Data in Kaspersky Endpoint Agent for Windows requests to Kaspersky Anti Targeted Attack Platform
When integrated with the Central Node component, the following data is stored locally on the device with Kaspersky Endpoint Agent installed.
All data that is stored locally on the device, except for trace and dump files, is deleted from the device when the program is uninstalled.
Data from Kaspersky Endpoint Agent requests to the Central Node component:
In the synchronization requests:
Unique ID of Kaspersky Endpoint Agent.
Base part of the server web address.
Device name.
IP address of the device.
MAC address of the device.
Local time on the device.
Self-defense status of Kaspersky Endpoint Agent.
Name and version of the operating system that is installed on the device.
Kaspersky Endpoint Agent version.
Versions of program settings and task settings.
Task statuses in Kaspersky Endpoint Agent: IDs of running tasks, execution statuses, execution error codes.
Statuses of Kaspersky Endpoint Agent settings: type of applied settings, version of settings, status of applying the settings, error codes of applying the settings.
In requests for obtaining files from the server:
Unique IDs of files.
Unique ID of Kaspersky Endpoint Agent.
Unique IDs of tasks.
Base part of the web address of the Central Node server.
Host IP address.
In the reports on task execution results:
Host IP address.
Details of objects detected during IOC or YARA scan.
Flags of the additional actions performed by Kaspersky Endpoint Agent after completion of tasks (for example, "deleteFileAfterReboot": false).
Task execution errors and return codes.
Task completion statuses.
Task completion time.
Versions of settings used for task execution.
Details of objects submitted to the server, quarantined objects, and objects restored from Quarantine: paths to objects, MD5 and SHA256 hashes of objects, IDs of quarantined objects.
Details of processes started or stopped on the Kaspersky Endpoint Agent device following the server request: PID and UniquePID, error code, MD5 and SHA256 hashes of objects.
Information about services started or stopped on the device following the server request (name of the service, run type, error code, MD5 and SHA256 hashes of service file images).
Details of objects for which a memory dump was created for YARA scanning (paths, dump file ID).
Files requested by the server.
Telemetry packets.
Data on running processes:
Name of the executable file, including the full path and extension.
Process autorun settings.
Process ID.
Logon session code.
Logon session name.
Date and time when the process started.
MD5 hash of the object.
SHA256 hash of the object.
Data on files:
Path to the file.
File name.
File size.
File attributes.
File creation date and time.
Date and time of the last modification of the file.
Basic information about the file that is displayed to users. This line can be displayed in the list when the user selects files for installation. This line is mandatory.