In the window of the application web interface, select the Custom rules section, IOC subsection.
This opens the table of IOC files.
Select the IOC file for which you want to view information.
This opens a window containing information about the IOC file.
The window contains the following information:
Clicking the Find alerts link opens the Alerts section with the filter condition populated with the name of your selected IOC file.
Clicking the Find events link opens the Threat Hunting section with the search condition populated with indicators of compromise of your selected IOC file.
Clicking the Download link opens the IOC file download window.
Autoscan—The IOC file is used when automatically scanning hosts with the Endpoint Agent component.
Name—Name of the IOC file.
Importance—Importance level that must be assigned to an alert generated using this IOC file.
The importance level can have one of the following values:
– Low importance.
– Medium importance.
– High importance.
Apply to—Displays the name of the tenant and the names of servers associated with events scanned based on this IOC file (in distributed solution and multitenancy mode).
Operation mode in which Kaspersky Anti Targeted Attack Platform is used to protect the infrastructure of multiple organizations or branch offices of the same organization simultaneously.
Two-level hierarchy of servers with Central Node components installed. This hierarchy allocates a primary control server (Primary Central Node (PCN)) and secondary servers (Secondary Central Nodes (SCN)).