KSC Open API
Kaspersky Security Center API description
List of report types

List of report types is presented below.

Type IDDisplay nameDescription
0Protection status report.Report contains information about the security application status on devices.
1Threats report.Report contains information about threats and virus activity on devices.
2Report on the most heavily infected devices.Top 10 most heavily infected devices.
3Key usage report.Report on status of keys on devices.
4Kaspersky software version report.Report on Kaspersky software versions.
5Database usage report.Kaspersky anti-virus database usage report.
6Errors report.Report on main errors in Kaspersky applications on devices.
7Network attack report.Report contains information about network attacks registered on devices.
8Incompatible applications report.Report on incompatible security applications installed on computers.
9Summary Report on Workstation and Windows Server protection applications.Summary Report on Installed Kaspersky Workstation and Windows Server protection applications.
10Summary Report on Mail System protection applications.Summary Report on Installed Kaspersky Mail System protection applications.
11Summary Report on Perimeter Defense applications.Summary Report on Installed Kaspersky Perimeter Defense applications.
12Summary Report on installed application types.Summary Report on installed Kaspersky application types.
13Report on users of infected devices.Report on users of the 10 most-infected devices.
14Report on installed applications.Report on all installed applications.
15Report on versions of Kaspersky software module updates.Report on versions of updates for software modules of Kaspersky applications installed on devices.
16Report on incidents.Report on incidents saved from client devices.
17Event report.Report on application events.
18Protection deployment report.Report on network deployment of Kaspersky protection components.
19Report on activity of distribution points.Report on statistics of distribution points.
20Secondary Administration Servers report.Report contains information on configuration of secondary Administration Servers.
21Report on hardware registry.Report contains information about the motherboard, CPU, RAM, and hard drives.
22Report on configuration changes.Report contains information about changes in the device configuration and any other devices connected.
23Report on applications registry history.Applications installation/removal report.
24Report on Device Control events.Report on connected devices detected by Device Control.
25Vulnerabilities report.Detected software vulnerabilities report.
26Report on blocked runs.Report contains information about blocked runs of executable files on networked devices.
27Web Control report.Report contains information about attempts to obtain access to web resources detected by Web Control.
28Report on encryption status of managed devices.Report displays the encryption statuses of managed devices.
29Report on encryption status of data storage devices.Report displays the encryption statuses of external devices and removable drives.
30Report on errors in the encryption of files and folders.Report on errors in the encryption of files and folders registered in Kaspersky applications on devices.
31Report on blockage of access to encrypted files.Report on blockage of access to encrypted files.
32Report on the status of groups of licensed applications.The report contains information about the current status of groups of licensed applications.
33Report on third-party software keys.Report contains information about existing third-party software keys.
34Hardware report.Report contains information about the equipment in the organization.
35Report on access rights for encrypted devices.Report displays statuses of accounts granted access to encrypted devices on computers.
36Report on device users.Rport displays the accounts of users who have accessed the devices.
37Software updates report.Software updates installation statistics report.
38Report on key usage by virtual server.Report on statistics of the use of keys by virtual Administration Servers.
39Report on rights.Specified user access rights to virtual and secondary Administration Servers, administration groups, tasks for specific devices, and reports.
40Report on effective user permissions.Rights of the user specified in the report properties that have been defined on the basis of the user’s membership in security groups and the roles assigned to this user.
41Report on device owners.Report contains information about device owners.
42Report on number of allowlisted devices.Report provides the details of allowlisted devices and real-time protection for all administration groups.
43Report on test-blocked runs.Report contains information about test-blocked runs of executable files on networked devices.
44Report on file operations on removable drives.File operations on removable drives.
45Top 10 devices that must be attended to.Report on File Integrity Monitor events and devices.
46Top 10 rules that must be attended to.Report on File Integrity Monitor events and rules.
47Report on results of update installation of third-party software.Report on statistical results of update installation of third-party software.
48Report on attacked controllers.Report provides details of detected attacks on programmable logic controllers (PLCs).
49Report on programmable logic controllers (PLCs) for integrity.Report provides the results of checking programmable logic controllers (PLCs) for integrity.
50Anti-virus database status report.Report informs you of the up-to-date status of Kaspersky anti-virus databases.
51Product components status report.Report contains information about the statuses of components installed/not installed on hosts in the network.
52Adaptive Security heuristic status report.Report informs you about operating status of Adaptive Security heuristics.
53Adaptive Security response report.Report informs you about the response of Adaptive Security heuristics.
54Distribution of EDR-agents on EDR-servers report.Report contains information about the EDR component.
55"NextGen" detection results report.Report on threats detected by "NextGen" components and technologies.
56List of used cloud services.List of cloud services used on managed devices.
57List of blocked cloud services.

List of cloud services blocked on managed devices.