Adding a TAA (IOA) rule to exclusions

You can add to exclusions only TAA (IOA) rules made by Kaspersky. If you do not want to apply a custom TAA (IOA) rule for scanning events, you can disable that rule or delete it.

To add a TAA (IOA) rule to exclusions from the Alerts section:

  1. Select the Alerts section in the window of the program web interface.

    This opens the table of alerts.

  2. Click the link in the Technologies column to open the filter configuration window.
  3. In the drop-down list on the left, select Contains.
  4. In the drop-down list on the right, select the (TAA) Targeted Attack Analyzer technology.
  5. Click Apply.

    The table displays alerts generated by the TAA technology based on TAA (IOA) rules.

  6. Select an alert for which the Detected column displays the name of the relevant rule.

    This opens a window containing information about the alert.

  7. Under Scan results, click the link with the name of the rule to open the rule information window.
  8. To the right of the TAA exclusions setting name, click Add to exclusions.

    This opens a window that allows you to add the TAA (IOA) rule to exclusions.

  9. In the Exclude rule field, select the exclusion operating mode:
    • Always if you do not want the program to create alerts for events that match the selected TAA (IOA) rule.
    • Based on conditions if you do not want the program to create events only for events that match specified conditions. Alerts are created for events that match the TAA (IOA) rule with the configured exclusion conditions taken into account.

      If you selected Based on conditions:

      1. Click Configure additional conditions to open the event search form.
      2. If you are using distributed solution and multitenancy mode and want to enable the display of events for all organizations, turn on the Search on all companies toggle switch.
      3. Perform an event search in design mode.

        A table is displayed of events that match the TAA (IOA) rule given the specified exclusion criteria.

        If you are using the distributed solution mode, found events are grouped in tiers: Server – Company names – Server names.

      4. Click the name of the server for which you want to view events.

        The host table of the selected server is displayed. Event grouping levels are displayed above the table.

        If necessary, you can change event search conditions.

      5. Click Add exclusion.
  10. If you are using distributed solution and multitenancy mode, in the Apply to servers* field, select check boxes for companies and hosts to which the rule must be applied.
  11. Click Add.

The TAA (IOA) rule is added to exclusions and is displayed in the exclusion list in the Settings section, Exclusions subsection on the TAA exclusions tab in the program web interface. This rule is no longer used for creating alerts.

To add a TAA (IOA) rule to exclusions from the Threat Hunting section:

  1. Select the Threat Hunting section in the program web interface window.

    This opens the event search form.

  2. Define the search conditions and click the Search button. For example, you can select event search criteria in the TAA properties group in design mode.

    The table of events that satisfy the search criteria is displayed.

  3. Select an event.
  4. To the right of the IOA tags setting, click the name of the rule.

    This opens a window containing information about the rule.

  5. To the right of the TAA exclusions setting name, click Add to exclusions.

    This opens a window that allows you to add the TAA (IOA) rule to exclusions.

  6. In the Exclude rule field, select the exclusion operating mode:
    • Always if you do not want the program to create alerts for events that match the selected TAA (IOA) rule.
    • Based on conditions if you do not want the program to create events only for events that match specified conditions. Alerts are created for events that match the TAA (IOA) rule with the configured exclusion conditions taken into account.

      If you selected Based on conditions:

      1. Click Configure additional conditions to open the event search form.
      2. If you are using distributed solution and multitenancy mode and want to enable the display of events for all organizations, turn on the Search on all companies toggle switch.
      3. Perform an event search in design mode.

        A table is displayed of events that match the TAA (IOA) rule given the specified exclusion criteria.

        If you are using the distributed solution mode, found events are grouped in tiers: Server – Company names – Server names.

      4. Click the name of the server for which you want to view events.

        The host table of the selected server is displayed. Event grouping levels are displayed above the table.

        If necessary, you can change event search conditions.

      5. Click Add exclusion.
  7. Click Add.

The TAA (IOA) rule is added to exclusions and is displayed in the exclusion list in the Settings section, Exclusions subsection on the TAA exclusions tab in the program web interface. This rule is no longer applied when scanning events.

When creating a search query to be saved as an exclusion criterion, avoid using the following fields:

These fields are only displayed after Kaspersky Anti Targeted Attack Platform marks events as matching TAA (IOA) rules.

Users with the Security auditor and Security officer roles cannot add TAA (IOA) rules to exclusions.

See also

Viewing the list of TAA (IOA) rules added to exclusions

Viewing a TAA (IOA) rule added to exclusions

Removing a TAA (IOA) rule from exclusions

Page top