Kaspersky Anti Targeted Attack (KATA) Platform

Viewing the table of events

8 November 2023

ID 247645

The events table is displayed in the Threat Hunting section of the application web interface window after completion of Threat Hunting in the events database. You can sort events in the table by the Event time, Event type, Host, and User name columns.

If you are using the distributed solution and multitenancy mode, events in the table are grouped by hosts of the selected servers and tenants.

The table of events contains the following information:

  1. Event time—Date and time when the event was detected.
  2. Event type, for example, Process started.
  3. Host name—Name of the host on which the alert was generated.
  4. Details—Information about the event.
  5. User name—Name of the user on the computer with the Endpoint Agent component whose user account was used to detect the event.

In the events table, the Details column displays the set of data for each type of event in the Event type column (see the table below).

Set of data in the Details column for each event type in the Event column

Event type

Details

Process started

Name of the process file that was started. SHA256- and MD5 hash.

Module loaded

Name of the dynamic library that was loaded. SHA256- and MD5 hash.

Connection to remote host

URL to which a remote connection attempt was made. Name of the file that attempted to establish a remote connection.

Blocked application (prevention rule)

Name of the file of the application that was blocked from starting. SHA256- and MD5 hash.

Document blocked

Name of the document that was blocked from starting. SHA256- and MD5 hash.

File changed

Name of the created file. SHA256- and MD5 hash.

System event log

Channel for recording events in the system log. Event type ID.

Registry modified

Name of key in registry. <name of the variable in the key>=<value of the variable>.

Port listened

Server address and port. Name of the file of the process that listens to the port.

Driver loaded

File name of the driver that has been loaded. SHA256- and MD5 hash.

Scan: detect

Alert

Scan: detect processing result

Alert processing result.

AMSI scan

AMSI scan results.

Process: interpreted file run

Interpreted run of a file.

Process: console interactive input

Interactive input of commands in the console.

If you are using Kaspersky Endpoint Agent as the Endpoint Agent component, information about the AMSI scan event is available when Kaspersky Anti Targeted Attack Platform is integrated with Kaspersky Endpoint Agent for Windows 3.10 or later and when Kaspersky Endpoint Agent is integrated with Kaspersky Endpoint Security for Windows 11.5 or later. If Kaspersky Endpoint Security for Windows is not installed on the computer and is not integrated with Kaspersky Endpoint Agent, information about the AMSI scan event is not logged in the event database and is not displayed in the Kaspersky Anti Targeted Attack Platform web interface.

If Kaspersky Endpoint Agent is used in the role of the Endpoint Agent component, the Central Node server generates Scan: detect and Scan: detect processing result events based on data received from EPP applications. If EPP applications are not installed on the computer and are not integrated with Kaspersky Endpoint Agent, information about these events is not logged in the event database and is not displayed in the Kaspersky Anti Targeted Attack Platform web interface.

Clicking the link with the name of the event type, data, additional information and user name opens a list in which you can select the action to perform on the object. Depending on the value in the cell, you can perform one of the following actions:

See also

Event information

Recommendations for processing events

Information about events in the tree of events

Configuring the event table display

Viewing information about an event

Information about the "Process started" event

Information about the "Process terminated" event

Information about the "Module loaded" event

Information about the "Remote connection" event

Information about the "Prevention rule" event

Information about the "Document blocked" event

Information about the "File modified" event

Information about the "System event log" event

Information about the "Changes in the registry" event

Information about the "Port listened" event

Information about the "Driver loaded" event

Information about the "Alert" event

Information about the "Alert processing result" event

Information about the "Interpreted file run" event

Information about the "AMSI scan" event

Information about the "Interactive command input at the console" event

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.