Viewing the list of detections performed using Adaptive Anomaly Control rules
Expand all | Collapse all
To view the list of detections performed by Adaptive Anomaly Control rules:
- In the console tree, select the node of the Administration Server that you require.
- Select the Triggering of rules in Smart Training state subfolder (by default, this is a subfolder of Advanced → Repositories).
The list displays the following information about detections performed using Adaptive Anomaly Control rules:
- Administration group
The name of the administration group where the device belongs.
- Device name
The name of the client device where the rule was applied.
- Name
The name of the rule that was applied.
- Status
Excluding—If the Administrator processed this item and added it as an exclusion to the rules. This status remains till the next synchronization of the client device with the Administration Server; after the synchronization, the item disappears from the list.
Confirming—If the Administrator processed this item and confirmed it. This status remains till the next synchronization of the client device with the Administration Server; after the synchronization, the item disappears from the list.
Empty—If the Administrator did not process this item.
- Total times rules were triggered
The number of detects within one heuristic rule, one process and one client device. This number is counted by Kaspersky Endpoint Security.
- User name
The name of the client device user who run the process that generated the detect.
- Source process path
Path to the source process, i.e. to the process that performs the action (for more information, refer to the Kaspersky Endpoint Security help).
- Source process hash
SHA256 hash of the source process file (for more information, refer to the Kaspersky Endpoint Security help).
- Source object path
Path to the object that started the process (for more information, refer to the Kaspersky Endpoint Security help).
- Source object hash
SHA256 hash of the source file (for more information, refer to the Kaspersky Endpoint Security help).
- Target process path
Path to the target process (for more information, refer to the Kaspersky Endpoint Security help).
- Target process hash
SHA256 hash of the target file (for more information, refer to the Kaspersky Endpoint Security help).
- Target object path
Path to the target object (for more information, refer to the Kaspersky Endpoint Security help).
- Target object hash
SHA256 hash of the target file (for more information, refer to the Kaspersky Endpoint Security help).
- Processed
Date when the anomaly was detected.
To view properties of each information element:
- In the console tree, select the node of the Administration Server that you require.
- Select the Triggering of rules in Smart Training state subfolder (by default, this is a subfolder of Advanced → Repositories).
- In the Triggering of rules in Smart Training state workspace, select the object that you want.
- Do one of the following:
- Click the Properties link in the information box that appears on the right side of the screen.
- Right-click and in the context menu select Properties.
The properties window of the object opens, displaying information about the selected element.
You can confirm or add to exclusions any element in the list of detections of Adaptive Anomaly Control rules.
To confirm an element,
Select an element (or several elements) in the list of detections and click the Confirm button.
The status of the element(s) will be changed to Confirming.
Your confirmation will contribute to the statistics used by the rules (for more information, refer to Kaspersky Endpoint Security 11 for Windows Help).
To add an element as an exclusion,
Right-click an element (or several elements) in the list of detections and select Add to exclusions in the context menu.
The Add exclusion wizard starts. Follow the wizard instructions.
If you reject or confirm an element, it will be excluded from the list of detections after the next synchronization of the client device with the Administration Server, and will no longer appear in the list.
Page top