An indicator of compromise (IOC) is a set of data about an object or activity that indicates unauthorized access to the device (data compromise). For example, repeated unsuccessful attempts to sign in to the system may constitute an indicator of compromise. The IOC Scan task lets you detect indicators of compromise on the device and perform threat response actions.
IOC files are used to search for IOCs. IOC files contain a set of indicators that are compared to the indicators of an event. If the compared indicators match, the EPP application considers the event to be alert. IOC files must conform to the OpenIOC standard.
Kaspersky Endpoint Detection and Response Optimum lets you create and manually configure group and local IOC Scan tasks in Kaspersky Security Center Web Console and Cloud Console. IOC files that you have prepared are used to run the tasks.
When an IOC is detected on a device, Kaspersky Endpoint Detection and Response Optimum performs the specified response action. The following response actions are available for detected IOCs:
You can create a task manually from the alert details window, in Kaspersky Endpoint Security for Windows or in Kaspersky Endpoint Agent.
For details on how to run IOC Scan tasks, refer to the Kaspersky Endpoint Security for Windows Help, Kaspersky Endpoint Security for Mac Help, Kaspersky Endpoint Security for Linux Help, and Kaspersky Endpoint Agent Help.
Page top