Viewing the list of detections performed using Adaptive Anomaly Control rules
Expand all | Collapse all
To view the list of detections performed by Adaptive Anomaly Control rules:
- In the main menu, go to Operations → Repositories.
- Click the Rule triggers in Smart Training state link.
The list displays the following information about detections performed using Adaptive Anomaly Control rules:
- Administration group
The name of the administration group where the device belongs.
- Device name
The name of the client device where the rule was applied.
- Name
The name of the rule that was applied.
- Status
Excluding—If the Administrator processed this item and added it as an exclusion to the rules. This status remains till the next synchronization of the client device with the Administration Server; after the synchronization, the item disappears from the list.
Confirming—If the Administrator processed this item and confirmed it. This status remains till the next synchronization of the client device with the Administration Server; after the synchronization, the item disappears from the list.
Empty—If the Administrator did not process this item.
- User name
The name of the client device user who run the process that generated the detect.
- Processed
Date when the anomaly was detected.
- Source process path
Path to the source process, i.e. to the process that performs the action (for more information, refer to the Kaspersky Endpoint Security help).
- Source process hash
SHA256 hash of the source process file (for more information, refer to the Kaspersky Endpoint Security help).
- Source object path
Path to the object that started the process (for more information, refer to the Kaspersky Endpoint Security help).
- Source object hash
SHA256 hash of the source file (for more information, refer to the Kaspersky Endpoint Security help).
- Target process path
Path to the target process (for more information, refer to the Kaspersky Endpoint Security help).
- Target process hash
SHA256 hash of the target file (for more information, refer to the Kaspersky Endpoint Security help).
- Target object path
Path to the target object (for more information, refer to the Kaspersky Endpoint Security help).
- Target object hash
SHA256 hash of the target file (for more information, refer to the Kaspersky Endpoint Security help).
To view properties of each information element:
- In the main menu, go to Operations → Repositories.
- Click the Rule triggers in Smart Training state link.
- In the window that opens, select the object that you want.
- Click the Properties link.
The properties window of the object opens and displays information about the selected element.
You can confirm or add to exclusions any element in the list of detections of Adaptive Anomaly Control rules.
To confirm an element,
Select an element (or several elements) in the list of detections and click the Confirm button.
The status of the element(s) will be changed to Confirming.
Your confirmation will contribute to the statistics used by the rules (for more information, refer to Kaspersky Endpoint Security for Windows documentation).
To add an element as an exclusion,
Select an element (or several elements) in the list of detections and click the Exclude button.
The Add exclusion wizard starts. Follow the instructions of the wizard.
If you reject or confirm an element, it will be excluded from the list of detections after the next synchronization of the client device with the Administration Server, and will no longer appear in the list.
Page top
[Topic 172650]