Kaspersky Anti Targeted Attack Platform

Kaspersky Anti Targeted Attack Platform Interface

The application is managed through the web interface. Sections of the application web interface differ depending on the role of the user: Administrator or Senior security officer (Senior security officer, Security officer, Security auditor).

The window of the application web interface contains the following:

  • Sections in the left part and in the lower part of the application web interface window.
  • Tabs in the upper part of the application web interface window for certain sections of the application.
  • The workspace in the lower part of the application web interface window.

Sections of the application web interface window

The application web interface provides the following sections for users with the Senior security officer, Security officer, and Security auditor roles:

  • Dashboard. Contains Kaspersky Anti Targeted Attack Platform Monitoring data.

    For users with the Security auditor role, the Dashboard window contains the following sections: Alerts, System health.

  • Alerts. Contains information about alerts in the network of the to which you have access.
  • Network traffic events. Information about events and aggregate events in network traffic.
  • Threat Hunting. Contains information about events found on hosts of the tenant to which you have access.
  • Tasks. Contains information about tasks that you can use to manage files and application on hosts.
  • Prevention. Contains information about policies that you can use to manage preventions of files running on selected hosts.
  • Custom rules: TAA, Intrusion detection, IOC, YARA, Sandbox. Contains information for managing user-defined rules.
  • Storage: Files, and Quarantine. Contains information for managing objects in quarantine and Storage.
  • Assets. Contains information about computers with the Kaspersky Endpoint Agent component and their settings.
  • Network map: Network interactions map, Topology map, Network sessions. Contains information about the interaction of devices at different periods of time, diagrams of physical connections of devices in the network and information about network sessions.
  • Risks and anomalies. Contains information about the risks to which the resources of the information system are exposed.
  • Reports: Generated reports and Templates. Contains a report builder and a list of generated reports about alerts.
  • Logs: Application messages. Contains information about application performance.
  • Settings: Connectors, Secrets, IOC scanning schedule, Endpoint Agents, KPSN reputation database, Notification rules, VIP status, Exclusions, Allow rules, Sandbox servers, Passwords for archives, and License. Contains information about connector settings, secrets, the IOC scan schedule, Endpoint Agent component settings, and the settings for publishing objects in KPSN and assigning the VIP status to alerts based on information contained in alerts, the list of allowed objects, and IDS, TAA (IOA), and ICAP rules excluded from scanning, passwords of archives, and added keys.

For users with the Security auditor role, the web interface of the application contains the following sections in addition to those listed above:

  • Operating mode. Contains information about PCN and SCN servers and about tenants in and .
  • Sensor servers. Contains information about Central Node components and Sensor components connected to them.
  • Sandbox servers. Contains information about the connection of the Central Node component to Sandbox components.
  • External systems. Contains information about application integration with mail sensors.
  • Server configuration. Contains information about the sizing parameters of the application.

Workspace of the application web interface window

The workspace displays the information you choose to view in the sections and on the tabs of the application web interface window. It also contains control elements that you can use to configure how the information is displayed.

See also

Selecting a tenant to manage in the web interface of the application

Monitoring the performance of the application

Managing technologies

Viewing the alert table

Configuring the alert table display

Filtering, sorting, and searching alerts

Recommendations for processing alerts

Viewing alerts

User actions performed on alerts

Monitoring network traffic events

Events database threat hunting

Event information

Event chain scanning by Kaspersky TAA (IOA) rules

Managing assets

Configuring address spaces

Managing the network interactions map

Monitoring network sessions

Monitoring risks

Configuring NDR event types

Configuring risk types

System event types in Kaspersky Anti Targeted Attack Platform

Managing Endpoint Agent host information

Network isolation of hosts with the Endpoint Agent component

Automatically sending files from Kaspersky Endpoint Agent hosts to be scanned by the Sandbox component in accordance with Kaspersky TAA (IOA) rules

Selecting operating systems to use when scanning objects in Sandbox

Managing tasks

Managing policies (prevention rules)

Managing user-defined rules

Managing objects in Storage and Quarantine

Managing reports

Managing rules for assigning the VIP status to alerts

Managing allow rules for NDR events

Managing the list of scan exclusions

Managing Intrusion Detection rule exclusions

Managing TAA exclusions

Managing ICAP exclusions

Managing mirrored traffic from SPAN ports

Creating a list of passwords for archives

Managing Central Node or Sensor server information

Viewing server settings

Viewing the table of servers with the Sandbox component

Viewing the settings of the set of operating systems used for scanning objects in Sandbox

Viewing the table of external systems