KL 038.4 Part 5 Kea 0.7.en
KL 038.4 Part 5 Kea 0.7.en
KL 038.4
Kaspersky
Industrial
CyberSecurity
Part V.
Kaspersky Endpoint Agent
Student guide
1
KL 038.4: Kaspersky Industrial CyberSecurity.
Part V. Kaspersky Endpoint Agent
ed
Table of contents
ut
1. How Kaspersky Endpoint Agent works .................................................................................. 3
1.1 What is Kaspersky Endpoint Agent? ................................................................................................4
ib
1.2 Hardware and software requirements ..............................................................................................6
r
2.1 How to respond to an alert ...............................................................................................................7
st
2.2 Configuring the display of detection events in Kaspersky Security Center ......................................9
Configure the report on threats ........................................................................................................9
Enable display of the list of alerts ...................................................................................................10
di
Which technologies and tasks create an incident card? ................................................................10
2.3 Alert details .....................................................................................................................................11
Information about the detected object ............................................................................................12
re
Information about the created files .................................................................................................13
Information about injections and network connections ..................................................................14
Information about the created keys and registry changes .............................................................15
Information about the parent process.............................................................................................16
or
2.4 Threat containment.........................................................................................................................17
Isolate the host ...............................................................................................................................17
How to disable host isolation ..........................................................................................................18
Prevent execution ...........................................................................................................................19
What Execution Prevention does ...................................................................................................21
d
2
KL 038.4: Kaspersky Industrial CyberSecurity.
Part V. Kaspersky Endpoint Agent
ed
1. How Kaspersky Endpoint Agent works
ut
Kaspersky Industrial CyberSecurity for Nodes protects nodes against cybersecurity threats, but it only
ib
shows that a malicious object was detected and indicates the actions that were or were not taken on the
malicious object.
r
An analyst cannot use this information to detect the specific attack vector and determine the point where
the attack was blocked by the security application.
st
For example, the analyst might see that Kaspersky Industrial CyberSecurity for Nodes has detected and
blocked an encryption attempt. The analyst can use the event to find out which application encrypted the
di
data, but cannot find out whether or not the encryption was a legitimate operation, and cannot track the
entire chain of events that preceded the encryption attempt.
As a result, even if a threat has been detected and blocked, the analyst cannot be fully confident that
re
everything is all right in the system, i.e. that the attack is completely neutralized, all its consequences
have been eliminated, there are no unauthorized changes in the operating systems or applications, and
no data has leaked.
To analyze the cause of an incident, we need an application that will gather the event’s extended context.
or
An event’s extended context refers to additional information surrounding the detection of the threat, such
as:
— Process start events or process termination events
— Events involving the establishment of outbound connections
d
— Object name
co
be
t to
No
3
KL 038.4: Kaspersky Industrial CyberSecurity. 1. How Kaspersky Endpoint Agent works
Part V. Kaspersky Endpoint Agent
ed
ut
r ib
st
di
re
or
Kaspersky Endpoint Agent is an application that is installed on individual nodes and gathers telemetry
d
All telemetry gathered by Kaspersky Endpoint Agent can be forwarded to Kaspersky Industrial
co
4
KL 038.4: Kaspersky Industrial CyberSecurity. 1. How Kaspersky Endpoint Agent works
Part V. Kaspersky Endpoint Agent
ed
ut
r ib
st
di
re
or
When integrated with Kaspersky Industrial CyberSecurity for Nodes and managed by Kaspersky Security
Center, Kaspersky Endpoint Agent provides EDR (Endpoint Detection & Response) functionality.
Kaspersky Endpoint Agent, Kaspersky Industrial CyberSecurity for Nodes, and Kaspersky Security
Center constitute the Kaspersky Industrial CyberSecurity Endpoint Detection and Response
d
solution.
— Gathers additional information about the detection of a threat. The administrator and analyst can
pi
analyze this information, which is presented as an incident card, through the Kaspersky Security
Center Web Console. This helps clarify what was happening on the endpoint device before the
detection event occurred, and whether additional response measures should be taken.
co
can create IoCs based on data obtained from telemetry, or use external resources that publish
information about IoCs (for example, securelist.com or other public sources).
— IoC Scan tasks let you configure automatic response actions that Kaspersky Endpoint Agent will
perform if it detects indicators of compromise.
to
— Run an additional scan of the computer using Kaspersky Industrial CyberSecurity for Nodes
— Quarantine a file
— Isolate the computer from the network
— Conduct a security audit of nodes based on OVAL rules.
t
The administrator can manage Kaspersky Endpoint Agent only using Kaspersky Security Center Web
Console.
No
5
KL 038.4: Kaspersky Industrial CyberSecurity. 1. How Kaspersky Endpoint Agent works
Part V. Kaspersky Endpoint Agent
The following Kaspersky application versions support Kaspersky Industrial CyberSecurity Endpoint
ed
Detection and Response:
— Kaspersky Industrial CyberSecurity for Nodes 3.1
— Kaspersky Endpoint Agent 3.13 or later
ut
— Kaspersky Security Center Windows 12.1 or later – full support of Kaspersky Industrial
CyberSecurity Endpoint Detection and Response functionality
ib
1.2 Hardware and software requirements
r
st
di
re
or
d e
pi
co
be
to
You can find the complete hardware and software requirements in the online product help at
https://support.kaspersky.com/KEA/3.14/en-US/193103.htm.
t
No
6
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
2. Incident response
ed
ut
2.1 How to respond to an alert
r ib
st
di
re
or
d
This is a general plan. In practice, each organization must have its own plans and scenarios for handling
security incidents.
e
Kaspersky Endpoint Agent forwards telemetry to Kaspersky Security Center. In Kaspersky Security
Center, an extended context is provided as an incident card and as description of all detected interactions
pi
between malware and the system. In Kaspersky Security Center, the extended context is referred to as
alert details.
co
importance, prepare a plan of action, and assign a specialist or a team to investigate and respond
to the incident.
7
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
ed
— Terminate malware processes.
— Delete malicious objects.
— Run specific commands that will help stop a malicious process.
ut
r ib
st
di
For the purposes of this course, we will focus on the following:
— Analysis of alert details
re
— Containment tools
— Remediation and restoration tools
or
d e
pi
co
be
t to
No
8
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
ed
Kaspersky Security Center
ut
To use Kaspersky Industrial CyberSecurity Endpoint Detection and Response, the administrator must
install Kaspersky Industrial CyberSecurity for Nodes and Kaspersky Endpoint Agent on the protected
node.
ib
We covered remote installation via Kaspersky Security Center in Part IV. Kaspersky Industrial
CyberSecurity for Nodes.
r
To view incident cards in Kaspersky Security Center:
— Configure the report on threats
st
— Add the EDR detection widget
— Enable the list of displayed alerts
di
Configure the report on threats
re
or
de
pi
co
All detection events of Kaspersky Industrial CyberSecurity for Nodes can be viewed in the Report on
threats. The administrator can view the report under Monitoring & Reporting | Reports.
be
After installation and activation of Kaspersky Endpoint Agent, new detection events are enriched by
additional information. In the Open incident column, the View incident card link appears, which lets you
view the details of the detection event.
Old detection events—those logged before Kaspersky Endpoint Agent was activated or installed—will
to
not be enriched.
t
No
9
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
ed
ut
r ib
st
di
re
All detection events are also displayed in Monitoring & Reporting | Alerts. In the Enrichment and
or
response column, an enriched event has a More details link, which lets you view the detection details.
Enable display of the Alerts page in the web console interface options: KSC\<<User name under which
you have connected to the administration server>> | Interface options | Show EDR alerts.
d
Kaspersky Endpoint Agent does not generate detection events. It uses telemetry data to enrich
detection events from Kaspersky Industrial CyberSecurity for Nodes components.
to
10
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
ed
ut
r ib
st
di
re
or
Alert details in the Kaspersky Security Center Web Console consist of the following:
d
Chain of processes that preceded the detection: the activity of each process is specified, such as
pi
creating files, establishing connections, or modifying the registry. The object originally detected by a
protection technology is highlighted in blue.
Information about the incident: object name and location on the device, category, detection timestamp,
co
etc. Endpoint data is also included: computer’s domain name, IP address, MAC address, operating
system, device location in the Kaspersky Security Center group hierarchy.
The bottom of the window contains details on the malicious object, such as the file hash, creation date
and modification date, and user account used to create the file.
be
Detection details are stored on the administration server for 30 days and then deleted. Alert details are
displayed regardless of whether the device for which the enriched event was generated is currently
online.
t to
No
11
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
ed
ut
r ib
st
di
re
or
In our case, we can see that Kaspersky Industrial CyberSecurity for Nodes successfully blocked the
e
Next, analyze which executable files were involved in the attack. To simplify incident analysis, the object
pi
that Kaspersky Industrial CyberSecurity for Nodes detected and blocked is highlighted in blue. Click an
object in the threat formation chain to view detailed information about the file.
co
12
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
ed
ut
r ib
st
di
re
or
As you continue to explore details of the detected malicious activity, you can see what files it created.
d
You should analyze these files too, because they may spread the threat within the organization, facilitate
e
13
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
ed
ut
r ib
st
di
re
or
Information about injections shows executable files related to the attack. This information can be useful
e
the proxy server to find out which other devices connected to the same address and the same
port. This will quickly give you the list of devices that may have been compromised.
— The web address, referrer, user agent, and HTTP method (GET/POST) will only be displayed if
the request was made using HTTP.
be
t to
No
14
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
ed
ut
r ib
st
di
re
or
The analyst can study detection details that include information about the created keys and changes in
d
the registry related to the attack. To open a menu containing detailed information about an object, click
any object in the list.
e
Malware often modifies the registry to launch its objects. In some cases, malware may even do this using
legitimate reputable software to aid in a certain stage of the attack and make it difficult for protection
pi
When analyzing changes in the registry, pay the utmost attention to the keys that have the yes value in
co
15
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
ed
ut
r ib
st
di
re
or
When investigating details of a detection event, you can also check whether parent processes are related
d
If the parent process is Windows Explorer, a web browser, or an email application, a user most likely
carelessly executed the malicious file.
pi
If the parent process is a little-known file, that may indicate a new unknown threat and may be a reason to
proceed to threat containment.
co
be
t to
No
16
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
ed
Once threat analysis is completed, begin to contain the threat to prevent it from propagating to other
corporate devices. At the threat containment stage, we recommend the following:
ut
— Isolate compromised devices from the network.
— Prevent execution of the objects related to the attack.
— Quarantine suspicious files.
ib
— If necessary, retrieve objects for further analysis.
We recommend that you take some containment actions before completing a detailed analysis. For
r
example, if the alert details indicate that a node is attempting to establish a large number of network
connections, the analyst is advised to immediately isolate the device from the network and prevent
st
execution of objects. The analyst can do this directly from the detection card.
di
A host can be isolated by using the response buttons directly from the incident card, or it can be done
re
from the device card. or
ed
pi
co
be
The administrator does not need to use third-party tools or switch between consoles to begin containing a
threat, because the main commands are available in the detection card.
You can click the Isolate device from the network button to strictly limit a machine’s network activity.
Isolation is performed by Kaspersky Endpoint Agent. On the isolated device, the user sees the
corresponding notification.
to
Kaspersky Endpoint Agent does not block all connections. It does not block:
— Connections of Kaspersky Industrial CyberSecurity for Nodes services
— Connections of Kaspersky Security Center Network Agent
t
No
17
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
To view all isolated devices, open Tags | Device tags and select the Isolated from network tag. The
ed
Kaspersky Security Center Web Console will display the specific devices that have been isolated from the
network.
ut
r ib
st
di
How to disable host isolation
re
or
d e
pi
co
be
to
Note that removing the tag from the device properties is not enough to release the device!
The isolation period is defined in the Kaspersky Endpoint Agent policy. By default, a device will be
isolated for 30 minutes.
t
We recommend that you do not decrease this time so that a device remains isolated until specialists
complete their investigation and cope with the threat.
No
To release a device, go to its properties, open Kaspersky Endpoint Agent application settings, switch to
Application settings | Network Isolation | General, and then clear the Isolate this device from the
network check box.
18
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
Prevent execution
ed
ut
r ib
st
di
The administrator can prevent execution of suspicious files on endpoint devices. To do so, click the
Prevent execution button in the file details pane.
re
After clicking this button, the Kaspersky Security Center Administration Server creates a prevention rule
in the Kaspersky Endpoint Agent policy for the computer group. The name of this rule type takes the
prefix "[KillChain] md5". By default, a prevention rule uses the file’s MD5 hash sum.
or
To ensure that the prevention rule will work, enable execution prevention in the Kaspersky Endpoint
Agent policy. To do so, open Application Settings | Execution Prevention and select the Enable the
prevention of untrusted objects execution check box.
d
The administrator can configure an execution prevention message to be displayed to the user. To do so,
enable the Notify device user about prevention option.
co
be
t to
No
19
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
The administrator will not always be able to block an untrusted object directly from the object details
ed
pane.
For example, if an adversary used a PowerShell script during an attack, the administrator will see only the
powershell.exe process in the incident card and will be able to block only this process.
ut
Blocking powershell.exe would be an excessive response, because this could block legitimate scripts that
ICS engineers use to automate system maintenance.
ib
The details pane for the executed process contains the command line parameters that were used during
the attack. For example, the administrator can find the name of an executed script, calculate its hash, and
create a prevention rule for this script in the Kaspersky Endpoint Agent policy.
r
st
di
re
or
de
pi
co
You can block executables, scripts, and Microsoft Office documents using an MD5 or SHA256 checksum
be
20
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
ed
ut
r ib
st
di
re
or
If the user attempts to run a prohibited object, Kaspersky Endpoint Agent blocks execution of the object
d
and registers a security event. Windows shows the user a message containing the corresponding error.
e
Quarantine a file
pi
co
be
t to
No
21
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
It makes sense to quarantine files that the security application does not consider to be dangerous but do
ed
not appear to be a part of the operating system or well-known software. Such files are typically
characterized by their lack of a digital signature.
When you quarantine a file, it is moved from its original folder to a special encrypted local storage of
ut
Kaspersky Endpoint Agent. Neither the user nor any processes will be able to run it again. However, if
cybersecurity experts conduct an investigation that determines that the file is not dangerous, they can
restore it from Quarantine to its original folder.
ib
To quarantine a file from an alert card, open the file details pane and click Quarantine.
You can quarantine only files that have a checksum from an incident card. Kaspersky Endpoint Security
r
calculates checksums only for executable files.
Non-executable files can be quarantined using a Quarantine file task. Specify the target devices and the
st
full path to the file (or its full path and checksum) in the task parameters.
di
re
or
de
pi
co
To create and run a Quarantine task, select the criteria for quarantining a file:
— Specify the file full path – the complete path to the file must be indicated.
— Specify the file by folder path and checksum – the path to the file folder and the checksum of
be
You can enable the Delete the file from the device option, in which case Kaspersky Endpoint Agent will
place an encrypted copy the file in the local repository and then delete the original. If you do not want to
delete the original file, disable this option.
to
You can also exclude critical system files from the task scope by enabling the Do not perform actions
on critical system files option.
t
No
22
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
ed
ut
r ib
st
di
re
The administrator can view quarantined files of a specific node by running the following command in the
Windows command prompt:
When a suspicious file is put into Quarantine after it has been blocked from running, you should check for
e
similar suspicious files on other network nodes and eliminate any that you find.
pi
To do so, the administrator can create and run an IoC Scan task, which searches for Indicators of
Compromise. The task searches computers for such files and can automatically quarantine them.
co
An IoC Scan is a tool that searches for traces of malicious activity on network computers. You can create
an IoC from an alert card, generate one from open-source data, or receive a ready file from a third-party
IoC provider.
For example, an incident card contains information about created files and registry keys. It is critical for
the administrator to find out if such files and registry keys are present on other computers because this
be
could mean that a malicious file has already been run on other computers in the network.
You can easily create a standard description for an indicator of compromise right from the alert card. To
do so, open the All incident events tab, select the objects related to malicious activity, and click the
Create IoC button.
to
Not all of the files displayed on an alert card are indicators of compromise. Standard Windows files may
be shown as well.
t
No
23
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
ed
ut
r ib
st
di
re
or
Kaspersky Endpoint Agent automatically generates indicators of compromise in the OpenIOC format from
the selected files and registry keys. Files are searched for by their MD5 checksum, while registry keys are
searched for by their full path, name, and value of the variable in the registry.
If the web console does not let you select certain files on the All incident events list, that means there is
d
If multiple objects are selected, Kaspersky Security Center generates a consolidated indicator. This
e
indicator consists of separate conditions for each object. You can combine the conditions with logical OR
or AND:
pi
— OR means that the computer will be considered compromised if it contains even one of the
selected objects.
co
— AND means that the computer will be considered compromised only if all of the selected objects
(files and registry keys) are found on it.
You can immediately save the generated IoC as a file or create an IoC scan task for the network
computers.
be
When you create a task, choose which actions it should perform when an IoC is detected:
— Isolate the device from the network—use this response action cautiously, since sudden isolation
may disrupt the user’s work and even the operation of the whole organization if an IoC is
detected on a server.
—
to
An IoC can be exported from the incident card or scan task in OpenIoC format. To do so, click Export
IOC Collection…
t
No
24
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
ed
ut
r ib
st
di
re
A group IoC Scan task is created from the alert card. The task’s name will start with IoC Scan from
incident <threat name> <threat detection time>.
You can create multiple tasks from a single alert card. For example, select a group of highly reliable
indicators and make a task that will quarantine the respective files. For less reliable indicators, you can
or
create a task that will make the security solution scan the respective computers for threats. All tasks
created from the same card get the same names by default, so rename them to avoid confusion.
If an IoC Scan task is created from an alert card, it scans only critical areas (temporary folders and
download folders of all the device users) by default. You can redefine the scan area in the task properties
d
and select to scan specific folders on a drive, the system drive, or all drives of the device.
e
IoC Scan tasks created from an alert card are run once as soon as they are created.
pi
co
be
t to
No
You can create an IoC Scan task manually. In the task settings, you can add files in OpenIoC format from
external sources.
25
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
To add IoC files in the OpenIoC format, click the button Redefine IoC files; then in the window that
ed
opens, click Add IoC files and specify the OpenIoC files. A single scan task can search for multiple
indicators.
ut
r ib
st
di
re
or
An IoC Scan task automatically recognizes OpenIoC files that specify what types of data to look for.
On the Advanced tab, the administrator can configure the scan settings for data types represented in
d
OpenIoC files.
If you plan to search for files by their hashes, you can modify the scan scope. With the default settings,
e
the task scans critical areas on the device, meaning, temporary folders and download folders of all users.
pi
You can customize the scan area and disable/enable searching the Windows registry.
co
be
t to
No
26
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
To check the task status and whether the indicators have been found on the computers, switch to the
ed
Application Settings tab of the task and open the IOC Scan Results section. You can find detailed IoC
scan results here, namely, the devices where indicators were detected.
Click the Indicator(s) of compromise detected link to open the list of results for the respective
ut
computer. It contains all indicators specified in the task. If an indicator was detected, the State column
contains the matched link that opens a detailed detection card with the names of detected files (or other
objects).
ib
The detection card shows which objects on the computer matched the IoC conditions. If the IoC consists
of several groups of conditions combined with the logical OR operator, the group whose conditions match
the found files (or other objects) will be highlighted.
r
st
di
re
or
d e
pi
co
be
t to
No
27
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
ed
What is a security audit?
ut
r ib
st
di
re
or
The Kaspersky Endpoint Agent Security Audit task scans target nodes to check their compliance with
rules, generates a report, and sends it to the Kaspersky Security Center Administration Server.
— Vulnerabilities
— Installed applications
e
— Running processes
— Users' group membership
pi
— Files
Open Vulnerability and Assessment Language (OVAL) is an international cybersecurity standard that
includes a language for describing and assessing vulnerabilities.
co
OVAL rules consist of an XML file that contains a set of OVAL definitions.
— Application installed with certain settings (version later than the defined version, set of
components, etc.)
— Running process
— System status
to
Each definition contains triggering criteria. Criteria may include the following:
— Installed software
— Software version
— Files in a specific folder
t
When conducting an audit based on OVAL rules, Kaspersky Endpoint Agent gathers the necessary
No
information in the system and checks it against the criteria in OVAL definitions.
28
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
Each OVAL definition is associated with a specific class. These classes are described by the OVAL
ed
specification:
— A Compliance definition checks whether the system configuration settings comply with the
security policy.
— An Inventory definition checks whether the software or hardware specified in OVAL rules is
ut
installed in the system.
— A Miscellaneous definition refers to custom scans.
ib
— A Patch definition checks whether the patch specified in OVAL rules is installed on the system.
— A Vulnerability definition checks whether the vulnerabilities specified in OVAL rules are present
in the system.
r
The Agent then generates a report that indicates whether each individual OVAL rule was triggered (the
st
system matches the criteria).
di
re
or
ed
pi
co
Analysts can use built-in rules from Kaspersky ICS CERT, write their own rules, or use rules from the
OVAL repository (https://github.com/CISecurity/OVALRepo).
be
OVAL rules from ICS CERT include the vulnerabilities of most popular software used for industrial
networks running Windows.
On the Scope tab, the administrator can configure which OVAL definitions Kaspersky Endpoint Agent will
use when scanning a node.
to
— Scan only definitions included in list below – only the definitions added to the list will be used
No
To add a definition to the list, click Add and select the definition from the list.
29
KL 038.4: Kaspersky Industrial CyberSecurity. 2. Incident response
Part V. Kaspersky Endpoint Agent
Kaspersky Security Center loads the list of definitions from the added source of OVAL rules.
ed
ut
r ib
st
di
re
To add OVAL rules from a file, select the Custom database from file … option and click Import OVAL
or
collection from file.
You can upload only one archive containing XML files with OVAL rules.
d e
pi
co
be
to
The administrator can find the results of the Security Audit task on the Application settings tab of the
task in the Report section.
t
No
The results are provided in a report where you can find the OVAL definitions that were used to conduct
the audit. The scan result will be indicated for each definition in the Security audit result type column.
30