Kaspersky Anti Targeted Attack (KATA) Platform

Kaspersky Anti Targeted Attack Platform

8 November 2023

ID 246848

Kaspersky Anti Targeted Attack Platform (hereinafter also referred to as "the application") is a solution designed for the protection of a corporate IT infrastructure and timely detection of threats such as zero-day attacks, targeted attacks, and complex targeted attacks known as advanced persistent threats (hereinafter also referred to as "APT"). The solution is developed for corporate users.

The Kaspersky Anti Targeted Attack Platform solution includes two functional blocks:

  • Kaspersky Anti Targeted Attack (hereinafter also referred to as "KATA"), which provides perimeter security for the enterprise IT infrastructure.
  • Kaspersky Endpoint Detection and Response (hereinafter also referred to as "KEDR"), which provides protection for the local area network of the organization.

The solution can receive and process data in the following ways:

  • Integrate into the local area network, receive and process mirrored SPAN, ERSPAN and RSPAN traffic, and extract objects and metadata from the HTTP, FTP, SMTP, and DNS protocols.
  • Connect to the proxy server via the ICAP protocol, receive and process data of HTTP and FTP traffic, as well as HTTPS traffic if the administrator has configured SSL certificate replacement on the proxy server.
  • Connect to the mail server via the POP3 (S) and SMTP protocols, receive and process copies of e-mail messages.
  • Integrate with Kaspersky Secure Mail Gateway and Kaspersky Security for Linux Mail Server, receive, and process copies of email messages.

    For detailed information on Kaspersky Secure Mail Gateway and Kaspersky Security for Linux Mail Server, please refer to the documentation of these applications.

  • Integrate with Kaspersky Endpoint Agent and Kaspersky Endpoint Security and receive data (events) from individual computers running Microsoft Windows and Linux operating systems in the corporate IT infrastructure. These applications continuously monitor processes running on those computers, active network connections, and files that are modified.
  • Integrate with external systems with the use of the REST API interface and scan files on these systems.

The solution uses the following means of Threat Intelligence:

  • Infrastructure of Kaspersky Security Network (also referred to as "KSN") cloud services that provides access to the online Knowledge Base of Kaspersky, which contains information about the reputation of files, web resources, and software. The use of data from Kaspersky Security Network ensures faster responses by Kaspersky applications to threats, improves the performance of some protection components, and reduces the likelihood of false alarms.
  • Integration with Kaspersky Private Security Network (KPSN) to access the reputation databases of Kaspersky Security Network and other statistical data without sending data from user computers to Kaspersky Security Network.
  • Integration with the Kaspersky information system known as Kaspersky Threat Intelligence Portal, which contains and displays information about the reputation of files and URLs.
  • The Kaspersky Threats database.

The solution can detect the following events that occur within the corporate IT infrastructure:

  • A file has been downloaded or an attempt was made to download a file to a corporate LAN computer.
  • A file has been sent to the email address of a user on the corporate LAN.
  • A website link was opened on a corporate LAN computer.
  • Network activity has occurred in which the IP address or domain name of a corporate LAN computer was detected.
  • Processes have been started on a corporate LAN computer.

The application can provide the results of its operation and Threat Intelligence to the user in the following ways:

  • Display the results of work done in the web interface of the Central Node, Primary Central Node (hereinafter also PCN) or Secondary Central Node (hereinafter also SCN) servers.
  • Publish alerts to a SIEM system already being used in your organization via the Syslog protocol.
  • Integrate with external systems via the REST API and send information on alerts generated by the solution to external systems on demand.
  • Publish information on Sandbox component alerts in the local reputation database of Kaspersky Private Security Network.

Users with the Senior security officer or Security officer role can perform the following actions in the application:

  • Monitor the components of the solution.
  • View the table of detected signs of targeted attacks and intrusions into the corporate IT infrastructure, filter and search alerts, view and manage each alert, and follow recommendations for evaluating and investigating incidents.
  • Look through the table of events occurring on computers and servers of the corporate IT infrastructure, search for threats, filter, view and manage each event, follow recommendations for evaluating and investigating incidents.
  • Run tasks on computers with Kaspersky Endpoint Agent and Kaspersky Endpoint Security: run applications and stop processes, download and delete files, quarantine objects on computers with Kaspersky Endpoint Agent and Kaspersky Endpoint Security, place copies of files in Storage of Kaspersky Anti Targeted Attack Platform, and restore files from Quarantine.
  • Set up policies for preventing the running of files and processes that they consider to be unsafe on selected computers with Kaspersky Endpoint Agent and Kaspersky Endpoint Security.
  • Isolate individual computers with Kaspersky Endpoint Agent and Kaspersky Endpoint Security from the network.
  • Work with TAA (IOA) rules to classify and analyze events.
  • Manage user-defined Targeted Attack Analyzer TAA (IOA), Intrusion Detection System (IDS), and YARA rules — upload rules to be used for scanning events and creating alerts.
  • Work with OpenIOC compliant files (IOC files) to search for signs of targeted attacks, infected and probably infected objects on hosts with the Endpoint Agent component and in the Alerts database.
  • Exclude TAA (IOA) rules and IDS rules defined by Kaspersky from scanning.
  • Manage objects in quarantine and copies of objects in Storage.
  • Manage reports about application performance and alerts.
  • Configure the sending of notifications about alerts and problems encountered by the application to email addresses of users.
  • Manage the list of VIP alerts and the list of data excluded from the scan, and populate the local reputation database of KPSN.

Users with the Security auditor role can perform the following actions in the application:

  • Monitor the components of the solution.
  • View the table of detected signs of targeted attacks and intrusions into the enterprise IT infrastructure, filter and search alerts, and view the data of each alert.
  • Look through the table of events occurring on the computers and servers of the enterprise IT infrastructure, search for threats, filter and view each event.
  • View the list of hosts with the Endpoint Agent component and information about selected hosts.
  • View the custom rules for Targeted Attack Analyzer TAA (IOA), Intrusion Detection System (IDS), and YARA.
  • View the scan-excluded TAA (IOA) rules and IDS rules defined by Kaspersky experts.
  • View reports about application performance and alerts.
  • View the list of VIP alerts and the list of data excluded from the scan.
  • View all settings made in the application web interface.

Users with the Local administrator or Administrator role can perform the following actions in the application:

  • Edit application settings.
  • Configure servers for the distributed solution and multitenancy mode.
  • Set up the integration of the application with other applications and systems.
  • Manage TLS certificates and set up trusted connections between the Central Node server and the Sandbox server, between Kaspersky Anti Targeted Attack Platform servers and the Endpoint Agent component, and with external systems.
  • Manage accounts of application users.
  • Monitor application health.

See also

Kaspersky Anti Targeted Attack Platform Help

Data provision

Application licensing

Architecture of the application

Operating principle of the application

Distributed solution and multitenancy

Sizing Guide

Installing and performing initial configuration of the application

Configuring the sizing settings of the application

Configuring the integration of Kaspersky Anti Targeted Attack Platform with the Kaspersky Endpoint Agent component

Getting started with the application

Managing accounts of application administrators and users

Authentication using domain accounts

Participation in Kaspersky Security Network and use of Kaspersky Private Security Network

Managing the Sandbox component through the web interface

For administrators: Getting started with the application web interface

For security officers: Getting started with the application web interface

Managing user-defined Sandbox rules

Sending notifications

Managing Kaspersky Endpoint Agent for Windows

Managing Kaspersky Endpoint Agent for Linux

Managing Kaspersky Endpoint Security for Windows

Managing Kaspersky Endpoint Security for Linux

Creating a backup copy and restoring the application from backup

Upgrading Kaspersky Anti Targeted Attack Platform

Interaction with external systems via API

Sources of information about the application

Contacting the Technical Support Service

Information about third-party code

Trademark notices

In this Help section

What's new

About Kaspersky Threat Intelligence Portal

Distribution kit

Hardware and software requirements

Restrictions

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.