|
KSC Open API
Kaspersky Security Center API description
|
List of report types is presented below.
| Type ID | Display name | Description |
|---|---|---|
| 0 | Protection status report. | Report contains information about the security application status on devices. |
| 1 | Threats report. | Report contains information about threats and virus activity on devices. |
| 2 | Report on the most heavily infected devices. | Top 10 most heavily infected devices. |
| 3 | Key usage report. | Report on status of keys on devices. |
| 4 | Kaspersky software version report. | Report on Kaspersky software versions. |
| 5 | Database usage report. | Kaspersky anti-virus database usage report. |
| 6 | Errors report. | Report on main errors in Kaspersky applications on devices. |
| 7 | Network attack report. | Report contains information about network attacks registered on devices. |
| 8 | Incompatible applications report. | Report on incompatible security applications installed on computers. |
| 9 | Summary Report on Workstation and Windows Server protection applications. | Summary Report on Installed Kaspersky Workstation and Windows Server protection applications. |
| 10 | Summary Report on Mail System protection applications. | Summary Report on Installed Kaspersky Mail System protection applications. |
| 11 | Summary Report on Perimeter Defense applications. | Summary Report on Installed Kaspersky Perimeter Defense applications. |
| 12 | Summary Report on installed application types. | Summary Report on installed Kaspersky application types. |
| 13 | Report on users of infected devices. | Report on users of the 10 most-infected devices. |
| 14 | Report on installed applications. | Report on all installed applications. |
| 15 | Report on versions of Kaspersky software module updates. | Report on versions of updates for software modules of Kaspersky applications installed on devices. |
| 16 | Report on incidents. | Report on incidents saved from client devices. |
| 17 | Event report. | Report on application events. |
| 18 | Protection deployment report. | Report on network deployment of Kaspersky protection components. |
| 19 | Report on activity of distribution points. | Report on statistics of distribution points. |
| 20 | Secondary Administration Servers report. | Report contains information on configuration of secondary Administration Servers. |
| 21 | Report on hardware registry. | Report contains information about the motherboard, CPU, RAM, and hard drives. |
| 22 | Report on configuration changes. | Report contains information about changes in the device configuration and any other devices connected. |
| 23 | Report on applications registry history. | Applications installation/removal report. |
| 24 | Report on Device Control events. | Report on connected devices detected by Device Control. |
| 25 | Vulnerabilities report. | Detected software vulnerabilities report. |
| 26 | Report on blocked runs. | Report contains information about blocked runs of executable files on networked devices. |
| 27 | Web Control report. | Report contains information about attempts to obtain access to web resources detected by Web Control. |
| 28 | Report on encryption status of managed devices. | Report displays the encryption statuses of managed devices. |
| 29 | Report on encryption status of data storage devices. | Report displays the encryption statuses of external devices and removable drives. |
| 30 | Report on errors in the encryption of files and folders. | Report on errors in the encryption of files and folders registered in Kaspersky applications on devices. |
| 31 | Report on blockage of access to encrypted files. | Report on blockage of access to encrypted files. |
| 32 | Report on the status of groups of licensed applications. | The report contains information about the current status of groups of licensed applications. |
| 33 | Report on third-party software keys. | Report contains information about existing third-party software keys. |
| 34 | Hardware report. | Report contains information about the equipment in the organization. |
| 35 | Report on access rights for encrypted devices. | Report displays statuses of accounts granted access to encrypted devices on computers. |
| 36 | Report on device users. | Rport displays the accounts of users who have accessed the devices. |
| 37 | Software updates report. | Software updates installation statistics report. |
| 38 | Report on key usage by virtual server. | Report on statistics of the use of keys by virtual Administration Servers. |
| 39 | Report on rights. | Specified user access rights to virtual and secondary Administration Servers, administration groups, tasks for specific devices, and reports. |
| 40 | Report on effective user permissions. | Rights of the user specified in the report properties that have been defined on the basis of the user’s membership in security groups and the roles assigned to this user. |
| 41 | Report on device owners. | Report contains information about device owners. |
| 42 | Report on number of allowlisted devices. | Report provides the details of allowlisted devices and real-time protection for all administration groups. |
| 43 | Report on test-blocked runs. | Report contains information about test-blocked runs of executable files on networked devices. |
| 44 | Report on file operations on removable drives. | File operations on removable drives. |
| 45 | Top 10 devices that must be attended to. | Report on File Integrity Monitor events and devices. |
| 46 | Top 10 rules that must be attended to. | Report on File Integrity Monitor events and rules. |
| 47 | Report on results of update installation of third-party software. | Report on statistical results of update installation of third-party software. |
| 48 | Report on attacked controllers. | Report provides details of detected attacks on programmable logic controllers (PLCs). |
| 49 | Report on programmable logic controllers (PLCs) for integrity. | Report provides the results of checking programmable logic controllers (PLCs) for integrity. |
| 50 | Anti-virus database status report. | Report informs you of the up-to-date status of Kaspersky anti-virus databases. |
| 51 | Product components status report. | Report contains information about the statuses of components installed/not installed on hosts in the network. |
| 52 | Adaptive Security heuristic status report. | Report informs you about operating status of Adaptive Security heuristics. |
| 53 | Adaptive Security response report. | Report informs you about the response of Adaptive Security heuristics. |
| 54 | Distribution of EDR-agents on EDR-servers report. | Report contains information about the EDR component. |
| 55 | "NextGen" detection results report. | Report on threats detected by "NextGen" components and technologies. |
| 56 | List of used cloud services. | List of cloud services used on managed devices. |
| 57 | List of blocked cloud services. | List of cloud services blocked on managed devices. |