The following changes have been introduced in Kaspersky Anti Targeted Attack Platform 8.0:
In addition, the platform detects suspicious connections and network segmentation violations. These include the use of non-standard ports and protocols, RDP and SSH connections to external addresses, firewall configuration errors, and attempts to bypass access control restrictions. Special focus is placed on attacks targeting domain infrastructure and user accounts, such as DCSync, DCShadow, Kerberos-based attacks, and brute-force attempts, as well as internal reconnaissance activity, including Active Directory, LDAP, and Kerberos enumeration, port scanning, and DNS zone transfers.
This capability also enables detection of connections to suspicious external resources and attacker command-and-control servers, including DGA domains, DNS TXT tunneling, and tunneling and file-sharing services, allowing early identification of compromised hosts and insider activity. All detected anomalies are displayed in the context of network sessions and are enriched with attributes for rapid analysis and investigation.
Flexible configuration of thresholds, object lists, and attributes allows detection logic to be adapted to a specific infrastructure without vendor support. This increases the effectiveness of the security monitoring center and reduces the time required to detect complex attacks.
Changes in Kaspersky Endpoint Security 12.11 for Windows
You can view the list of changes in Kaspersky Endpoint Security 12.11 for Windows in the Kaspersky Endpoint Security for Windows Online Help.
Changes in Kaspersky Endpoint Security 12.4.0 for Linux
You can view the list of changes in Kaspersky Endpoint Security 12.4.0 for Linux in the Kaspersky Endpoint Security for Linux Online Help.