Kaspersky Anti Targeted Attack Platform resources provide no capability to restrict the rights of the users of servers and operating systems to which the Central Node component is installed. The administrator is advised to use any system resources at their own discretion to control how the users of servers and operating systems with the application installed may be granted access to the personal data of other users.
Service data of Kaspersky Anti Targeted Attack Platform include:
The above data is stored indefinitely on the server hosting the Central Node component in the / data
directory if the Central Node component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers indefinitely.
OS log files are stored indefinitely in the /var/log
directory on the server hosting the Central Node component.
The log file is stored indefinitely in the /data
directory on the server hosting the Central Node component, if the component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers indefinitely.
Files are stored on the server hosting the Central Node component in the /data
directory if the component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers. The data is retained until the scan is completed.
Files are stored on the server hosting the Central Node component in the /data
directory if the component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers. Data is rotated when disk space becomes full.
Files are stored indefinitely in the /data
directory on the server hosting the Central Node component, if the component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers indefinitely.
Files are stored indefinitely on the server hosting the Central Node component in the /data
directory if the component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers indefinitely.
Files are stored on the server hosting the Central Node component in the /data
directory if the component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers. Data is rotated when disk space becomes full.
Files are stored on the server hosting the Central Node component in the /data
directory if the component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers. Data is rotated when disk space becomes full.
Files are stored indefinitely in the /data
directory on the server hosting the Central Node, PCN, SCN, Sensor component or on the computer with the Endpoint Agent component.
Files are stored indefinitely in the /data
directory on the server hosting the Central Node, PCN, SCN, Sensor component or on the computer with the Endpoint Agent component.
Files are stored in storage mounted on the server with the Sensor component. Data is deleted as disk space becomes full.
Files are stored indefinitely on the server hosting the Central Node component in the /data
directory if the component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers indefinitely.
The application stores the following information about user accounts:
The application stores the following information about computers connected to the Central Node component on which the Endpoint Agent component is installed:
The application stores the following information about the prevention rules:
The application stores the following information about tasks assigned to computers with the Endpoint Agent component:
The application stores the following information about TAA (IOA) user-defined rules:
The application stores the following information about IDS user-defined rules:
The application stores the following information about IOC user-defined rules:
The application stores the following information about YARA user-defined rules:
The application stores the following information about network isolation rules:
The application stores the following information about scan exclusions:
The application stores the following information about report templates:
The application stores the following information about Endpoint Agent component certificates:
The application stores the following information about Sandbox scan rules:
The application stores the following information about the virtual machine configuration: