Kaspersky Anti Targeted Attack Platform

Recommendations for processing IOC alerts

In the right part of the window, the Recommendations section displays recommendations that you can follow, as well as the number of alerts that have attributes in common with the alert you are working on.

You can follow the following recommendations:

  • Under Qualifying, select Find similar alerts by host name. Click the link to display the Alerts alert table in a new browser tab. The alerts are filtered by the Source column. The host name from the alert you are working on is highlighted in yellow.
  • Under Qualifying, select Find similar alerts by IOC. Click the link to display the Alerts alert table in a new browser tab. The alerts are filtered by the Detected column, the name of the IOC file from the alert you are working on.
  • In the Quick response section, select Isolate <host name>. This opens the network isolation rule creation window.

See also

Recommendations for processing alerts

Recommendations for processing AM alerts

Recommendations for processing TAA alerts

Recommendations for processing SB alerts

Recommendations for processing YARA alerts

Recommendations for processing IDS alerts

Recommendations for processing NDR:IDS and NDR:EA alerts