Contents
- Preparing for installing application components
- Preparing the IT infrastructure for installing application components
- Preparing the IT infrastructure for integration with a mail server used for receiving messages via POP3
- Preparing the IT infrastructure for integration with a mail server used for receiving messages via SMTP
- Preparing the virtual machine for installing the Sandbox component
- Preparing an installation disk image with the Central Node, Sensor, and Sandbox components
Preparing for installing application components
This section provides information on how to prepare your corporate IT infrastructure for the installation of Kaspersky Anti Targeted Attack Platform components.
Preparing the IT infrastructure for installing application components
Before installing the application, prepare your corporate IT infrastructure for the installation of components of Kaspersky Anti Targeted Attack Platform:
- Ensure that the servers, the computer intended for working with the application web interface, and the computers to be installed with the Endpoint Agent component all satisfy the hardware and software requirements.
- To protect the network from the objects being analyzed, deny access to the local network of the Sandbox server for the management network interface and the network interface used for internet access of processed objects.
- Prepare the corporate IT infrastructure in accordance with the table below:
Ports for interaction between Kaspersky Anti Targeted Attack Platform components
Source
Direction
Port or protocol
Description
Central Node
Inbound
TCP 22
Connecting to the server over SSH
TCP 443
Receiving data from workstations with Endpoint Agent
TCP 8443
Access to the web interface of the application
TCP 9081
Receiving data from Sensors installed on standalone servers
TCP 7423, 13520
Communication with the Sensor server
UDP 53
Outgoing
TCP 80
TCP 443
TCP 1443Communication with the KSN servers and Kaspersky update servers
TCP 443
Sending objects to Sandbox for scanning
TCP 601
Sending messages to the SIEM system
UDP 53
Communication with the Sensor server
Inbound and outbound
ESP, AH, IKEv1, IKEv2
For interaction between Central Node and Sensor over a secure link based on the IPSec protocol
Sensor
Inbound
TCP 22
Connecting to the server over SSH
TCP 1344
Receiving traffic from the proxy server
TCP 25
Receiving SMTP traffic from the mail server
TCP 443
When Sensor is used as a proxy server for communication between workstations with Endpoint Agent and Central Node
TCP 9443
Access to the web interface of the component
UDP 53
Communication with the Central Node server
Outgoing
TCP 80
TCP 443Communication with the KSN servers and Kaspersky update servers
TCP 995
Integration with the mail server for secure connections
TCP 110
Integration with the mail server for unsecured connections
TCP 7423, 13520
Communication with the Central Node server
UDP 53
Inbound and outbound
ESP, AH, IKEv1, IKEv2
For interaction between Central Node and Sensor over a secure link based on the IPSec protocol
Sandbox
Inbound (management
interface)TCP 22
Connecting to the server over SSH
TCP 443
Interaction with the Central Node
TCP 8443
Access to the web interface of the application
Outbound (management interface)
TCP 80
TCP 443Communication with Kaspersky update servers
Outbound and corresponding inbound (interface for access of processed objects)
Any
Access to the internet for analyzing the network behavior of processed objects.
Deny access to the corporate LAN to protect the network from analyzed objects.
SCN (when using the distributed solution mode)
Outgoing
TCP 8443
For interaction between SCN and PCN over a secure link based on the IPSec protocol
Inbound and outbound
TCP 443, UDP 53
ESP, AH,
IKEv1 и IKEv2PCN (when using the distributed solution mode)
Inbound
TCP 8443
Inbound and outbound
TCP 443, UDP 53
ESP, AH,
IKEv1 и IKEv2
If you install an additional network interface that receives only mirrored traffic in a VMware ESXi virtual environment, use the E1000 network adapter or disable the LRO (large receive offload) option on a VMXNET3 network adapter.
Preparing the IT infrastructure for integration with a mail server used for receiving messages via POP3
If you are using a Microsoft Exchange mail server as your mail server and an email sender configured a request for read receipt notification, you must disable read receipt notifications. Otherwise, read receipt notifications will be sent from the email address that you have configured as the email address used for receiving messages of Kaspersky Anti Targeted Attack Platform. You must also disable automatic processing of meeting requests to prevent filling of the mailbox used for receiving messages of Kaspersky Anti Targeted Attack Platform.
To disable sending read receipt notifications from the email address used for receiving messages of Kaspersky Anti Targeted Attack Platform:
- On the Microsoft Exchange server, check whether or not notifications are enabled. To do so, execute the command:
Get-MailboxMessageConfiguration -Identity <email address for receiving messages by Kaspersky Anti Targeted Attack Platform> | fl
- If notifications are enabled, run the following command:
Set-MailboxMessageConfiguration -Identity <email address for receiving messages by Kaspersky Anti Targeted Attack Platform> -ReadReceiptResponse NeverSend
This will disable read receipt notifications from the email address used for receiving messages of Kaspersky Anti Targeted Attack Platform.
To disable automatic processing of meeting requests:
- On the Microsoft Exchange server, check whether or not notifications are enabled. To do so, execute the command:
Get-CalendarProcessing -Identity <email address for receiving messages by Kaspersky Anti Targeted Attack Platform> | fl
- If automatic processing of meeting requests is enabled, run the following command:
Set-CalendarProcessing -Identity <email address for receiving messages by Kaspersky Anti Targeted Attack Platform> -AutomateProcessing:None
Automatic processing of meeting requests will be disabled.
Preparing the IT infrastructure for integration with a mail server used for receiving messages via SMTP
To prepare your corporate IT infrastructure for Kaspersky Anti Targeted Attack Platform integration with a mail server over the SMTP protocol:
- On the external mail server, configure rules for forwarding copies of the messages that you want to send for scanning by Kaspersky Anti Targeted Attack Platform to the addresses specified in Kaspersky Anti Targeted Attack Platform.
- Specify the route for forwarding email messages to the server with the Sensor component.
It is recommended to specify a static route – IP address of the server with the Sensor component.
- In the firewall of your organization, allow inbound connections to port 25 of the server with the Sensor component from mail servers that are forwarding copies of email messages.
You can also improve the security of Kaspersky Anti Targeted Attack Platform integration with a mail server over the SMTP protocol.
To improve the security of Kaspersky Anti Targeted Attack Platform integration with a mail server over the SMTP protocol.
- Configure authentication of the Kaspersky Anti Targeted Attack Platform server on the side of the mail servers forwarding email messages for Kaspersky Anti Targeted Attack Platform.
- Configure mandatory encryption of traffic on mail servers that are forwarding email messages for Kaspersky Anti Targeted Attack Platform.
- Configure authentication of mail servers forwarding email messages for Kaspersky Anti Targeted Attack Platform on the Kaspersky Anti Targeted Attack Platform side.
Preparing the virtual machine for installing the Sandbox component
To prepare the virtual machine for installing the Sandbox component:
- Run the VMware ESXi hypervisor.
- Open the virtual machine management console.
- In the context menu of the virtual machine on which you want to install the Sandbox component, choose Edit Settings.
This opens the virtual machine properties window.
- On the Virtual Hardware tab, expand the CPU settings group and select the Expose hardware-assisted virtualization to guest OS check box.
- On the VM Options tab in the Latency Sensitivity drop-down list, select High.
- Click OK.
The virtual machine is ready for installing the Sandbox component.
Preparing an installation disk image with the Central Node, Sensor, and Sandbox components
Before installing the application, you must prepare an iso image of the installation disk with the Central Node, Sensor, and Sandbox components based on the Astra Linux operating system.
Minimum hardware requirements for a device that can be used to create the iso image:
- CPU: 4 cores, clock rate 2500 MHz or more.
- RAM: 8 GB.
- Available disk space: 100 GB.
Software requirements:
- Operating system based on an up-to-date Linux kernel.
- Docker 20 or later
- Availability of the iso image of the Astra Linux Special Edition 1.7.5
Kaspersky Anti Targeted Attack Platform does not support other versions of the Astra Linux operating system.
To mount an iso image of the Central Node and Sensor or Sandbox components based on the Astra Linux operating system:
- From the distribution kit, download the Central Node and Sensor component distribution kit (kata-cn-distribution-6.1.0-324-x86_64_en-ru-zh.tar.gz), the Sandbox component distribution kit (kata-sb-distribution-6.1.0-768-x86_64_en-ru.tar.gz) and the file named iso-builder-6.1.0-324-x86_64_en-ru.tar.
- Create an iso_builder.sh file with the following content.
- Run the
mkdir /var/kata_builder
command. - Put the files listed in step 1 in the newly created /var/kata_builder directory. Make sure that the Astra Linux Special Edition 1.7.5 iso image is named installation-1.7.5.16-06.02.24_14.21.iso. If the name of the iso image is different, please rename it.
- Run the following command:
- If you are preparing a disk image with the Central Node and Sensor components:
sudo ./iso_builder.sh /var/kata_builder/installation-1.7.5.16-06.02.24_14.21.iso /var/kata_builder/kata-cn-distribution-6.1.0-324-x86_64_en-ru-zh.tar.gz /var/kata_builder/iso-builder-6.1.0-324-x86_64_en-ru.tar /var/kata_builder buildCNSensorAstra.iso
- If you are preparing a disk image with the Sandbox component:
sudo ./iso_builder.sh /var/kata_builder/installation-1.7.5.16-06.02.24_14.21.iso /var/kata_builder/kata-sb-distribution-6.1.0-768-x86_64_en-ru.tar.gz /var/kata_builder/iso-builder-6.1.0-324-x86_64_en-ru.tar /var/kata_builder buildSandboxAstra.iso
- If you are preparing a disk image with the Central Node and Sensor components:
After running the commands, the installation disk images with the Central Node and Sensor components named buildCNSensorAstra.iso and buildSandboxAstra.iso are located in the /var/kata_builder directory.
If you use other directories for storing files, you can run the command as follows: sudo ./iso_builder.sh <source_iso_host_path> <distribution_host_path> <iso_builder_image_host_path> <build_host_path> <target_iso_name>
, where:
- source_iso_host_path is the path to the distribution kit of the Astra Linux Special Edition 1.7.5
- distribution_host_path is the path to the kata-cn-distribution-6.1.0-324-x86_64_en-ru-zh.tar.gz or kata-sb-distribution-6.1.0-768-x86_64_en-ru.tar.gz distribution kit.
- iso_builder_image_host_path is the path to the iso-builder-6.1.0-324-x86_64_en-ru.tar file.
- build_host_path is the path where the mounted iso image must be located, without specifying the name being assigned to the iso image.
- target_iso_name is the name that is being assigned to the iso image.