-
Posts
352 -
Joined
-
Last visited
Posts posted by Antipova Anna
-
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Problem
Remote installation tasks finishes with uninformative errors:
Setup process error: Unknown error. (126)
Setup process error: Unknown error. (2)
Solution
1. Create 3rd party installation package (Create installation package -> Create an installation package for the specified executable file.)
2. Specify executable file, for example script.sh
3. Locate this package folder in KSC storage, by default %ProgramData%\KasperskyLab\adminkit\1093\.working\share\Packages\(package_name)
4. Edit .\(package_name)\executable_package.kpd: remove exec\ from Executable path, add DontWrap=1 option. Setup section should read the following:
executable_package.kpd[Setup]
Executable=script.sh
DontWrap=1
Params=
5. Edit .\(package_name)\exec\executable_package.kpd: remove exec\ from Executable path, add DontWrap=1 option. Setup section should read the following:
exec\executable_package.kpd[Setup]
Executable=script.sh
DontWrap=1
Params=
6. Copy .\(package_name)\exec\script.sh to .\(package_name)\script.sh
7. Check that in package Settings, "Executable file" changed from exec\script.sh to script.sh
8. Use this package in "install application remotely" task
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Information in this article can be used when there are disk space limitations imposed on the folders used by KESL:
- /var/opt/kaspersky - default KESL installation folder
- /tmp - default folder used to store temporary files during the scan
/var/opt/kaspersky
To move files located in this directory you can create a symbolic link to another folder before installation. Use the following steps:
-
Before installing KESL:
mkdir/new/kesl/folder/ln-s/new/kesl/folder//var/opt/kaspersky#root has to be the owner of all kesl subfolders below /chmodgo-w,a-t/new - Install KESL
If you encounter "Fatal error: Invalid permissions. Check /, /opt, /opt/kaspersky, /var, /var/opt, /var/opt/kaspersky. Only root user should have write access to these directories." while running the post install script, make sure root is owner of all subfolders in the path to kesl executable.
/tmp
You can declare a new temporary folder for KESL by following these steps:
-
Execute this:
systemctl edit kesl -
Add the following:
[Service]Environment="TMP=/new/temp/folder"
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Description
After successful installation kesl-supervisor.service may refuse to start with the following error:
kesl-supervisor.service: Control process exited, code=exited status=203
journalctl -xe command provide more information related this error
*****
kesl-supervisor.service: Failed to execute command: Permission denied
kesl-supervisor.service: Failed at step EXEC spawning /var/opt/kaspersky/kesl/install-current/etc/init.d/kesl-supervisor:
*****kesl-supervisor.service: Control process exited, code=exited status=203
kesl-supervisor.service: Failed with result 'exit-code'.
Failed to start kesl.Root cause
SElinux is enabled on the system and prohibits execution of the service.
Solution
You can check SELinux status by running:
$ sestatusIf SELinux is enabled, then use the dedicated online help article to disable, configure and re-enable it.
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Problem
kesl-control --app-info outputs the following error:
enFile Threat Protection: Unavailable due to file interceptor driver errorOne of the most common root causes is Fanotify is disabled (or KESL could not access it) and kernel module compilation also failed.
A special utility can be used for this directly on the affected machine with KESL installed:
sudo /opt/kaspersky/kesl/bin/fanotify-checker && echo fanotify: supported || echo fanotify: unsupportedIn case, an operating system does not support Fanotify technology, it is required to install some additional packages and build a kernel module for KESL.
A part of required packages may be found on the Hardware and software requirements section of the product documentation, for example for KESL 11.3; In addition to this, new packages kernel-headers-XXX and kernel-devel-XXX must be installed, where XXX - an operating system kernel version.
Use the following scenario to install those packages and build a kernel module for KESL:
for RHEL based OS:
yum install kernel-headers-`uname -r` kernel-devel-`uname -r`for Debian based OS:
apt install linux-headers-`uname -r`Reboot the system;
Run the post-install script:
/opt/kaspersky/kesl/bin/kesl-setup.pl --build | tee /tmp/buildLogAnd reboot the service:
systemctl restart kesl-supervisor.serviceIn case of any further issues, please contact Kaspersky Support.
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Problem
There are several problems with similar causes:
1) KESL postinstall script produces error.
Warning: Failed to set up KSN
2) KESL is installed and running. However, the kesl-control command outputs something like that:
kesl-control --app-info
Connection refused. Invalid user permissions for /var.
Only root user should have write access to this path.
kesl-control --app-infoCould not connect to Kaspersky Endpoint Security 11.2.2 for Linux
3) KESL is installed and running, kesl-control indicates no problems. However, kesl-gui shows the Application is currently unavailable error.
4) KESL is installed and running, nagent indicates no connectivity problems. However, KSC shows that KESL is stopped and can't be started.
Root cause
KESL service implements defensive internal logic which denies connections from not "trusted" processes. One of the causes is that the process executable file or some library it loads can be overwritten by a non-root user:
1) The Owner is not "root".
2) FS write permission is granted to "Group" or "Other".
Such errors often serve as indication of some erratic configuration. For example:
- You may have changed ACL for /opt or other folder (which is supposed to not be widely accessible) to 777;
- In Astra Linux, the owner of the /var directory is sometimes changed to the fly-dm service user due to an error in the fly-dm package. Astra developers confirmed this bug and released fix. If the issue reproduces with new fly-dm versions, address Astra support.
- LD_PRELOAD variable may be used to load arbitrary libraries for any given process including KESL. This is usually the case when you see non-root permissions errors for some third-party libraries.
Solution
To restore proper permissions, use the chown and/or chmod commands:
chown root:root /path/to/folderchmod g-w,o-w /path/to/folderPlease exercise caution when changing permissions for / and folders straight under /. It depends on the environment which files/folders are checked, thus a complete list cannot be provided.
In new kesl versions, kesl-control output suggests which path has incorrect permissions.
You can check what folders have incorrect permissions using this command:
# ls -ld / /var /var/opt /opt /opt/kaspersky /bin /usr /usr/lib /usr/lib64 | egrep -v'^d.{4}-.{2}-.*root root'To get a full list of files loaded by KESL or klnagent, you can read /proc/<pid>/maps. Use commands in the example below to filter out all application-specific files that are located in the folders listed above and to see what other files are used:
# cat /proc/$(pidof -s klnagent)/maps | awk'{print $6}'| grep ^/ | grep -v'kaspersky'| sort | uniq# cat /proc/$(pidof kesl)/maps | awk'{print $6}'| grep ^/ | grep -v'kaspersky'| sort | uniq-
1
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Problem
While WTP/NTP is enabled, nft utility produces errors (stderr) like
# nft list rulesetXT target TPROXY not foundXT target TPROXY not foundXT target TPROXY not foundXT target TPROXY not foundThese errors are caused by a bug in nft utility and xt_TPROXY dynamic library. This effect does not indicate functionality issues.
This bug may be reported to netfilter.org developers.
Explanation
Whenever nft utility lists traffic rules, it dynamically loads extension libraries (for example, from /usr/lib/x86_64-linux-gnu/xtables in Debian OS) including TPROXY and CONNMARK.
When nft encounters first ipv4 rule, it sets global "family=ipv4" state via xtables_set_nfproto function, then loads libxt_TPROXY.so which has both ipv4 and ipv6 targets, but ipv6 are ignored due to the flag.
After that, nft processes ipv6 rules but there are no ipv6 targets for them. As a result, nft utility produces errors "XT target TPROXY not found".
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Sometimes one may need to enable transmitted traffic capturing in KATA (in example, for local testing of Suricata detections).
Here's how to do it.
Instructions for KATA 3.7.*
-
In file
/etc/modprobe.d/pf_ring.confsetenable_tx_capture=1. File should look like this:options pf_ring enable_tx_capture=1min_num_slots=16384 -
Stop
apt-preprocessorandsuricataservices:systemctl stop apt-preprocessor.servicesystemctl stop suricata.service -
Reload
pf_ringmodule:rmmod pf_ringmodprobe pf_ring -
Start
apt-preprocessorandsuricatabacksystemctl start apt-preprocessor.servicesystemctl start suricata.service
Instructions for KATA 4.0/4.1
-
In file
/etc/modprobe.d/pf_ring.confsetenable_tx_capture=1. File should look like this:options pf_ring enable_tx_capture=1min_num_slots=16384 -
Stop
dockerservice:systemctl stop docker -
Reload
pf_ringmodule:rmmod pf_ringmodprobe pf_ring -
Start d
ockerbacksystemctl start docker
Instructions for KATA 5.0
-
In file
/etc/pf_ring/pf_ring.confsetenable_tx_capture=1. File should look like this:options pf_ring enable_tx_capture=1min_num_slots=16384 -
Stop
dockerservice:systemctl stop docker -
Reload
pf_ringmodule:rmmod pf_ringmodprobe pf_ring -
Start d
ockerbacksystemctl start docker
With these changes, KATA will capture and process both incoming and outgoing traffic.
-
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
This is a workaround and should be used if you can't check it the standard way.
1. Collect GSI
2. Open this file (see screenshot) and press ctrl+f and search for the word, for example, Firewall. Immediately you'll get a line with the installed components.
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
In Compact Diagnostic Interface
Can be checked in "About the application" window.
In Kaspersky Security Console
Can be checked in Action -> Information about the application and available module updates...
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Problem
You might notice that large files named like PR*.tmp appear in C:\Windows\Temp.
Cause
This is known and expected behavior. When the product scans an object it creates a temporary copy, names it like PR*.tmp and places it in the temp folder.Once the scan is complete, this temporary file gets deleted.
Large PR*.tmp files mean that some large objects are scanned by OAS (On-Access Scan) or ODS (On-Demand Scan).
Solution
In some cases there might be not enough space of drive to create large temporary file. Below are the possible solutions:
- Exclude large objects from OAS and ODS;
- In OAS and ODS settings, enable option 'Do not scan compound objects larger than' and specify required size in MB;
- Change the folder where KSWS temporary files are created to a drive with higher capacity. In KSWS11 this can be achieved by editing Application settings → Scalability, interface and scan settings → Scan settings → 'Folder for temporary files created during scanning'. In KSWS10 use below registry entry:
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\KasperskyLab\WSEE\10.1\Environment]"ProcessingTempPath"="d:\\Temp\\" -
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Sometimes you may need to add a particular site\domain to an exclusions list of Traffic Security.
Unfortunately, at current moment KSWS console allows us to make exclusions ONLY for Ports, IP-addresses, and Processes:
But we have ability to make site and domain exclusions for Traffic Security via registry workaround.
To implement workaround, we need to create and fill following REG_MULTI_SZ key:
[HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\KasperskyLab\WSEE\11.0\Environment\ICAP\IgnoreDomains]To make changes in this hive, you can add necessary permissions to your account OR you can run regedit in SYSTEM context (psexec -s -i regedit.exe).
Important
Besides required domain names, we recommend to add the following default list of names to avoid breaking of Windows Updates and KSWS activation functionality:
*.data.microsoft.com
*.update.microsoft.com
*.kaspersky.com
*.rds.amazonaws.com
*.s3.amazonaws.com
*.blob.core.windows.net
*.database.windows.net -
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Some issues with KSWS/KESS/KICS4Nodes may require a process dump to analyze. It is fairly easy to collect.
Crash dumps
KSWS/KESS/KICS4Nodes does not create crash dumps by default. It should be enabled before reproducing the issue.
Using KSC console
- Open KSC console and navigate to the affected server.
- Open its properties.
- Switch to the Applications tab.
- Open KSWS properties.
- In the new window navigate to the Malfunction diagnosis tab.
- Mark Create dump file checkbox.
- Specify Dump file folder.
Using KSWS command line
- Start elevated command prompt.
-
Execute KAVSHELL DUMP command. More info about the syntax is here https://support.kaspersky.com/KSWS/11/en-US/146721.htm.
Example where automatic dumps will be saved to C:\DumpsKAVSHELL DUMP /ON /F:"C:\Dumps"
Manual dumps
Manual dump files are usually required when the process does not crash, just hangs or consumes a large amount of CPU time. There are two ways to collect manual dumps. Keep in mind that there are multiple executables, and we need all dumps from all of them. There are always one
kavfs.exeand at least onekavfswp.exe(number depends on load and settings).Using Windows Task Manager
- Start Task Manager
- Switch to the Details tab
- Right-click on the image name
- Select Create dump file
- Repeat for every running KSWS/KESS/KICS4Nodes process
Using KSWS command line
- Start an elevated command prompt.
-
Execute KAVSHELL DUMP command. More info about the syntax is here https://support.kaspersky.com/KSWS/11/en-US/146721.htm.
Example where process with ID 1234 is dumped to C:\DumpsKAVSHELL DUMP /SNAPSHOT /F:C:\Dumps /P:1234
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
KSWS/KESS use * as a wildcard character. There are multiple ways to use it.
Examples
Masks without paths
-
*.exe - all files with extension
*.exe -
test - all files with name
test
Masks with absolute paths
-
C:\dir\*.* - all files in folder
C:\dir\and its subfolders -
C:\dir\*.exe - all files with mask
*.exein folderC:\dir\and its subfolders -
C:\dir\test - all files named
testin folderC:\dir\and its subfolders -
C:\dir\ - all files in folder
C:\dir\and its subfolders
Masks with relative paths
-
dir\*.* - all files in all folders named
dirand their subfolders -
dir\*.exe - all files with mask
*.exein all folders nameddirand their subfolders -
dir\test - all files named
testin all folders nameddirand their subfolders -
dir\test*.* - all files which name begins with test and has extention in all folders named
dirand their subfolders (for example, C:temp\dir\sub\test2.exe will be excluded ) -
dir\ - all files in all folders named
dirand their subfolders
dir\ and dir\* have the same result.
Combinations such as dir\*\ are not used. The product will ignore them.
Masks acceptable while adding trusted processes:
c:\dir1\dir2\fil?.exe
c:\dir1\dir?\fil?.exe
c:\dir1\dir2\*.exe
c:\dir1\*\some_file.exe
-
*.exe - all files with extension
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Product version/Environment
- KSWS 10.1/11.X
- Windows Server Requirements for the server on which Kaspersky Security for Windows Server is deployed
Description of Error
Run installation of the application or the console with the setup file. Error "Please go to the Control Panel to install and configure system components" pops up and installation doesn't run.
Solution
- Unpack the installation file and run the .msi file inside instead of the setup:
- *\ksws_11.0.1.897_en\client\ks4wstools*.msi for the console
- *\ksws_11.0.1.897_en\server\ks4ws*.msi for the application
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Consider the following scenario:
Open update or scan KSWS task.
Go to Schedule->Advanced→Task stop settings:
Solution
Task's stop settings are greyed out and cannot be changed. This is by design behaviour:
-
Task stop settings can be changed only for real-time tasks - Real-Time File Protection and Script Monitoring. These tasks can be configured in KSWS policy to pause the execution at certain time not to interfere with 3d apps or speed up heavy operations.
- Task stop settings cannot be changed for Updater and On Demand Scan tasks. These tasks should be executed without pausing them.
-
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Problem
If you found out that KSWS installations are somehow corrupted, and you're not able to remove it using conventional means (using misexec and/or appwiz.cpl), please do not use kavremover and/or mszap tools. Do not attempt removing the product manually as our goal is to determine the root cause of the product moving to this inconsistent state.
Solution
Please provide Kaspersky Support with the pertinent GSI log of the affected host and KSWS msi installer logs containing all the previous installations/modifications of the product that have led it to its current state.
Locate and copy all msi files from the windows temp folder and the user temp folders:
%systemroot%\Temp:\Users\<username>\AppData\Local\TempOr simply collect all files from those folders from the affected machine.
Also, clarify the exact timestamp when the issue have started to occur, or an approximate date and time when you have noticed the problem on the affected host for the first time, and when the last time was when the product was working just fine on the said host as well.
Based on this data it will be potentially possible to provide an automated msiexec string to repair and/or removing the product automatically, and more importantly it will give us a better chance of determining the root cause.
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Environment/Preconditions
KSC - 12
KSWS - 11.0.1.897You may find a massive increase in disk usage from the folder report under the Kaspersky folder. The size of the report folder will increase from around 2GB to 12GB, the files in the report folder have random name (like 340a13d9-2a50-4c4e-94d6-82a79d80da4b), which rapidly grows and consumes disk space.
The file can be deleted to resolve the disk space full issue, which itself can cause many issues (can't log in to the server, KSWS stop, etc)
To delete the file:
- Stop KSWS.
- Add permission/owner for the login account.
- Right-click and delete file.
This issue is caused by the Task log setting under Log and Notification tab in the KSWS policy.
To avoid the detailed events issue:
- Ensure that there are no Informational events in the Importance level option in each Component.
- Remove task logs older than (days) is selected.
In case you do the above step and the random file is still keep growing rapidly (100 MB per hour), it may be causes by the flooding event.
You can check the event flooding by using "DB Browser for SQLite".
For example, the log above is generated by the Application launch control component. You may solve this issue by disabling Application launch control log.
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Problem
KSWS10 and KSWS11 may have two issues because of the Application Control component:
-
Can't uninstall KSWS with the error "There is a problem with this Windows Installer package. A DLL required for this install to complete could not be run"
-
Can't run GSI with this error "Unable to unpack the critical file. GsiSharp.bin"
Solution
Disable Application Control and retry uninstallation.
Сollect GSI, if necessary.
-
Can't uninstall KSWS with the error "There is a problem with this Windows Installer package. A DLL required for this install to complete could not be run"
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Problem
In some cases, it is possible to run a database upgrade task on the KSWS/KICS/KESS host, but despite the upgrade task successfully completing, the databases are still out of date.
Solution
Most probably product operates in UpdateBlackListOnly mode. This happens in cases when product is activated with activation code and is unable to reach our activation servers. Thus KSWS fails to receive/refresh activation ticket and downloads updates only for Blacklist.
Possible ways to solve the problem:
1. Activate with a key file;
2. In case KSWS needs to be activated with the code make sure that either KSWS server is able to reach our public activation servers directly or set up KSC to act as activation proxy and make sure that KSWS server is able to reach KSC on TCP17000. -
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Description
As part of proactive security, you may wish to add sha256 to block the execution of application or malicious applications without having the original source files.
This article explains how to perform this action.
How To
-
Create a text file containing the sha256 you want to block.
-
Use the AppRulesGenerator.exe app to generate an xml file:
-
Import the generated .xml file into the KSWS policy:
AppRulesGenerator.exe can be downloaded here.
-
1
-
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
In KSWS/KESS/KICS there is an option in update task to Lower the load on the disk I/O.
It is important to understand that when this option is enabled the task does not use HDD resources at all. Updater will not only place current updates to RAM. Update temp and cache files will also be placed there.
Incorrect expectation: The task uses dedicated amount of RAM, in case if dedicated RAM is not enough for all update files including temp and cache task will continues through HDD.
Actual product behavior : The task uses dedicated amount of RAM, in case if dedicated RAM is not enough for all update files including temp and cache then task fails with the error:
Failed to update. Reason: insufficient drive space.
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Problem
In previous versions of KATA it was possible to mount an NFS share to copy backups to. In KATA 5.x only CIFS share mounts are available out-of the box.
Errorroot@1.srv.node1.node.dyn.kata:/home/admin# mount -t nfs10.225.62.41:/mnt/NFS/KXDR /mnt/nfsmount: /mnt/nfs: bad option;forseveral filesystems (e.g. nfs, cifs) you might need a /sbin/mount.<type> helper program.Solution
Install packages manually via dpkg in the following order to add NFS support:
dpkg -i /home/admin/libtirpc-common_1.2.5-1_all.debdpkg -i /home/admin/libtirpc3_1.2.5-1_amd64.debdpkg -i /home/admin/keyutils_1.6-6ubuntu1_amd64.debdpkg -i /home/admin/libnfsidmap2_0.25-5.1ubuntu1_amd64.debdpkg -i /home/admin/rpcbind_1.2.5-8_amd64.debdpkg -i /home/admin/nfs-common_1.3.4-2.5ubuntu3.5_amd64.deb -
It is the same as setting up flag in the registry:
[HKEY_LOCAL_MACHINE\SOFTWARE\KasperskyLab\Components\34\1093\1.0.0.0\ServerFlags]
"SrvUseFqdnAsDisplayNames"=dword:00000001Both ways are acceptable. Thank you!
-
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Collect script output is a must for most KATA-related issues and questions.
Which information?Which file?How to find/interpret?ExampleКАТА version and role: CN/PCN/SCN/Sensor /config/apt-va File contains the version and role in human-readable form. Also, you can see if the node was upgraded from previous KATA versions in 'migrate'linePrimary CN[product]name=kata-cntitle=Kaspersky Anti Targeted Attack Platformversion=3.5.0-1269release=releasemaster = yessensor = yestimestamp =1568700994migrate =cn_role = pcnStandalone CN[product]name=kata-cntitle=Kaspersky Anti Targeted Attack Platformversion=3.6.1-713release=releasemaster = yessensor = yestimestamp =1572445307.01migrate =cn_role = cnSensor node[product]name=kata-cntitle=Kaspersky Anti Targeted Attack Platformversion=3.6.1-713release=releasemaster = nosensor = yestimestamp =1583845362.98migrate =cn_role =Virtual or hardware? /environment/dmesg.txt
OR
/var/log/messages
OR
/var/log/boot.log
Search for "DMI" entries in the file. Physical server[0.000000] DMI: HPE ProLiant DL560 Gen10/ProLiant DL560 Gen10, BIOS U3406/20/2018Virtual server[0.000000] DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS6.0004/05/2016CPU /environment/cpuinfo.txt Scroll to the bottom of the file. Each "processor" listed is not a physical core, but virtual "thread", so, i.e. 8-physical core CPU with hyper-threading will have 16 CPUs in the file. Keep in mind that CPUs are counted from 0, so for 16-thread CPU last entry will have number 15. processor :15vendor_id : GenuineIntelcpu family :6model :79model name : Intel(R) Xeon(R) Platinum8158CPU @3.00GHzstepping :0microcode :0x2000050cpu MHz :2992.968cache size :25344KBphysical id :0siblings :16core id :15cpu cores :16apicid :15initial apicid :15fpu : yesfpu_exception : yescpuid level :13wp : yesflags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts mmx fxsr sse sse2 ss ht syscall nx pdpe1gb rdtscp lm constant_tsc arch_perfmon pebs bts nopl xtopology tsc_reliable nonstop_tsc eagerfpu pni pclmulqdq ssse3 fma cx16 pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand hypervisor lahf_lm abm 3dnowprefetch ibrs ibpb stibp fsgsbase tsc_adjust bmi1 hle avx2 smep bmi2 invpcid rtm rdseed adx smap xsaveopt arat spec_ctrl intel_stibp arch_capabilitiesbogomips :5985.93clflush size :64cache_alignment :64address sizes :43bits physical,48bits virtualpower management:RAM /environment/memory.txt File shows free command output. Values are in megabytes, pay attention to 'total'and'available'columns. NB! Ignore'free'column: despite of it's name, it doesn't actually show free RAM,'available'column does it.total used free shared buff/cache availableMem:1973086386936346738129804125558Swap:000HDD /environment/hdd.txt Pay attention to partitions /dev/sda* and /dev/sdb*.
If /dev/sdb* partition is present, you are dealing with two-disk installation, otherwise, it's one-disk installation.
NB! Always check HDD partitions size and available free space! KATA needs a LOT of disk space to work correctly.
Most important partitions are:
/dev/sda4 1.2T 894G 224G 80% /data ← Used for processing queues and quarantine, main partition for KATA
/dev/sdb1 2.7T 1.4T 1.3T 52% /data/var/lib/kaspersky/storage ← Used for EDR data: (telemetry from Endpoint Sensors)
Filesystem Size Used Avail Use% Mounted on/dev/sda3 367G 14G 335G4% /devtmpfs 126G0126G0% /devtmpfs 126G 252K 126G1% /dev/shmtmpfs 126G4.1G 122G4% /runtmpfs 126G0126G0% /sys/fs/cgroup/dev/sda2 232M 32M 189M15% /boot/dev/sda1 237M5.5M 232M3% /boot/efi/dev/sda41.5T 435G 955G32% /data/dev/sdb12.7T1.4T1.3T52% /data/var/lib/kaspersky/storagetmpfs 26G026G0% /run/user/998tmpfs 26G026G0% /run/user/1002tmpfs 26G026G0% /run/user/1001DNS name
/environment/hostname.txt File contains exactly the hostname of the machine. kata-cn IP address /environment/ipa.txt
/environment/ifconfig.txt
Both files contain info about network interfaces and assigned IP addresses.
ifconfig command is considered obsolete by community, but it can be useful: it helps to recognize SPAN interfaces. SPAN interfaces usually don't have IP address assigned, but have a lot of traffic. Also, SPAN interfaces always are in promiscuous mode: <UP,BROADCAST,RUNNING,PROMISC,MULTICAST>
ipa.txt1: lo: <LOOPBACK,UP,LOWER_UP> mtu65536qdisc noqueue state UNKNOWN groupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:00inet127.0.0.1/8scope host lovalid_lft forever preferred_lft foreverinet6 ::1/128scope hostvalid_lft forever preferred_lft forever2: ens192: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu1500qdisc mq state UP groupdefaultqlen1000link/ether00:50:56:9f:0e:77brd ff:ff:ff:ff:ff:ffinet10.200.178.85/23brd10.200.179.255scope global ens192valid_lft forever preferred_lft foreverinet6 fe80::250:56ff:fe9f:e77/64scope linkvalid_lft forever preferred_lft forever3: ens224: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu1500qdisc mq state UP groupdefaultqlen1000link/ether00:50:56:9f:db:4d brd ff:ff:ff:ff:ff:ffinet6 fe80::250:56ff:fe9f:db4d/64scope linkvalid_lft forever preferred_lft foreverifconfig.txtens192: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu1500inet10.200.178.85netmask255.255.254.0broadcast10.200.179.255inet6 fe80::250:56ff:fe9f:e77 prefixlen64scopeid0x20<link>ether00:50:56:9f:0e:77txqueuelen1000(Ethernet)RX packets604911116bytes747444631331(696.1GiB)RX errors0dropped26overruns0frame0TX packets368814032bytes353073760300(328.8GiB)TX errors0dropped0overruns0carrier0collisions0ens224: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu1500inet6 fe80::250:56ff:fe9f:db4d prefixlen64scopeid0x20<link>ether00:50:56:9f:db:4d txqueuelen1000(Ethernet)RX packets437bytes135823(132.6KiB)RX errors0dropped1125overruns0frame0TX packets8bytes656(656.0B)TX errors0dropped0overruns0carrier0collisions0lo: flags=73<UP,LOOPBACK,RUNNING> mtu65536inet127.0.0.1netmask255.0.0.0inet6 ::1prefixlen128scopeid0x10<host>loop txqueuelen1000(Local Loopback)RX packets19418334689bytes12053991732736(10.9TiB)RX errors0dropped0overruns0frame0TX packets19418334689bytes12053991732736(10.9TiB)TX errors0dropped0overruns0carrier0collisions0SPAN interfaceeno2: flags=4419<UP,BROADCAST,RUNNING,PROMISC,MULTICAST> mtu1500inet6 fe80::42f2:e9ff:fecc:4343prefixlen64scopeid0x20<link>ether40:f2:e9:cc:43:43txqueuelen1000(Ethernet)RX packets122540697216bytes104768065608116(95.2TiB)RX errors0dropped0overruns0frame0TX packets7bytes586(586.0B)TX errors0dropped0overruns0carrier0collisions0device memory0xbd5a0000-bd5bffffSandbox server information /config/apt-agents-id Bottom part of the file contains info about connected sandbox nodes: IP addresses, cert fingerprints and states: Sandbox may be connected, but disabled. [sandbox_node.sandbox1]host =172.16.0.151enable = yesfingerprint = C0:15:18:C8:11:46:11:BC:23:50:16:95:10:2D:FF:FA:4E:06:21:90:20:AA:CC:36:53:27:B8:BF:CF:5A:1A:9CEnabled integrations(SPAN, ICAP, etc) /config/preprocessor.conf Preprocessor is the component responsible for main KATA integrations: SPAN, SMTP, ICAP, POP3.
You should look for corresponding section in preprocessor.conf:
SPAN: [traffic]
SMTP: [smtp_proxy]
ICAP: [icap]
POP3: [pop3]
For each section, there's a line defining whether this integration is enabled:
enable=yes/no
Other integrations like KSMG/KLMS/API aren't easy to check by collect script output
Only SPAN is enabled[app]use_syslog=notrace_level=ERRcache_socket=localhost:6379collector_url=http://centralnode:8081/apt/collectorlicense_remote=no#thissection applicableforsections: pop3, smtp_proxy andfortraffic section but onlyforsmtp preprocessor[mail]extract_urls=yes#file extensions of attachments which format recognizer is not usedforfile_extensions=dll,exe,com,java,js,jse,wsf,wsh,vbs,vbe,msi,deb,rpm,apk,zip,7z,rar,iso,cab,jar,bz2,gz,tgz,ace,arj,dmg,xsr,rtf,pdf,msg,eml,vsd,vdx,xps,xsn,odt,ods,odp,sxw,doc,dot,docx,docb,dotx,docm,dotm,xls,xlt,xlm,xla,xll,xlw,xlsx,xltx,xlsm,xltm,xlam,xlsb,ppt,pot,pps,ppam,sldx,sldm,thmx,pptx,potx,pptm,potm,ppsx,ppsm,pub,html,htm,hta,swf,jpg,jpeg,gif,png,tiff,chm,mht,cpl,ocx,pif,scr,bat,cmd,ps1,lnk,reg,msu,msp,z[traffic]enable=yesnetwork_interfaces=ens6f0,ens6f1,ens5f1,ens5f0,ens5f3,ens5f2,eno1,ens3f1,ens3f0pcap_snaplen=1600pcap_cores=pcap_filter=checksum_validation=nobuffer_size_limit=4096tcp_threads_number=16enable_dns=yesenable_http=yesenable_ftp=yesenable_ssl=yesenable_smtp=yesftp_data_expired_timeout_in_seconds=60ftp_data_supposed_max_size_in_bytes=10485760[ksn]enable=yes#possible values of type are KSN or KPSNtype=KSNtimeout=500non_dl_formats=GeneralHtml,GeneralTxt,ExecutableJs,ImageGif,ImageJpeg,ImagePng,ArchiveCabksn_adapter_interfaces=# Change cache entries only you know what are doing.#0- disables cachecache_entries=3600100request_threads=4[snmp]enable=yesmaster_agent_address=tcp:localhost:705ping_interval_in_seconds=15[icap]enable=nolisten_interfaces=ens3f3:1344,ens3f2:1344,eno2:1344allow204=yesmax_connections=5000respmod_url=av/respmodheader_client_ip=X-Client-IPheader_client_port=X-Client-Portextract_user=noheader_username=X-Authenticated-Userbase64_decode_username=yes[filter]file_size_limit=100000000dns_lookup_enable=yesdns_timeout=500html_filter=/var/opt/kaspersky/apt/update/bases/htmlre.txt[snort]enable=yesalerts_socket=/var/log/kaspersky/snort/snort_alert[pop3]enable=noserver=port=user=password=cipher_list=ALL:!aNULL:!eNULL:!LOW:!EXP:!MD5:!DSS:!KRB5:!PSK:!RC4:!SRP:!CAMELLIA:!IDEA:!SEED:!3DES:@STRENGTH:!kDH:!kECDHencrypted=yescheck_interval_in_seconds=2accept_any_certificates=noaccept_untrusted_self_signed_certificate=yesprocess_msgs_per_session=3000request_timeout_in_seconds=60[smtp_proxy]enable=nomax_threads=20socket_in=inet:10025@127.0.0.1#RFC1123suggests10mintimeout_in_seconds=600[stat_engine]enable=yesdb=kafka:centralnode:9092?topic=networkoltp_bulk_size=1000subnets=taa_skip_header_proxy_auth=status-code:407oltp_raw_data_limit=0[proxy]enable=nobypass_local_addresses=yeshost=port=user=password=Connected Endpoint Sensors /config/aapt_info You can find the beginning of Endpoint Sensors list by searching for 'Agent Status'. To find the number of connected sensors, you need to calculate lines; but it's not easy to automate it as the lines don't have obvious unique grep-able attribute. However, using'Microsoft Windows'will give you enough precision(it will give a few extra matches from last detections info).Sample entry for 1 agentae5290b1-c490-404b-beec-ee553d5d64ee | DXB00079395.*.corp |2019-09-2408:41:51.579011|10.56.14.170|3.5.435.0|2019-09-2303:21:26.883616|2019-09-2403:15:28.642816| t | Microsoft Windows10| | | 2346c7a2-a395-4dc4-bc5c-ea99fa488386 |6| 568b01b8-4497-decf-7f8c-671bbf8ad8ccKSN/KPSN connection /config/preprocessor.conf From collect script, you can only determine whether KATA is set up to receive verdicts from the cloud, and understand which sort of cloud it is - global KSN or private KPSN. Look for [ksn]section inpreprocessor.conf, it's pretty self-explanatory. Keep in mind that you have a tool which allows you to[ksn]enable=yes#possible values of type are KSN or KPSNtype=KSN
SSH certificate import error during the "Install application remotely" task in KSC [KES for Linux]
in Advice and solutions for Kaspersky Endpoint Security for Business
Posted
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials.
Problem
The "Install application remotely" task wizard presents an option to specify an SSH certificate as account credentials, if Linux package is selected for installation.
The wizard does not accept certain certificates and fails to provide informative error messages why this happens.
Examples:
Failed to upload the certificate.
Failed to import the private key of the certificate.
Root cause
KSC 13.2 only accepts PEM certificates, they start with header line of the following format:
-----BEGIN RSA PRIVATE KEY-----
However, most modern Linux systems use openssh, which offers an ssh-keygen tool to generate certificates. Starting from ~2018 it generates certificates in its own openssh structure if used with default settings. The header looks as follows:
-----BEGIN OPENSSH PRIVATE KEY-----
Solution
As a workaround, generate a cetificate in the PEM/RSA format.
# ssh-keygen -t rsa -m PEM
Generate the SSH-2 certificate, then navigate to Conversions → Export OpenSSH key (do not choose "force new file format").