Kaspersky Endpoint Agent

Configuring the integration of Kaspersky Endpoint Agent with Kaspersky Sandbox

November 17, 2023

ID 200213

Configuring the integration of Kaspersky Endpoint Agent with Kaspersky Sandbox is not available in Kaspersky Security Center Cloud Console interface.

This section contains information on configuring the integration of Kaspersky Endpoint Agent with Kaspersky Sandbox. Integration must be configured both on Kaspersky Endpoint Agent's side using the Kaspersky Security Center Web Console, and on Kaspersky Sandbox's side using the web interface.

See also

Opening Kaspersky Endpoint Agent settings window

Configuring Kaspersky Endpoint Agent security settings

Configuring Kaspersky Endpoint Agent connection settings to a proxy server

Configuring Kaspersky Security Center as a proxy server for Kaspersky Endpoint Agent activation

Configure network isolation settings

Configuring Kaspersky Endpoint Agent policy type

Configuring KSN usage in Kaspersky Endpoint Agent

Configuring general settings for integration with telemetry collection servers

Configuring integration between Kaspersky Endpoint Agent and KATA Central Node

Configuring integration between Kaspersky Endpoint Agent and Kaspersky Industrial CyberSecurity for Networks

Configuring integration between Kaspersky Endpoint Agent and a SIEM system.

Configuring integration between Kaspersky Endpoint Agent and Kaspersky Managed Detection and Response

Configuring EDR telemetry settings

Configuring Execution prevention settings

Configuring storage settings in Kaspersky Endpoint Agent

Configuring failure diagnosis

In this Help section

Enabling and disabling integration with Kaspersky Sandbox

Configuring trusted connection on Kaspersky Endpoint Agent side

Adding Kaspersky Sandbox servers to Kaspersky Endpoint Agent list

Configuring the response timeout of Kaspersky Sandbox and request queue settings

Configuring Threat Response actions of Kaspersky Endpoint Agent to respond to threats detected by Kaspersky Sandbox

Enabling detection of legitimate applications that can be used by cybercriminals

Configuring IOC Scan tasks start

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.