An Indicator of Compromise (IOC) is a set of data about an object or activity that indicates unauthorized access to the computer (compromise of data). For example, many unsuccessful attempts to sign in to the system can constitute an Indicator of Compromise. The IOC Scan task allows finding Indicators of Compromise on the computer and taking threat response measures.
Kaspersky Endpoint Security searches for indicators of compromise using IOC files. IOC files are files containing the sets of indicators that the application tries to match to count a detection. IOC files must conform to the OpenIOC standard.
IOC Scan task run mode
Kaspersky Endpoint Detection and Response lets you create standard IOC Scan tasks to detect compromised data. Standard IOC scan task is a group or local task that is created and configured manually in the Web Console. Tasks are run using IOC files prepared by the user. If you want to add an indicator of compromise manually, please read the requirements for IOC files.
The file that you can download by clicking the link below, contains a table with the full list of IOC terms of the OpenIOC standard.
DOWNLOAD THE IOC_TERMS.XLSX FILE
Kaspersky Endpoint Security also supports stand-alone IOC scan tasks when the application is used as part of the Kaspersky Sandbox solution.
Creating IOC file
Starting with Kaspersky Endpoint Security 12.10 for Windows, you can create IOC files directly in the task settings. To create an IOC file, you must prepare a TXT file with a list of indicators of compromise. You can add lists of the following objects as indicators of compromise:
The application prepares an IOC file with a FileItem/Md5sum or FileItem/Sha256sum scan scope.
The application prepares an IOC file with a PortItem/RemoteIP scan scope.
The application prepares an IOC file with a DnsEntryItem/RecordName scan scope.
How to create IOC file in the Web Console
Creating an IOC Scan task
You can create IOC Scan tasks manually:
Alert Details is a tool for viewing the entirety of collected information about a detected threat. Alert details include, for example, the history of files appearing on the computer. For details about managing alert details, refer to the Kaspersky Endpoint Detection and Response Optimum Help and the Kaspersky Endpoint Detection and Response Expert Help.
You can configure the task for EDR Optimum in Web Console and Cloud Console. Task settings for EDR Expert are available only in Cloud Console.
To create a IOC Scan task:
The list of tasks opens.
The Task Wizard starts.
By default, Kaspersky Endpoint Security starts the task as the system user account (SYSTEM).
The system account (SYSTEM) does not have permission to perform the IOC Scan task on network drives. If you want to run the task for a network drive, select the account of a user that has access to that drive.
For standalone IOC Scan tasks on network drives, in the task properties you need to manually select the user account that has access to this drive.
A new task will be displayed in the list of tasks.
The task properties window opens.
After you upload the IOC files, the application displays summary information about the file, including the list of indicators that did not pass the check. After uploading IOC files, you can manually edit the files in the built-in editor directly in task properties. Kaspersky Endpoint Security supports editing IOC files that are compliant with the OpenIOC 1.1 standard. Editing OpenIOC 1.0 files is not possible.
Kaspersky Endpoint Security adds IOC files to the IOC collection. If necessary, you can temporarily exclude IOC files from the task scope.
Adding or removing IOC files after running the task is not recommended. This can cause the IOC scan results to display incorrectly for prior runs of the task. To search indicators of compromise by new IOC files, it is recommended to add new tasks.
If this check box is cleared, you can isolate the computer from the network after running the task manually. If the IOC Scan task detects an IOC, you can isolate the computer from the network directly from the IOC (properties of the IOC Scan → Application settings → IOC Scan results task). Kaspersky Endpoint Security also allows immediately managing additional settings: Network isolation disablement period and Network isolation exclusions.
If this check box is cleared, you can quarantine the file manually after running the task manually. If the IOC Scan task detects a file that can compromise data, you can quarantine this file directly from IOC Scan results (Application settings → IOC Scan results). As a result, Kaspersky Endpoint Security starts the task creation wizard with preset data of the detected file. You only need to manage additional task settings, for example, set up the task schedule.
Kaspersky Endpoint Security automatically selects data types (IOC documents) for the IOC Scan task in accordance with the content of loaded IOC files. It is not recommended to deselect data types.
You can additionally configure scan scopes for the following data types:
By default, Kaspersky Endpoint Security scans for IOCs only in important areas of the computer, such as the Downloads folder, the desktop, the folder with temporary operating system files, etc. You can also manually add the scan scope.
By default, Kaspersky Endpoint Security scans a set of registry keys.
Wake-on-LAN is not available for this task. Make sure the computer is turned on to run the task.
As a result, Kaspersky Endpoint Security runs the search for indicators of compromise on the computer. You can view the results of the task in task properties in the Results section. You can view the information about detected indicators of compromise in the task properties: Application settings → IOC Scan results. In IOC Scan results, you can also manually quarantine the detected file or isolate the computer from the network.
IOC scan results are kept for 30 days. After this period, Kaspersky Endpoint Security automatically deletes the oldest entries.
Page top