Kaspersky Security Center 13.1

Data repositories

This section provides information about data stored on the Administration Server and used for tracking the condition of client devices and for servicing them.

The Repositories folder of the console tree displays the data used for tracking the statuses of client devices.

The Repositories folder contains the following objects:

In this section

Exporting a list of repository objects to a text file

Installation packages

Main statuses of files in the repository

Triggering of rules in Smart Training mode

Quarantine and Backup

Active threats

Page top
[Topic 46876]

Exporting a list of repository objects to a text file

You can export the list of objects from the repository to a text file.

To export the list of objects from the repository to a text file:

  1. In the console tree, in the Repositories folder select the subfolder of the relevant repository.
  2. In the repository subfolder, select Export list in the context menu.

    This will open the Export list window, in which you can specify the name of text file and path to the folder where it was placed.

Page top
[Topic 52373]

Installation packages

Kaspersky Security Center places the installation packages for applications of Kaspersky and third-party vendors in data repositories.

An installation package is a set of files required to install an application. An installation package contains the setup settings and initial configuration of the application being installed.

If you want to install an application on a client device, create an installation package for that application, or use an existing one. The list of created installation packages is stored in the Remote installation folder of the console tree, the Installation packages subfolder.

See also:

Working with installation packages

Page top
[Topic 4535]

Main statuses of files in the repository

Security applications scan files on devices for known viruses and other programs that may pose a threat, assign statuses to files, and place some of them in the repository.

For example, security applications can do the following:

  • Save a copy of a file to the repository before deletion
  • Isolate probably infected files in the repository

The main statuses of files are presented in the table below. You can obtain more detailed information about actions to take on files in respective Help systems of security applications.

Statuses of files in the repository

Status name

Status description

Infected

The file has a section of code of a known virus or other malware whose information is found in Kaspersky anti-virus databases.

Not infected

No known viruses or other malware were detected in the file.

Warning

The file contains a fragment of code that partially matches a snippet of code of a known threat.

Probably infected

The file contains either modified code of a known virus or code resembling a virus that is not yet known to Kaspersky.

Placed to folder by user

The user manually placed the file in the repository because the file's behavior gave rise to suspicion that it contains some threats. The user can scan the file for threats by using up-to-date databases.

False positive

A Kaspersky application assigned Infected status to a non-infected file because its code is similar to that of a virus. After a scan with up-to-date databases, the file is identified as non-infected.

Disinfected

The file was successfully disinfected.

Deleted

The file was deleted during processing.

Password-protected

The file cannot be processed because it is protected with a password.

See also:

File status icons in Administration Console

Page top
[Topic 158852]

Triggering of rules in Smart Training mode

This section provides information about the detections performed by the Adaptive Anomaly Control rules in Kaspersky Endpoint Security for Windows on client devices.

The rules detect anomalous behavior on client devices and may block it. If the rules work in Smart Training mode, they detect anomalous behavior and send reports about every such occurrence to Kaspersky Security Center Administration Server. This information is stored as a list in the Triggering of rules in Smart Training state subfolder of the Repositories folder. You can confirm detections as correct or add them as exclusions, so that this type of behavior is not considered anomalous anymore.

Information about detections is stored in the event log on the Administration Server (along with other events) and in the Adaptive Anomaly Control report.

For more information about Adaptive Anomaly Control, the rules, their modes and statuses, refer to Kaspersky Endpoint Security for Windows Help.

In this section

Viewing the list of detections performed using Adaptive Anomaly Control rules

Adding exclusions from the Adaptive Anomaly Control rules

Page top
[Topic 172869]

Viewing the list of detections performed using Adaptive Anomaly Control rules

Expand all | Collapse all

To view the list of detections performed by Adaptive Anomaly Control rules:

  1. In the console tree, select the node of the Administration Server that you require.
  2. Select the Triggering of rules in Smart Training state subfolder (by default, this is a subfolder of Advanced → Repositories).

    The list displays the following information about detections performed using Adaptive Anomaly Control rules:

    • Administration group

      The name of the administration group where the device belongs.

    • Device name

      The name of the client device where the rule was applied.

    • Name

      The name of the rule that was applied.

    • Status

      Excluding—If the Administrator processed this item and added it as an exclusion to the rules. This status remains till the next synchronization of the client device with the Administration Server; after the synchronization, the item disappears from the list.

      Confirming—If the Administrator processed this item and confirmed it. This status remains till the next synchronization of the client device with the Administration Server; after the synchronization, the item disappears from the list.

      Empty—If the Administrator did not process this item.

    • Total times rules were triggered

      The number of detects within one heuristic rule, one process and one client device. This number is counted by Kaspersky Endpoint Security.

    • User name

      The name of the client device user who run the process that generated the detect.

    • Source process path

      Path to the source process, i.e. to the process that performs the action (for more information, refer to the Kaspersky Endpoint Security help).

    • Source process hash

      SHA-256 hash of the source process file (for more information, refer to the Kaspersky Endpoint Security help).

    • Source object path

      Path to the object that started the process (for more information, refer to the Kaspersky Endpoint Security help).

    • Source object hash

      SHA-256 hash of the source file (for more information, refer to the Kaspersky Endpoint Security help).

    • Target process path

      Path to the target process (for more information, refer to the Kaspersky Endpoint Security help).

    • Target process hash

      SHA-256 hash of the target file (for more information, refer to the Kaspersky Endpoint Security help).

    • Target object path

      Path to the target object (for more information, refer to the Kaspersky Endpoint Security help).

    • Target object hash

      SHA-256 hash of the target file (for more information, refer to the Kaspersky Endpoint Security help).

    • Processed

      Date when the anomaly was detected.

To view properties of each information element:

  1. In the console tree, select the node of the Administration Server that you require.
  2. Select the Triggering of rules in Smart Training state subfolder (by default, this is a subfolder of Advanced → Repositories).
  3. In the Triggering of rules in Smart Training state workspace, select the object that you want.
  4. Do one of the following:
    • Click the Properties link in the information box that appears on the right side of the screen.
    • Right-click and in the context menu select Properties.

The properties window of the object opens, displaying information about the selected element.

You can confirm or add to exclusions any element in the list of detections of Adaptive Anomaly Control rules.

To confirm an element,

Select an element (or several elements) in the list of detections and click the Confirm button.

The status of the element(s) will be changed to Confirming.

Your confirmation will contribute to the statistics used by the rules (for more information, refer to Kaspersky Endpoint Security 11 for Windows Help).

To add an element as an exclusion,

Right-click an element (or several elements) in the list of detections and select Add to exclusions in the context menu.

The Add Exclusion Wizard starts. Follow the Wizard instructions.

If you reject or confirm an element, it will be excluded from the list of detections after the next synchronization of the client device with the Administration Server, and will no longer appear in the list.

Page top
[Topic 172650]

Adding exclusions from the Adaptive Anomaly Control rules

The Add Exclusion Wizard allows you to add exclusions from the Adaptive Anomaly Control rules for Kaspersky Endpoint Security.

You can start the Wizard through one of the three procedures below.

To start the Add Exclusion Wizard through the Adaptive Anomaly Control node:

  1. In the console tree, select the node of the required Administration Server.
  2. Select Triggering of rules in Smart Training state (by default, this is a subfolder of Advanced → Repositories).
  3. In the workspace, right-click an element (or several elements) in the list of detections and select Add to exclusions.

    You can add up to 1000 exclusions at a time. If you select more elements and try to add them to exclusions, an error message is displayed.

The Add Exclusion Wizard starts.

You can start the Add Exclusion Wizard from other nodes in the console tree:

  • Events tab of the main window of the Administration Server (then the User requests option or Recent events option).
  • Report on Adaptive Anomaly Control rules state, Detections count column.

In this section

Step 1. Selecting the application

Step 2. Selecting the policy (policies)

Step 3. Processing of the policy (policies)

Page top
[Topic 173182]

Step 1. Selecting the application

This step can be skipped if you have only one Kaspersky Endpoint Security for Windows version and do not have other applications that support the Adaptive Anomaly Control rules.

The Add Exclusion Wizard shows the list of Kaspersky applications whose management plug-ins allow you to add exclusions to the policies for these applications. Select an application from this list and click Next to proceed to selecting the policy to which the exclusion will be added.

Page top
[Topic 173183]

Step 2. Selecting the policy (policies)

The Wizard shows the list of policies (with policy profiles) for Kaspersky Endpoint Security.

Select all the policies and profiles to which you want to add exclusions and click Next.

Page top
[Topic 173184]

Step 3. Processing of the policy (policies)

The Wizard displays a progress bar as the policies are processed. You can interrupt the processing of policies by clicking Cancel.

Inherited policies cannot be updated. If you do not have the rights to modify a policy, this policy will not be updated either.

When all the policies are processed (or if you interrupt the processing), a report appears. It shows which policies were updated successfully (green icon) and which policies were not updated (red icon).

This is the last step of the Wizard. Click Finish to close the Wizard.

Page top
[Topic 173198]

Quarantine and Backup

Kaspersky anti-virus applications installed on client devices may place files in Quarantine or Backup during device scan.

Quarantine is a special repository for storing files that are probably infected with viruses and files that cannot be disinfected at the time when they are detected.

Backup is designed for storing backup copies of files that have been deleted or modified during the disinfection process.

Kaspersky Security Center creates a summarized list of files placed in Quarantine or Backup by Kaspersky applications on the devices. Network Agents on client devices transmit information about the files in Quarantine and Backup to the Administration Server. You can use Administration Console to view the properties of files stored in repositories on devices, run virus scans of those repositories, and delete files from them. The icons of the file statuses are described in the appendix.

Operations with Quarantine and Backup are supported for versions 6.0 or later of Kaspersky Anti-Virus for Windows Workstations and Kaspersky Anti-Virus for Windows Servers, as well as for Kaspersky Endpoint Security 10 for Windows, or later versions.

Kaspersky Security Center does not copy files from repositories to Administration Server. All files are stored in repositories on the devices. You can restore a file only on the device with the anti-virus application, which placed that file in the repository.

In this section

Enabling remote management for files in the repositories

Viewing properties of a file placed in repository

Deleting files from repositories

Restoring files from repositories

Saving a file from repositories to disk

Scanning files in Quarantine

Page top
[Topic 12429]

Enabling remote management for files in the repositories

By default, you cannot manage files placed in repositories on client devices.

To enable remote management of files stored in repositories on client devices:

  1. In the console tree, select an administration group, for which you want to enable remote management for files in the repository.
  2. In the group workspace, open the Policies tab.
  3. On the Policies tab, select the policy of the security application that has placed the files in the repositories on the devices.
  4. In the policy settings window in the Data transfer to Administration Server group of settings, select the check boxes corresponding to the repositories for which you want to enable the remote management.

    The location of the Data transfer to Administration Server settings group in the policy properties window and the names of check boxes depend on the currently used security application.

Page top
[Topic 52347]

Viewing properties of a file placed in repository

To view properties of a file in Quarantine or Backup:

  1. In the console tree, select the Repositories folder, the Quarantine or Backup subfolder.
  2. In the workspace of the Quarantine (Backup) folder, select a file whose properties you want to view.
  3. By selecting Properties in the context menu of the file.
Page top
[Topic 12430]

Deleting files from repositories

To delete a file from Quarantine or Backup:

  1. In the console tree, in the Repositories folder, select the Quarantine or Backup subfolder.
  2. In the workspace of the Quarantine (or Backup) folder select the files that you want to delete by using the Shift and Ctrl keys.
  3. Delete the files in one of the following ways:
    • By selecting Delete in the context menu of the files.
    • By clicking the Delete objects (Delete object) if you want to delete one file) link in the information box for the selected files.

The security applications that placed files in repositories on client devices will delete the same files from those repositories.

Page top
[Topic 12431]

Restoring files from repositories

To restore a file from Quarantine or Backup:

  1. In the console tree, select the Repositories folder, the Quarantine or Backup subfolder.
  2. In the workspace of the Quarantine (Backup) folder select the files that you want to restore by using the Shift and Ctrl keys.
  3. Start restoration of the files in one of the following ways:
    • By selecting Restore in the context menu of the files.
    • By clicking the Restore link in the information box for the selected files.

The security applications that placed files in repositories on client devices will restore the same files to their original folders.

Page top
[Topic 12432]

Saving a file from repositories to disk

Kaspersky Security Center allows you to save on a disk copies of files that a security application placed in Quarantine or Backup on a client device. Files are copied to the device with Kaspersky Security Center installed, to the specified folder.

To save a copy of file from Quarantine or Backup to a hard drive:

  1. In the console tree, select the Repositories folder, the Quarantine or Backup subfolder.
  2. In the workspace of the Quarantine (Backup) folder, select a file that you want to copy to the hard drive.
  3. Start copying in one of the following ways:
    • By selecting Save to Disk in the context menu of the file.
    • By clicking the Save to Disk link in the information box for the selected file.

The security application that placed the file in Quarantine on the client device will save a copy of that file to the specified folder.

Page top
[Topic 12592]

Scanning files in Quarantine

To scan quarantined files:

  1. In the console tree, select the Repositories folder, the Quarantine subfolder.
  2. In the workspace of the Quarantine folder, select the files that you want to scan by using the Shift and Ctrl keys.
  3. Start the file scan in one of the following ways:
    • By selecting Scan in the context menu of the file.
    • By clicking the Scan link in the information box for the selected files.

The application runs the on-demand scan task for security applications that have placed the selected files in Quarantine on the devices where those files are stored.

Page top
[Topic 3627]

Active threats

Information about unprocessed files that have been detected on client devices is stored in the Repositories folder, Active threats subfolder.

Postponed processing and disinfection are performed by the security application upon request or after a specified event occurs. You can configure the postponed processing.

In this section

Disinfecting an unprocessed file

Saving an unprocessed file to disk

Deleting files from the "Active threats" folder

Page top
[Topic 3666]

Disinfecting an unprocessed file

To start disinfection of an unprocessed file:

  1. In the console tree, in the Repositories folder select the Active threats subfolder.
  2. In the workspace of the Active threats folder, select the file that you have to disinfect.
  3. Start disinfection of the file in one of the following ways:
    • By selecting Disinfect in the context menu of the file.
    • By clicking the Disinfect link in the information box for the selected file.

The attempt to disinfect this file is then performed.

If the file is disinfected, the security application installed on the client device restores it to its original folder. The record of the file is removed from the list in the Active threats folder. If the file cannot be disinfected, the security application installed on the device deletes it from that device. The record of the file is removed from the list in the Active threats folder.

Page top
[Topic 12607]

Saving an unprocessed file to disk

Kaspersky Security Center allows you to save to disk copies of unprocessed files found on client devices. Files are copied to the device with Kaspersky Security Center installed, to the specified folder. You can download a file only if the file is stored in the backup storage of the managed device.

To save a copy of an unprocessed file to disk:

  1. In the console tree, in the Repositories folder select the Active threats subfolder.
  2. In the workspace of the Active threats folder, select the files that you have to copy to disk.
  3. Start copying in one of the following ways:
    • By selecting Save to Disk in the context menu of the file.
    • By clicking the Save to Disk link in the information box for the selected file.

The security application installed on the client device on which the unprocessed file has been found saves a copy of that file to the specified folder.

Page top
[Topic 12594]

Deleting files from the "Active threats" folder

To delete a file from the Active threats folder:

  1. In the console tree, in the Repositories folder select the Active threats subfolder.
  2. In the workspace of the Active threats folder, select the files that you have to delete by using the Shift and Ctrl keys.
  3. Delete the files in one of the following ways:
    • By selecting Delete in the context menu of the files.
    • By clicking the Delete objects (Delete object if you want to delete one file) link in the information box for the selected files.

The security applications that placed the files in repositories on client devices, will delete the same files from those repositories. The records of the files are removed from the list in the Active threats folder.

Page top
[Topic 12606]