Jump to content

About this blog

Entries in this blog

How to check KSN availability on KATA CN [KATA/KEDRE]

Sometimes, you may need to check KSN servers availability and operation on KATA CN. This method is not applicable to KATA 6.0. The tool is still present, but it returns error 0x80000001 (Interface not supported). For KSN issues, there's a way to check specific hash for reputation: Become root  sudo -i Check specific hash for reputation by running the following command: for KATA 4.+ and 5.0: docker exec -it "$(do

svc_kms

svc_kms in How-to

How to integrate KATA and KWTS [KATA/KEDRE]

You may have purchased both the KATA and KWTS(Kaspersky Web Traffic Security) products. Since KWTS has built-in KATA integration, you may want to integrate KATA and KWTS. Problems after integration Shortly after integration you may notice that on KWTS side, there is an error about sending objects to KATA, and dashboards look similar to this: Resolution Prerequisite for successful integration with KWTS is KATA version 3.6.1.752 or higher. KATA side To

svc_kms

svc_kms in How-to

How to remotely uninstall KEA Core Patches through KSC [Kaspersky Endpoint Agent]

Most of the time KEA core patches are cumulative and it is sufficient to install the newer one on top of the previous in order to fix new issues. However, sometimes, for troubleshooting purposes or otherwise, you would need to remove an existing patch. This is how it's done. Step-by-step guide In the Administration Console, go to Advanced → Remote installation → Installation packages; In the right frame, click Create installation package; Select Create installatio

svc_kms

svc_kms in How-to

How to perform Yara-scan using KEA [Kaspersky Endpoint Agent]

The scenario is applicable for KEA version 3.10 and above. There is no built-in feature to perform Yara-scan using KATA/EDR Expert 3.7.2. But if necessary, it's possible to perform it using KEA 3.10 and above. Yara-scan using the Command line Requirements: KEA 3.10 (and above) installed Files with Yara-rules (*.yara; *.yar) Scenario: Ensure that KEA is installed and running; Run the Yara-scan

svc_kms

svc_kms in How-to

How to gather sandbox-debug-report from terminal [KATA/KEDRE]

This article is fully applicable to KSB 2.0 server as well You may want to gather KATA Sandbox diagnostics via SSH, without accessing Web UI. Here's how to do it. Step-by-step guide Login to Sandbox via SSH and become root. Then, execute the command: Produce collect sb-logs --create '/tmp' '-7' chmod 777 /tmp/sandbox-debug-report*

svc_kms

svc_kms in How-to

How to install Sandbox VM images from command line [KATA/KEDRE]

This article is applicable to both KATA and Kaspersky Sandbox 1. It's not applicable to KSB2. In certain cases (i.e. slow connection to Datacenter from Administrator workplace) it may be troublesome to upload VM images to fresh installed KATA Sandbox server. In such cases, you may prefer to transfer VM images to Sandbox via tools like WinSCP, and then install images via command line tools. Step-by-step guide  Images should be transferred to Sandbox. Files should be located in /va

svc_kms

svc_kms in How-to

How to collect telemetry dump for load profile analysis [KATA/KEDRE]

Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials. Sometimes EDR agents generate more telemetry than anticipated. There's an option to tune telemetry collection via KEA bases, and in order to do it, telemetry profile, aka "topic-dump", is needed in ready-to-use format. In order to collect telemetry, do the following: Please do not run apt-sedr-reset before collecting topic dumps. Execute the following comma

svc_kms

svc_kms in How-to

How to upgrade KATA 3.7.2 > 4.0 > 4.1 > 5.0 > 5.1 > 6.0 > 6.1 [KATA/KEDRE]

In order to upgrade KATA from 3.7.2 to 4.0 > 4.1 > 5.0 > 5.1 > 6.0 please follow the manual below.   Step-by-step guide Prior to PCN upgrade you have to disconnect all Sensors, SCNs and Sandboxes. After upgrade Sandboxes and Sensors must be reinstalled, disconnected SCNs – upgrade to 4.0 and 4.1 and then reconnect them to PCN. Upgrade order described here - https://support.kaspersky.com/KATA/4.0/en-US/198801.htm

svc_kms

svc_kms in How-to

How to enable KEA traces from installation [Kaspersky Endpoint Agent]

Sometimes, you may want to have Kaspersky Endpoint Agent traces which start from its very cradle. This guide is applicable to local installation. Step-by-step guide Place the attached JSON file next to endpointagent.msi file. Feel free to modify patch to traces folder inside. Install Endpoint Agent using GUI or command line: msiexec /i endpointagent.msi /qn

svc_kms

svc_kms in How-to

How to install patches on password-protected KEA [Kaspersky Endpoint Agent]

As the first step of troubleshooting of KEA, we recommend installing the latest core patch. However, sometimes such installation will fail. There are two popular causes of this: EULA is not accepted; KEA installation is protected with a password. This guide addresses both of these issues. # in Password Symbol Due to limitations in KSC, when creating a custom package for remote deployment in KSC, or editing package configuration file (.kpd) directly,

svc_kms

svc_kms in How-to

How to remove VM snapshots from KATA Sandbox [KATA/KEDRE]

Sometimes, KATA Sandbox may suddenly stop functioning normally and throw a self-diagnostic error. This may be caused by snapshots corruption: as one of the troubleshooting steps, you may remove the latest VM snapshots, this is harmless procedure. Step-by-step guide Login to Sandbox via SSH and execute the following command: ls -l /vm/qemu/vms/ total 36 drwxr

svc_kms

svc_kms in How-to

How to change installed components for built-in KEA [Kaspersky Endpoint Agent]

Problem If you install standalone Kaspersky Endpoint Agent, both KSC installation package and local installer provide option to choose, which KEA components to install: However, when KEA is installed in built-in scenario, bundled with KES or KSWS, you don't get to choose and KEA is installed in default configuration, with all the components. There's a way to select installed KEA components even for built-in scenarios. Using install_props.json for changing installed comp

svc_kms

svc_kms in How-to

How to get Endpoint Agent lists and statuses from CLI [KATA/KEDRE]

This works an all KATA CN versions from 3.6.1 to 5.1 You can execute the queries below with Curl to get the text representation of agent status. SSO login and password must be used, limit of 200 entries is used in the example query. JSONs with agent status curl -s --output /dev/null -c ./cookie -k -X POST -H 'Content-Type: application/json' -d '{"username":"SSO","password":"MYPASSWORD","local":false

svc_kms

svc_kms in How-to

How to change Docker network settings in KATA [KATA/KEDRE]

Please use caution when following the steps. This article is applicable to KATA 3.7.2 and KATA 4.0/4.1 In KATA 3.7, EDR stack is based on microservice architecture, it utilizes Docker Swarm. Containers have their own internal networking, which may cause issues in infrastructure, if the same networks are already used. Docker uses 4 different networks: Name Subnet br

svc_kms

svc_kms in How-to

How to use certificate chain for Web UI [KATA/KEDRE]

You may want to have full certificate chain for KATA Web UI. Here's how to do it. Step-by-step guide Preparing the certificate chain for use in nginx_gateway configuration We start with full certificate chain in familiar form. Please note that certificate chain should contain desired intermediate authorities' public keys. Do not add private key to the chain. First of all, we transfer it to the Central Node. It's recommended to do all further actions on Central Node, as in dif

svc_kms

svc_kms in How-to

How to manage VMs, images, and slots via CLI in KATA SB [KATA/KEDRE]

KATA Sandbox provides instruments to manage SB images, ISO files, and VM Slots number via CLI. For details, see below. Slots Sometimes, it is convenient to change a slot number via CLI. To do so, become a root user and run:  /opt/kaspersky/sandbox/bin/sandbox-slots-setup <number of slots> Change slots number via CLI # /opt/kaspersky/sandbox/bin/sandbox-slots-setup 12

svc_kms

svc_kms in How-to

How to configure Single-Sign-On For KATA 4.1/5+/6+ [KATA/KEDRE]

There is an example of a step-by-step instruction to configure Single-Sign-On (SSO) for KATA 4.1/5+/6+ into HOME.LAB domain. Prerequisites Deployed Central Node Server Name should be FQDN. (In current case FQDN name of Central Node - kata-cn.home.lab)  It can be checked via Settings/Network Settings of Central Node. A and PTR record should be set for Central Node in DNS. Domain User Account should be created to set up Kerberos authentication by means of keytab f

svc_kms

svc_kms in How-to

How to enable TX capturing in KATA [KATA/KEDRE]

Sometimes one may need to enable transmitted traffic capturing in KATA (in example, for local testing of Suricata detections). Here's how to do it. Instructions for KATA 3.7.* In file /etc/modprobe.d/pf_ring.conf set enable_tx_capture=1. File should look like this: options pf_ring enable_tx_capture=1 min_num_slots=16384

svc_kms

svc_kms in How-to

How to export alerts from KATA to CSV [KATA/KEDRE]

Security officers may need raw alerts data from KATA for further processing in Excel/etc. Here's how to export all alerts from KATA database to .csv file: KATA 3.7.2 sudo -u postgres bash -c "psql -d antiapt -c \"COPY (SELECT * FROM all_alerts) TO '/tmp/kata_alerts.csv' (format csv, delimiter ';', header, encoding 'UTF8');\"" Instead of simply copying all alerts

svc_kms

svc_kms in How-to

How to check KEA bases version [Kaspersky Endpoint Agent]

Configuring KEA update task is of crucial importance. Updated KATA telemetry filters, exclusions and performance optimizations are delivered via bases. However, KEA has no transparent means to check bases version locally. The solution to this demand is to check bases version locally via CLI. KEA for Windows bases date From Elevated Command Prompt, execute: type "C:\ProgramData\Kaspersky Lab\En

svc_kms

svc_kms in How-to

How to force KATA Sandbox selfcheck [KATA/KEDRE]

For KATA 3.7.2 You can force run Sandbox Healthcheck instead of waiting for 30 minutes' timeout.  Step-by-step guide Log into Sandbox Server via ssh. To run checker, first you need to delete /var/tmp/sbtest file: rm /var/tmp/sbtest Then run checker and wait until it finishes:

svc_kms

svc_kms in How-to

How to disable mandatory amount of VM images KATA SB 4.1/5.0 [KATA/KEDRE]

You may not want to use all 3 or 4 (depends on settings at web set) VMs in KATA 4.1/5.0 SB. If one of the VM images is not installed, there will be SB self-diagnostics error at the KATA web-interface. Usually it's WinXP image that gets excluded. This article is applicable only to KATA 4.1/5.0 Images names for 4.1: CentOS7_x64, WinXP, Win7_x64, Win10_x64 Images names for 5.0: Astra_x64, CentOS7_x64, WinXP, Win7_x64, Win10_x64 KATA

svc_kms

svc_kms in How-to

How to upgrade password protected KEA with KSC task [Kaspersky Endpoint Agent]

How to upgrade previously installed password protected KEA using KSC remote installation task. Step-by-step guide Edit attached file install_props.json, put there your password for already installed KEA; Put this file to folder on KSC containing files for creation of remote installation package for new KEA version as per screenshots below; Create on KSC package for remote installation; Start remote installation task on KSC.

svc_kms

svc_kms in How-to

How to collect LENA troubleshooting information [Kaspersky Endpoint Agent for Linux]

This article applies to Endpoint Agent for Linux. To collect LENA debug or ANY traces, please follow this guide. Default traces location is '/var/log/kaspersky/epagent/'. Default dumps location is '/tmp/agentdumps' Public collect.sh script was updated to collect LENA-related information and gather these folder as well. How to: enable LENA ANY traces For KATA-EDR (on-premises) customers to tune LENA performance by exclusions, ANY level logs are required. To enable ANY log

svc_kms

svc_kms in How-to

How to replace pinned TLS Certificate [KATA/KEDRE]

KATA / EDR is using only one certificate for all connections (like WebServer and Client Connections). When you plan to replace it, do it in an early stage of deployment. If you want to replace the TLS certificate, you will need to: Reauthorize mail sensors (KSMG, KLMS) on Central Node. Reconfigure connection of Central Node, PCN and SCN to Sandbox. Reconfigure Endpoint Agent traffic redirection to Sensor and trusted connection with Endpoint Agent. Upload a new c

svc_kms

svc_kms in How-to



×
×
  • Create New...