Contents
Managing logs
This section contains information about managing the logs of Kaspersky Anti Targeted Attack Platform.
In the Kaspersky Anti Targeted Attack Platform web interface, you can manage the following logs:
- User activity log. Users with the Administrator role can manage the log. Users with the Security auditor role can download the log.
- User activity log for the NDR functionality. Users with the Administrator role can manage the log. Users with the Security auditor role can view the log.
Managing the activity log
Some user actions in the application web interface can cause errors in the operation of Kaspersky Anti Targeted Attack Platform. You can enable logging of user action information in the application web interface and if necessary, view the information by downloading log files.
Enabling and disabling the recording of information in the activity log
To enable or disable the logging of information about user actions in the Kaspersky Anti Targeted Attack Platform web interface to the activity log:
- Select the Logs section, User activity subsection in the application web interface.
- Do one of the following:
- Set the Event logging toggle switch to the Enabled position if you want to enable the logging of information about user actions in the application web interface.
- Set the Event logging toggle switch to the Disabled position if you want to disable the logging of information about user actions in the application web interface.
This function is enabled by default.
Information about user actions is recorded in the user_actions.log file, which is stored on the Central Node server in the /data/storage/volumes/siem_proxy/log-user-actions/ directory. By default, records in this file are kept for 90 days, after which they are deleted.
To view the activity log records, you need to download the user_actions.log file.
You can configure the logging of information about user activity in the application web interface to a remote log. The remote log is saved on the server on which a SIEM system is installed. The settings of integration with the SIEM system must be configured to write to the remote log.
In distributed solution mode, information about user actions in the application web interface is recorded in the log of the same server for which the users are managing the web interface. Information about the actions of PCN server users that affect the settings of SCN servers is recorded in the PCN server log.
Users with the Security auditor role can only view the settings for logging information to the activity log.
Page topDownloading the activity log file
To download the activity log file:
- Select the Logs section, User activity subsection in the application web interface.
- Click Download.
The file is saved to your local computer in your browser's downloads folder. The file is downloaded as a ZIP archive.
In distributed solution mode, you can download the log file only for the server for which you are managing the web interface.
Page topContent and properties of CEF messages about user activity in the web interface
The header of each message contains the following information:
- Format version.
Current version number:
0
. Current field value:CEF:0
. - Vendor.
Current field value:
AO Kaspersky Lab
. - Application name.
Current field value:
Kaspersky Anti Targeted Attack Platform
. - Application version
Current field value: 7.0.1-500.
- Event type.
See the table below.
- Event name.
See the table below.
- Event importance.
Current field value:
Low
.Example:
CEF:0|AO Kaspersky Lab|Kaspersky Anti Targeted Attack Platform|7.0.1-500|tasks|Managing tasks|Low|
All fields of the CEF message have the "<key>=<value>"
format. The keys, as well as their values contained in a message, are presented in the table below.
Event information in CEF messages
Event type |
Event name and description |
Key and description of its value |
---|---|---|
|
Connecting the Sensor component to the Central Node server, modifying component settings. |
|
|
Connecting the Sandbox component to the Central Node server. |
|
|
Configuring integration with external systems. |
|
|
Configuring participation in Kaspersky Security Network, enabling or disabling the usage of Kaspersky Private Security Network, and configuring integration with Kaspersky Managed Detection and Response. |
|
|
Operations with YARA rules. |
|
|
Operations with IOC rules. |
|
|
Operations with IDS rules. |
|
|
Operations with TAA (IOA) rules. |
|
|
Operations with Sandbox rules. |
|
|
Operations with prevention rules. |
|
|
Operations with scan exclusion rules. |
|
|
Operations with hosts on which the Endpoint Agent component is installed. |
|
|
Operations with tasks. |
|
|
Network isolation of Endpoint Agent hosts. |
|
|
Modifying Central Node server settings. |
|
|
Modifying the settings of Primary Central Node and Secondary Central Node servers in and . |
|
|
Actions on user accounts. |
|
|
Configuring email notifications. |
|
|
Managing the license key. |
|
If an operation is performed on over 30 objects simultaneously, only one entry is logged for this operation. The entry includes the information about the operation and the number of objects on which it was performed.
Page topManaging the NDR user activity log
This section contains information about managing logs of the NDR functionality.
Users with the Administrator role can manage the log. Users with the Security auditor role can view the log.
Logs are available when using any type of Kaspersky Anti Targeted Attack Platform license key.
Managing log storage settings
You can edit the settings of log record storage in the Central Node database.
To change the log storage settings:
- Log in to the web interface with the application administrator account.
- Select the Sensor servers section.
- Select the card of the Central Node server.
The details area is displayed in the right part of the web interface window.
- Click Edit.
In the details area, tabs are displayed, on which you can manage the settings of the server.
- On the General tab, configure the following settings in the Events, Audit entries, and Application messages sections:
- Use the Max volume setting to set a size limit for stored records. You can select the unit of measure for the value: MB or GB.
When editing this setting, keep in mind the estimated maximum number of records for the specified volume. You also need to take into account that the sum total of all size limits may not exceed the specified maximum storage capacity for the node.
- If necessary, use the Storage time (days) setting to limit the storage duration of records, and specify the duration in days.
- Use the Max volume setting to set a size limit for stored records. You can select the unit of measure for the value: MB or GB.
- Click Save.
Log storage is configured.
Page topEnabling and disabling user activity audit
You can enable or disable user activity audit for the NDR functionality.
User activity audit is enabled by default.
To enable or disable user activity audit:
- Connect to the Central Node server using the web interface.
- Select the Logs section, Audit subsection.
- Enable or disable user activity audit using the User activity audit switch in the toolbar.
- Wait for the changes to be applied. The switch does not become available again until the transition to the other state is completed.
Viewing user activity audit records
Kaspersky Anti Targeted Attack Platform can save information about actions performed by users of the NDR functionality. Information is saved in the audit log if user activity audit is enabled.
You can view audit records when connecting to the Central Node server using the web interface. If necessary, you can also configure audit records to be sent to third-party systems through connectors.
Only users with the Administrator role can view audit records.
To view audit records:
- Connect to the Central Node server using the web interface.
- Select the Logs section, Audit subsection.
The table displays audit records corresponding to the specified filtering and search conditions.
Audit record settings are displayed in the following columns of the table:
- Date and time.
Date and time when user activity information was recorded.
- Action.
Registered action performed by the user.
- Result.
Result of the registered action (successful or unsuccessful).
- User.
Name of the user that performed the registered action.
- User node.
IP address of the node where the registered action was performed.
- Description.
Additional information about the registered action.
When viewing the table of audit records, you can use the configuration, filtering, searching, and sorting functionality.
Page topSetting the maximum storage space limit for trace logs
Information about the performance of the NDR functionality is recorded in trace logs. You can limit the storage space occupied by these logs. In this case, when the limit is reached, old trace log files are deleted from the /var/log/kaspersky
directory.
Users with the Administrator role can manage log storage. Users with the Security auditor role can view these settings.
To limit the amount of space occupied by trace logs:
- Log in to the web interface with the application administrator account.
- Select the Sensor servers section in the window of the application web interface.
- Click the card of the relevant Sensor component.
- This opens a window with information about the component.
- Click Edit.
- Go to the General tab.
- In the Trace data field, use the Max volume setting to configure the maximum space that the logs can occupy. You can select the unit of measure for the value: MB or GB.
The space occupied by trace logs is limited.
Page topSetting the maximum storage space limit for trace logs
The statistical logs record metrics of the NDR functionality, such as the number of network packets received. You can limit the storage space occupied by these logs. In this case, when the limit is reached, old statistical log files are deleted from the /var/log/kaspersky
directory.
Users with the Administrator role can manage log storage. Users with the Security auditor role can view these settings.
To limit the amount of space occupied by statistical logs:
- Log in to the web interface with the application administrator account.
- Select the Sensor servers section in the window of the application web interface.
- Click the card of the relevant Sensor component.
- This opens a window with information about the component.
- Click Edit.
- Go to the General tab.
- In the Statistical data field, use the Max volume setting to configure the maximum space that the logs can occupy. You can select the unit of measure for the value: MB or GB.
The space occupied by statistical logs is limited.
Page top