Kaspersky Anti Targeted Attack Platform

Information about the "Alert processing result" event

The window showing information about a Detect processing result type event contains the following details:

  • Tree of events.
  • On the Details tab, under Detect processing result:
    • IOA tags—Information about the results of file analysis using the Targeted Attack Analyzer technology: name of the TAA (IOA) rule that was used to create the alert.

      Click the link to display information about the TAA (IOA) rule. If the rule was provided by Kaspersky experts, it contains information about the triggered

      as well as recommendations for reacting to the event.

    • Event time—Date and time of the event.
    • Detect—Name of the detected object. Clicking the link with the object name opens a list in which you can select one of the following actions:
      • Find events—Find all events in which this object was detected.
      • View on KL TIP.
      • Copy value to clipboard.
    • Last action—Last action taken on the detected object.
    • Host name—Name of the host on which the alert was generated.
    • User name—User account used to complete the action taken on the detected object.
    • Object type—Type of object (for example, a file).
    • Object name—Full name of the file in which the object was detected.
    • MD5—MD5 hash of the file in which the object was detected.
    • SHA256—SHA256 hash of the file in which the object was detected.
    • Detect mode—Scan mode in which the alert was generated.
    • Record ID—ID of the record of the alert in the database.
    • Databases version—Version of the database used to generate the alert.
  • On the Details tab, under Parent process:
    • File—Path to the parent process file.
    • MD5—MD5 hash of the parent process file.
    • SHA256—SHA256 hash of the parent process file.
    • Process ID—Identifier of the parent process.
    • Launch parameters—Parent process startup settings.
  • On the History tab, in the table:
    • Type is the type of the Detect processing result event.
    • Description—Description of the event.
    • Time is the date and time of the alert processing result.

Clicking the link with the file name or file path opens a list in which you can select one of the following actions:

Clicking the link with the host name opens a list in which you can select one of the following actions:

Clicking the MD5 link opens a list in which you can select one of the following actions:

Clicking the SHA256 link opens a list in which you can select one of the following actions:

The Kaspersky Anti Targeted Attack Platform server generates a Detect processing result event based on data received from EPP programs. If EPP programs are not installed on the computer and are not integrated with the Endpoint Agent component, information about the Detect processing result event is not logged in the event database and is not displayed in the program web interface.

See also

Event information

Viewing the table of events

Viewing information about an event

Information about events in the tree of events

Recommendations for processing events

Information about the "Process started" event

Information about the "Module loaded" event

Information about the "Remote connection" event

Information about the "Prevention rule" event

Information about the "Document blocked" event

Information about the "File created" event

Information about the "Windows log event" event

Information about the "Changes in the registry" event

Information about the "Port listened" event

Information about the "Driver loaded" event

Information about the "Alert" event

Information about the "Interpreted file run" event

Information about the "Interactive command input at the console" event