Kaspersky Unified Monitoring and Analysis Platform introduces the following features and improvements:
- KUMA now also supports the following operating systems:
- Ubuntu 22.04 LTS
- Oracle® Linux 9.4
- Astra Linux 1.7.5
- RED OS 7, 8.
- Starting with version 3.2.x, the password complexity requirements have been updated. The password must be at least 16 characters long, contain at least one alphabetic and one numeric character, and may not contain three or more identical characters in a row. The new requirements apply only to new installations. In existing KUMA installations, the requirements apply only to new users. For existing users, the requirements are applied only when the password is changed.
- In the KUMA web console, in the Active services section, the Core service is displayed as core-1. In the operating system of the Core server, the kuma-core.service is now named kuma-core 00000000-0000-0000-0000-000000000000.service.
- Added the Event router service. This service lets you receive events from collectors and send events to specified destinations in accordance with the filters configured for the service. An intermediate service like this enables effective load balancing between links and lets you use low-bandwidth links. For example, as shown in the diagram in the expandable section, instead of sending events as multiple streams from collector 5 to the destinations, you can send events as one stream: in the diagram, collector 1 + collector 2 + collector 3 send events to the router of the local office, then to the router of the data center, and from there the events are finally sent to the specified destinations.
Diagram of event transmission with and without an event router
- NCIRCC integration — updated list of fields and incident types, added the ability to submit information about personal data leaks. Exported incidents with an old type that is no longer supported are displayed correctly.
- Grouping by arbitrary fields, using time rounding functions from the event interface.
When conducting an investigation, you need to get selections of events and build aggregation queries. Now you can run aggregation queries simply by selecting one or more fields you want to group by and doing Run query. Aggregation queries with time rounding are available for fields of the Date type.
As a result, you can see both the groups and the grouped events without rewriting the search query. You can navigate the groups, flip through the lists of events included in the group, and view the fields of event, which makes your job easier and lets you get your result quicker when investigating.
- Now you convert a source field using an information entropy calculation function. In the collector, you can configure an enrichment rule for a source field of the event type, select the entropy conversion type, and specify a target field of the float type in which you want KUMA to place the conversion result. The result of the conversion is a number. Calculating the information entropy allows detecting DNS tunnels or compromised passwords, for example, when a user enters the password instead of the login and this password gets logged in plain text. Typically, a login consists of alphabetic characters, and the conversion calculates the information entropy and returns, for example, 2.5416789. If the user mistakenly enters the password in the login field and so the password ends up in the log as plain text, KUMA calculates the information entropy and outputs 4, because a password containing letters, numerals and special characters has a higher entropy. In this way, you can find events in which the user name has an entropy more than 3, and trigger a "Password change required" rule in such cases. After configuring enrichment in the collector, you must update the settings to apply the changes.
- You can search for events in multiple selected storages simultaneously using a simple query. For example, you can find events to determine where a user account is being blocked or which IP addresses were used to log in to which URLs.
Some installations may require using multiple separate storages, for example, in cases of low-bandwidth links, or regulatory requirements to store events in a certain country. Federated search allows running a search query on multiple storage clusters simultaneously and getting the result as one combined table. Finding events in distributed storage clusters is now quicker and easier. The combined table of events indicates the storage in which a record was found. Group queries, retroscan, or export to TSV are not supported when searching in multiple clusters.
- Coverage of a MITRE ATT&CK matrix by rules
When developing detection logic, an analyst can be guided by the mapping of content to real-world threats. You can use MITRE ATT&CK matrices to find out the techniques to which your organization's resources are vulnerable. As an aid to analysts, we developed a tool that allows visualizing the coverage of a MITRE ATT&CK matrix by the rules you have developed and thus assessing the level of security.
The functionality lets you:
- Import an up-to-date file with the list of techniques and tactics into KUMA.
- Specify the techniques and tactics detected by a rule in its properties.
- Export from KUMA a list of rules marked up in accordance with a matrix to the MITRE ATT&CK Navigator (you can specify individual folders with rules).
The file with the list of marked up rules is displayed in the MITRE ATT&CK Navigator.
- Reading files by the Windows agent.
The KUMA agent installed on Windows systems can now read text files and send data to the KUMA collector. The same agent installed on a Windows server can send data both from Windows logs and from text files with logs. For example, you no longer need to use shared folders to get Exchange Server transport logs or IIS logs.
- Getting DNS Analytics logs using the etw connector.
The new ETW (Event Tracing for Windows) transport used by the Windows agent for reading a DNS Analytics subscription allows getting an extended DNS log, diagnostics events, and analytical information about the operation of the DNS server, which is more information than the DNS debug log provides, and with less impact on DNS server performance.
Recommended configuration for reading ETW logs:
- If no agent is installed on the server that is the source of DNS Analytics logs, create a new collector and a new agent:
- Create an etw connector. The agent is created automatically.
- Create a dedicated collector for ETW logs. In the collector installation wizard, specify the etw connector and the [OOTB] Microsoft DNS ETW logs json normalizer.
- Install the collector and the agent.
- If the WEC agent is already installed on the server that is the source of DNS Analytics logs, create a collector and edit the settings of the manually created agent:
- Create a collector with an http transport and \0 as the delimiter; specify the [OOTB] Microsoft DNS ETW logs json normalizer.
- Save collector settings.
- Install the collector.
- In the existing WEC agent, add an ETW configuration and in it, specify the following:
- The etw connector
- Specify the collector created at step "a." as the destination.
- Select http as the destination type and \0 as the delimiter.
- Save agent settings and start the agent.
- CyberTrace enrichment over the API.
Cybertrace-http is a new streaming event enrichment type in CyberTrace that allows you to send a large number of events with a single request to the CyberTrace API. We recommend using this enrichment type for systems with a lot of events. Cybertrace-http significantly outperforms the previous 'cybertrace' type, which is still available in KUMA for backward compatibility.
- Activation with a code.
Now you can activate KUMA using an activation code. With this method, you do not need to worry about importing new keys into KUMA when renewing or reconfiguring your license. To activate using a code, your Core server needs access to several servers on the internet. You can still use the old activation method with a license file.
- Optimized transmission of events in CEF format. Transmitted events include the CEF header and only non-empty fields. When events are sent to third-party systems in CEF format, empty fields are not transmitted.
- Events can now be received from ClickHouse using the SQL connector. In the SQL connector settings, you can select the Database type for the connection. In this case, the prefix corresponding to the protocol is automatically specified in the URL field.
- The 'file', '1c-log', and '1c-xml' connectors now have the 'Poll interval, ms' setting, which sets the interval for reading files from the directory. Adjusting this setting can reduce CPU and RAM consumption.
- The '
airgap
' parameter was removed from the inventory file. If your inventory file still contains the 'airgap
' parameter, the installer ignores it during installation or update. - Secrets of the URL and Proxy types no longer contain the login and password. Added the ability to transform the password.
- Fields containing a value in addition to the key have been added to service events about an entry dropping out of the active sheet and context table. Fields with values provide more flexibility in writing correlation rules for processing such service events.
A context table record drops out if a nonzero value is specified for the record retention time in the context table configuration.
When a record becomes out of date, an event is generated inside the correlator, which is "looped back" to the input of the correlator. This event is not sent to the storage.
If the corresponding correlation rule is configured, a correlation event and an alert can be created based on this event. Such a correlation event is what is sent to the storage and displayed in the Events section.
- Added the service monitoring functionality.
A user with the General administrator role can configure thresholds for monitored parameters for all types of services except agents and cold storage. If the specified thresholds are exceeded, KUMA generates an audit event, sends a notification email message to the user with the General administrator role, and the service is displayed in the Active services section with a yellow status. A yellow status means that the service is running, but there are errors. You can view the error message by clicking the yellow status icon, and you can take steps to correct the operation of the service.
- The list of statuses for services has been updated: the purple status has been added, and the yellow status is used more broadly.
- Now you can go from the 'Source status' section to the events of the selected event source. Qualifying conditions in the search query string are generated automatically after clicking the link. By default, events are displayed for the last 5 minutes. If necessary, you can change the time interval and repeat the query.
- Collecting metrics from the agent.
The Metrics section now has a subsection where the performance of the agent is visualized. This graphical view helps administrators who are responsible for collecting events using agents. Metrics for agents are available after upgrading the agents to version 3.2.x.
- Added support for the compact embedded SQLite 3.37.2 database management system.
- Added the 'elastic' connector for receiving events from Elasticsearch versions 7 and 8. A fingerprint secret has been added for the connector.
- For connectors of the tcp, udp, and file types, the following auditd event processing options have been added:
- The Auditd toggle switch allows grouping auditd event lines received from the connector into an auditd event.
- The Event buffer TTL field allows specifying the lifetime of the auditd event line buffer in milliseconds.
- Now you can configure a list of fields for event source identification. DeviceProduct, DeviceHostName, DeviceAddress, DeviceProcessName is the set of fields used by default for identifying event sources. Now you can redefine the list of fields and their order. You can specify up to 9 fields in a sequence that is meaningful to the user. After saving changes to the set of fields, previously identified event sources are deleted from the KUMA web interface and from the database. You can still use a set of fields for default event source identification.
- Added the iLike operator to the event search query graphical builder.
- Updated the list of REST API methods. Description of v2.1 methods is available in OpenAPI format.
- The parameters of the snmp-trap connector now include an additional parameter that allows you to specify an OID that is a MAC address.
- The KUMA installer checks the status of SELinux.
- Creating a backup copy of the Core using the "/opt/kaspersky/kuma/kuma tools backup" command line utility is no longer supported
- Certain obsolete normalizers are no longer supported or provided:
- [Deprecated][OOTB] Microsoft SQL Server xml
- [Deprecated][OOTB] Windows Basic
- [Deprecated][OOTB] Windows Extended v.0.3
- [Deprecated][OOTB] Cisco ASA Extended v 0.1
- [Deprecated][OOTB] Cisco Basic