Kaspersky Anti Targeted Attack Platform

Data provision

The operation of certain components of Kaspersky Anti Targeted Attack Platform requires data processing on the Kaspersky side. Components do not send data without the consent of the administrator of Kaspersky Anti Targeted Attack Platform.

You can view the list of data and the terms on which it is used as well as give consent to data processing in the following agreements between your organization and Kaspersky:

  • In the End User License Agreement (for example, during installation of the application).

    According to the terms of the End User License Agreement, you agree to automatically send Kaspersky the information listed in the End User License Agreement under Data Provision. The End User License Agreement is included in the application distribution kit.

  • In the KSN Statement (for example, during installation of the application or in the administrator menu after installation).

    When you participate in Kaspersky Security Network, information obtained as a result of Kaspersky Anti Targeted Attack Platform operation is automatically sent to Kaspersky. The list of transmitted data is specified in the KSN Statement. The Kaspersky Anti Targeted Attack Platform user independently decides on his/her participation in KSN. The KSN Statement is included in the application distribution kit.

    Before KSN statistics are sent to Kaspersky, they are accumulated in the cache on servers hosting Kaspersky Anti Targeted Attack Platform components.

Kaspersky protects any information received in this way as prescribed by law and applicable rules of Kaspersky. Data is sent over encrypted communication channels.

When using Kaspersky Private Security Network, Kaspersky is not sent information about the operation of Kaspersky Anti Targeted Attack Platform. However, KSN statistical data is accumulated in the cache on servers hosting Kaspersky Anti Targeted Attack Platform components to the same extent as when using Kaspersky Security Network. This accumulated KSN statistical data may be transmitted beyond the perimeter of your organization if a server with the Kaspersky Private Security Network application is located outside of your organization.

The Kaspersky Private Security Network administrator must personally ensure the security of such data.

See also

Kaspersky Anti Targeted Attack Platform Help

Kaspersky Anti Targeted Attack Platform

Application licensing

Architecture of the application

Operating principle of the application

Distributed solution and multitenancy

Sizing Guide

Installing and performing initial configuration of the application

Configuring the sizing settings of the application

Configuring firewall rules

Configuring integration of the Endpoint Agent component with the KEDR functional block

Configuring integration of the Endpoint Agent component with the NDR functional block

Getting started with the application

Managing accounts of application administrators and users

Authentication using domain accounts

Participation in Kaspersky Security Network and use of Kaspersky Private Security Network

Managing the Sandbox component through the web interface

For administrators: Getting started with the application web interface

For security officers: Getting started with the application web interface

Managing user-defined Sandbox rules

Sending notifications

Managing logs

Viewing application messages

Viewing information about files that have been sent for scanning to the Kaspersky Anti Targeted Attack Platform

Managing Kaspersky Endpoint Agent for Windows

Managing Kaspersky Endpoint Security for Windows

Managing Kaspersky Endpoint Security for Linux

Managing Kaspersky Endpoint Security for Mac

Backing up and restoring data

Upgrading Kaspersky Anti Targeted Attack Platform

Using Kaspersky Anti Targeted Attack Platform API KATA and KEDR

Using Kaspersky Anti Targeted Attack Platform API NDR

Sources of information about the application

Contacting the Technical Support Service

Information about third-party code

Trademark notices

In this Help section

Service data of the application

Data of the Central Node and Sensor components

Sandbox component data

Data transmitted between application components

Data contained in application trace files

Data of Kaspersky Endpoint Agent for Windows

Data of Kaspersky Endpoint Security for Windows

Data of Kaspersky Endpoint Security for Linux

Data of Kaspersky Endpoint Security for Mac

Page top
[Topic 159935]

Service data of the application

Kaspersky Anti Targeted Attack Platform resources provide no capability to restrict the rights of the users of servers and operating systems to which the Central Node component is installed. The administrator is advised to use any system resources at their own discretion to control how the users of servers and operating systems with the application installed may be granted access to the personal data of other users.

Information about the service data of Kaspersky Anti Targeted Attack Platform is provided in the table below.

Service data of Kaspersky Anti Targeted Attack Platform

Data type

Location and duration of storage

  • Data on user accounts.
  • Data of the Central Node component.
  • Data about tenants.
  • Information about computers connected to the Central Node component on which the Endpoint Agent component is installed.
  • Data about presets and prevention rules.
  • Information about tasks assigned to computers with the Endpoint Agent component.
  • Custom widget layout data.
  • Information about user-defined TAA (IOA) rules.
  • Information about user-defined IDS rules.
  • Information about user-defined IOC rules.
  • Data on network isolation rules.
  • Data about scan exclusions.
  • Information about reports and report templates.
  • Information about Endpoint Agent component certificates.

 

Data is stored indefinitely on the server hosting the Central Node component in the /data directory if the Central Node component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers indefinitely.

System event log

OS log files are stored indefinitely in the /var/log directory on the server hosting the Central Node component.

Log with information about the application operation.

The log file is stored indefinitely in the /data directory on the server hosting the Central Node component, if the component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers indefinitely.

File scan queue.

Files are stored on the server hosting the Central Node component in the /data directory if the component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers. The data is retained until the scan is completed.

Files received from computers with the Endpoint Agent component.

Files are stored on the server hosting the Central Node component in the /data directory if the component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers. Data is rotated when disk space becomes full.

Files with YARA and IDS rules (user-defined and from Kaspersky).

Files are stored indefinitely in the /data directory on the server hosting the Central Node component, if the component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers indefinitely.

 

Files with data about detections sent to external systems.

Files are stored indefinitely on the server hosting the Central Node component in the /data directory if the component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers indefinitely.

 

Artifacts of the Sandbox component.

Files are stored on the server hosting the Central Node component in the /data directory if the component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers. Data is rotated when disk space becomes full.

Files for which detections were created by the Sandbox component.

Files are stored on the server hosting the Central Node component in the /data directory if the component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers. Data is rotated when disk space becomes full.

Certificate files used for the authentication of application components.

Files are stored indefinitely in the /data directory on the server hosting the Central Node, PCN, SCN, Sensor component or on the computer with the Endpoint Agent component.

Encryption keys that are transmitted between application components.

Files are stored indefinitely in the /data directory on the server hosting the Central Node, PCN, SCN, Sensor component or on the computer with the Endpoint Agent component.

 

Copies of mirrored traffic from SPAN ports.

Files are stored in storage mounted on the server with the Sensor component. Data is deleted as disk space becomes full.

ICAP exclusion filters.

Files are stored indefinitely on the server hosting the Central Node component in the /data directory if the component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers indefinitely.

  • Information about network sessions.
  • Device information.
  • Telemetry when integrated with the Endpoint Agent component.
  • Network traffic events.
  • User account information.
  • Information about executable files.
  • Dumps of traffic relevant to registered events.
  • Dumps of traffic relevant to network sessions.

 

The data is stored on the Central Node server in the /data/storage/volumes/nta_database directory. Data is rotated as disk space becomes filled.

  • User account ID.
  • User account name.
  • Domain name of the user.
  • User account role.
  • User account status.
  • Date and time of the last password change for the user account.

Files are stored indefinitely on the server hosting the Central Node component in the /data directory if the component is installed on the server. When the Central Node component is installed on a cluster, data is stored on storage servers indefinitely.

  • Central Node server ID.
  • IP address of the Central Node server.
  • Central Node server name.
  • Central Node activity indicator.
  • Tenant ID.
  • Tenant name.
  • Names of servers with the Central Node component assigned to this tenant.
  • Tenant creation date.
  • ID of the Endpoint Agent computer assigned by Kaspersky Security Center.
  • Name of the Endpoint Agent computer.
  • IP address of the Endpoint Agent computer.
  • Operating system of the Endpoint Agent computer.
  • Version of the application that acts as the Endpoint Agent component.
  • Status of the Endpoint Agent self-defense mechanism.
  • Date and time when the first and last telemetry packet were sent to the Central Node component.
  • Date and time of the last IOC scan run.
  • Result of the last IOC scan run.
  • License key status of the application that acts as the Endpoint Agent component.
  • ID of the tenant on which the prevention rule was created.
  • Status of the prevention rule (enabled or disabled).
  • MD5 or SHA256 hash of the file that is prevented from running.
  • The account name of the user who created the prevention rule.
  • The account name of the user who changed the prevention rule.
  • List of computers on which the file is prevented from running.
  • Prevention rules change log.
  • Prevention rule creation date and time.
  • Name of the prevention rule.
  • Attribute indicating whether the user must be notified about file start being blocked.
  • Type of the task assigned to the Endpoint Agent computer.
  • Name of the computer to which the task is assigned.
  • IP address of the computer with the Endpoint Agent component.
  • Creation date and time of the task assigned to the Endpoint Agent computer.
  • ID of the tenant for which the task was created.
  • Task expiration date.
  • Name of the user account that created the task.
  • Task settings data.
  • Task report data.
  • Task comments.
  • User-defined TAA (IOA) rule name.
  • Source code of the request being scanned.
  • User-defined TAA (IOA) rule ID.
  • User-defined TAA (IOA) rule status.
  • Creation date and time of the user-defined TAA (IOA) rule.
  • Importance specified when adding the user-defined TAA (IOA) rule.
  • Level of confidence that depends on the likelihood of false alarms as defined by the user when the user-defined TAA (IOA) rule was added.
  • ID of the tenant for which the rule was created.

User name of the user account that uploaded the file with user-defined IDS rules.

  • Date and time when the file with user-defined IDS rules was uploaded.
  • Status of the user-defined IDS rule.
  • Importance specified in the user-defined IDS rule file.
  • User name of the user account that uploaded the file with user-defined IOC rules.
  • Name of the IOC file.
  • Contents of the IOC file.
  • Date and time when the IOC file was uploaded.
  • Status of the IOC rule.
  • Rule importance as specified in the IOC file.
  • Description of the IOC rule.
  • ID of the tenant for which the IOC file was uploaded.
  • User name of the user account that uploaded the file with user-defined YARA rules.
  • Contents of the YARA file.
  • Date and time when the YARA file was uploaded.
  • Name of the file containing YARA rules.
  • Importance.
  • Status of the YARA rule.
  • Account name of the user that enabled network isolation.
  • ID of the isolated computer.
  • Name of the network isolation rule.
  • Status of the network isolation rule.
  • List of resources excluded from network isolation.
  • Date and time when the network isolation rule was modified.
  • State of the network isolation rule.
  • Expiration date of the network isolation rule.
  • User name of the user that added the scan exclusion rule.
  • List of objects excluded from the scan.
  • Exclusion rule ID.
  • Name of the exclusion rule.
  • Creation date and time of the exclusion rule.
  • ID of the tenant for which the exclusion rule was created.
  • Names of components to which the exclusion rules apply.
  • ID of the user account that created or modified the report template.
  • Template creation date.
  • Date of last modification of the template.
  • Text of the template as HTML code.
  • Name of the template.
  • Tenant ID.
  • User name of the user account that uploaded the Endpoint Agent component certificate file.
  • Digest of the certificate.
  • Serial number of the certificate.
  • Public key.
  • Expiration date of the certificate.
  • State of the Sandbox component scan rule
  • Type of the rule
  • Masks of included objects
  • Masks of excluded objects
  • Size of scanned files
  • Rule creation date and time
  • ID of the virtual machine where the rule is assigned

Virtual machine configuration information:

  • IP address of the server hosting the Sandbox component
  • List of virtual machines

Data on user accounts:

  • User account ID.
  • User account name.
  • Name of the computer on which the user is authorized.

The data is stored on the Central Node server in the /data/storage/volumes/nta_database directory. Data is rotated as disk space becomes filled.

Network session information:

  • Names of the participants in the network communication.
  • IP and MAC addresses of the participants of the network communication.

Information about devices registered in the application:

  • Device names.
  • IP and MAC addresses of devices.

Data saved when integrated with the Endpoint Agent component as part of the NDR functionality:

  • IP and MAC addresses of the computer with the Endpoint Agent component.
  • Name of the computer with the Endpoint Agent component.
  • Name of the user account registered on the computer with the Endpoint Agent component.
  • The operating system that the computer is running.
  • User Agent.

Information about network traffic events: IP and MAC addresses of devices.

Information about executable files on Endpoint Agent computers connected as part of the NDR functionality:

  • File name.
  • Path to the file.
  • File version.
  • MD5 and SHA256 hash of the file.

Traffic dump data related to logged network sessions and events:

  • Names of the participants in the network communication.
  • IP and MAC addresses of the participants of the network communication.
  • Device names.
  • IP and MAC addresses of devices.
  • User account name.
  • User account ID.
  • The operating system that the computer is running.
  • User Agent.
  • Name of the executable file.
  • Path to the executable file.
  • Version of the executable file.
  • MD5 and SHA256 hash of the executable file.

Page top

[Topic 242920]

Data of the Central Node and Sensor components

This section contains the following information about user data that is stored on the server with the Central Node component and on the server with the Sensor component:

  • Contents of stored data
  • Storage location
  • Storage duration
  • User access to data

See also

Service data of the application

Sandbox component data

Data transmitted between application components

Data contained in application trace files

Data of Kaspersky Endpoint Agent for Windows

Data of Kaspersky Endpoint Security for Windows

Data of Kaspersky Endpoint Security for Linux

Data of Kaspersky Endpoint Security for Mac

In this section

Traffic data of the Sensor component

Data in detections

Data in events

Data in reports

Data on objects in Storage and Quarantine

Page top
[Topic 176644]

Traffic data of the Sensor component

Traffic data of the Sensor component is stored on the server with the Sensor component or on the server with Sensor and Central Node components if Sensor and Central Node are installed on the same server or deployed as a cluster.

Traffic data is recorded and stored in sequentially created files. The application stops recording data in one file and starts logging data in the next file if:

  • The maximum file size is reached (you can configure this setting)
  • The configured time interval has elapsed (you can configure this setting)
  • The traffic saving service or the entire Kaspersky Anti Targeted Attack Platform application is restarted

As traffic data accrues, Kaspersky Anti Targeted Attack Platform filters data and keeps only the following information:

  • Information related to alerts generated as a result of scanning by the Targeted Attack Analyzer technology
  • PCAP files in which:
    • Source or destination IP address matches an IP address from the detection
    • Traffic data belongs to the time period within 15 minutes from the detection time

Filtered traffic data is moved to a separate section. The rest of the traffic data (that do not satisfy filtering criteria) is deleted.

Filtered traffic data is saved in sequentially created files. The application stops recording data in one file and starts logging data in the next file if:

  • The maximum file size is reached
  • The configured time interval has elapsed

Filtered data traffic is stored for the last 24 hours. Older data is deleted.

See also

Data of the Central Node and Sensor components

Data in detections

Data in events

Data in reports

Data on objects in Storage and Quarantine

Page top
[Topic 197172]

Data in detections

Kaspersky Anti Targeted Attack Platform resources provide no capability to restrict the rights of the users of servers and operating systems to which the Central Node component is installed. The administrator is advised to use any system resources at their own discretion to control how the users of servers and operating systems with the application installed may be granted access to the personal data of other users.

Information about the data that may be stored when creating

is listed in the table below.

Data in Kaspersky Anti Targeted Attack Platform detections

Data type

Location and duration of storage

The following data is stored on the server for all detections:

  • Detection creation date and time.
  • Date and time of alert modification.
  • Category of the detected object.
  • Name of the detected file.
  • Type of the detected file.
  • Source of the detected object.
  • Detected URL.
  • MD5 and SHA256 hash of the detected file.
  • User comments added to the details of the associated with the detection.
  • ID of the TAA (IOA) rule by which the detection was created.
  • IP address and name of the computer on which the detection was generated.
  • ID of the computer on which the detection was generated.
  • User agent.
  • The user account to which the alert associated with the detection was assigned.
  • List of files.
  • Alert importance depending on the security impact this alert may have on the computer or corporate LAN, based on Kaspersky experience.
  • The technology that made the detection.
  • Status of the alert associated with the detection.
  • Name of the user to which the alert associated with the detection was assigned.
  • Event ID (when using the NDR functionality).
  • Device IDs (when using the NDR functionality).

If the Central Node is installed on a server, detection information is stored on the Central Node server in the /data directory. If Central Node is installed as a cluster, detection information is stored in a ceph storage.

Data is rotated when the number of detection records generated by an individual scanning technology reaches 1,000,000.

When the alert associated with the detection is modified, the following information is stored on the server:

  • The user account that modified the alert.
  • The user account to which the alert was assigned.
  • Date and time of alert modification.
  • Alert status.
  • User comment.

If the detection was created as a result of scanning a file, the following information may be stored on the server:

  • Full name of the detected file.
  • MD5 and SHA256 hash of the detected file.
  • Size of the detected file.
  • Information about the signature of the file.

If the detection was created as a result of scanning FTP traffic, the following information may be stored on the server:

  • URI of the FTP request.

If the detection was created as a result of scanning HTTP traffic, the following information may be stored on the server:

  • URI of the HTTP request.
  • URI of the request source.
  • User agent.
  • Information about the proxy server.

If the detection was created as a result of scanning by the Intrusion Detection technology, the following information may be stored on the server:

  • Name of the computer from which the data was sent.
  • Name of the computer that received the data.
  • The IP address of the computer from which the data was sent.
  • The IP address of the computer that received the data.
  • Transmitted data.
  • Data transfer time.
  • URL extracted from the file containing the traffic, User Agent, and method.
  • File containing the traffic where the detection occurred.
  • Object category based on the IDS database.
  • Name of the custom IDS rule that was used to generate the detection.
  • HTTP request body.
  • List of detected objects.

If the detection was created as a result of scanning by the URL Reputation technology, the following information may be stored on the server:

  • Name of the computer from which the data was sent.
  • Name of the computer that received the data.
  • The IP address of the computer from which the data was sent.
  • The IP address of the computer that received the data.
  • The URI of the transferred resource.
  • Information about the proxy server.
  • Unique ID of the email message.
  • Email addresses of the sender and recipients of the message (including the recipients of copies and blind carbon copies of the message).
  • Subject of the email message.
  • Date and time when the message was received by Kaspersky Anti Targeted Attack Platform, with precision up to the second.
  • List of detected objects.
  • Time of network connection.
  • URL of network connection.
  • User agent.

If the detection was created as a result of scanning HTTP traffic, the following information may be stored on the server:

  • Version of the application databases used to generate the detection.
  • Category of the detected object.
  • Names of detected objects.
  • MD5 hashes of detected objects.
  • Information about detected objects.

If the detection was created as a result of scanning by the Anti-Malware technology, the following information may be stored on the server:

  • Versions of databases of Kaspersky Anti Targeted Attack Platform components that were used to generate the alert.
  • Category of the detected object.
  • List of detected objects.
  • MD5 hash of detected objects.
  • Additional information about the detection.

If the detection was created as a result of a DNS activity detection, the following information may be stored on the server:

  • DNS query data.
  • Contents of the DNS server response to the query.
  • List of queried hosts.

If the detection was created as a result of scanning in accordance with user-defined IOC or TAA (IOA) rules, the following information may be stored on the server:

  • Date and time of scan completion.
  • IDs of the computers on which the detection was generated.
  • Name of TAA (IOA) rule.
  • Name of the IOC file.
  • Information about detected objects.
  • List of hosts with the Endpoint Agent component.

If the detection was created using YARA rules, the following information can be stored on the server:

  • Version of YARA rules that was used to generate the detection.
  • Category of the detected object.
  • Name of the detected object.
  • MD5 hash of the detected object.
  • Date and time when the object was detected.
  • Additional information about the alert.

If the detection was created as a result of scanning a file, the following information may be stored on the server:

  • Email addresses of the sender and recipients of the message, including the recipients of copies and blind carbon copies of the message.
  • Subject of the email message.
  • Date and time when the message was received by Kaspersky Anti Targeted Attack Platform, with precision up to the second.
  • All service headers of the message (as they appear in the message).

If the Central Node is installed on a server, detection information is stored on the Central Node server in the /data directory. If Central Node is installed as a cluster, detection information is stored in a ceph storage.

The data is stored indefinitely.

If the detection was created as a result of a rescan, the following information may be stored on the server:

  • File name.

See also

Data of the Central Node and Sensor components

Traffic data of the Sensor component

Data in events

Data in reports

Data on objects in Storage and Quarantine

Page top
[Topic 247484]

Data in events

Events may contain user data. If Central Node is installed on a server, information about occurred events is stored in the /data directory. If Central Node is installed as a cluster, the information is stored in ceph storage.

Data is rotated as the disk becomes full.

Kaspersky Anti Targeted Attack Platform resources provide no capability to restrict the rights of the users of servers and operating systems to which the Central Node component is installed. The administrator is advised to use any system resources at their own discretion to control how the users of servers and operating systems with the application installed may be granted access to the personal data of other users.

Event data can contain information related to the following:

  • Name of the computer where the event occurred.
  • Unique ID of the computer with the Endpoint Agent component.
  • Name of the user account under which the event occurred.
  • Name of the group that the user belongs to.
  • Event type.
  • Event time.
  • Information about the file for which the event was logged: name, path, full name.
  • MD5 and SHA256 hash of the file.
  • File creation time.
  • File modification time.
  • File access rights.
  • Environment variables of the process.
  • Command-line parameters.
  • Text of the command entered into the command line.
  • Local IP address of the adapter.
  • Local port.
  • Remote host name.
  • Remote host IP address.
  • Port on the remote host.
  • URLs and IP addresses of visited websites, and links from these websites.
  • Network connection protocol.
  • HTTP request method.
  • HTTP request header.
  • Information about Windows registry variables: path to the variable, variable name, variable value.
  • Contents of a script or binary file sent for AMSI scanning.
  • Information about the event in the Windows log: event type, event type ID, event ID, user account under which the event was logged, full text of the event from the Windows Event Log in XML format.

See also

Data of the Central Node and Sensor components

Traffic data of the Sensor component

Data in detections

Data in reports

Data on objects in Storage and Quarantine

Page top
[Topic 247485]

Data in reports

If the Central Node component is installed on a server, report data is stored in the /data directory indefinitely. If Central Node is installed as a cluster, the information is stored in ceph storage indefinitely.

Kaspersky Anti Targeted Attack Platform resources provide no capability to restrict the rights of the users of servers and operating systems to which the Central Node component is installed. The administrator is advised to use any system resources at their own discretion to control how the users of servers and operating systems with the application installed may be granted access to the personal data of other users.

Reports may contain the following information:

  • Report creation date.
  • Time period covered in the report.
  • ID of the user account that generated the report.
  • Report status.
  • Central Node components for which the report was generated.
  • Text of the report as HTML code.
  • Report description.
  • Name of the template that the report was generated from.
  • Tenant ID.

See also

Traffic data of the Sensor component

Data in detections

Data in events

Data on objects in Storage and Quarantine

Page top
[Topic 247486]

Data on objects in Storage and Quarantine

If the Central Node component is installed on a server, data about objects in storage and quarantine is stored in the /data directory indefinitely. If Central Node is installed as a cluster, the information is stored in ceph storage indefinitely.

Kaspersky Anti Targeted Attack Platform resources provide no capability to restrict the rights of the users of servers and operating systems to which the Central Node component is installed. The administrator is advised to use any system resources at their own discretion to control how the users of servers and operating systems with the application installed may be granted access to the personal data of other users.

Data on objects in Storage and quarantine may contain the following information:

  • Name of the object.
  • Path to the object on the computer with the Endpoint Agent component.
  • MD5- and SHA256 hash of the file.
  • File size.
  • ID of the user that quarantined the object.
  • ID of the user that placed the object in Storage.
  • IP address of the computer on which the quarantined object is stored.
  • Name of the computer on which the quarantined object is stored.
  • Unique ID of the computer on which the quarantined object is stored in Storage.
  • ID of the TAA (IOA) rule by which the detection was generated.
  • Category of the detected object.
  • Results for the object scanned using individual modules and technologies of the application.
  • File download time.
  • Metadata of scanned files and their sources.
  • Resulting status of the object in Storage.

See also

Traffic data of the Sensor component

Data in detections

Data in events

Data in reports

Page top
[Topic 247487]

Sandbox component data

For the processing time, the body of the file sent by the Central Node component is saved in open form on the server hosting the Sandbox component. During processing, the server administrator can access the sent file in Technical Support Mode. The scanned file is deleted by a special script according to the schedule. Once every 60 minutes by default.

Information about the data stored on the server with the Sandbox component is provided in the table below.

Data stored on the server with the Sandbox component

Scope of data

Storage location

Storage duration

Access to data

Scanned files

/var/opt/kaspersky/sandbox/library/

After the Central Node component receives the scan results or until automatic deletion, but no more than 24 hours.

User access is defined by the administrator using operating system tools.

File scan results

  • /var/opt/kaspersky/sandbox/library/
  • /tmp/

After the Central Node component receives the scan results or until automatic deletion, but no more than 24 hours.

User access is defined by the administrator using operating system tools.

Task settings

  • /var/opt/kaspersky/sandbox/library/
  • Sandbox component database

After the Central Node component receives the scan results or until automatic deletion, but no more than 24 hours in the directory /var/opt/kaspersky/sandbox/library/.

Up to 90 days in the Sandbox component database.

User access to the directory /var/opt/kaspersky/sandbox/library/ is defined by the administrator using operating system tools.

A password is required for user authentication in the database. Access to database files is granted only to users who started database processes and users with root privileges.

Access is provided only over an encrypted IPSec channel.

Trace files

/var/log/kaspersky/sandbox/

Up to 21 days.

User access is defined by the administrator using operating system tools.

Only authorized users can perform actions with trace files.

Information about actions with trace files is saved in the application event log.

Settings of the update source

/var/opt/kaspersky/apt-updater

Until modified or deleted.

User access is defined by the administrator using operating system tools.

Minimum password length settings

/var/opt/kaspersky/apt-config-ram-common/validator.conf

Until modified or deleted.

User access is defined by the administrator using operating system tools.

Virtual machines

/vm

Until modified or deleted.

User access is defined by the administrator using operating system tools.

Downloaded images of operating systems and applications in iso format

/var/opt/kaspersky/sandbox/custom_images/iso

Until modified or deleted.

User access is defined by the administrator using operating system tools.

See also

Data provision

Service data of the application

Data of the Central Node and Sensor components

Data transmitted between application components

Data contained in application trace files

Data of Kaspersky Endpoint Agent for Windows

Data of Kaspersky Endpoint Security for Windows

Data of Kaspersky Endpoint Security for Linux

Data of Kaspersky Endpoint Security for Mac

Page top
[Topic 176763]

Data transmitted between application components

Central Node and the Endpoint Agent component

Application used in the role of the Endpoint Agent component send the following to the Central Node component: task completion reports, information on events and alerts that occurred on computers with these applications, and information about terminal sessions.

If there is no connection with the Central Node component, all pending information is accumulated until it is sent to the Central Node component or until the application that is being used in the role of the Endpoint Agent is removed from the computer, but no longer than 21 days.

General information for all events

If an event occurred on the user's computer, the applications send the following data to the events database:

  • Event type.
  • Event time.
  • Event ID.
  • Version of the event schema.
  • Time when the event was processed by the Central Node server.
  • User account for which the event was generated.
  • Name of the host where the event occurred.
  • IP address of the host.
  • Type of the operating system installed on the host.
  • OS family.
  • OS name.
  • OS version.
  • The IP address of the network adapter that the application used in the role of the Endpoint Agent uses to connect to the Central Node or Sensor server.
  • The version of the application that is being used in the role of the Endpoint Agent component.
  • Date of the last update of the KBD databases.
  • Date of the last update of the SW databases.
  • Index date.
  • When marking up events in accordance with TAA (IOA) rules, the following information is transmitted:
    • ID of the triggered indicator of attack.
    • Decision of the triggered indicator of attack.
    • Source of the triggered indicator of attack.
    • Version of the triggered attack indicator.
    • MITRE technique code.
    • MITRE tactic code.
    • Alert importance depending on the security impact this alert may have on the computer or corporate LAN, based on Kaspersky experience.
    • Confidence of the detection depending on the likelihood of false alarms caused by the rule.

Central Node and Kaspersky Endpoint Agent for Windows

If an event occurred on the user's computer, the application sends the following data to the events database:

  1. File creation event.
    • Details of the process that created the file: process file name, and MD5- and SHA256 hash of the process file.
    • File name.
    • Path to the file.
    • Full name of the file.
    • MD5- and SHA256 hash of the file.
    • Date of file creation and modification.
    • File size.
  2. Registry monitoring event.
    • Details of the process that modified the registry: Process ID, process file name, and MD5- and SHA256 hash of the process file.
    • Path to the registry key.
    • Registry value name.
    • Registry value data.
    • Registry value type.
    • Previous path to the registry key.
    • Previous registry value data.
    • Previous registry value type.
  3. Driver loading event.
    • File name.
    • Path to the file.
    • Full name of the file.
    • MD5- and SHA256 hash of the file.
    • File size.
    • Date of file creation and modification.
  4. Listening port opening event.
    • Details of the process that opened the listening port: process file name, and MD5- and SHA256 hash of the process file.
    • Port number.
    • Adapter IP address.
  5. Event in the operating system log.
    • Time of the event, host on which the event occurred, and user account name.
    • Event ID.
    • Channel/log name.
    • Event ID in the log.
    • Provider name.
    • Authentication event subtype.
    • Domain name.
    • Remote IP address.
    • Event header fields: ProviderName, EventId, Version, Level, Task, Opcode, Keywords, TimeCreatedSystemTime, EventRecordId, CorellationActivityId, ExecutionProcessID, ThreadID, Channel, Computer.
    • Event body fields: AccessList, AccessFiles mask, AccountExpires, AllowedToDelegateTo, Application, AuditPolicyChanges, AuthenticationPackageName, CategoryId, CommandLine, DisplayName, Dummy, ElevatedToken, EventCode, EventProcessingFailure, FailureReason, FilterRTID, HandleId, HomeDirectory, HomePath, ImpersonationLevel, IpAddress, IpPort, KeyLength, LayerName, LayerRTID, LmPackageName, LogonGuid, LogonHours, LogonProcessName, LogonType, MandatoryLabel, MemberName, MemberSid, NewProcessId, NewProcessName, NewUacValue, NewValue, NewValueType, ObjectName, ObjectServer, ObjectType, ObjectValueName, OldUacValue, OldValue, OldValueType, OperationType, PackageName, ParentProcessName, PasswordLastSet, PrimaryGroupId, PriviledgeList, ProcessId, ProcessName, ProfileChanged, ProfilePath, Protocol, PublisherId, ResourceAttributes, RestrictedAdminMode, SamAccountName, ScriptPath, ServiceAccount, ServiceFileName, ServiceName, ServiceStartType, ServiceType, SettingType, SettingValue, ShareLocalPath, ShareName, SidHistory, SourceAddress, SourcePort, Status, SubcategoryGuid, SubcategoryId, SubjectDomainName, SubjectLogonId, SubjectUserName, SubjectUserSid, SubStatus, TargetDomainName, TargetLinkedLogonId, TargetLogonId, TargetOutboundDomainName, TargetOutboundUserName, TargetUserName, TargetUserSid, TaskContent, TaskName, TokenElevationType, TransmittedServices, UserAccountControl, UserParameters, UserPrincipalName, UserWorkstations, VirtualAccount, Workstation, WorkstationName.
  6. Process start event.
    • Information about the process file: file name, file path, MD5 or SHA256 hash of the file, file size, creation and modification date, name of the organization that issued the digital certificate of the file, digital signature verification result.
    • UniquePID.
    • Process start options.
    • Process start time.
    • Information about the parent process: file path, UniquePID, MD5 or SHA256 hash of the process file, process start options.
  7. Process stop event.
    • Information about the file of the process: file name, file path, full name of the file, MD5 or SHA256 hash of the file, file size, and process end time.
    • UniquePID.
    • Process start options.
    • Information about the parent process: file path, UniquePID, MD5 or SHA256 hash of the process file, process start options.
  8. Module loading event.
    • Details of the file that loaded the module: UniquePID, file name, file path, full name of the file, MD5- and SHA256 hash of the file, and file size.
    • DLL name.
    • Path to DLL.
    • DLL full name.
    • MD5 or SHA256 hash of the DLL.
    • DLL size.
    • Date of DLL creation and modification.
    • Name of the organization that issued the digital certificate of the DLL.
    • DLL digital signature verification result.
  9. Process startup blocking event.
    • Details of the file that attempted to run: file name, file path, full name of the file, MD5- and SHA256 hash of the file, file size, and date of file creation and modification.
    • Command line parameters.
  10. File startup blocking event.
    • Details of the file that attempted to open: file name, file path, full name of the file, MD5- and SHA256 hash of the file, type of checksum used for file size blocking (0 – MD5, !=0 – SHA256, not used for search).
    • Details of the executable file: file name, file path, full name of the file, MD5- and SHA256 hash of the file, file size, and date of file creation and modification.
    • Details of the parent process: file name, file path, full name of the file, MD5- and SHA256 hash of the file, PID, and UniquePID.
  11. Detection event and the result of its processing (when Kaspersky Endpoint Agent for Windows is integrated with Kaspersky Endpoint Security for Windows).
    • Scan result.
    • Name of the detected object.
    • ID of the record in application databases.
    • Release time of the application databases with which the detection was generated.
    • Object processing mode.
    • Category of the detected object (for example, name of a virus).
    • MD5 hash of the detected object.
    • SHA256 hash of the detected object.
    • Unique ID of the process.
    • Process PID displayed in the Windows Task Manager.
    • Process start command line.
    • Reason for the error when processing the object.
    • Contents of the script scanned using AMSI.
  12. AMSI scan event.
    • Contents of the script scanned using AMSI.

Central Node and Kaspersky Endpoint Security for Windows

If an event occurred on the user's computer, the application sends the following data to the events database:

  1. File modification event.
    • Details of the process that created the file: process file name, and MD5- and SHA256 hash of the process file.
    • Information about the created or modified file: name, path, full name, type, MD5 hash, SHA256 hash, creation date, modification date, attributes, attribute modification date, size, zone ID, application name of the file, vendor, name of the organization that issued the digital certificate, description, digital signature verification result, time of the digital signature, original name, name before modification, path before modification, full name before modification.
    • Information about the file to which a link was created: MD5 hash, SHA256 hash, creation date, modification date, attributes, attribute modification date, size, type, zone ID, application name of the file, original name, name of the organization that issued the digital certificate, description, subject of the signature, digital signature verification result, time of the digital signature, full name of the link file.
  2. Registry monitoring event.
    • Details of the process that modified the registry: Process ID, process file name, and MD5- and SHA256 hash of the process file.
    • Path to the registry key.
    • Registry value name.
    • Registry value data.
    • Registry value type.
    • Previous path to the registry key.
    • Previous registry value data.
    • Previous registry value type.
    • Type of the operation with the registry.
    • Path to the file where the registry key was saved.
  3. Driver loading event.
    • File name.
    • Original file name.
    • Path to the file.
    • Full name of the file.
    • MD5- and SHA256 hash of the file.
    • File size.
    • Date of file creation and modification.
    • File attribute modification date.
    • File size.
    • File type.
    • File attributes.
    • File zone ID.
    • File vendor.
    • File description.
    • Name of the organization that issued the digital certificate.
    • Signature subject.
    • Digital signature verification result.
    • Time of digital signature.
    • URL from which the file was retrieved.
    • Metadata of the message from which the file was retrieved.
  4. Listening port opening event.
    • Details of the process that opened the listening port: process file name, and MD5- and SHA256 hash of the process file.
    • Port number.
    • Adapter IP address.
    • Operation status.
  5. Remote connection event.
    • Information about the local computer: IP address, port number.
    • Information about the remote computer: IP address, port number, FQDN.
    • Information about TLS encryption of the connection: protocol version, SNI, encrypted SNI, MD5 hash of the certificate file, SHA1 hash of the certificate file, certificate issuer name, certificate serial number, certificate verification result, certificate expiration date, Ja3, Ja3s, MD5 hash of Ja3, MD5 hash of Ja3s, socket type.
    • LANA number.
    • HTTP method.
    • URL that was followed.
    • Process status.
    • Connection direction.
  6. DNS lookup event.
    • IPv4 address of the DNS server.
    • Binary mask of the DNS query being performed.
    • DNS response error code.
    • DNS query type ID.
    • Name of the domain for which the DNS record is to be resolved.
    • Date of the DNS response.
  7. LDAP event.
    • Search scope.
    • Search query filter.
    • Attributes specified in the query as attributes to be returned.
    • Path to the LDAP container to be searched.
  8. Process start event.

    Information about files of the parent and grandparent processes, loader processes, creator processes, running processes: name, path, full name, MD5 hash, SHA256 hash, creation date and time, modification date and time, attributes, attribute modification date and time, size, zone ID, vendor, name of the organization that issued the digital certificate, description, original name, digital signature subject, digital signature verification result, date and time of the digital signature, file version, logon type, login session ID, user account type, user name, user account ID, IP address of the computer from which the logon was made, integrity level, process ID, current directory.

  9. Process stop event.
    • Information about the file of the process: file name, file path, full name of the file, MD5 or SHA256 hash of the file, file size, and process end time.
    • Unique ID of the process.
    • Process start options.
    • Information about the parent process: file path, UniquePID, MD5 and SHA256 hash, command line options.
  10. Process access event.
    • Operation type.
    • Process access permissions.
    • Call stack.
    • Information about the file of the recipient process and the file of the process from which the handle was duplicated: name, path, full path, MD5 and SHA256 hash, creation date and time, modification date and time, attribute modification date and time, size, unique ID, system ID, command line options, URL from which the file was retrieved, metadata of the message from which the file was retrieved.
  11. Module loading event.
    • Details of the file that loaded the module: UniquePID, file name, file path, full name of the file, MD5- and SHA256 hash of the file, and file size.
    • DLL name.
    • Path to DLL.
    • DLL full name.
    • MD5 or SHA256 hash of the DLL.
    • DLL size.
    • DLL attributes.
    • DLL zone ID.
    • DLL application name.
    • Original DLL name.
    • Date of DLL creation and modification.
    • Name of the organization that issued the digital certificate of the DLL.
    • DLL digital signature verification result.
    • DLL digital signature date.
    • Path to replaced DLL.
    • DLL file type.
    • URL from which the file was retrieved.
    • Metadata of the message from which the file was retrieved.
    • .NET assembly name.
    • .NET assembly flags.
    • .NET module flags.
  12. Process startup blocking event.
    • Details of the file that attempted to run: file name, file path, full name of the file, MD5- and SHA256 hash of the file, file size, and date of file creation and modification.
    • Command line parameters.
  13. File startup blocking event.
    • Information about the file that was being opened: file name, file path, full file name, MD5 hash, SHA256 hash, type of checksum that triggered the blocking, (0 for MD5, !=0 for SHA256, not used for search), URL of the website from which the executable file was downloaded, metadata of the message to which the downloaded file was attached.
    • Details of the executable file: file name, file path, full name of the file, MD5- and SHA256 hash of the file, file size, and date of file creation and modification.
    • Details of the parent process: file name, file path, full name of the file, MD5- and SHA256 hash of the file, PID, and UniquePID.
  14. Event of named pipe being opened and connected to.
    • File name of the process that created or connected to the named pipe.
    • Pipe operation type.
  15. Threat detection event and detection processing result.
    • Name of the detected object.
    • MD5 hash of the detected object.
    • SHA256 hash of the detected object.
    • Type of detected object.
    • Scan result.
    • ID of the record in application databases.
    • Version of the application databases used to generate the detection.
    • Object processing mode.
    • Category of the detected object (for example, name of a virus).
    • Protocol.
    • IPv4 or IPv6 address of the local computer.
    • Local port number.
    • IPv4 or IPv6 address of the remote computer.
    • Remote port number.
    • URL from which the file was retrieved.
    • Email address of the sender if the file was obtained from an email message.
    • Full name, MD5 hash, SHA256 hash of the file loader.
    • Unique ID of the process.
    • Process PID displayed in the Windows Task Manager.
    • Process start command line.
    • Reason for the error when processing the object.
    • Contents and type of the script scanned using AMSI.
  16. WMI service start event.
    • Operation type.
    • Remote startup flag of the WMI service.
    • Name of the computer on which the WMI service was started.
    • Name of the user that started the WMI service.
    • WMI namespace.
    • Event consumer filter name.
    • Name of the created event consumer.
    • Event consumer source code.
  17. AMSI scan event.
    • Contents of the script scanned using AMSI.
    • Content type of the script sent for scanning.
    • Name of the script sent for scanning.
    • MD5 hash of the script file.
    • SHA256 hash of the script file.
  18. Code injection event.
    • Information about the recipient process: application name, full application name, path to the application, MD5 hash of the file, SHA256 hash of the file, URL from which the file was downloaded, metadata of the message to which the downloaded file was attached, unique ID of the application, system ID of the application, command line, name of the process DLL, path to the process DLL, address of the process in the address space.
    • Injection method.
    • Modified command line of the process.
    • System call parameters.
    • API call stack at the time of interception of the injection-related function.
  19. Interpreted file run event.

    Information about the interpreted file: name, path, full name, MD5, SHA256, file creation date and time, file modification date and time, size, type, attributes, attribute modification date and time, original name, description, zone ID, name of organization that issued the digital certificate, result of digital signature verification, date and time of the digital signature, subject of the digital signature, URL from which the file was obtained, metadata of the message to which the downloaded file was attached.

  20. Event in the operating system log.
    • Time of the event, host on which the event occurred, and user account name.
    • Event ID.
    • Channel/log name.
    • Event ID in the log.
    • Provider name.
    • Authentication event subtype.
    • Domain name.
    • Remote IP address.
    • Event header fields: ProviderName, EventId, Version, Level, Task, Opcode, Keywords, TimeCreatedSystemTime, EventRecordId, CorellationActivityId, ExecutionProcessID, ThreadID, Channel, Computer.
    • Event body fields: AccessList, AccessFiles mask, AccountExpires, AllowedToDelegateTo, Application, AuditPolicyChanges, AuthenticationPackageName, CategoryId, CommandLine, DisplayName, Dummy, ElevatedToken, EventCode, EventProcessingFailure, FailureReason, FilterRTID, HandleId, HomeDirectory, HomePath, ImpersonationLevel, IpAddress, IpPort, KeyLength, LayerName, LayerRTID, LmPackageName, LogonGuid, LogonHours, LogonProcessName, LogonType, MandatoryLabel, MemberName, MemberSid, NewProcessId, NewProcessName, NewUacValue, NewValue, NewValueType, ObjectName, ObjectServer, ObjectType, ObjectValueName, OldUacValue, OldValue, OldValueType, OperationType, PackageName, ParentProcessName, PasswordLastSet, PrimaryGroupId, PriviledgeList, ProcessId, ProcessName, ProfileChanged, ProfilePath, Protocol, PublisherId, ResourceAttributes, RestrictedAdminMode, SamAccountName, ScriptPath, ServiceAccount, ServiceFileName, ServiceName, ServiceStartType, ServiceType, SettingType, SettingValue, ShareLocalPath, ShareName, SidHistory, SourceAddress, SourcePort, Status, SubcategoryGuid, SubcategoryId, SubjectDomainName, SubjectLogonId, SubjectUserName, SubjectUserSid, SubStatus, TargetDomainName, TargetLinkedLogonId, TargetLogonId, TargetOutboundDomainName, TargetOutboundUserName, TargetUserName, TargetUserSid, TaskContent, TaskName, TokenElevationType, TransmittedServices, UserAccountControl, UserParameters, UserPrincipalName, UserWorkstations, VirtualAccount, Workstation, WorkstationName, System, SystemProvider, SystemProviderName, SystemProviderGuid, SystemProviderEventSourceName, SystemEventID, SystemEventIDQualifiers, SystemEventRecordID, SystemChannel, SystemTask, SystemOpcode, SystemVersion, SystemLevel, SystemKeywords, SystemTimeCreated, SystemTimeCreatedSystemTime, SystemCorrelation, SystemCorrelationActivityID, SystemExecution, SystemExecutionProcessID, SystemExecutionThreadID, SystemComputer, SystemSecurity, SystemSecurityUserID, UserData, UserDataEventProcessingFailure, UserDataEventProcessingFailureError, UserDataEventProcessingFailureErrorCode, UserDataEventProcessingFailureEventID, UserDataEventProcessingFailurePublisherID, UserDataLogFileCleared, UserDataLogFileClearedSubjectUserSid, UserDataLogFileClearedSubjectUserName, UserDataLogFileClearedSubjectDomainName, UserDataLogFileClearedSubjectLogonId, UserDataFileIsFull, UserDataOperationStartedOperationalProviderName, UserDataOperationStartedOperationalCode, UserDataOperationStartedOperationalHostProcess, UserDataOperationStartedOperationalProcessID, UserDataOperationStartedOperationalProviderPath, UserDataServiceShutdown, UserDataOperationClientFailure, UserDataOperationClientFailureId, UserDataOperationClientFailureClientMachine, UserDataOperationClientFailureUser, UserDataOperationClientFailureClientProcessId, UserDataOperationClientFailureComponent, UserDataOperationClientFailureOperation, UserDataOperationClientFailureResultCode, UserDataOperationClientFailurePossibleCause, EventData, EventDataData, EventDataDataTaskName, EventDataDataPrivilegeList, EventDataDataAttributeLDAPDisplayName, EventDataDataOperationType, EventDataDataObjectClass, EventDataDataAttributeValue, EventDataDataObjectDN, EventDataDataRelativeTargetName, EventDataDataWorkstationName, EventDataDataServiceName, EventDataDataAllowedToDelegateTo, EventDataDataUserAccountControl, EventDataDataProfileChanged, EventDataDataRuleId, EventDataDataRuleName, EventDataDataSubjectUserSid, EventDataDataSubjectUserName, EventDataDataSubjectDomainName, EventDataDataSubjectLogonId, EventDataDataPreviousTime, EventDataDataNewTime, EventDataDataProcessId, EventDataDataProcessName, EventDataDataObjectType, EventDataDataObjectName, EventDataDataAccessList, EventDataDataAccessMask, EventDataDataServiceFileName, EventDataDataServiceType, EventDataDataServiceStartType, EventDataDataServiceAccount, EventDataDataDomainName, EventDataDataDomainSid, EventDataDataTdoType, EventDataDataTdoDirection, EventDataDataTdoAttributes, EventDataDataSidFilteringEnabled, EventDataDataTargetSid, EventDataDataAccessGranted, EventDataDataTargetUserName, EventDataDataTargetDomainName, EventDataDataSamAccountName, EventDataDataSidHistory, EventDataDataDomainPolicyChanged, EventDataDataMinPasswordAge, EventDataDataMaxPasswordAge, EventDataDataForceLogoff, EventDataDataLockoutThreshold, EventDataDataLockoutObservationWindow, EventDataDataLockoutDuration, EventDataDataProperties, EventDataDataPasswordProperties, EventDataDataMinPasswordLength, EventDataDataPasswordHistoryLength, EventDataDataMachineAccountQuota, EventDataDataMixedDomainMode, EventDataDataDomainBehaviorVersion, EventDataDataOemInformation, EventDataDataGroupTypeChange, EventDataDataLogonGuid, EventDataDataTargetUserSid, EventDataDataTargetLogonId, EventDataDataTargetLogonGuid, EventDataDataSidList, EventDataDataWorkstation, EventDataDataStatus, EventDataDataCallerProcessId, EventDataDataCallerProcessName, EventDataDataForestRoot, EventDataDataForestRootSid, EventDataDataOperationId, EventDataDataEntryType, EventDataDataFlags, EventDataDataTopLevelName, EventDataDataDnsName, EventDataDataNetbiosName, EventDataDataAuditSourceName, EventDataDataEventSourceId, EventDataDataErrorCode, EventDataDataGPOList, EventDataDataDestinationDRA, EventDataDataSourceDRA, EventDataDataSourceAddr, EventDataDataNamingContext, EventDataDataOptions, EventDataDataStatusCode, EventDataDataSessionID, EventDataDataStartUSN, EventDataDataPackageName, EventDataDataAuthenticationPackageName, EventDataDataFailureReason, EventDataDataSubStatus, EventDataDataCategoryId, EventDataDataSubcategoryGuid, EventDataDataAuditPolicyChanges, EventDataDataUserPrincipalName, EventDataDataHomeDirectory, EventDataDataHomePath, EventDataDataScriptPath, EventDataDataProfilePath, EventDataDataUserWorkstations, EventDataDataPasswordLastSet, EventDataDataAccountExpires, EventDataDataPrimaryGroupId, EventDataDataOldUacValue, EventDataDataNewUacValue, EventDataDataUserParameters, EventDataDataLogonHours, EventDataDataMemberName, EventDataDataMemberSid, EventDataDataServiceSid, EventDataDataTicketOptions, EventDataDataTicketEncryptionType, EventDataDataPreAuthType, EventDataDataCertIssuerName, EventDataDataCertSerialNumber, EventDataDataCertThumbprint, EventDataDataSettingType, EventDataDataSettingValue, EventDataDataShareName, EventDataDataShareLocalPath, EventDataDataApplication, EventDataDataSourceAddress, EventDataDataSourcePort, EventDataDataProtocol, EventDataDataFilterRTID, EventDataDataLayerName, EventDataDataLayerRTID, EventDataDataLogonType, EventDataDataLogonProcessName, EventDataDataTransmittedServices, EventDataDataLmPackageName, EventDataDataKeyLength, EventDataDataIpAddress, EventDataDataIpPort, EventDataDataImpersonationLevel, EventDataDataRestrictedAdminMode, EventDataDataTargetOutboundUserName, EventDataDataTargetOutboundDomainName, EventDataDataVirtualAccount, EventDataDataTargetLinkedLogonId, EventDataDataElevatedToken, EventDataDataTaskContentNew, EventDataDataTaskContentNewTask, EventDataDataTaskContentNewTaskRegistrationInfo, EventDataDataTaskContentNewTaskRegistrationInfoDate, EventDataDataTaskContentNewTaskRegistrationInfoAuthor, EventDataDataTaskContentNewTaskTriggers, EventDataDataTaskContentNewTaskPrincipals, EventDataDataTaskContentNewTaskPrincipalsPrincipal, EventDataDataTaskContentNewTaskPrincipalsPrincipalid, EventDataDataTaskContentNewTaskPrincipalsPrincipalRunLevel, EventDataDataTaskContentNewTaskPrincipalsPrincipalUserId, EventDataDataTaskContentNewTaskPrincipalsPrincipalLogonType, EventDataDataTaskContentNewTaskSettings, EventDataDataTaskContentNewTaskSettingsMultipleInstancesPolicy, EventDataDataTaskContentNewTaskSettingsDisallowStartIfOnBatteries, EventDataDataTaskContentNewTaskSettingsStopIfGoingOnBatteries, EventDataDataTaskContentNewTaskSettingsAllowHardTerminate, EventDataDataTaskContentNewTaskSettingsStartWhenAvailable, EventDataDataTaskContentNewTaskSettingsRunOnlyIfNetworkAvailable, EventDataDataTaskContentNewTaskSettingsIdleSettings, EventDataDataTaskContentNewTaskSettingsIdleSettingsStopOnIdleEnd, EventDataDataTaskContentNewTaskSettingsIdleSettingsRestartOnIdle, EventDataDataTaskContentNewTaskSettingsAllowStartOnDemand, EventDataDataTaskContentNewTaskSettingsEnabled, EventDataDataTaskContentNewTaskSettingsHidden, EventDataDataTaskContentNewTaskSettingsRunOnlyIfIdle, EventDataDataTaskContentNewTaskSettingsWakeToRun, EventDataDataTaskContentNewTaskSettingsExecutionTimeLimit, EventDataDataTaskContentNewTaskSettingsPriority, EventDataDataTaskContentNewTaskActions, EventDataDataTaskContentNewTaskActionsContext, EventDataDataTaskContentNewTaskActionsExec, EventDataDataTaskContentNewTaskActionsExecCommand, EventDataDataOldSd, EventDataDataNewSd, EventDataDataNotificationPackageName, EventDataDataSecurityPackageName, EventDataDataStopTime, EventDataDataContextInfo, EventDataDataUserData, EventDataDataPayload, EventDataDataOpCorrelationID, EventDataDataAppCorrelationID, EventDataDataDSName, EventDataDataDSType, EventDataDataObjectGUID, EventDataDataFileName, EventDataDataLinkName, EventDataDataTransactionId, EventDataDataOldObjectDN, EventDataDataNewObjectDN, EventDataDatabcdCCID, EventDataDatabMaxSlotIndex, EventDataDatabVoltageSupport, EventDataDatadwProtocols, EventDataDatadwDefaultClock, EventDataDatadwMaximumClock, EventDataDatabNumClockSupported, EventDataDatadwDataRate, EventDataDatadwMaxDataRate, EventDataDatabNumDataRateSupported, EventDataDatadwMaxIFSD, EventDataDatadwSyncProtocols, EventDataDatadwMechanical, EventDataDatadwFeatures, EventDataDataObjectValueName, EventDataDataHandleId, EventDataDataOldValueType, EventDataDataOldValue, EventDataDataNewValueType, EventDataDataNewValue, EventDataDataSubjectUserDomainName, EventDataDataObjectCollectionName, EventDataDataObjectIdentifyingProperties, EventDataDataObjectProperties, EventDataDataparam, EventDataDataCVEID, EventDataDataAdditionalDetails, EventDataDataObjectServer, EventDataDataTaskContent, EventDataDataTaskContentTask, EventDataDataTaskContentTaskRegistrationInfo, EventDataDataTaskContentTaskRegistrationInfoDate, EventDataDataTaskContentTaskRegistrationInfoAuthor, EventDataDataTaskContentTaskTriggers, EventDataDataTaskContentTaskPrincipals, EventDataDataTaskContentTaskPrincipalsPrincipal, EventDataDataTaskContentTaskPrincipalsPrincipalid, EventDataDataTaskContentTaskPrincipalsPrincipalRunLevel, EventDataDataTaskContentTaskPrincipalsPrincipalUserId, EventDataDataTaskContentTaskPrincipalsPrincipalLogonType, EventDataDataTaskContentTaskSettings, EventDataDataTaskContentTaskSettingsMultipleInstancesPolicy, EventDataDataTaskContentTaskSettingsDisallowStartIfOnBatteries, EventDataDataTaskContentTaskSettingsStopIfGoingOnBatteries, EventDataDataTaskContentTaskSettingsAllowHardTerminate, EventDataDataTaskContentTaskSettingsStartWhenAvailable, EventDataDataTaskContentTaskSettingsRunOnlyIfNetworkAvailable, EventDataDataTaskContentTaskSettingsIdleSettings, EventDataDataTaskContentTaskSettingsIdleSettingsStopOnIdleEnd, EventDataDataTaskContentTaskSettingsIdleSettingsRestartOnIdle, EventDataDataTaskContentTaskSettingsAllowStartOnDemand, EventDataDataTaskContentTaskSettingsEnabled, EventDataDataTaskContentTaskSettingsHidden, EventDataDataTaskContentTaskSettingsRunOnlyIfIdle, EventDataDataTaskContentTaskSettingsWakeToRun, EventDataDataTaskContentTaskSettingsExecutionTimeLimit, EventDataDataTaskContentTaskSettingsPriority, EventDataDataTaskContentTaskActions, EventDataDataTaskContentTaskActionsContext, EventDataDataTaskContentTaskActionsExec, EventDataDataTaskContentTaskActionsExecCommand, EventDataDataOldTargetUserName, EventDataDataNewTargetUserName, EventDataDataDeviceId, EventDataDataDeviceDescription, EventDataDataClassId, EventDataDataClassName, EventDataDataVendorIds, EventDataDataCompatibleIds, EventDataDataLocationInformation, EventDataDataAccountName, EventDataDataAccountDomain, EventDataDataLogonID, EventDataDataSessionName, EventDataDataClientName, EventDataDataClientAddress, EventDataDataMajorVersion, EventDataDataMinorVersion, EventDataDataBuildVersion, EventDataDataQfeVersion, EventDataDataServiceVersion, EventDataDataBootMode, EventDataDataStartTime, EventDataDataOldRemark, EventDataDataNewRemark, EventDataDataOldMaxUsers, EventDataDataNewMaxUsers, EventDataDataOldShareFlags, EventDataDataNewShareFlags, EventDataDataOldSD, EventDataDataNewSD, EventDataDataTreeDelete, EventDataDataPuaCount, EventDataDataPuaPolicyId, EventDataDataResourceAttributes, EventDataDataModifiedObjectProperties, EventDataDataDisplayName, EventDataDataDnsHostName, EventDataDataServicePrincipalNames, EventDataDataAttributeSyntaxOID, EventDataDataDummy, EventDataDataComputerAccountChange, EventDataDataMessageNumber, EventDataDataMessageTotal, EventDataDataScriptBlockText, EventDataDataScriptBlockId, EventDataDataPath, EventDataDataImagePath, EventDataDataStartType, EventDataDataAppName, EventDataDataAppVersion, EventDataDataTerminationTime, EventDataDataExeFileName, EventDataDataReportId, EventDataDataPackageFullName, EventDataDataPackageRelativeAppId, EventDataDataHangType, EventDataDataAccessReason, EventDataDataTargetServerName, EventDataDataTargetInfo, EventDataDataTargetProcessId, EventDataDataTargetProcessName, EventDataDataKerberosPolicyChange, EventDataDataSubcategoryId, EventDataBinary.

Central Node and Kaspersky Endpoint Security for Linux

If an event occurred on the user's computer, the application sends the following data to the events database:

  1. File modification event.
    • Details of the process that created the file: process file name, and MD5- and SHA256 hash of the process file.
    • Information about the created or modified file: name, path, full name, type, MD5 hash, SHA256 hash, creation date, modification date, attributes, attribute modification date, size, zone ID, application name of the file, vendor, name of the organization that issued the digital certificate, description, digital signature verification result, time of the digital signature, original name, name before modification, path before modification, full name before modification.
    • Information about the file to which a link was created: MD5 hash, SHA256 hash, creation date, modification date, attributes, attribute modification date, size, type, zone ID, application name of the file, original name, name of the organization that issued the digital certificate, description, subject of the signature, digital signature verification result, time of the digital signature, full name of the link file.
    • File type.
    • Owner ID.
    • Owner group ID.
    • Owner user name.
    • Owner group name.
    • URL from which the file was retrieved.
    • Metadata of the message from which the file was retrieved.
    • Requested access flags.
    • Indicator of file deletion after a restart.
    • File access flags.
  2. Event in the operating system log.
    • Event time.
    • Event type.
    • Event name.
    • Result of the operation.
    • Information about the parent process: file path, UniquePID, MD5 or SHA256 hash of the process file, command that was used to start the process.
  3. Process start event.

    Information about files of the parent and grandparent processes, loader processes, creator processes, running processes: name, path, full name, MD5 hash, SHA256 hash, creation date and time, modification date and time, attributes, attribute modification date and time, size, zone ID, vendor, name of the organization that issued the digital certificate, description, original name, digital signature subject, digital signature verification result, date and time of the digital signature, file version, logon type, login session ID, user account type, user name, user account ID, IP address of the computer from which the logon was made, integrity level, process ID, current directory, owner ID, owner group ID, owner user name, owner group name, real user name, real group name, effective group name, effective user name, file access permission flags, URL from which the file was downloaded, metadata of the message from which the file was obtained, process environment variables, command line options, process type.

  4. Process stop event.
    • Information about the file of the process: file name, file path, full name of the file, MD5 or SHA256 hash of the file, file size, and process end time.
    • UniquePID.
    • Process start options.
    • Information about the parent process: file path, UniquePID, MD5 or SHA256 hash of the process file, process start options.
  5. Detection event and the result of its processing.
    • Scan result.
    • Name of the detected object.
    • ID of the record in application databases.
    • Release time of the application databases with which the detection was generated.
    • Object processing mode.
    • Category of the detected object (for example, name of a virus).
    • MD5 hash of the detected object.
    • SHA256 hash of the detected object.
    • Unique ID of the process.
    • PID of the process.
    • Process start command line.
    • Reason for the error when processing the object.
  6. DNS lookup event.
    • IPv4 address of the DNS server.
    • Binary mask of the DNS query being performed.
    • DNS response error code.
    • DNS query type ID.
    • Name of the domain for which the DNS record is to be resolved.
    • Date of the DNS response.
  7. Code injection event.
    • Information about the recipient process: application name, full application name, path to the application, MD5 hash of the file, SHA256 hash of the file, URL from which the file was downloaded, metadata of the message to which the downloaded file was attached, unique ID of the application, system ID of the application, command line, name of the process DLL, path to the process DLL, address of the process in the address space.
    • Injection method.
    • Modified command line of the process.
    • System call parameters.
    • API call stack at the time of interception of the injection-related function.

Central Node and Kaspersky Endpoint Security for Mac

If an event occurred on the user's computer, the application sends the following data to the events database:

  1. File creation event.
    • Details of the process that created the file: process file name, and MD5- and SHA256 hash of the process file.
    • File name.
    • Path to the file.
    • Full name of the file.
    • File type.
    • MD5- and SHA256 hash of the file.
    • Date of file creation and modification.
    • File size.
  2. Process start event.

    Information about files of the parent and grandparent processes, loader processes, creator processes, running processes: name, path, full name, MD5 hash, SHA256 hash, creation date and time, modification date and time, attributes, attribute modification date and time, size, zone ID, vendor, name of the organization that issued the digital certificate, description, original name, digital signature subject, digital signature verification result, date and time of the digital signature, file version, logon type, login session ID, user account type, user name, user account ID, IP address of the computer from which the logon was made, integrity level, process ID, current directory, owner ID, owner group ID, owner user name, owner group name, real user name, real group name, effective group name, effective user name, file access permission flags, URL from which the file was downloaded, metadata of the message from which the file was obtained, process environment variables, command line options, process type.

  3. Process stop event.
    • Information about the file of the process: file name, file path, full name of the file, MD5 or SHA256 hash of the file, file size, and process end time.
    • UniquePID.
    • Process start options.
    • Information about the parent process: file path, UniquePID, MD5 or SHA256 hash of the process file, process start options.
  4. Threat detection event and detection processing result.
    • Scan result.
    • Name of the detected object.
    • ID of the record in application databases.
    • Release time of the application databases with which the detection was generated.
    • Object processing mode.
    • Category of the detected object (for example, name of a virus).
    • MD5 hash of the detected object.
    • SHA256 hash of the detected object.
    • Unique ID of the process.
    • PID of the process.
    • Process start command line.
    • Reason for the error when processing the object.

Central Node and Sandbox

The Central Node component sends to the Sandbox component files and URLs extracted from the network and email traffic. The files are not changed in any way prior to sending. The Sandbox component sends scan results to the Central Node component.

Central Node and Sensor

The application may transmit the following data between Central Node and Sensor components:

  • Files and email messages.
  • Data on alerts generated by the Intrusion Detection System and URL Reputation technologies.
  • License information.
  • List of data excluded from the scan.
  • Data of the Endpoint Sensors application, if integration with a proxy server has been configured.
  • Application databases, if receiving database updates from the Central Node component is configured.

Servers with PCN and SCN roles

If the application is running in distributed solution mode, data about the following things is transmitted between the PCN and connected SCNs:

  • Alerts.
  • Events.
  • Tasks.
  • Policies.
  • Scans using IOC, TAA (IOA), IDS, YARA user rules.
  • Files in Storage.
  • User accounts.
  • The license.
  • The list of computers with the Endpoint Agent component.
  • Objects placed in Storage.
  • Objects quarantined on computers with the Endpoint Agent component.
  • Files attached to detections.
  • IOC and YARA files.

See also

Service data of the application

Data of the Central Node and Sensor components

Sandbox component data

Data contained in application trace files

Data of Kaspersky Endpoint Agent for Windows

Data of Kaspersky Endpoint Security for Windows

Data of Kaspersky Endpoint Security for Linux

Data of Kaspersky Endpoint Security for Mac

Page top
[Topic 247488]

Data contained in application trace files

Kaspersky Anti Targeted Attack Platform resources provide no capability to restrict the rights of the users of servers and operating systems to which the Central Node component is installed. The administrator is advised to use any system resources at their own discretion to control how the users of servers and operating systems with the application installed may be granted access to the personal data of other users.

Trace files can include any personal data of the user or confidential data of your organization. Files are stored in the /var/log/kaspersky directory indefinitely.

Page top
[Topic 242956][Topic 247138]

Data received from the Central Node component

Kaspersky Endpoint Agent saves the values of settings received from the Central Node component on the hard drive of the computer. Data is saved in open non-encrypted form in the folder C:\ProgramData\Kaspersky Lab\Endpoint Agent\protected\data.

By default, only users with System and Administrator permissions have read-access to files when Self-Defense is enabled. When Self-Defense is disabled, users with System and Administrator permissions can also delete the files, modify their contents, and modify the access rights to them. The Kaspersky Endpoint Agent application does not manage access permissions to this folder or any files in it. It is the system administrator who determines access permissions.

The data is deleted when Kaspersky Endpoint Agent is removed.

Data received from the Central Node component may contain the following information:

  • Data on network connections.
  • Data on the operating system that is installed on the server with the Central Node component.
  • Data on operating system user accounts.
  • Data on user sessions in the operating system.
  • Data on Windows event log.
  • About a RT_VERSION resource.
  • About the contents of a PE file.
  • About operating system services.
  • Certificate of the server with the Central Node component.
  • URL- and IP addresses of visited websites.
  • HTTP protocol headers.
  • Computer name.
  • MD5 hashes of files.
  • Unique ID of the computer with Kaspersky Endpoint Agent.
  • Names and values of Windows registry keys.
  • Paths to Windows registry keys.
  • Names of Windows registry variables.
  • Name of the local DNS cache entry.
  • Address from the local DNS cache entry in IPv4 format.
  • IP address or name of the requested host from the local DNS cache.
  • Host of the local DNS cache element.
  • Domain name of the local DNS cache element.
  • Address of the ARP cache element in IPv4 format.
  • Physical address of the ARP cache element.
  • Serial number of the logical drive.
  • Home folder of the local user.
  • Name of the user account that started the process.
  • Path to the script that is run when the user logs in to the system.
  • Name of the user account under which the event occurred.
  • Name of the computer where the event occurred.
  • Full paths to files on computers with Kaspersky Endpoint Agent.
  • Names of files on computers with Kaspersky Endpoint Agent.
  • Masks of files on computers with Kaspersky Endpoint Agent.
  • Full names of folders on computers with Kaspersky Endpoint Agent.
  • Comments of the file publisher.
  • Mask of the process file image.
  • Path to the process file image that opened the port.
  • Name of the process that opened the port.
  • Local IP address of the port.
  • Trusted public key of the digital signature of executable modules.
  • Process name.
  • Process segment name.
  • Command-line parameters.

See also

Data in alerts and events

Data contained in task completion reports

Data contained in an install log

Data on files that are blocked from starting

Data related to the performance of tasks

Page top
[Topic 194532]

Data in alerts and events

Event data is saved in binary form in the folder C:\ProgramData\Kaspersky Lab\Endpoint Agent\protected\kata in open non-encrypted form.

Event data can contain information related to the following:

  • Data on executable modules.
  • Data on network connections.
  • About the operating system that is installed on the computer with Kaspersky Endpoint Agent.
  • Data on user sessions in the operating system.
  • Data on operating system user accounts.
  • Data on Windows event log.
  • About alerts of Kaspersky Endpoint Security for Windows.
  • About organizational units (OU) of Active Directory.
  • HTTP protocol headers.
  • Fully qualified domain name of the computer.
  • MD5- and SHA256 hash of files and their fragments.
  • Unique ID of the computer with Kaspersky Endpoint Agent.
  • Unique IDs of certificates.
  • Certificate publisher.
  • Certificate subject.
  • Name of the algorithm used to generate the certificate fingerprint.
  • Address and port of the local network interface.
  • Address and port of the remote network interface.
  • Application vendor.
  • Application name.
  • Name of the Windows registry variable.
  • Path to the Windows registry key.
  • Windows registry variable data.
  • Name of the detected object.
  • Kaspersky Security Center Network Agent ID.
  • Contents of the hosts file.
  • Process start command line.

See also

Data received from the Central Node component

Data contained in task completion reports

Data contained in an install log

Data on files that are blocked from starting

Data related to the performance of tasks

Page top
[Topic 194534]

Data contained in task completion reports

Prior to being sent to the Central Node component, the reports and relevant files are temporarily saved on the hard drive of the computer with the Kaspersky Endpoint Agent application. The task completion reports are saved in archived non-encrypted form in the folder C:\ProgramData\Kaspersky Lab\Endpoint Agent\protected\kata\data_queue.

By default, only users with System and Administrator permissions have read-access to files when Self-Defense is enabled. When Self-Defense is disabled, users with System and Administrator permissions can also delete the files, modify their contents, and modify the access rights to them. The Kaspersky Endpoint Agent application does not manage access permissions to this folder or any files in it. It is the system administrator who determines access permissions.

Task completion reports contain the following information:

  • Data on task output.
  • Data on executable modules.
  • Data on operating system processes.
  • Data on user accounts.
  • Data on user sessions.
  • Fully qualified domain name of the computer.
  • Unique ID of the computer with Kaspersky Endpoint Agent.
  • Files of the computer with Kaspersky Endpoint Agent.
  • Names of .
  • Full paths to files on the computer with Kaspersky Endpoint Agent.
  • Full names of folders on the computer with Kaspersky Endpoint Agent.
  • Content of the process standard output.
  • Content of the process standard error stream.

See also

Data received from the Central Node component

Data in alerts and events

Data contained in an install log

Data on files that are blocked from starting

Data related to the performance of tasks

Page top
[Topic 194535]

Data contained in an install log

The administrator can enable the Kaspersky Endpoint Agent installation log (using the msiexec standard procedure) during installation using the command line. The administrator shows the path to the file where the install log will be saved.

The log records installation process steps and the msiexec command line containing the address of the server hosting the Central Node component and the path to the install log file.

See also

Data received from the Central Node component

Data in alerts and events

Data contained in task completion reports

Data on files that are blocked from starting

Data related to the performance of tasks

Page top
[Topic 194536]

Data on files that are blocked from starting

Data on files that are blocked from starting is stored in open non-encrypted form in the folder C:\ProgramData\Kaspersky Lab\Endpoint Agent\protected\kata.

By default, only users with System and Administrator permissions have read-access to files when Self-Defense is enabled. When Self-Defense is disabled, users with System and Administrator permissions can also delete the files, modify their contents, and modify the access rights to them. The Kaspersky Endpoint Agent application does not manage access permissions to this folder or any files in it. It is the system administrator who determines access permissions.

Data on files that are blocked from starting may contain the following information:

  • Full path to the blocked file.
  • MD5 hash of the file.
  • SHA256 hash of the file.
  • Process start command.

See also

Data received from the Central Node component

Data in alerts and events

Data contained in task completion reports

Data contained in an install log

Data related to the performance of tasks

Page top
[Topic 194537]

Data related to the performance of tasks

When performing a task for placing a file in quarantine, the archive containing this file is temporarily saved in one of the following folders:

  • C:\ProgramData\Kaspersky Lab\Endpoint Agent\protected\kata\temp for Kaspersky Endpoint Agent that is installed as part of Kaspersky Endpoint Security.
  • C:\ProgramData\Kaspersky Lab\Endpoint Agent\protected\data\kata\temp for Kaspersky Endpoint Agent that is installed from the Kaspersky Anti Targeted Attack Platform distribution kit.

When performing an application run task on a host, Kaspersky Endpoint Agent locally stores the contents of standard output streams and errors of the running process in plain unencrypted form until the task completion report is sent to the Central Node component. Files are stored in one of the following folders:

  • C:\ProgramData\Kaspersky Lab\Endpoint Agent\protected\kata\temp for Kaspersky Endpoint Agent that is installed as part of Kaspersky Endpoint Security.
  • C:\ProgramData\Kaspersky Lab\Endpoint Agent\protected\data\kata\temp for Kaspersky Endpoint Agent that is installed from the Kaspersky Anti Targeted Attack Platform distribution kit.

By default, only users with System and Administrator permissions have read-access to files when Self-Defense is enabled. When Self-Defense is disabled, users with System and Administrator permissions can also delete the files, modify their contents, and modify the access rights to them. The Kaspersky Endpoint Agent application does not manage access permissions to this folder or any files in it. It is the system administrator who determines access permissions.

See also

Data received from the Central Node component

Data in alerts and events

Data contained in task completion reports

Data contained in an install log

Data on files that are blocked from starting

Page top
[Topic 194538]

Kaspersky Endpoint Security for Windows data

For detailed information about data transmitted by Kaspersky Endpoint Security, see the Online Help of the application:

Page top
[Topic 247291]

Kaspersky Endpoint Security for Linux data

For detailed information about data transmitted by Kaspersky Endpoint Security, see the Online Help of the application.

Page top
[Topic 247292]

Kaspersky Endpoint Security for Mac data

For detailed information about data transmitted by Kaspersky Endpoint Security, see the Online Help of the application.

Page top
[Topic 266400]