Contents
- Managing user-defined Sandbox rules
- Viewing the table of user-defined Sandbox rules
- Configuring the Sandbox rule table display
- Filtering and searching Sandbox rules
- Clearing a Sandbox rule filter
- Viewing the information of a user-defined Sandbox rule
- Creating a user-defined Sandbox rule for scanning files
- Creating a user-defined Sandbox rule for URL scanning
- Copying a user-defined Sandbox rule
- Importing user-defined Sandbox rules for file scanning
- Editing a user-defined Sandbox rule
- Enabling or disabling user-disabling Sandbox rules
- Exporting user-defined Sandbox rules for file scanning
- Deleting user-defined Sandbox rules
- List of extensions for file categories
Managing user-defined Sandbox rules
Users with the Senior security officer and Administrator roles can create rules for scanning files and URLs in their user environments. If no rules are added, objects are not sent for scanning.
You can create, edit, delete, enable, or disable rules. File scanning rules can also be imported and exported.
To send objects for scanning in preset images, you do not need to create rules. By default, Kaspersky Anti Targeted Attack Platform sends objects that need to be scanned for scanning.
In distributed solution mode, you must create rules for scanning files in custom environments on each PCN and SCN server from which you want to send files for scanning.
Users with the Security auditor role can view the list of rules. Users with the Security officer role cannot view this section.
Page topViewing the table of user-defined Sandbox rules
To view the table of user-defined Sandbox rules:
- In the window of the application web interface, select the Custom rules section, Sandbox subsection.
- Open the Files or URLs tab.
The table of user-defined Sandbox rules for file or URL scanning is displayed.
The table of user-defined rules for file scanning contains the following information:
- Created is the rule creation time.
- Virtual machine is the name of the virtual machine to which files are sent for scanning.
- Mask is the mask of files sent for scanning.
- Mask exclusion is the mask of files that are excluded from scanning.
- File category are categories of files sent for scanning.
- State is the state of the rule. It can have the values Enabled and Disabled.
The table of user-defined URL scanning rules contains the following information:
- Created is the rule creation time.
- Virtual machine is the name of the virtual machine to which files are sent for scanning.
- State is the state of the rule. It can have the values Enabled and Disabled.
Configuring the Sandbox rule table display
You can show or hide columns and change the order of columns in the table.
To configure the table display:
- In the window of the application web interface, select the Custom rules section, Sandbox subsection.
- Open the Files or URLs tab.
The table of user-defined Sandbox rules for file or URL scanning is displayed.
- In the heading part of the table, click
.
This opens the Customize table window.
- If you want to show a column in the table, select the check box next to the name of the parameter that you want displayed in the table.
If you want to hide a parameter in the table, clear the check box.
At least one check box must be selected.
- If you want to change the order of columns in the table, move the mouse cursor to the row with the relevant parameter, click
and move the row to its new place.
- If you want to restore default table display settings, click Default.
- Click Apply.
The rule table display is configured.
Page topFiltering and searching Sandbox rules
To filter or search for Sandbox rules by required criteria:
- In the window of the application web interface, select the Custom rules section, Sandbox subsection.
- Open the Files or URLs tab.
- Depending on the filtering criterion, do the following:
The table displays only rules that match the specified criteria.
You can use multiple filters at the same time.
Clearing a Sandbox rule filter
To clear the Sandbox rule filter for one or more filtering criteria:
- In the window of the application web interface, select the Custom rules section, Sandbox subsection.
- Open the Files or URLs tab.
- Click
to the right of that column heading of the rule table for which you want to clear filtering criteria.
If you want to clear multiple filter conditions, take steps to clear each filter condition individually.
The selected filters are cleared.
The table displays only rules that match the specified criteria.
Viewing the information of a user-defined Sandbox rule
To view the information of a user-defined Sandbox rule:
- In the window of the application web interface, select the Custom rules section, Sandbox subsection.
- Open the Files or URLs tab.
- Select the rule for which you want to view information.
This opens a window containing information about the rule.
The window with information about the user-defined file scanning rule contains the following information:
- State is the state of the prevention rule.
- Virtual machine is the virtual machine on which files are scanned in accordance with this rule.
- Mask is the mask of files sent for scanning.
- Mask exclusion is the mask of files that are excluded from scanning.
- File category are categories of files that are sent for scanning.
- File size is the size of the files being scanned.
The window with information about the user-defined URL scanning rule contains the following information:
- Virtual machine is the virtual machine on which URLs are scanned.
- State is the state of the prevention rule.
Creating a user-defined Sandbox rule for scanning files
To add a user-defined Sandbox rule for file scanning:
- In the window of the application web interface, select the Custom rules section, Sandbox subsection.
- Open the Files tab.
- Click Add.
- Select Create rule.
This opens the rule creation window.
- Configure the following settings:
- State is the state of the prevention rule. Select the check box if you want to enable the rule.
- Virtual machine is the virtual machine on which files will be scanned in accordance with this rule.
Only virtual machines with custom operating system images can be selected. These virtual machines must belong to the set of operating systems selected on the Central Node.
- Specify at least one of following values: mask or category of a file. If you fill in all the fields, the rule is triggered for files that match the category and size conditions or mask and size conditions, and are not exclusions.
- Mask is the mask of files that you want to send for scanning. You can specify multiple values.
To specify a mask, you can use the * and ? wildcard characters. Other wildcard characters are not supported.
- Mask exclusion is the mask of files that must be excluded from scanning. You can specify multiple values.
To specify an exclusion mask, you can use the * and ? wildcard characters. Other wildcard characters are not supported.
- File category are categories of files that you want to send for scanning. You can specify multiple categories.
You can view the full list of extensions for each category in the List of extensions for file categories section.
- File size is the size of the files being scanned.
- If you want to set multiple ranges, click Add file size.
- Mask is the mask of files that you want to send for scanning. You can specify multiple values.
- Click Add.
The rule is created.
If you want to send an archive for scanning, you must take into account the special considerations involved in scanning archives.
Archives are scanned as follows:
- Kaspersky Anti Targeted Attack Platform unpacks the archive.
- Files from the archive that match the rule are sent for scanning.
Files with the MSI extension are scanned in the same way as archives.
Page topCreating a user-defined Sandbox rule for URL scanning
To add a user-defined Sandbox rule for URL scanning:
- In the window of the application web interface, select the Custom rules section, Sandbox subsection.
- Open the URLs tab.
- Click Add.
- Select Create rule.
This opens the rule creation window.
- Configure the following settings:
- Virtual machine is the virtual machine on which URLs will be scanned.
Only virtual machines with custom operating system images can be selected. These virtual machines must belong to the set of operating systems selected on the Central Node.
- State is the state of the prevention rule. Select the check box if you want to enable the rule.
- Virtual machine is the virtual machine on which URLs will be scanned.
- Click Add.
The rule is created.
Page topCopying a user-defined Sandbox rule
To copy a user-defined Sandbox rule:
- In the window of the application web interface, select the Custom rules section, Sandbox subsection.
- Open the Files or URLs tab.
- Select the relevant rule.
- In the rule window, click Duplicate.
The rule is copied with all settings. You can change the values of settings if necessary.
Page topImporting user-defined Sandbox rules for file scanning
To import user-defined Sandbox rules for file scanning:
- In the window of the application web interface, select the Custom rules section, Sandbox subsection.
- Open the Files tab.
- Click Add.
- Select Import rules.
- This opens the file upload window.
- Select the file that you want to import.
- Click Open.
The file is imported.
Page topEditing a user-defined Sandbox rule
To edit a user-defined Sandbox rule:
- In the window of the application web interface, select the Custom rules section, Sandbox subsection.
- Open the Files or URLs tab.
The table of user-defined Sandbox rules for file or URL scanning is displayed.
- Select a rule.
This opens the rule editing window.
You can edit the following fields:
- In the user-defined Sandbox rules for scanning files:
- State is the state of the prevention rule. Select the check box if you want to enable the rule.
- Virtual machine is the virtual machine on which files will be scanned in accordance with this rule.
Only virtual machines with custom operating system images can be selected. These virtual machines must belong to the set of operating systems selected on the Central Node.
- Specify at least one of following values: mask or category of a file. If you fill in all the fields, the rule is triggered for files that match the category and size conditions or mask and size conditions, and are not exclusions.
- Mask is the mask of files that you want to send for scanning. You can specify multiple values.
To specify a mask, you can use the * and ? wildcard characters. Other wildcard characters are not supported.
- Mask exclusion is the mask of files that must be excluded from scanning. You can specify multiple values.
To specify an exclusion mask, you can use the * and ? wildcard characters. Other wildcard characters are not supported.
- File category are categories of files that you want to send for scanning. You can specify multiple categories.
You can view the full list of extensions for each category in the List of extensions for file categories section.
- File size is the size of the files being scanned.
If you want to set multiple ranges, click Add file size.
- Mask is the mask of files that you want to send for scanning. You can specify multiple values.
- In the user-defined Sandbox rules for scanning URLs:
- Virtual machine is the virtual machine on which URLs will be scanned.
Only virtual machines with custom operating system images can be selected. These virtual machines must belong to the set of operating systems selected on the Central Node.
- State is the state of the prevention rule. Select the check box if you want to enable the rule.
- Virtual machine is the virtual machine on which URLs will be scanned.
Enabling or disabling user-disabling Sandbox rules
To enable or disable a Sandbox rule:
- In the window of the application web interface, select the Custom rules section, Sandbox subsection.
- Open the Files or URLs tab.
The table of user-defined Sandbox rules for file or URL scanning is displayed.
- In the row with the relevant rule, select or clear the check box in the State column.
The rule is enabled or disabled.
To enable or disable the use of all or multiple Sandbox rules:
- In the window of the application web interface, select the Custom rules section, Sandbox subsection.
- Open the Files or URLs tab.
The table of user-defined Sandbox rules for file or URL scanning is displayed.
- Select the check boxes on the left of the rules whose use you want to enable or disable.
You can select all rules by selecting the check box in the row containing the headers of columns.
A control panel appears in the lower part of the window.
- Click Enable or Disable to enable or disable selected rules.
Selected rules are enabled or disabled.
Page topExporting user-defined Sandbox rules for file scanning
To export user-defined Sandbox rules for object scanning:
- In the window of the application web interface, select the Custom rules section, Sandbox subsection.
- Open the Files tab.
- Click Export.
The rules file is saved to your local computer. The file is downloaded in the JSON format.
Page topDeleting user-defined Sandbox rules
Users with the Senior security officer role can delete one or more user-defined Sandbox rules, or all rules at the same time.
To delete a user-defined Sandbox rule:
- In the window of the application web interface, select the Custom rules section, Sandbox subsection.
- Open the Files or URLs tab.
The table of user-defined Sandbox rules for file or URL scanning is displayed.
- Select the rule that you want to delete.
This opens a window containing information about the rule.
- Click Delete.
This opens the action confirmation window.
- Click Yes.
The rule is deleted.
To delete all or multiple user-defined Sandbox rules:
- In the window of the application web interface, select the Custom rules section, Sandbox subsection.
- Open the Files or URLs tab.
The table of user-defined Sandbox rules for file or URL scanning is displayed.
- Select the check boxes on the left of the rules that you want to delete.
You can select all rules by selecting the check box in the row containing the headers of columns.
A control panel appears in the lower part of the window.
- Click Delete.
This opens the action confirmation window.
- Click Yes.
The selected rules will be deleted.
Page topList of extensions for file categories
Extensions for file categories are listed in the table below.
Extensions for file categories
Category |
Extensions |
---|---|
1C |
.epf, .ert, .erf, .cf, .dt, .deb, .bsl, .os, .ertx, .xls, .xml, .html, .txt, .cfu, .rptdesign, .xdt, .xslt, .wsdl |
Adobe Flash Player |
.swf, .fla, .flv, .f4v, .f4p, .f4a, .f4b, .mxml, .as, .asc, .ascs, .asv, .fxp, .fxpl, .xfl, .swc, .cfx, .spl, .dcr, .dir, .dxr, .aam, .swz |
Java |
.jar, .class, .war, .ear, .jad, .jnlp, .ser, .jsp, .jspx, .properties, .policy |
Html |
.html, .htm, .shtml, .xhtml, .xml, .svg, .mathml, .rss, .atom, .json, .mht, .mhtml, .webarchive |
Network packet |
.pcap, .pcapng, .cap, .netcap, .etl, .erf, .pkts, .pkt, .tcpdump, .snoop, .ngc, .dump, .cat, .smb, .vpcap, .dmp, .shb, .npl, .nfcapd, .wcap, .arpd, .pc, .tr1, .tr2, .trace |
SAP |
.abap, .adt, .bak, .cct, .cdp, .cpf, .dsc, .erd, .glo, .grc, .lis, .log, .lsa, .msg, .olap, .pgm, .prd, .sap, .sd, .se, .so, .spf, .tpz, .trc, .trex, .ttx, .wri, .xlf |
XML |
.xml, .xsl, .xslt, .rdf, .rss, .opf, .svg, .wsdl, .xhtml, .xjb, .xmi, .xpl, .xsl-fo, .xquery, .xsd, .dtd, .xht, .atom, .mathml, .mml, .plist, .xul, .fodt, .fo, .mxf, .xspf, .gpx, .unity, .ac, .ad, .aw, .ccxml, .csd, .dms, .epub, .fxml, .glb, .glTF, .glTF-Binary, .gml, .iif, .imdi, .jelly, .kml, .mrc, .msh, .mshxml, .mtl, .nib, .nws, .nzb, .osdx, .owl, .pbix, .plistxml, .ptx, .qti, .rdfxml, .rl, .rng, .ros, .rpj, .scml, .scxml, .shex, .sketch, .soap, .srdf, .srx |
Archive |
.snb, .apk, .mht, .crx, .dd, .r01, .mpkg, .pup, .tbz, .ace, .arj, .bin, .cab, .cbr, .deb, .exe, .gzip, .one, .pak, .pkg, .ppt, .rpm, .sh, .sib, .sis, .sisx, .sit, .sitx, .spl, .tar-gz, .xar, .zipx, .zip, .rar, .7z, .tar, .gz, .bz2, .xz, .tgz, .tbz2, .txz, .z, .jar, .war, .ear, .iso, .img |
Audio |
.a52, .adt, .dct, .dss, .dvf, .iklax, .ivs, .rm, .rmvb, .8svx, .amb, .avr, .cdda, .cvs, .cvsd, .cvu, .dts, .dvms, .fap, .fssd, .gsrt, .hcom, .htk, .ima, .ircam, .maud, .nist, .paf, .prc, .pvf, .sd2, .smp, .snd, .sndr, .sndt, .sou, .sph, .spx, .tta, .txw, .vms, .voc, .vox, .w64, .wv, .wve, .ac3, .aob, .asf, .aud, .bin, .bwg, .cdr, .gpx, .ics, .m, .m3u, .mod, .mpp, .msc, .msv, .mts, .nkc, .ps, .sdf, .sib, .sln, .spl, .srt, .temp, .vb, .wave, .wm, .wpd, .xsb, .xwb, .mpc, .aac, .flac, .m4a, .mmf, .mp3, .ogg, .wav, .wma, .mid, .amr, .ape, .au, .caf, .gsm, .oma, .qcp, .vqf, .ra, .aif, .mp2, .m4p, .awb, .m4r, .ram, .asx, .mpga, .aiff, .koz, .m4b, .kar, .iff, .midi, .3ga, .opus, .aup, .xspf, .aifc, .rta, .cda, .m3u8, .mpa, .aa, .aax, .oga, .nfa, .adpcm, .cdo, .flp, .aimppl, .4mp, .mui |
Video |
.drc, .f4a, .f4b, .f4p, .gifv, .mng, .mp2, .mpe, .mpv, .nsv, .roq, .svi, .3gp2, .3gpp2, .asx, .bin, .dat, .drv, .gtp, .moov, .spl, .stl, .vcd, .vid, .wm, .yuv, .hevc, .m2v, .mjpeg, .wtv, .avi, .mpeg, .m4v, .mov, .mp4, .wmv, .mpg, .swf, .3gp, .3g2, .mkv, .ogv, .webm, .asf, .ts, .mxf, .rm, .thp, .mts, .rmvb, .f4v, .mod, .vob, .h264, .flv, .3gpp, .divx, .qt, .amv, .dvsd, .m2ts, .ifo, .mswmm, .srt, .cpi, .wlmp, .vpj, .ced, .vep, .veg, .264, .dav, .pds, .dir, .arf, .mepx, .xesc, .bik, .nfv, .tvs, .imoviemobile, .rcproject, .esp3, .vproj, .aep, .camproj, .camrec, .cmproj, .cmrec, .modd, .mproj, .osp, .trec, .g64, .vro, .braw, .mse, .pz |
Document |
.sxi, .odg, .svg, .vsd, .eps, .cwk, .wp, .ott, .asp, .cdd, .cpp, .dotm, .gpx, .indd, .kdc, .kml, .mdb, .mdf, .mso, .one, .pkg, .pl, .pot, .potm, .potx, .ppsm, .ps, .sdf, .sgml, .sldm, .xar, .xlt, .xltm, .xltx, .pdf, .txt, .doc, .odt, .xps, .chm, .rtf, .sxw, .docx, .wpd, .wps, .docm, .hwp, .pub, .xml, .log, .oxps, .vnt, .dot, .pages, .m3u, .dotx, .shs, .msg, .odm, .pmd, .vmg, .eml, .tex, .wp5, .csk, .fdxt, .adoc, .afpub, .tcr, .acsm, .opf, .mbp, .apnx, .cbt, .vbk, .kfx, .lrf, .snb, .odp, .ppt, .pptx, .pps, .ppsx, .pptm, .key, .flipchart, .epub, .mobi, .azw, .azw3, .fb2, .djvu, .cbz, .cbr, .ibooks, .lit, .pdb, .prc, .tr2, .tr3, .ods, .xls, .xlsx, .csv, .wks, .xlsm, .xlsb, .xlr, .wk3, .numbers |
Image |
.dib, .pdf, .mrw, .icns, .wdp, .fig, .epsf, .cur, .erf, .fts, .heif, .jfif, .jpe, .jps, .mng, .pam, .pbm, .pes, .pfm, .picon, .pnm, .ppm, .ras, .rw2, .sgi, .x3f, .xbm, .xpm, .xwd, .art, .arw, .bmp, .cr2, .crw, .dcm, .dds, .djvu, .dng, .exr, .fpx, .gif, .ico, .jpg, .jp2, .jpeg, .nef, .orf, .pcd, .pcx, .pef, .pgm, .pict, .png, .psd, .raf, .sfw, .tga, .tiff, .wbmp, .xcf, .yuv, .kdc, .pct, .sr2, .tif, .hdr, .webp, .nrw, .plist, .ithmb, .thm, .pspimage, .mac, .heic, .rwl, .flif, .avif, .raw, .pictclipping, .jxr, .emf, .eps, .svg, .wpg, .ai, .svgz, .wmf, .odg, .cdr, .vsd, .std, .pd, .emz, .mix, .otg, .cvs, .gvdesign |
Android executable file |
.apk, .aab, .dex, .so, .jar, .aar, .class, .obb, .odex, .vdex, .vmx, .vmem, .img |
Windows executable file |
.cgi, .ds, .air, .cpp, .gadget, .hta, .jar, .msu, .paf.exe, .pwz, .thm, .vbs, .exe, .msi, .bat, .cmd, .com, .pif, .scr, .vb, .vbe, .js, .jse, .ws, .wsf, .wsh, .ps1, .psm1, .psd1, .ps1xml, .psc1, .scf, .lnk |
Executable file |
.rc, .p, .d, .asc, .bas, .cbl, .vbp, .iwb, .pb, .yml, .pika, .s19, .xt, .suo, .fsproj, .pbj, .pbxuser, .pyw, .xq, .cd, .sb, .sb2, .ise, .kv, .cod, .nib, .pwn, .b, .hpp, .apa, .bet, .bluej, .erb, .fxc, .m4, .owl, .sma, .trx, .vc, .def, .xap, .o, .pas, .qpr, .resources, .vbproj, .vbx, .xib, .md, .ccc, .wwp, .ss, .asf, .asm, .asp, .cfm, .dot, .dtd, .fla, .ged, .gv, .icl, .jse, .lua, .m, .mb, .mdf, .mod, .msp, .obj, .pkg, .po, .pot, .pub, .rss, .sln, .so, .vbe, .vbs, .vc4, .vcproj, .vcxproj, .wsc, .xcodeproj, .xsd, .c, .class, .cpp, .cs, .css, .go, .h, .htaccess, .html, .java, .json, .kml, .sql, .swift, .vb, .yaml, .sh, .bat, .cmd, .ps1, .py, .pl, .rb, .js, .ts, .php, .jsp, .aspx, .cgi, .jar |
Disk image |
.img, .cue, .dsk, .vmdk, .vhd, .vhdx, .tc, .crypt, .dmgpart, .sparsebundle, .xva, .cif, .pqi, .udf, .fvd, .arc, .fcd, .gi, .giz, .ima, .udif, .vdi, .vim, .wim, .b5t, .b6t, .bin, .bwi, .bwt, .ccd, .cdi, .cdr, .dmg, .i00, .i01, .i02, .iso, .isz, .md0, .md1, .md2, .mdf, .mds, .nrg, .pdi, .po, .rom, .sub, .tib, .toast, .vc4, .vcd |
Windows event log |
.evt, .evtx, .log, .txt, .xml |
Windows registry file |
.reg, .dat, .pol, .hiv, .srd |
Font |
.bin, .ps, .sfd, .fnt, .afm, .ttf, .otf, .woff, .woff2, .eot, .svg, .dfont, .pfa, .pfb, .pfm, .fon, .suit, .bdf, .pcf, .snf, .ufo, .lib, .cff |
Database file |
.bup, .csv, .json, .xml, .myi, .sqlplan, .abs, .abx, .ac, .accdb, .accdc, .accde, .accdr, .accdt, .accdw, .accft, .adb, .ade, .adf, .adn, .adp, .alf, .anb, .approj, .aq, .ask, .bacpac, .bak, .btr, .caf, .cat, .cdb, .chck, .ckp, .cma, .cpd, .crypt, .dab, .dacpac, .dad, .daschema, .db, .db-journal, .db-shm, .db-wal, .db2, .db3, .dbc, .dbf, .dbs, .dbt, .dbv, .dbx, .dcb, .dct, .dcx, .ddl, .dlis, .dp1, .dqy, .dsk, .dsn, .dtsx, .dxl, .eco, .ecx, .edb, .epim, .erx, .exb, .fcd, .fdb, .fic, .frm, .ftb, .gdb, .grdb, .gwi, .hdb, .his, .ib, .ibd, .icdb, .idb, .ihx, .ipj, .itdb, .itw, .jet, .jtx, .kdb, .lgc, .lwx, .maf, .maq, .mar, .marshal, .mas, .mav, .maw, .mdb, .mdbhtml, .mdf, .mdn, .mdt, .mfd, .mpd, .mrg, .mud, .mwb, .myd, .ndf, .nnt, .ns2, .ns3, .ns4, .nsf, .nv2, .nwdb, .nyf, .odb, .odl, .oqy, .ora, .orx, .owc, .pan, .pdb, .pdm, .pnz, .pqa, .pvoc, .qry, .qvd, .rbf, .rctd, .realm, .rod, .rsd, .sbf, .scx, .sdb, .sdc, .sdf, .sis, .spq, .sql, .sqlite, .sqlite3, .sqlitedb, .te, .temx, .tmd, .tps, .trc, .trm, .tvdb, .udb, .udl, .vis, .vvv, .wdb, .wmdb, .wrk, .xdb, .xld, .xmlff |