Endpoint Detection and Response

Kaspersky Endpoint Security 11.7.0 now has a built-in agent for the Kaspersky Endpoint Detection and Response Optimum solution (hereinafter also "EDR Optimum"). Kaspersky Endpoint Security 11.8.0 now has a built-in agent for the Kaspersky Endpoint Detection and Response Expert solution (hereinafter also "EDR Expert"). Kaspersky Endpoint Detection and Response is a range of solutions for protecting the corporate IT infrastructure from advanced cyber threats. The functionality of the solutions combines automatic detection of threats with the ability to react to these threats to counteract advanced attacks including new exploits, ransomware, fileless attacks, as well as methods using legitimate system tools. EDR Expert offers more threat monitoring and response functionality than EDR Optimum. For details about the solutions, see the Kaspersky Endpoint Detection and Response Optimum Help and the Kaspersky Endpoint Detection and Response Expert Help.

Kaspersky Endpoint Detection and Response reviews and analyses threat development and provides security personnel or the Administrator with information about the potential attack that is necessary for a timely response. Kaspersky Endpoint Detection and Response displays alert details in a separate window. Alert Details is a tool for viewing the entirety of collected information about a detected threat. Alert details include, for example, the history of files appearing on the computer. For details about managing alert details, refer to the Kaspersky Endpoint Detection and Response Optimum Help and the Kaspersky Endpoint Detection and Response Expert Help.

Kaspersky Endpoint Detection and Response uses the following Threat Intelligence tools:

In this Help section

Integration with Kaspersky Endpoint Detection and Response

Migration from Kaspersky Endpoint Agent

Scan for indicators of compromise (standard task)

Move file to Quarantine

Get file

Delete file

Process start

Terminate process

Execution prevention

Computer network isolation

Cloud Sandbox

Appendix 1. Supported file extensions for Execution prevention

Appendix 2. Supported script interpreters

Appendix 3. IOC scan scope in the registry (RegistryItem)

Appendix 4. IOC file requirements

Page top