Responding through KATA/KEDR

Expand all | Collapse all

After you configure integration between Kaspersky XDR Expert and Kaspersky Anti Targeted Attack Platform, you can perform response actions on a device or with a file hash in one of the following ways:

You can also configure the response action to run automatically when creating or editing a playbook.

To perform response actions through Kaspersky Anti Targeted Attack Platform, you must have of the following XDR roles: Main administrator, Tenant administrator, Junior analyst, Tier 1 analyst, Tier 2 analyst.

To perform a response action through Kaspersky Anti Targeted Attack Platform:

  1. In the main menu, go to the Monitoring & reporting section, and then select the Alerts or Incidents section.

    If you want to respond from an investigation graph, select the Incidents section.

    If you want to respond from the event details, select the Alerts section.

  2. Click the ID of the required alert or incident.
  3. In the window that opens, do one of the following:
    • If you want to respond through the alert or incident details, go to the Assets tab, and then select check box next to the required device.

      You can select several devices, if necessary.

    • If you want to respond through the event details, go to the Details tab, select the required file hash, click the Add prevention rule button, and then select the device for which you want to add the prevention rule.

      You can also go to the Observables tab, select check box next to the file hash that you want to block, and then click the Add prevention rule button.

    • If you want to respond through the device details, go to the Assets tab, click the name of the required device, and then in the drop-down list, select View properties.
    • If you want to respond through an investigation graph, click the View on graph button. In the investigation graph that opens, click the device name to open the device details.
  4. In the Select response actions drop-down list, select the response action that you want to perform:
    • Enable network isolation

      If you select this response action for a device on which network isolation is already enabled, the parameters are overwritten with new values.

      After you select this response action, you must configure the necessary settings in the window that opens on the right side of the screen.

    • Disable network isolation

      You can select this response action for devices on which network isolation is enabled.

    • Run executable file

      The executable file is always run on behalf of the system and must be available on the device before you start the response action.

      After you select this response action, you must configure the necessary settings in the window that opens on the right side of the screen.

    • Add prevention rule

      After you select this response action, you must configure the necessary settings in the window that opens on the right side of the screen.

    • Delete prevention rule

      You can select this response action for devices on which the prevention rule was applied.

    All of the listed response actions are available on devices that use Kaspersky Endpoint Agent for Windows or Kaspersky Endpoint Security for Windows in the role of the Endpoint Agent component. On devices with Kaspersky Endpoint Agent for Linux and Kaspersky Endpoint Security for Linux, the only available response action is Run executable file.

  5. In the window that opens, set the necessary parameters for the response action you selected at step 4:
    • For network isolation
    • For running executable file
    • For adding prevention rule

If the response action is completed successfully, an appropriate message is displayed on the screen. Otherwise, an error message is displayed.

Page top