Jump to content

MilanBortel

Members
  • Posts

    128
  • Joined

  • Last visited

Posts posted by MilanBortel

  1. Hi @dmkasp,
    it happened to me also. This intrusion has been detected on devices with both KSWS and KES installed. What is funny - it was detected on Windows 10 devices, that obviously doesn’t have any DNS role installed and thus cannot become victims for that attack.. It can only affect Windows Server host with DNS role installed, is that your case?

    From my communication with support I took it as false positive. I guess it detects some of our network monitoring tools sending the attacking packets..

    Cheers,
    Milan

  2. Hi @ameen abu siaf,

    I believe that Kaspersky Endpoint Detection and Response is the general name for the product principle and Kaspersky Endpoint Detection and Response Optimum is the name of the specific product.

    When working with standard security products you use Kaspersky Security Center + Kaspersky Endpoint Security for Business, right?

    You can add additional product called Endpoint Agent, which acts as a sensor for detection (and is installed together with Network Agent and KES on devices). Then you use standard KSC Web Console with additional license for managing Endpoint Agent.. Using this enhanced Web Console you are doing the response part of the job.

    KEDR Optimum + KSC + KESB + Kaspersky Sandbox

    As you can see from attached picture you can then add one more product Kaspersky Sandbox, which acts as an independent test environment which is testing possible uknown threats and giving the reputation back to KSC for initiating futher steps.

     

    Is it making any sense to you? 🤔

    Cheers,
    Milan 

  3. Hello guys,

    when I use the standard “Send message to user” task, from target user perspective it displays the message box as “inactive” window with “K” icon blinking in taskbar:

    Send message to user notification​​​​

    When user switch window, then he can see the message eventually:

    send message to user

    Question: can I set somehow so the windows is displayed on top of other windows? 🤓

    Versions: KSC - 12.2.0.4376 + KES 11.5.0.590

     

    Cheers,
    Milan

  4. This does not really look like a Kaspersky issue/error message.

    However, if you turn off KES temporarily, does the admin center work?

    If yes, I would check scan encrypted traffic (put an exception for that server) or WebAV component.

    Hi @ak01 ,

    confirmed - when KES is disabled, WAC works just fine.. Already submitted request for technical support (INC000012291803). Will let you all know of result.. :)

    Cheers,
    Milan

  5. Hi @andrew75,

    you can built your own “test” ransomware using original AES encryption tool.

    1. download and extract AES tool from http://www.aescrypt.com/download/ into C:\AESCrypt\
    2. create a test file .Desktop/invoice.txt
    3. create ransomware.bat file using this code:
      @echo off  

      if exist C:\AESCrypt\aescrypt.exe goto :Step1

      echo **** not exist C:\AESCrypt\aescrypt.exe ****
      pause
      exit

      :Step1
      if exist .\invoice.txt goto :Step2
      echo **** not exist .Desktop\invoice.txt ****
      pause
      exit

      :Step2
      C:\AESCrypt\aescrypt.exe -e -p root .\invoice.txt
      if exist .\invoice.txt.aes goto :Step3

      :Step3 del .\invoice.txt
      echo **** Congratulations!!! Your personal files are encrypted ****
      pause
      exit
    4. then run the bat file :)

    Kaspersky should recognize this encryption activity as a dangerous → block the process → restore the file. You can test on network path, on multiple files, .. see details on aescrypt.exe parameters here 

    Cheers,
    Milan

  6. I am using kaspersky security center but I do not find the way to exclude an exe file to be excluded because it has been detected as a false positive, any idea of how to do it ? I think there is a way to catalogue detected applications and exes as secure files.

    Hello @palmer,

    you can set up Exclusions easily via policy: General Settings/Exclusions → Trusted Zone Settings

     

    Let us know of result :)

    Cheers,
    Milan

  7. Hi Milan,

    No need to be nervous, if everything is working so far (except the Update task), then there’s nothing to worry about. The KSWS patches are not automatic, this is true, but if there’s something really critical, we’ll release it as an autopatch, of course.

    Still, I'd recommend getting the Core 10 patch and installing it. By the way, we’re preparing the new release - KSWS 11. So we also have some evolution going on. :)

    Hi Oleg,

    yeah, I’ve seen the roadmap ;) KSWS 11 should’ve been around since Q2/2020 ..

    Anyway, I’ll ask Ales Buba for the patch :)

    Cheers,
    Milan

  8. Hello,

    Do you have any patches installed for KSWS 10.1.2? If not, I strongly recommend you to request and install the Core 10 patch from the Support.

    Hi @Oleg Bykov,

    I never heard of Core 10 patch .. could you provide more details, pls? I do have 13 servers running KSWS 10.1.2.996 and I am a bit nervous about the fact, that the product has not been updated for a long long time :( Compared to KES, which is evolving much faster..

    Thanks for feedback!

    Milan

  9. Hello @jeo,

    from my point of view I can’t see anything wrong on your side :( Eventually, you’ll have to submit a ticket for official technical support. You can do this via Company Portal
     

    Then you continue with:
     

    And finally specify the details:
     

     

    It happened to me before - that the Device Control was not able to deal with a certain type of device - and the support replied that it’s a known issue and will be fixed in next release.. So, of course there bugs in the products ;)

     

    Wish you luck and let me know of the result :)

    Cheers,
    Milan

  10. Hm.. it’s getting a little complicated :)

    What do you mean by saying: “they won’t active through the console KSC” .. if you install Network Agent on the machine, it should appear as “managed device” - by default there is an automated relocation rule, which moves a machine with Network Agent installed in the “Managed devices” group. You can check the rules in here:

    Relocation rules

    Can you share printscreen of the rules?

  11. Hello @Williamlee,
    are you able to connect via RDP to the server? From my point of view, there has to be something with the Firewall settings in the KES (Kaspersky Endpoint Security) policy.

    Anyway, for Windows servers in general, you should have installed different security product - Kaspersky Security for Windows Servers (KSWS) - info here. It is tested on servers and does not have so huge impact on the system..

     

    Cheers,
    Milan

  12. 1) Can I upgrade from version 10 straight to version 12? Or do you need to go to 11 first?

    R: yes → see details here

    2) Do I need to remove the old plugins to update?

    R: no, but you’ll probably want to update the plugins to be able to manage newer versions of security products

    3) Is it necessary to run database maintenance before?

    R: no

    4) Any best practices for upgrading?

    R: backup all KSC data, then run the upgrade :)

     

    You can see my how-to video on Youtube

     

    Cheers,
    Milan

  13. Hi @alexcad,

    yes, you’re right. Out-of-office policy is an optional.. But if you take it from the security point of view, I’d definitely want different settings IN/OUT of office - at least for Firewall.

     

    And with port-forwarding → it is working when a device wants to connect to KSC .. that’s fine. But if you try to push settings from KSC side, it won’t be able to connect to host.. And also, you can’t see the “real-time” statistics of application:

     

×
×
  • Create New...