Kaspersky Endpoint Security 12 for Linux

Data provided when using Kaspersky Anti Targeted Attack Platform

July 22, 2024

ID 277040

When integrating Kaspersky Endpoint Security with Kaspersky Endpoint Detection and Response (KATA), a component of the Kaspersky Anti Targeted Attack Platform solution, Kaspersky Endpoint Security stores the following internal information, which may contain personal and confidential data:

  • KATA server addresses
  • Public key of the certificate of the server for integrating with Kaspersky Endpoint Detection and Response (KATA)
  • Cryptocontainer with the client certificate for integrating with Kaspersky Endpoint Detection and Response (KATA)
  • Credentials for authenticating on the proxy server
  • Settings for the frequency of synchronization with the KATA server and settings for sending data to the KATA server
  • Status of the connection with the KATA server and information about client certificate and server certificate errors
  • Settings of tasks received from KATA servers:
    • Task start schedule settings
    • Names and passwords of accounts that must be used to start tasks
    • Versions of settings
    • Type of service start
    • Names of services
    • Command line (including arguments) used to start the process
    • MD5 and SHA256 hashes of objects
    • Paths to objects
    • IOC files
  • Isolation settings in accordance with which a device is blocked from connecting to other devices except those specified in the exclusions

When integrating Kaspersky Endpoint Security with Kaspersky Endpoint Detection and Response (KATA), Kaspersky Endpoint Security stores the following information and may send it to the KATA server:

  • Information for synchronization requests to the EDR (KATA) component:
    • Unique identifier
    • Base part of the server address
    • Device name
    • IP address of the device
    • MAC address of the device
    • Local time on the device
    • Name and version of the operating system installed on the device
    • Version of Kaspersky Endpoint Security
    • Release date of the application databases being used
    • License status
  • Information from requests to the EDR (KATA) component in task execution reports:
    • IP address of the device
    • Unique identifier
    • Base part of the server address
    • MAC address of the device
    • Task execution errors and return codes
    • Task completion statuses
    • Task completion time
    • Versions of task settings used
    • Information about processes started or stopped on the device at the server's request: PID and UniquePID, error code, MD5 and SHA256 checksums of objects
    • Files requested by the server
    • Information about errors while getting information about objects: full name of the object that was processed with an error; error code
    • Network isolation status
    • For IOCs, scan results are returned (whether each indicator was detected, objects found, and information about which branch of the indicator was detected).
    • For objects in which IOCs were detected, different values are returned depending on the type of indicator:
      • ArpEntry: IP address from the ARP table (including ipv6), physical address from the ARP table.
      • File: MD5 hash of the file, SHA256 hash of the file, full file name (including path), file size.
      • Port: remote IP address and port used to established a connection during scan; IP address and port of the local adapter; protocol type (TCP, UDP, IP, RAWIP).
      • Process: process name; process arguments; path to the process file; system PID of the process; system PID of the parent process; name of the user that started the process; date and time the process started.
      • SystemInfo: OS name; OS version; network name of the device without a domain; domain or workgroup.
      • User: user name.
  • Data in telemetry packets:
    • Information about files:
      • Unique ID of the file
      • File path
      • File name
      • File size
      • File attributes
      • Creation date and time of the file
      • Last modification date and time of the file
      • MD5 and SHA256 hashes of the object
      • Information (name and ID) about the user and group that own the file
    • Information about running processes:
      • Unique ID of the process file
      • Command line options that the process was started with
      • Process IDs
      • Session ID
      • Date and time when the process was started
      • Information (name and ID) about the user and group that started the process
    • Information about detected and processed threats:
      • Name of the detected threat and the technology that detected the threat, according to the Kaspersky classification.
      • Application database version
      • Web address from which the infected object was downloaded.
      • Threat processing status.
      • The reason why the threat cannot be eliminated.
      • Unique ID of the threat file
    • File modification data:
      • Unique ID of the modified file
      • Unique ID of the process that made the changes
      • Information about the modification
    • Data about changes in the system:
      • Unique ID of the process that made the changes
      • Information about the change that occurred
    • User logon information:
      • Session ID
      • User information (name and ID)
      • IP address of the device from which the session was established
    • Data about processes being terminated: unique ID of the process.

The information listed here can also be saved in trace files and dump.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.