor and Sandbox components will not be saved.
— Central Node 5.0 is not compatible with earlier versions of Sensor or Sandbox.
or
The certificate may need to be replaced on the central node. First, a self-signed certificate that is created
pi
during the installation expires in 5 years. You will have to change it then. Second, some organizations
prefer to use certificates issued by their internal certificate management system. Third, regular certificate
replacement may be prescribed by the internal security policy.
co
You can replace (or create a new self-signed) certificate from the central node administrator's web
console in Settings | Certificates.
To use a certificate issued by another system at the central node, prepare a PEM file. The file must
contain both the public and private parts of the certificate; the private key must be at least 2048-bit.
be
Once the central node certificate is replaced, you will need to reconnect all entities — sandbox servers,
sensors, KWTS and KSMG servers and endpoint agents — depending on the solution deployed.
Often, time out of sync turns out to be the cause of hard-to-diagnose connection problems between KATA
or KEDR components. That's why it's so important that the time is synchronized on the servers. The
easiest way to achieve this is to configure all servers to receive time from the same trusted source.
t
No
If the address of your organization's NTP server changes, be sure to update the time settings on all
servers.
You can set the time parameters either via the web console (where available) or through the text console.
227
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
ed
You may need to change the network settings for the servers. You can do it in the administrator’s web
console or in the text console.
ut
As a rule, changing network settings does not have any negative consequences. However, to be on the
safe side, we recommend that you don't change the server address while some of the hosts connected to
it are isolated from the network.
ib
7.13 Kaspersky Private Security Network (KPSN)
r
st
Why KPSN may be required
di
Kaspersky Anti Targeted Attack and Kaspersky Endpoint Detection and Response, like many other
Kaspersky products, are deeply integrated with Kaspersky Security Network (KSN), a reputation
database of files and URLs in the Kaspersky cloud infrastructure. KSN provides a faster response to new
re
threats, improves the efficiency of detection and protection components and reduces the likelihood of
false positives.
KSN is an important component, but it is the system administrator who decides whether to use it. If the
decision is taken to participate in KSN, some information obtained while running the product is forwarded
or
to Kaspersky. The list of data forwarded is specified in the KSN Statement. It mainly consists of
checksums of scanned files, links, information about malicious objects and product operation statistics.
However, there are specific requirements in some industries and companies, according to which no data
can be sent outside the organization. Such a requirement could limit the use of KSN. To overcome this
d
limitation, Kaspersky offers a local replica of Kaspersky Security Network: the Kaspersky Private Security
Network (KPSN) product. This approach provides all KSN benefits without sending any data outside the
e
organization.
KPSN servers deployed on the customer’s side are permanently connected to the global KSN servers. As
pi
soon as the global directory is updated, KPSN servers get notified and start downloading the changes.
This means that databases are always up-to-date on the customer side, and KPSN returns the same
answers as KSN.
co
Kaspersky Private Security Network supports several deployment options, for example, for an air-gapped
network. KPSN deployment falls outside the framework of this course. We will only touch upon KPSN
specifics that affect integration with Kaspersky Anti Targeted Attack/Kaspersky Endpoint Detection and
Response.
be
During the deployment, you will need to save the file with KPSN settings (configuration.json), send it to
Kaspersky and receive an answer with several files that are required to connect KPSN to KSN and to
connect KATA/KEDR and other Kaspersky applications to KPSN:
— cert.tar.gz — a certificate for authenticating KPSN in KSN, which must be specified in the KPSN
t
228
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
— <company name>_settings.pkcs7 — the file that you must upload to Kaspersky Security Center
ed
settings to enable it to use KPSN in Kaspersky Endpoint Security and other protection
applications.
Transform the three files (kc_<company name>.xml, kh_<company name>.xml and ksncli_<company
ut
name>.dat) before you upload them into KATA/KEDR settings:
1. Compress .xml files into .xms by the squeeze.exe utility (you can request it from Kaspersky)
2. Replace <company name> in the file names with private:
ib
— kc_private.xms,
— kh_private.xms,
r
— ksncli_private.dat.
st
Connecting a central node to KPSN
di
The KSN module is included with Central Node and Sensor. A sandbox server does not communicate
with the KSN directly, but the central node additionally sends the files that sandbox has found to be
dangerous to KSN. Interaction with KSN/KPSN is configured for each server individually via its
re
management console.
To connect a central node to the KPSN, use the administrator's web console. In the Settings |
KSN/KPSN and MDR section, select the KPSN connection type, upload the kc_private.xms,
kh_private.xms and ksncli_private.dat files and click Apply.
or
The connection result will be displayed in a message at the bottom of the window.
Sensors receive KPSN settings from the central node and don't need to be configured.
d
KPSN not only supplies Kaspersky products with enhanced data from the KSN public infrastructure, but
pi
also creates a local reputation database for the company, which is controlled by administrators.
No security solution is both 100% effective in detecting threats and 100% accurate in identifying non-
co
dangerous objects. There is always some small risk of false positives and overlooked threats.
When using the public version of KSN, file processing statistics are sent to Kaspersky, where they are
processed by algorithms and experts. As a result, previously unknown files quickly receive correct
classification: dangerous or not.
be
KPSN does not send any information to Kaspersky. Therefore, classifying unknown files becomes the
task of the customer's specialists. And that's what the local KPSN reputation database is designed for.
The customer’s experts can add the checksum of any file to it and manually specify whether it is
dangerous.
to
You can integrate a KATA Platform central node with the KPSN reputation database and automatically
populate it with information about the files that the sandbox technology finds to be dangerous and highly
important.
To configure sending checksums of files detected by the sandbox technology to KPSN, you will need a
t
Download the certificate (both parts, public and private) of a KPSN user who has the permission to use
KPSN API from the user’s profile in the KPSN web console. The KPSN administrator has the required
permissions; but a pair of encryption keys of any user allowed to access KPSN API will do as well.
229
KL 025.5: Kaspersky Anti Targeted Attack. Kaspersky Endpoint Detection and Response. 7. KATA platform maintenance
Administration
ed
— In the central node administrator's console, open Settings | KPSN reputation database and
specify:
— HOST — IP address of the KPSN server where the local KPSN reputation database is
ut
stored;
— TLS Certificate — a certificate for user authentication in KPSN;
— TLS encryption key — the private encryption key;
ib
— In the central node console of a senior security officer, open Settings | KPSN reputation
database and select the checkbox Assign the ‘Untrusted’ status to alerts.
r
With these settings, the central node will send checksums of objects that were detected by the Sandbox
technology to the KPSN reputation database. Two checksums will be sent for each object: MD5 and
st
SHA256.
The KPSN administrator can manually create records in the KPSN reputation database. A record by
di
Kaspersky Anti Targeted Attack/Kaspersky Endpoint Detection and Response has the KATA tag in the
description. You cannot delete KATA records, but you can disable them.
Other Kaspersky applications will be able to block objects by checksums available in the KPSN reputation
re
database. Specifically, Kaspersky Endpoint Security blocks executable files that have bad reputation with
its File Threat Protection and Host Intrusion Prevention components.
or
e d
pi
co
be
t to
No
v.0.6
230