EDR Optimum PoC Guide (v1.4.1)
EDR Optimum PoC Guide (v1.4.1)
Kaspersky
18.08.2020
Contents
Introduction ...................................................................................................................................................................2
Who should use this guide? ......................................................................................................................................2
What is Kaspersky Endpoint Detection and Response Optimum? ...........................................................................2
Application architecture .............................................................................................................................................3
Prepare the environment ..............................................................................................................................................5
Review KEDR Optimum requirements ......................................................................................................................5
Download the required files .......................................................................................................................................5
Configure network .....................................................................................................................................................5
Demo environment description ..................................................................................................................................6
Deployment and configuration ......................................................................................................................................7
Deploy Web Console .................................................................................................................................................7
Deploy Web Plug-in ...................................................................................................................................................7
Deploying KES with Kaspersky Endpoint Agent .....................................................................................................11
Kaspersky Endpoint Agent activation ......................................................................................................................14
Create and configure Endpoint Agent policy ...........................................................................................................19
Configure Kill Chain .................................................................................................................................................22
Capability scenarios ....................................................................................................................................................23
An attack using a new previously unknown threat ..................................................................................................23
Evaluation steps ...................................................................................................................................................24
Host isolation ........................................................................................................................................................28
IoC scan ...............................................................................................................................................................32
Execution Prevention ...........................................................................................................................................35
Appendix A: PoC completion checklist .......................................................................................................................37
Introduction
Who should use this guide?
This guide is built to help you quickly deploy and configure Kaspersky Endpoint Detection and Response Optimum
(KEDR Optimum or KEDRO) for evaluation. It guides you through detailed scenarios in a proof of concept
environment to help you better understand how KEDR Optimum works. These instructions provide an evaluation
method for the most common use cases.
The guide is intended for use primarily by Kaspersky presales engineers and 3rd parties wishing to evaluate the
product.
1. Have a prior knowledge of internet access management and corporate network infrastructure.
KEDR Optimum is designed to provide full visibility and root cause analysis in order to give the IT security
specialist a complete view of any potential attack, an immediate understanding of what’s happening, and the ability
to respond fast before damage can occur.
Application architecture
EDR Optimum does not require any resource-demanding components, thus minimizing costs related to solution
deployment.
Kaspersky Endpoint Agent. This application is part of the KEDR Optimum solution, and is installed as part of a
Kaspersky EPP (Endpoint Protection Platform – the Kaspersky Endpoint Security for Windows application is an
example of an EPP), or separately, on workstations and servers on your corporate LAN. It is the main solution
component installed on devices. The endpoint agent is responsible for:
Collecting data on threat verdicts and threat context from Kaspersky Endpoint Security (KES)
Provision of incident-related data to KSC, for use in data visualization including attack execution mapping
and root cause analysis
Response actions (host isolation, on-demand scan tasks, sending files to quarantine, etc)
Kaspersky Security Center (KSC). Enables the centralized execution of basic administration and maintenance
tasks in an organization's network. The application provides the administrator with access to detailed information
about the organization's network security level, and supports the configuration of all protection components built
using Kaspersky applications.
Kaspersky Security Center (KSC) Web Console. Provides a web interface for KSC. KEDR Optimum supports
the Web Console version of KSC only. Working with KEDR Optimum is possible only via the WEB Console.
Network Agent. Coordinates the interaction between the Administration Server and Kaspersky applications,
including Kaspersky Endpoint Agent, Installed on a network node (workstation or server).
Kaspersky Endpoint Security (KES) 11.4 and later versions. KES) for Windows provides comprehensive
computer protection against various types of threats, network and phishing attacks. Each type of threat is handled
by a dedicated component. Components can be enabled or disabled independently of one another, and their
settings can be configured.
Prepare the environment
Review KEDR Optimum requirements
You can find the list of all requirements for KEDR Optimum in the Online help.
It’s assumed that either Kaspersky Security Center (KSC) or KSC Cloud Console is already deployed on the
infrastructure.
The Kaspersky Security Center Online Help shows to install the Administration Server component.
Need to know how to get started with KSC Cloud Console? Go to https://ksc.kaspersky.com/, create an
account and either add a valid license code or request a trial license for 30 days.
Kaspersky Endpoint Agent 3.9 can be installed as part of the following EPPs:
https://support.kaspersky.ru/kes11#downloads
https://support.kaspersky.ru/ksws10#downloads
KSC
https://support.kaspersky.ru/ksc12#downloads
Configure network
The Network Agent coordinates the interaction between the Administration Server and Kaspersky applications
installed on a network node (workstation or server). This means that you must consider requirements for the
administration agent: https://help.kaspersky.com/ksc/12/en-US/158830.htm
FQDN OS IP Purpose
Windows Server Server with KSC and KES +
wins2019s.demo.lab 10.0.0.1
2019 Standard Endpoint Agent
- Kaspersky Endpoint Security for Windows with Kaspersky Endpoint Agent module
Kaspersky Endpoint Agent can be installed separately or as part of the Kaspersky Endpoint Protection Platform
applications (or ‘EPPs’").
Kaspersky Endpoint Agent 3.9 can be installed as part of the following EPPs:
By default, Kaspersky Endpoint Agent is not automatically selected for installation - you need to manually select it
in the list of EPP components. There’s an online help page about creating an antivirus installation package:
How to deploy Kaspersky applications through Kaspersky Security Center 12 Web Console
First, let's create an antivirus package with an activated component of Kaspersky Endpoint Agent
A list of available
installation packages
located on Kaspersky
servers is displayed.
By default, this full list
includes of all
languages, types and
property.
Set up a filters. This
will help you quickly
find the installation
package you need.
The‘Discovery&Depl
oyment’ ->
’Deplyment
&Assignment’ ->
’Installation
Packages’ section
displays the
downloaded package.
Click on it.
Next, create a remote installation task and wait for it to complete successfully. The complete process of creating a
package and installing it on workstations is described here: Scenario: Kaspersky applications deployment through
Kaspersky Security Center 12 Web Console
For the product to work correctly, the anti-virus databases must be updated. The product has a special task for this.
Information on how to do this is described here: Database and application module update scenarios
Kaspersky Endpoint Agent must be installed on the device together with a compatible EPP application in
order to build a Kill Chain.
Kaspersky Endpoint Agent activation
License type
Base:
If there is one key to activate KES and Kaspersky Endpoint Agent – see this help page:
https://help.kaspersky.com/ksc/12/en-US/3612_1.htm
Add-on:
You can activate the Kaspersky Endpoint Agent using a task in KSC. The ability to create a special group task
Endpoint Agent will appear after installing the Kaspersky Endpoint Agent plugin
click ‘+Add’
Select Kaspersky
Endpoint Agent
Product and the
‘Activation of
Application’ Task
Select ‘Group of
devices’ to run it on a
group of devices with
Endpoint Agent
installed
Click ‘Next’
Select the device group
that contains the device
with KES11.4
Click ‘Next’
click ‘+Add’
Click ‘Next’
Enable KEDR Optimum
functionality.
Click ‘Next’
Click ‘Save’
Configure Kill Chain
Dealing with incidents involves using a Threat Report. Through this, you can see the kill chain and work with
information security events. Before you begin, the report must be configured.
In ‘report properties,
open the ‘Fields’ tab
and customizing the
report for a user-
friendly experience.
Click ‘Save’
Capability scenarios
An attack using a new previously unknown threat
An attack is carried out by mailing to the organization's internal address list or in other ways. The file mailed enters
the organization’s infrastructure at user workstations.
Scenario:
The AV on some PCs may have been turned off (partially or completely) or the AV database not updated.
KES detects new malware using Behavior Analysis technology (System Watcher) and transfers the
information to KSC using KEDRO
Builds a kill chain, based on: hash file, exploit name, etc.
If infected machines are detected by IoC search, automatic isolation / file quarantine / scan task occurs
Preparation:
Download the test sample from the link, add it to the target workstations and extract it to the local disk:
sw_test.exe
Password: infected
This is a synthetic threat that is not capable of doing harm, but its behavior is similar to that of a real
threat.
Evaluation steps
On a user’s machine
with KES for Windows
installed, run
sw_test.exe
Check ‘Report on
threats’ and click
‘Show report’
Open report ‘Details’,
find the related incident
and hit ‘Present’ in the
‘Open Incident’
column.
->’Devices/TAGS’
->’Devices/Managed
Devices-> Click
<Device name>’
Click ‘Kaspersky
Endpoint Agent’
Open ‘Application
Settings->Network
isolation’ tab.
Click ‘General’.
uncheck the "Isolate
current device from
the network"
click ‘OK’
Click ‘Save’
This section demonstrates how to create an IoC scan task based on the detected threats and scan the entire
network to see if other nodes were affected.
in ‘incident details’
open the 'injections'
section which contains
information about the
files used for infection
Switch to ‘Application
Settings’ -> ‘Results’
and click the details of
IoC scan by clicking on
the ‘results’ link.
Lets add a rule for KEDRO to prevent a new copy of the malware file being executed in future.
On any machine open sw_test.exe file. It has not deleted (the file itself is not a virus) so you can still run it.
Click ‘Prevent
Execution’.
Go to ‘Devices’ ->
‘Policies & Profiles’ ->
open Kaspersky
Endpoint Agent policy.
Change mode to
‘Active’ and enable
user’s notification.
Kaspersky Endpoint
Agent blocks launch of
the objects or opening
the documents that meet
criteria of the Execution
prevention rules.
Appendix A: PoC completion checklist
# Task Success criteria Notes
2.3 Configure Kill Chain Threat report contains the necessary fields
and filtering
Configure Endpoint Agent Necessary options included for building kill
2.4
policy chain