Scan for indicators of compromise (IOC)

An Indicator of Compromise (IOC) is a set of data about an object or activity that indicates unauthorized access to the computer (compromise of data). For example, many unsuccessful attempts to sign in to the system can constitute an Indicator of Compromise. The IOC Scan tasks allows finding Indicators of Compromise on the computer and take threat response measures.

Kaspersky Endpoint Security searches for indicators of compromise using IOC files IOC files are files containing the sets of indicators that the application tries to match to count a detection. IOC files must conform to the OpenIOC standard. Kaspersky Endpoint Security creates IOC files automatically and allows to load IOC files prepared by the user. If you want to add an indicator of compromise manually, please read the requirements for IOC files.

The file that you can download by clicking the link below, contains a table with the full list of IOC terms of the OpenIOC standard that are supported by the Kaspersky Endpoint Detection and Response solution.

DOWNLOAD THE IOC_TERMS.XLSX FILE

IOC Scan task run modes

Kaspersky Endpoint Security allows running the IOC Scan in the following modes:

Running the IOC Scan task

Kaspersky Sandbox may create IOC Scan tasks automatically when reacting to threats. In Kaspersky Endpoint Detection and Response Optimum, you can only create IOC Scan tasks manually.

You can create IOC Scan tasks manually:

You can configure the settings only in the Web Console.

To create standalone IOC Scan tasks for threat response, Kaspersky Security Center version 13.2 is required.

To create an IOC Scan task:

  1. In the main window of Web Console, select DevicesTasks.

    The list of tasks opens.

  2. Click the Add button.

    The Task Wizard starts.

  3. Configure the task settings:
    1. In the Application drop-down list, select Kaspersky Endpoint Security for Windows (11.7.0).
    2. In the Task type drop-down list, select IOC Scan.
    3. In the Task name field, enter a brief description.
    4. In the Select devices to which the task will be assigned section, select the task scope.
  4. Select devices according to the selected task scope option. Click the Next button.
  5. Enter the account credentials of the user whose rights you want to use to run the task. Click the Next button.

    By default, Kaspersky Endpoint Security starts the task as the system user account (SYSTEM).

    The system account (SYSTEM) does not have permission to perform the IOC Scan task on network drives. If you want to run the task for a network drive, select the account of a user that has access to that drive.

    For standalone IOC Scan tasks on network drives, in the task properties you need to manually select the user account that has access to this drive.

  6. Finish the wizard by clicking the Finish button.

    A new task will be displayed in the list of tasks.

  7. Click the new task.

    The task properties window opens.

  8. Select the Application settings tab.
  9. Go to the IOC scan settings section.
  10. Load the IOC files to search for indicators of compromise.

    After loading the IOC files, you can view the list of indicators from IOC files. If necessary, you can temporarily exclude IOC files from the scope of the task.

    Adding or removing IOC files after running the task is not recommended. This can cause the IOC scan results to display incorrectly for prior runs of the task. To search indicators of compromise by new IOC files, it is recommended to add new tasks.

  11. Configure actions on IOC detection:
    • Isolate computer from the network. If this option is selected, Kaspersky Endpoint Security isolates the computer from the network to prevent the threat from spreading. You can configure the duration of the isolation in Endpoint Detection and Response component settings.
    • Move copy to Quarantine, delete object. If this option is selected, Kaspersky Endpoint Security deletes the malicious object found on the computer. Before deleting the object, Kaspersky Endpoint Security creates a backup copy in case the object needs to be restored later. Kaspersky Endpoint Security moves the backup copy to Quarantine.
    • Run scan of critical areas. If this option is selected, Kaspersky Endpoint Security runs the Critical Areas Scan task. By default, Kaspersky Endpoint Security scans the kernel memory, running processes, and disk boot sectors.
  12. Go to the Advanced section.
  13. Select data types (IOC documents) that must be analyzed as part of the task.

    Kaspersky Endpoint Security automatically selects data types (IOC documents) for the IOC Scan task in accordance with the content of loaded IOC files. It is not recommended to deselect data types.

    You can additionally configure scan scopes for the following data types:

    • Files - FileItem. Set an IOC scan scope on the computer using preset scopes.

      By default, Kaspersky Endpoint Security scans for IOCs only in important areas of the computer, such as the Downloads folder, the desktop, the folder with temporary operating system files, etc. You can also manually add the scan scope.

    • Windows event log - EventLogItem. Enter the time period when the events were logged. You can also select Windows event logs for IOC scanning: the application event log, the system event log, and the security event log.

    For the data type Windows registry - RegistryItem Kaspersky Endpoint Security scans a set of registry keys.

  14. Click the Save button.
  15. Select the check box next to the task.
  16. Click the Run button.

As a result, Kaspersky Endpoint Security runs the search for indicators of compromise on the computer. You can view the results of the task in task properties in the Results section. You can view the information about detected indicators of compromise in the task properties: Application settingsIOC Scan Results.

IOC scan results are kept for 30 days. After this period, Kaspersky Endpoint Security automatically deletes the oldest entries.

Page top