Kaspersky Unified Monitoring and Analysis Platform

Configuring the display of a link to a Kaspersky Endpoint Detection and Response detection in KUMA event details

You can configure the creation of an alert or each received Kaspersky Endpoint Detection and Response detection. You can configure the display of a link to a Kaspersky Endpoint Detection and Response detection in KUMA alert information.

You can configure the display of a detection link if you use only one Central Node server in Kaspersky Endpoint Detection and Response. If Kaspersky Endpoint Detection and Response is used in a distributed solution mode, it is impossible to configure the display of the links to Kaspersky Endpoint Detection and Response detections in KUMA.

To configure the display of a link to a detection in KUMA alert details, you need to complete steps in the Kaspersky Endpoint Detection and Response web interface and KUMA.

In the Kaspersky Endpoint Detection and Response web interface, you need to configure the integration of the application with KUMA as a SIEM system. For details on configuring integration, refer to the Kaspersky Anti Targeted Attack Platform documentation, Configuring integration with a SIEM system section.

Configuring the display of a link in the KUMA web interface includes the following steps:

  1. Adding an asset that contains information about the Kaspersky Endpoint Detection and Response Central Node server from which you want to receive detections, and assigning a category to that asset.
  2. Creating a correlation rule.
  3. Creating a correlator.
  4. Adding a collector, taking into account the following:
    • At the Transport step, specify the connector type (TCP or UDP) and the connection port (must be the same as the port configured in the SIEM connection settings in Kaspersky Anti Targeted Attack Platform).
    • At the Parsing step, when selecting a normalizer, you need to specify mappings for KEDR event fields or select the [OOTB] KATA normalizer.
    • After adding the correlator, in the collector, you need to specify a destination pointing to the correlator.

You can use a pre-configured correlation rule. In this case configuring the display of a link in the KUMA web interface includes the following steps:

  1. Creating a correlator.

    Select the [OOTB] KATA Alert correlation rule.

  2. Adding an asset that contains information about the Kaspersky Endpoint Detection and Response Central Node server from which you want to receive detections and assigning a category KATA standAlone to that asset.

Step 1. Adding an asset and assigning a category to it

First, you need to create a category that will be assigned to the asset being added.

To add a category:

  1. In the KUMA web interface, select the Assets section.
  2. On the All assets tab, expand the list of tenant categories by doing one of the following:
    • Under All tenants, click the menu icon (context_menu_icon) and select Expand all.
    • In the All tenants object tree, click the arrow icon (Arrow_down_icon) next to the name of the tenant.
  3. Select a category or subcategory and do one of the following:
  4. Click the add icon (plus_icon).
  5. Click the menu icon (icon_three vertical dots) and select Add subcategory.

    The Add category sidebar is dispalyed in the right part of the web interface window.

  6. Define the category settings:
    1. In the Name field, enter the name of the category.
    2. In the Parent drop-down list, select categories from the tree of categories.
    3. In the Tenant drop-down list, select a tenant if it is not automatically specified.
    4. In the Categorization kind drop-down list, select how the category will be populated with assets. Depending on your selection, you may need to specify additional settings:
      • Manually—assets can only be manually linked to a category.
      • Active—assets will be assigned to a category at regular intervals if they satisfy the defined filter.
      • Reactive—the category will be filled with assets by using correlation rules.
    5. If required, define the values for the following settings:
      • Assign a severity to the category in the Severity drop-down list.

        The specified severity is assigned to correlation events and alerts associated with the asset.

      • Add a description for the category in the Description field.
  7. Click the Save button.

To add an asset:

  1. In the KUMA web interface, select the Assets section.
  2. Click the Add asset button.

    The Add asset details area opens in the right part of the window.

  3. Define the following asset parameters:
    1. In the Asset name field, enter a name for the asset.
    2. In the Tenant drop-down list, select the tenant that will own the asset.
    3. In the IP address field, specify the IP address of the Kaspersky Endpoint Detection and Response Central Node server from which you want to receive detections. If necessary, you can add one or more server IP addresses.
    4. If required, define the values for the following fields:
      • In the FQDN field, specify the Fully Qualified Domain Name of the Kaspersky Endpoint Detection and Response server.
      • In the MAC address field, specify the MAC address of the Central Node Kaspersky Endpoint Detection and Response Central Node server.
      • In the Owner field, define the name of the asset owner.
      • In the Categories field, select the category of the tenant.
      • In the CII categories drop-down list, select the critical information infrastructure category of the resource.
  4. If necessary, under Software, specify the name and version of the operating system.
  5. If necessary, in the Hardware info section, specify the following parameters of the hardware:
    • Name, core count, and clock rate of the CPU in MHz. If necessary, you can click the Add CPU button specify more CPUs.
    • Free disk space and the total size of the disk in bytes. If necessary, you can click the Add disk button specify more disks to be used.
    • Name, vendor, and driver version of the network adapter. If necessary, you can click the Add network card button to specify more network adapters.
    • The clock rate of the RAM in MHz and the total amount of RAM in bytes.
  6. Click the Save button.

Step 2. Adding a correlation rule

You can create a correlation rule or use the ready-made [OOTB] KATA Alert rule.

To add a correlation rule:

  1. In the KUMA web interface, select the Resources section.
  2. Under Resources configuration, select Correlation rules and click the Add button.
  3. On the General tab, specify the following settings:
    1. In the Name field, define the rule name.
    2. In the Tenant drop-down list, select a tenant.
    3. In the Type drop-down list, select simple.
    4. In the Tags drop-down list, select one or more tags to identify the rule.
    5. In the Propagated fields field, add the following fields: DeviceProduct, DeviceAddress, EventOutcome, SourceAssetID, DeviceAssetID
    6. If required, define the values for the following fields:
      • In the Rate limit field, define the maximum number of times per second that the rule will be triggered.
      • In the Severity field, define the severity of alerts and correlation events that will be created as a result of the rule being triggered.
      • In the Description field, provide any additional information.
      • In the MITRE Techniques drop-down list, select the applicable MITRE ATT&CK techniques.
  4. On the Selectors → Settings tab, specify the following filter settings:
    1. In the Filter drop-down list, select Create new.
    2. Click Add group.
    3. In the operator field for the group you added, select AND.
    4. Add a condition for filtering by KATA value:
      1. In the Conditions field, click the Add condition button.
      2. In the condition field, select If.
      3. In the Left operand field, select Event fields.
      4. In the Event fields field, select DeviceProduct.
      5. In the Operator field, select =.
      6. In the Right operand field, select Constant.
      7. In the value field, enter KATA.
    5. Add a category filter condition:
      1. In the Conditions field, click the Add condition button.
      2. In the condition field, select If.
      3. In the Left operand field, select Event fields.
      4. In the Event fields field, select DeviceAssetID.
      5. In the Operator field, select inCategory.
      6. In the Right operand field, select Constant.
      7. Click the Builder button.
      8. Select the category in which you placed the Kaspersky Endpoint Detection and Response Central Node server asset.
      9. Click the Save button.
    6. In the Conditions field, click the Add group button.
    7. In the operator field for the group you added, select OR.
    8. Add a condition for filtering by event class identifier:
      1. In the Conditions field, click the Add condition button.
      2. In the condition field, select If.
      3. In the Left operand field, select Event fields.
      4. In the Event fields field, select DeviceEventClassID.
      5. In the Operator field, select =.
      6. In the Right operand field, select Constant.
      7. In the Value field, enter taaScanning.
    9. Repeat steps 1 through 7 under (h) for each of the following event class IDs:
      • file_web.
      • file_mail.
      • file_endpoint.
      • file_external.
      • ids.
      • url_web.
      • url_mail.
      • dns.
      • iocScanningEP.
      • yaraScanningEP.
  5. On the Actions tab, specify the following settings:
    1. Select the Output check box.
    2. In the Enrichment section, click the Add enrichment button.
    3. In the Source kind drop-down list, select Template.
    4. In the Template field, enter https://{{.DeviceAddress}}:8443/katap/#/alerts?id={{.EventOutcome}}.
    5. In the Target field drop-down list, select DeviceExternalID.
    6. If necessary, turn on the Debug toggle switch to log information related to the operation of the resource.
  6. Click the Save button.

Step 3. Creating a correlator

You need to launch the Correlator Installation Wizard. At step 3 of the Wizard, you are required to select the correlation rule that you added by following this guide.

After the correlator is created, a link to these detections will be displayed in the details of alerts created when receiving detections from Kaspersky Endpoint Detection and Response. The link is displayed in the correlation event details (Related events section), in the DeviceExternalID field.

If you want the FQDN of the Kaspersky Endpoint Detection and Response Central Node server to be displayed in the DeviceHostName field, in the detection details, you need to create a DNS record for the server and create a DNS enrichment rule at step 4 of the Wizard.