KSC Open API
Kaspersky Security Center API description
|
List of report types is presented below.
Type ID | Display name | Description |
---|---|---|
0 | Protection status report. | Report contains information about the security application status on devices. |
1 | Threats report. | Report contains information about threats and virus activity on devices. |
2 | Report on the most heavily infected devices. | Top 10 most heavily infected devices. |
3 | Key usage report. | Report on status of keys on devices. |
4 | Kaspersky software version report. | Report on Kaspersky software versions. |
5 | Database usage report. | Kaspersky anti-virus database usage report. |
6 | Errors report. | Report on main errors in Kaspersky applications on devices. |
7 | Network attack report. | Report contains information about network attacks registered on devices. |
8 | Incompatible applications report. | Report on incompatible security applications installed on computers. |
9 | Summary Report on Workstation and Windows Server protection applications. | Summary Report on Installed Kaspersky Workstation and Windows Server protection applications. |
10 | Summary Report on Mail System protection applications. | Summary Report on Installed Kaspersky Mail System protection applications. |
11 | Summary Report on Perimeter Defense applications. | Summary Report on Installed Kaspersky Perimeter Defense applications. |
12 | Summary Report on installed application types. | Summary Report on installed Kaspersky application types. |
13 | Report on users of infected devices. | Report on users of the 10 most-infected devices. |
14 | Report on installed applications. | Report on all installed applications. |
15 | Report on versions of Kaspersky software module updates. | Report on versions of updates for software modules of Kaspersky applications installed on devices. |
16 | Report on incidents. | Report on incidents saved from client devices. |
17 | Event report. | Report on application events. |
18 | Protection deployment report. | Report on network deployment of Kaspersky protection components. |
19 | Report on activity of distribution points. | Report on statistics of distribution points. |
20 | Secondary Administration Servers report. | Report contains information on configuration of secondary Administration Servers. |
21 | Report on hardware registry. | Report contains information about the motherboard, CPU, RAM, and hard drives. |
22 | Report on configuration changes. | Report contains information about changes in the device configuration and any other devices connected. |
23 | Report on applications registry history. | Applications installation/removal report. |
24 | Report on Device Control events. | Report on connected devices detected by Device Control. |
25 | Vulnerabilities report. | Detected software vulnerabilities report. |
26 | Report on blocked runs. | Report contains information about blocked runs of executable files on networked devices. |
27 | Web Control report. | Report contains information about attempts to obtain access to web resources detected by Web Control. |
28 | Report on encryption status of managed devices. | Report displays the encryption statuses of managed devices. |
29 | Report on encryption status of data storage devices. | Report displays the encryption statuses of external devices and removable drives. |
30 | Report on errors in the encryption of files and folders. | Report on errors in the encryption of files and folders registered in Kaspersky applications on devices. |
31 | Report on blockage of access to encrypted files. | Report on blockage of access to encrypted files. |
32 | Report on the status of groups of licensed applications. | The report contains information about the current status of groups of licensed applications. |
33 | Report on third-party software keys. | Report contains information about existing third-party software keys. |
34 | Hardware report. | Report contains information about the equipment in the organization. |
35 | Report on access rights for encrypted devices. | Report displays statuses of accounts granted access to encrypted devices on computers. |
36 | Report on device users. | Rport displays the accounts of users who have accessed the devices. |
37 | Software updates report. | Software updates installation statistics report. |
38 | Report on key usage by virtual server. | Report on statistics of the use of keys by virtual Administration Servers. |
39 | Report on rights. | Specified user access rights to virtual and secondary Administration Servers, administration groups, tasks for specific devices, and reports. |
40 | Report on effective user permissions. | Rights of the user specified in the report properties that have been defined on the basis of the user’s membership in security groups and the roles assigned to this user. |
41 | Report on device owners. | Report contains information about device owners. |
42 | Report on number of allowlisted devices. | Report provides the details of allowlisted devices and real-time protection for all administration groups. |
43 | Report on test-blocked runs. | Report contains information about test-blocked runs of executable files on networked devices. |
44 | Report on file operations on removable drives. | File operations on removable drives. |
45 | Top 10 devices that must be attended to. | Report on File Integrity Monitor events and devices. |
46 | Top 10 rules that must be attended to. | Report on File Integrity Monitor events and rules. |
47 | Report on results of update installation of third-party software. | Report on statistical results of update installation of third-party software. |
48 | Report on attacked controllers. | Report provides details of detected attacks on programmable logic controllers (PLCs). |
49 | Report on programmable logic controllers (PLCs) for integrity. | Report provides the results of checking programmable logic controllers (PLCs) for integrity. |
50 | Anti-virus database status report. | Report informs you of the up-to-date status of Kaspersky anti-virus databases. |
51 | Product components status report. | Report contains information about the statuses of components installed/not installed on hosts in the network. |
52 | Adaptive Security heuristic status report. | Report informs you about operating status of Adaptive Security heuristics. |
53 | Adaptive Security response report. | Report informs you about the response of Adaptive Security heuristics. |
54 | Distribution of EDR-agents on EDR-servers report. | Report contains information about the EDR component. |
55 | "NextGen" detection results report. | Report on threats detected by "NextGen" components and technologies. |
56 | List of used cloud services. | List of cloud services used on managed devices. |
57 | List of blocked cloud services. | List of cloud services blocked on managed devices. |