Kaspersky Anti Targeted Attack Platform

Information about the "Named pipe" event

The window displaying information about Named pipe events contains the following details:

  • Tree of events.
  • Actions that can be performed to handle an event.

    Depending on the type of the named pipe operation, one of the following section names is displayed in the event information:

    • Pipe created
    • Pipe connected

    This section displays the following information:

    • IOA tags—Information about the results of file analysis using the Targeted Attack Analyzer technology: name of the TAA (IOA) rule that was used to create the alert.

      Click the link to display information about the TAA (IOA) rule. If the rule was provided by Kaspersky experts, it contains information about the triggered

      as well as recommendations for reacting to the event.

      The field is displayed if a TAA (IOA) rule was triggered when the event was created.

    • File—File name of the process that created or connected to the named pipe.
    • Event time—Time when the named pipe was created or connected to.
  • Event initiator section:
    • File—Name of the parent process file.
    • MD5—MD5 hash of the parent process file.
    • SHA256—SHA256 hash of the parent process file.
  • System info section:
    • Host name—Name of the host on which the named pipe was created or connected to.
    • User name—Name of the user that created or connected to the named pipe.
    • OS version—Version of the operating system that is being used on the host.

Clicking the link with the pipe name opens a list in which you can do one of the following:

Clicking the link with the file name or file path opens a list in which you can select one of the following actions:

Clicking the MD5 link opens a list in which you can select one of the following actions:

  • Find events.
  • Find alerts.
  • .
  • Find in Storage.
  • Create prevention rule.
  • Copy value to clipboard.

Clicking the SHA256 link opens a list in which you can select one of the following actions:

Clicking the link with the host name opens a list in which you can select one of the following actions:

  • Find events.
  • Find alerts.
  • Run the following tasks:
  • Copy value to clipboard.

Clicking the link with the IP address of the host opens a list in which you can select one of the following actions:

Clicking the link with the user name opens a list in which you can do one of the following: