Kaspersky Anti Targeted Attack Platform

Information about the "DNS" event

The window displaying information about DNS events contains the following details:

  • Tree of events.
  • Actions that can be performed to handle an event.
  • DNS section:
    • IOA tags—Information about the results of file analysis using the Targeted Attack Analyzer technology: name of the TAA (IOA) rule that was used to create the alert.

      Click the link to display information about the TAA (IOA) rule. If the rule was provided by Kaspersky experts, it contains information about the triggered

      as well as recommendations for reacting to the event.

      The field is displayed if a TAA (IOA) rule was triggered when the event was created.

    • Server IP—IPv4 address of the DNS server.
    • Query options—DNS query options.
    • Request status—Status of the DNS query.
    • Domain name—Name of the domain for which the DNS record is to be resolved.
    • Record type ID—Type of resource record.
    • Response data—Contents of the DNS server response to the query.
    • Event time—Time when the DNS query was sent.
  • Event initiator section:
    • File—Name of the parent process file.
    • MD5—MD5 hash of the parent process file.
    • SHA256—SHA256 hash of the parent process file.
    • Process ID—Identifier of the parent process.

      If the event was logged in the event database by Kaspersky Endpoint Agent for Linux, the Event initiator section also includes the following fields:

    • Environment variables—Environment variables of the process.
    • Real user name—Name of the user assigned when registering in the system.
    • Real group name—Group to which the user belongs.
    • Effective user name—User name that was used to log in to the system.
    • Effective group name—Group of the user whose name was used to log in to the system.
  • System info section:
    • Host name—Name of the host from which the query to the DNS server was issued.
    • Host IP—IP address of the host from which the query to the DNS server was issued.

      If you are using dynamic IP addresses, the field displays the IP address assigned to the host at the moment when the event was created.

      The application does not support IPv6. If you are using IPv6, the IP address of the host is not displayed.

    • Logon from remote host—Name of the host that was used to remotely log in to the system.
    • User name—Name of the user that issued the query to the DNS server.
    • OS version—Version of the operating system that is being used on the host.

Links with the server IP address, record type ID, and user name open a list in which you can do one of the following:

Clicking the link with the domain name opens a list in which you can do one of the following:

  • Find events.
  • Find alerts.
  • Find on Kaspersky TIP.
  • Copy value to clipboard.

Clicking the link with the file name or file path opens a list in which you can select one of the following actions:

Clicking the MD5 link opens a list in which you can select one of the following actions:

  • Find events.
  • Find alerts.
  • .
  • Find in Storage.
  • Create prevention rule.
  • Copy value to clipboard.

Clicking the SHA256 link opens a list in which you can select one of the following actions:

Clicking the link with the host name opens a list in which you can select one of the following actions:

  • Find events.
  • Find alerts.
  • Run the following tasks:
  • Copy value to clipboard.

In the information about the event that Kaspersky Endpoint Security for Linux recorded in the event database, you can click the link with the host name to open a list in which you can select one of the following actions:

Clicking the link with the IP address of the host opens a list in which you can select one of the following actions: