Kaspersky Unified Monitoring Analysis Platform Complete Study Guide
Kaspersky Unified Monitoring Analysis Platform Complete Study Guide
Kaspersky Unified
Monitoring and Analysis
Platform
Student guide
D
TE
Table of contents
1. General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
BU
1.1. About SIEM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2. About KUMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2. Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.1. All-in-one installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
RI
2.2. Distributed installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
2.3. Web console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.4. Installation results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
ST
2.5. Tenants and system components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.6. Role-based access control and authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
3. Event collecting and processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
DI
3.1. Collecting events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
3.2. Normalization of events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
3.3. Collector: event processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
RE
4. Integrations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
4.1. Integration with Kaspersky Security Center. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
4.2. LDAP integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
4.3. Kaspersky Threat Lookup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
OR
4.4. Kaspersky CyberTrace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
4.5. Kaspersky Endpoint Detection and Response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
4.6. Kaspersky Automated Security Awareness Platform. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
5. Correlation and work with events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
5.1. Working with events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
ED
D
TE
Glossary
BU
Central Node Kaspersky Anti Targeted Attack Central Node
RI
EPS Events per second
ST
IS Information security
IT Information technology
DI
KATA Kaspersky Anti Targeted Attack
RE
KEA Kaspersky Endpoint Agent
1
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Chapter 1. General
1.1. About SIEM
BU
This guide covers the Kaspersky Unified Monitoring and Analysis Platform product (or KUMA for
short), version 3.2.
RI
The official documentation is available at https://support.kaspersky.com/help/KUMA/3.2/en-US/
217694.htm.
ST
Documentation comes in handy when you need theoretical information; but if you need to solve
practical issues, you’d better consult the lab guide of this course. Kaspersky Unified Monitoring and
DI
Analysis is a SIEM (Security Information and Event Management) product. Before moving on to
Kaspersky Unified Monitoring and Analysis Platform, a few words about why SIEM systems are
RE
needed, what problems they can solve and how they do it.
So, what is SIEM (Security Information and Event Management)? To avoid reinventing the wheel, let’s
quote Wikipedia:
OR
ED
PI
CO
BE
To put it in a less formal language, SIEM is a system that collects events from the whole corporate
TO
network and helps information security specialists filter this data stream and automatically or semi-
automatically find indicators of cybersecurity incidents.
2
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Events that theoretically can help detect and investigate a cybersecurity incident may be logged by
different systems, have different structure, format, encoding. This can be a Windows event log, Linux
OR
audit event log, SQL database, etc.
One of the primary SIEM tasks is to retrieve all these events from different sources. Then something
has to be done with all these events, because they are not really comparable in their raw form. Thus,
ED
the next task of SIEM is to convert them into some normalized form to be able to compare attributes
of different events.
To detect correlations indicative of security incidents in normalized events, a SIEM system groups
PI
events by various attributes and uses a set of correlation rules, conditions and more complex
detection mechanisms.
CO
Correlation allows you to interrelate different events using some (merely any) criteria. For example, a
connection to a computer and a file operation on that computer may be correlated by the event time if
they occur in a short timespan.
BE
Another example is when the proxy server provides information that a file was downloaded; this event
can be related to a file operation on a computer if file hashsums coincide.
TO
Other functions of a typical SIEM are quite common, and you can find them in various analysis and
management systems:
3
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• Build reports about the system status and operation results
Use cases
BU
RI
ST
DI
RE
OR
SIEM systems typically permit configuring flexible conditions to search a database of events for a
wide variety of patterns and correlations. Here are a few simple incident examples that SIEM can find:
ED
• Brute-force attacks when multiple failed login attempts are followed by a successful
authentication. All these events can be correlated by the name of computer where they happen
or by the name of the user whose password is being brute-forced, and if there are many such
PI
events in a short period of time, this is a clear sign of a brute-force attack that a SIEM system
can easily detect
CO
• The use of forged Kerberos tickets for computer authentication in the domain is a Golden
Ticket attack, when an adversary gets hold of the secret key of a service account in Active
Directory and can create a TGT (Ticket Granting Ticket) for any user account in the domain,
even non-existent, and grant it administrator permissions. And then use the TGT to obtain a
BE
ticket from the TGS (Ticket Granting Service), which provides access to domain resources. A
possible detection logic is to monitor the tickets issued by TGT and give a TGS ticket only if a
previously issued TGT ticket is presented. A domain user receives a TGT every 10 hours, so a
TO
TGS request may not immediately follow a TGT request, and it makes sense to store TGT
receiving events for at least 10 hours. KUMA has an out-of-the-box correlation rule that uses a
similar Golden Ticket attack detection mechanism.
T
• Unprocessed threats when a threat detection event has not been followed by a neutralization
event. If we talk about an endpoint protection application, then detecting something is not a
NO
4
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
problem; from the security point of view, we are interested in cases when there was a detection
that was not followed by an event informing that the respective link was blocked or the file
involved was deleted, quarantined or disinfected. You can set some reasonable time interval
BU
(say, 1 hour) and check whether a detection event is followed by another event with the same
threat identifier, file path or file hashsum within this period; if no, then we believe that the
situation requires special attention
RI
• Use of remote access applications. For example, the company has some critical servers or
workstations that are forbidden to connect to using remote access programs such as VNC,
ST
TeamViewer and others. Meaning, SIEM will extract the name or address of the target host
from a connection event and check whether this host is included in the critical list
DI
• Privilege escalation control on Linux servers. For example, there is a correlation rule that tracks
all cases of privilege escalation, and if the account that requested privilege escalation is not
included in the allow list, then an incident is recorded
RE
All these examples demonstrate that in order to detect an incident, the system must take into account
multiple events, which are sometimes significantly separated in time and created by different systems.
OR
These are just a few simple examples of what SIEM can detect. If the correlation rule constructing
tools are flexible and rich enough, detection capabilities are limited only by the analyst’s imagination
and the system resources.
ED
Since a SIEM system potentially works with a huge number of events, it is crucial that it operates
NO
5
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
efficiently. Therefore, an important parameter is its throughput, which is usually measured in EPS
(Events Per Second): the number of events that SIEM can process (normalize, enrich, correlate and
save to the storage) per second. That’s the first factor.
BU
Another factor is resource consumption. Obviously, achieving the necessary throughput at the
expense of wild hardware requirements is no good. Customers are not willing to invest fantastic sums
RI
into equipment, they expect good performance with reasonable resources.
Apart from that, the system must be widely scalable, i.e. have no limit on the amount of processed
ST
information.
Another important thing is out-of-the-box functionality. Setting up SIEM from scratch is quite difficult:
DI
you need to study formats of all kinds of logs that you want to collect. Windows events are XML,
events from network equipment are something else (Netflow or syslog), events from security
RE
applications are something entirely different, for example, json, etc. The more data you want to collect
from different sources, the more preparatory work you need to do when studying data formats of
these sources. The customer will obviously not be happy to analyze all these formats and write
normalization and correlation rules manually. Therefore, vendors strive to write as many normalizers
OR
for popular systems as possible and provide them out of the box.
The same is true for enrichment rules. There are typical situations where enrichment is appropriate,
for example, adding computer names by IP addresses or querying an external treat intelligence
ED
system to find out whether hashes, URLs and IP addresses from incoming events are known
indicators of compromise. You can add such enrichment rules out of the box.
And, of course, correlation rules. There are a lot of well-known situations that should be detected
PI
automatically, such as a brute-force attack, network scanning, various techniques from the MITRE
ATT&CK matrix, and so on. It is also reasonable to have out-of-the-box rules for these situations
CO
Of course, it is impossible to cover all customers’ requirements with standard rules and each
organization will have some network topology specifics or special security requirements when it will be
necessary to detect some non-standard things. A customer may need particular correlation or
normalization rules.
TO
You can supply this service as an add-on, but if a customer has specialists who would prefer to create
and modify such resources themselves, a simple, intuitive and user-friendly interface of the SIEM
system will greatly simplify their routine.
T
Kaspersky Unified Monitoring and Analysis Platform has all the characteristics of a good SIEM:
NO
6
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• The microservice architecture provides seamless scalability without bottlenecks: you can
deploy a full-featured demo system on an office workstation; on the other hand, if necessary,
the solution can be deployed in a high-availability and distributed architecture with a throughput
BU
of 500 000 events per second or more
• KUMA includes predefined settings for receiving events in standard formats and normalizing
them into a single format (CEF), as well as sample correlation rules. The lists of supported
RI
protocols, incoming data formats and ready-to-use out-of-the-box resources are constantly
supplemented
ST
• All KUMA components are configured in a simple graphical interface that does not require
knowledge of any special markup or programming languages. You can combine KUMA
DI
resources in many different ways to solve a variety of practical tasks
Kaspersky Unified Monitoring and Analysis Platform provides a wide range of capabilities to enrich
RE
events from external sources and close (but optional) integration with Kaspersky ecosystem of
products and services:
• Kaspersky Security Center provides extended information about assets (including their
OR
vulnerabilities) for analysis, and automated incident response
• Kaspersky Threat Lookup allows you to query the Kaspersky cloud cyberthreat intelligence
database to gain context and detect indicators of compromise
ED
Let’s proceed from general information about SIEM systems to Kaspersky Unified Monitoring and
Analysis. This section is devoted to its architecture, operation principles, licensing, scaling and
technical support.
BE
7
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Kaspersky Unified Monitoring and Analysis Platform has a modular (microservice) architecture,
meaning, it consists of several services that interact with each other. Almost all of them are
OR
implemented as Linux services and each service is responsible for a specific function:
• Core provides a web interface for administrators and analysts, stores settings of all other
services and acts as a coordination center for the whole platform. The settings are stored in the
ED
local MongoDB database, and all services connect to the core to get their settings
• Collector receives events from external sources and pre-processes them: normalizes
(transforms into a single format), filters, aggregates and enriches with data from external
PI
sources
• Correlator processes already normalized events from collectors and applies correlation rules to
CO
discover relationships between the events. Incident alerts are generated as a result of
correlation
• Storage contains events and provides search capabilities. Search can be performed either
BE
explicitly through the web interface, or implicitly through a dashboard widget, report or
retroscanning task. At the technical level, the storage is a ClickHouse cluster that uses the
ClickHouse Keeper component to coordinate interaction between the nodes.
TO
In addition to other services, there are also KUMA agents for Windows and Linux.
• KUMA agent for Windows is a service installed on Windows computers that collects events
from Windows Event Log and forwards to a collector, which normalizes them and sends to the
T
correlator and storage A KUMA agent for Windows can collect events in one of the following
modes:
NO
8
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• WEC mode, when the agent collects events from the log of the device where it is installed
• WMI mode, when a single agent collects Windows events over the network from multiple
devices
BU
• ETW mode, when the agent receives events from the ETW session locally
RI
We will describe the process of collecting events from Windows Event Log in detail in one of the
following sections.
ST
• KUMA agent for Linux is a service installed on Linux computers that can read its log file line
by line and forward this data to a collector for further processing in KUMA
DI
Additionally, KUMA agents for Linux and Windows can relay events or split data flows within the
RE
system. An agent forwards an event as it is, without any modifications; therefore, you can configure
an agent service to listen for incoming data, copy it without changing the contents and send a few
copies to several collectors concurrently.
OR
KUMA architecture (simplified)
ED
PI
CO
BE
TO
Let’s consider data flows in Kaspersky Unified Monitoring and Analysis Platform.
Kaspersky Unified Monitoring and Analysis Platform primarily receives events from external sources.
It supports multiple sources and event formats: NetFlow from network hardware, Windows events,
T
events from security tools such as Kaspersky Security Center or Kaspersky Anti Targeted Attack
NO
9
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Kaspersky Unified Monitoring and Analysis Platform can listen for events in different formats on the
specified port or read events from a file, SQL database, or from Kafka or NATS event routing systems.
The list of supported formats, protocols and sources is constantly being updated and is available in
BU
the online help at https://support.kaspersky.com/help/KUMA/3.2/en-US/217776.htm
Collectors receive events from external sources (alternatively, an active collector can retrieve events
RI
from a passive source such as an SQL database). Each collector is implemented as an individual
service. Different types of incoming data require dedicated collectors. But it is best to set up separate
collectors even for data of the same type (for example, CEF or syslog) that come from different
ST
sources. This will simplify configuration and troubleshooting.
Collectors are installed on a Linux operating system. You can install multiple collectors on a single
DI
server, or allocate a separate server to each collector. When a collector receives data, it converts it
into the CEF format, which is the internal data format in Kaspersky Unified Monitoring and Analysis
RE
Platform. The primary conversion simply maps the values of the fields in the original data format to the
Kaspersky Unified Monitoring and Analysis Platform fields (CEF). When processing events, the
collector can modify data using simple replacement operators or regular expressions.
OR
The collector can also filter data and discard what the administrator or analyst consider to be
uninteresting and undeserving of processing and storage.
The collector can aggregate events, meaning, replace a group of similar events with a single event
ED
that includes the group’s statistical parameters. For example, instead of processing each event about
a connection between two addresses, it can create an event that there were so many connections
between address A and address B during which so much data was sent or received.
PI
Finally, a collector can send requests to external systems to enrich events with data that was missing
from the initial event. In particular, the following requests are supported:
CO
• DNS — to resolve names into IP addresses and vice versa. If the initial event does not include
all the network attributes of a device, the enrichment mechanism can query a DNS server to fill
in the missing attributes
BE
• LDAP — the enrichment mechanism can send requests to a LDAP server and, based on the
event attributes (for example, the user’s SID), supplement the event with other information
about this account from Active Directory
TO
• Kaspersky Threat Lookup — a collector can query the cloud cyberthreat intelligence platform
using a hash, address or URL from the event, and if it matches an indicator of compromise,
enrich the event with information about the indicator
T
• Kaspersky CyberTrace — a collector can query the local cyberthreat intelligence platform in a
similar manner and supplement events with data from matching indicators of compromise
NO
10
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Within the framework of enrichment, the collector can also use the local data of Kaspersky Unified
Monitoring and Analysis Platform. An administrator or analyst can upload data to KUMA as
dictionaries and use them to convert or supplement events. For example, you can use a dictionary to
BU
replace or supplement numerical event codes with text descriptions.
Normalized and enriched events output by the collector are named base events. The collector mirrors
RI
events to send them to internal consumers within the Kaspersky Unified Monitoring and Analysis
Platform: one of the streams goes to the storage to be persistently stored, and the other goes to the
correlator that will apply correlation rules to the events. You can configure storing the initial event
ST
along with the normalized event.
The correlator’s task is to find relationships between events that are important from the security point
DI
of view. For this purpose, the correlator applies correlation rules to the base events. Rules can check
if an event matches some conditions, compare events and respond to specific sequences of events.
RE
When a correlation rule is matched, the correlator creates a correlation event that is linked to the
related base events. When a correlation event appears, alerts are created or updated for security
personnel, and the configured response rules are triggered. For example, you can configure the
OR
following responses: start a task in Kaspersky Security Center or execute a script on the server where
the correlator service is running. Integration with Kaspersky Anti Targeted Attack Platform and
Kaspersky Industrial CyberSecurity for Networks adds other response options, for example, isolate an
infected computer.
ED
Correlation events can also be enriched with data from dictionaries and external sources. Enriched
correlation events output by the correlator can be sent to its input again or to the storage where they
PI
All services exchange data with the core, from which they receive their settings. All changes that we
CO
make in the web interface are stored on the core. When a service starts, it connects to the core to
receive its settings. Few service settings are stored locally: core connection parameters, the certificate
and the ID of the service for which the settings are requested.
BE
In addition to the web interface, the core provides REST API that third-party systems can use to
communicate with KUMA. The API permits you, for example, to download alerts from KUMA to
external systems, search KUMA for events, create/import/export resources, and much more. You can
find a complete list of operations available via the API, their syntax and response codes in the KUMA
TO
11
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Speaking of architecture, we should mention the Event Router service. Collectors usually send events
to the correlator and storage in two streams. In specific cases, a collector may have even more than
OR
two destinations. This can become a bottleneck if the collector is located behind a thin channel in
relation to the destination points. Each destination also requires a separate port to be opened on
firewalls. The Event Router service permits keeping collected data within a single stream as long as
possible and forking it later. Events are sent in internal format to the API port of event router.
ED
Data in KUMA
PI
CO
BE
TO
T
NO
At different stages of event processing, it makes sense to talk about different types of events in
12
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Kaspersky Unified Monitoring and Analysis Platform:
BU
• The collector processes them and outputs normalized events
• Normalized events made from raw events are named base events
RI
• A collector can merge several similar base events into a single event that includes identical and
statistical parameters of the respective base events. Such events are named aggregated
ST
• A correlator processes events by applying correlation rules to them. When a rule is matched,
the correlator creates a so-called correlation event
• Additionally, Kaspersky Unified Monitoring and Analysis services can generate audit events
DI
about their status changes
• There are also monitoring events that show that an event source has stopped generating
RE
events or, conversely, the stream has increased abnormally
• Base, aggregated, correlation, audit and monitoring events are all normalized and you can
search the database for events of a particular type
OR
Services process events in streaming mode in real time and save them to the storage for further
analysis, search or retrospective correlation.
In addition to events, Kaspersky Unified Monitoring and Analysis Platform deals with the following
ED
types of objects:
• Assets represent the organization’s computers. An analyst can organize assets into categories
PI
and then use categories for filtering and correlation. The Kaspersky Unified Monitoring and
Analysis Platform core imports assets from Kaspersky Security Center; you can also create
CO
• Accounts — the core imports information about accounts from the specified LDAP server; you
can use this data for filtering and correlation
BE
• Dictionaries contain information in the key-value format or in a table; you can use it to configure
filters or to enrich events. For example, if there are code values in events, you can add a text
description to each code in a dictionary and enrich the events with this test description
TO
• GeoIP — you can upload a database of IP addresses with the respective geographical data
(country, region, city, longitude, latitude) into KUMA
Assets, accounts, all settings and resources are stored on the core server in a local MongoDB
13
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
database in JSON format. Alerts, incidents and related copies of events, assets and accounts are also
stored in MongoDB. Meaning, an alert is a kind of container that stores information about all entities
associated with it.
BU
Report templates and dashboard layouts are also stored in MongoDB.
Another database, a VictoriaMetrics time series database, stores Prometheus metrics on the core.
RI
Prometheus is a monitoring system that collects metrics from the specified endpoints. The Grafana
ST
solution visualizes metrics in the KUMA interface.
The last element in this diagram is the storage where our SIEM system sends events. Technically,
DI
events are stored in a ClickHouse database in KUMA. ClickHouse is an open source column-oriented
DBMS developed by Yandex.
RE
Storing data in ClickHouse
OR
ED
PI
CO
BE
At the component level, this is organized as follows: during the KUMA installation, one or more
ClickHouse instances are deployed (let’s focus on a simple case with only one DBMS instance for
TO
now), to which the KUMA system writes incoming events for storage.
The system interacts with the DBMS using a Storage service, which is installed locally on the same
server as the ClickHouse instance. The Storage service transfers data between KUMA and
T
14
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
In addition to recording new events to the database, the Storage service also queries the database
and returns the results to the system, for example, when an analyst working with the SIEM manually
searches for events or when a correlator performs retroscanning. The Storage service also removes
BU
outdated events from the ClickHouse database when their retention period expires (this period is also
one of the settings of the storage service).
RI
Storing data in ClickHouse: sharding and replication
ST
DI
RE
OR
ED
The previous figure shows a simplified interaction scheme with a single server, storage service and
database. There can be only one ClickHouse instance in the entire KUMA installation and,
PI
However, if you want to ensure high availability and fault tolerance for your database with KUMA
events, or if you need to scale your storage horizontally, ClickHouse provides so-called sharding and
replication mechanisms that allow you to build clusters from ClickHouse instances.
BE
First and foremost, we will not scrutinize ClickHouse architecture or capabilities in this course; we just
want to introduce the general concepts necessary for a basic understanding of the principles of KUMA
interaction with the database.
TO
So, data is divided among shards in ClickHouse. Sharding is an approach that involves breaking up a
distributed database into segments (shards). A shard is a mini-cluster that consists of several replicas
and stores some segment of data from our database (or the entire database if there is only one
shard).
T
When new data are written to the database, they are distributed among all shards according to a
NO
15
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
specific algorithm. Meaning, when a group of events arrives to the database, some of these events
will be recorded to shard-1; another part, to shard-2; yet another chunk, to shard-3, and so on,
depending on how many shards the ClickHouse cluster has. The data is distributed evenly across all
BU
shards to balance the load and optimize performance.
There can be any number of shards, starting from one; it depends on the database operation
RI
conditions, performance requirements, the amount of data stored, etc. You will be able to add new
shards after the system commissioning if you need to expand the storage. After that, data to be
written into the storage will be distributed between two, three or more shards as they are added.
ST
Each shard consists of one or more replicas. A replica within a shard is a copy of the data stored in
the shard. There can be one replica per shard; in this case, the shard is not fault tolerant, and
DI
breakdown of a server with a single replica may mean that all data stored on the shard will be lost. To
ensure high availability, create several replicas per shard.
RE
In our diagram, each replica rectangle (replica-1, replica-2) represents a separate physical or virtual
server that are combined into 2 shards (shard-1 and shard-2), or in other words we have 4 servers in
total within 2 two-replica shards.
OR
Meaning, a shard is a logical entity, while replicas are servers with ClickHouse installed that are
combined into a cluster in our diagram. When writing data to a cluster, the system decides which
shard to write data to. ClickHouse Keeper services monitor and coordinate tables across the
ED
database.
ClickHouse Keeper is a ClickHouse database coordination service for data replication and distributed
querying; it can also be deployed as a cluster.
PI
There must be an odd number of keepers to avoid the split-brain problem: 1, 3 or 5 (typically, 3
CO
keepers are used). ClickHouse Keeper services can be installed either on separate or on the same
servers as the ClickHouse instances (the latter is the usual practice). But remember that latency is an
important parameter for ClickHouse Keeper, and ClickHouse Keeper and ClickHouse itself may
compete for resources on weak virtual machines; therefore, it is important to allocate adequate
BE
resources to ClickHouse Keeper or install it on a dedicated server; otherwise, cluster nodes may
switch to read-only mode and the whole cluster may malfunction.
16
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Kaspersky Unified Monitoring and Analysis Platform consists of several interacting services: core,
collector, correlator and storage, and also services of the agent that collects Windows events.
OR
Settings of all services are organized as a set of resources. Each resource defines a particular aspect
of the service’s operation, such as connection or listening address and port, filtering conditions,
enrichment rules, names and passwords for authentication in external systems, dictionaries for
ED
Resources are simply sets of parameters that are stored as JSON structures in the core database.
When a service starts, it sends a request to the core service and receives its settings in response.
PI
The core reads its own settings from the database directly.
CO
The advantage of such an organization is that each resource has its clear and specific purpose and a
very small set of parameters.
For example, a connector resource consists of an address, port and protocol; it also describes the
BE
low-level format of data that comes from a source (encoding and delimiter between the events).
(aggregation rules) and which events to enrich (enrichment rules). The storage and correlator
addresses (destinations) are also configured as resources.
You can reuse a resource. For example, a filter specified as a resource can be a parameter of several
T
17
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Kaspersky Unified Monitoring and Analysis Platform has the following resources:
• Connectors set network parameters for receiving data from external sources or connecting to
BU
external sources; they also describe high-level parameters for parsing events, such as
encoding, delimiter and others. Collectors use connectors to extract raw events
• Normalizers are complex configurations for converting raw events to normalized events. The
RI
normalizer and connector are the main settings of a collector
• Filters are sets of conditions that can be used to filter incoming events, to select events in
ST
correlation rules or to selectively apply enrichment, aggregation or response
• Aggregation rules describe how to replace multiple similar events with a single joint event.
DI
They are used in collectors
• Enrichment rules specify how to add new information fields to events: either by converting
RE
available fields or by requesting data from external systems. Enrichment is used in collectors
and correlators
• Correlation rules enable correlators to detect correlations. Correlation rules use filters to pick
out events
OR
• Destinations set network parameters for transmitting normalized events. Destinations are
used in collectors and correlators to describe where to send processed events. Usually, a
correlator and the storage act as destinations
ED
• Active lists are dynamically populated key/value sets. Correlation rules populate active lists.
You can use the contents of active lists in filtering conditions (including correlation rules) and to
enrich correlation events. Active lists reside in the correlator’s memory and are only used in
PI
correlators
• Dictionaries are static key/value sets that can be used in filtering conditions and enrichment
CO
rules
• Secrets include user names, passwords and sometimes certificates for authentication in
external systems. They are used in global settings and connection resources
BE
• Responses define how to respond when correlation rules are triggered: run a script or start a
task in Kaspersky Security Center, Kaspersky Anti Targeted Attack Platform or Kaspersky
Industrial CyberSecurity for Networks. Responses are used in correlators
TO
• Notification templates — contents of the message body when notifying about a created alert.
They are configured in global alert settings
• Proxies define proxy server settings for connecting to data sources. They are used in global
settings and connection resources
T
NO
18
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Formally, services do not pertain to resources, but in reality, services are also a kind of resources that
use other resources.
BU
Hardware requirements
RI
ST
DI
RE
OR
Kaspersky Unified Monitoring and Analysis Platform is designed to scale flexibly to meet various
(even very high) loads. The main parameter for load estimation is the amount of incoming data, which
ED
During the load tests, Kaspersky Unified Monitoring and Analysis Platform successfully processed a
PI
stream of 500K EPS; and the bottleneck was the speed of the collector’s network interface card rather
than the computing platform.
CO
A single server with 4 CPU cores and 8GB of RAM is recommended for a demonstration. In a
production environment, resource consumption depends on various factors:
• Types of processed events. Events of different formats may require different amount of
BE
• The amount and types of correlation rules. The more complex correlations need to be
discovered, the more resources the rules can require. You must be careful and always test
TO
rules before using them in the production environment. Quite often, the same aim can be
achieved in several different ways and testing helps find the most efficient one
A pilot rollout enables you evaluate resources more accurately. However, resource consumption may
T
19
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
To process a 10K EPS stream, it is usually enough to install the core, collector and correlator on a
single server and allocate another server for the storage.
BU
The product team has a sizing guide with approximate server specifications for typical EPS streams in
an infrastructure of an average customer. It describes distributed installations where each server is
allocated for a particular service and specifies how much memory, processor and disk recourses are
RI
needed.
ST
When processing a data stream of 20K EPS if you need to store events for 6 months, it is
recommended to install each service (core, collector, correlator, storage) on a dedicated server.
DI
Storage presumes replication in this case.
In total, you need to allocate 5 servers with adequate hardware if you deploy keepers on the storages
RE
and on the core.
OR
ED
PI
CO
BE
To process a data stream of 50K EPS, we recommend that you add another collector and thus
allocate 8 adequate servers in total, taking into account storage replication; keepers can coexist with
other roles.
TO
T
NO
20
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Data volume depends on the intensity of the event flow, the amount of data in each event, the
retention period, and the number of replicas in the storage cluster.
OR
To estimate the resources required for a particular workload, partners should contact their manager at
Kaspersky, and Kaspersky employees can contact the product team.
All Kaspersky Unified Monitoring and Analysis Platform license keys have a limit on the number of
events processed per second. This number is counted at the collectors’ output, which means that only
NO
21
Chapter 1. General KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
base and aggregated events are considered. Therefore, filtering and aggregating helps reduce
expenses. The number of unique events is counted; if they are sent to two destinations (correlator and
storage), only one copy will be counted.
BU
Kaspersky Unified Monitoring and Analysis Platform counts EPS every second and then calculates
daily average, starting with the product launch. If the average daily EPS value exceeds the license
RI
limit by more than 30%, the administrator will be notified by email, and the same notification will
appear in the interface.
ST
Warnings also appear 30 days before a key expires and 7 days before and after the key expires. If a
key is missing or has expired, administrators and analysts will not be able to create, modify or delete
resources and services. Running services will keep going, but if you need to restart something, you
DI
will not be able to start the service without a new license.
RE
OR
ED
PI
CO
BE
TO
T
NO
22
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Chapter 2. Deployment
In this chapter, we will talk about Kaspersky Unified Monitoring and Analysis Platform installation
BU
options and deployment results. This chapter also describes the role-based access model and
multitenancy in Kaspersky Unified Monitoring and Analysis Platform.
Installation requirements
RI
ST
DI
RE
OR
ED
Kaspersky Unified Monitoring and Analysis Platform supports two installation modes:
PI
• All-in-one — when all KUMA services are installed on the same server
combinations
It is better to evaluate system requirements for a distributed installation based on the results of a pilot
rollout and recommendations of the product team, depending on the intensity of the incoming event
BE
Kaspersky Unified Monitoring and Analysis Platform services can be installed on physical or virtual
servers.
TO
All services of Kaspersky Unified Monitoring and Analysis Platform are installed on Linux operating
systems. Kaspersky Unified Monitoring and Analysis Platform version 3.2 supports:
T
23
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• Oracle Linux 8.6, 8.7, 9.2, 9.4
BU
An all-in-one installation is intended for demonstration purposes and fits small organizations; the
following configuration is recommended for it:
RI
• Processor with 4 (or more) processing cores (if HyperThreading is used, each thread is
considered as a core)
ST
• at least 8GB of RAM
DI
• 100Mbps (or higher) network interface
RE
• Google Chrome 110 or later
The services are addressed using their FQDN within Kaspersky Unified Monitoring and Analysis
Platform, and it is important that you configure a correct name for the server. To verify this, run the
PI
hostnamectl status command. By default, all connections between the services are encrypted with
certificates that the Kaspersky Unified Monitoring and Analysis Platform Core issues for the FQDN
CO
More information about system and hardware requirements is available in the online help at
https://support.kaspersky.com/help/KUMA/3.2/en-US/217889.htm
BE
The online help also describes prerequisites. For example, Python 3.6 or higher must be installed in
the system, and SELinux must be disabled. https://support.kaspersky.com/help/KUMA/3.2/en-US/
231034.htm
TO
24
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
To install KUMA, download the Kaspersky Unified Monitoring and Analysis Platform distribution to the
server and unpack it. The unpacked contents are saved into the kuma-ansible-installer folder.
OR
Then you will need to perform a few simple steps that depend on KUMA installation mode.
Edit the single.inventory.yml.template file included with the distribution. Specify the KUMA
PI
installation parameters in this file. As an all-in-one installation takes place on a single server,
you only need to specify the address of this server for each component (core, storage,
collectors and correlators).
CO
You can also edit the deploy_example_services parameter to specify whether to install out-of-
the-box services automatically. This is a set of 4 collector services with default normalization
rules for popular event sources, a correlator service and a storage service. The default value of
BE
• Copy your Kaspersky Unified Monitoring and Analysis key file to the folder /kuma-ansible-
installer/roles/kuma/files/ and rename it license.key. A key file usually has an alphanumeric
TO
name that must be changed to license.key. Otherwise, the installation will return an error
informing that the license.key file was not found in the installer folder
• Run the install.sh script with the name of the prepared Ansible yml file as a parameter, for
T
example:
NO
25
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
./install.sh single.inventory.yml
Then accept the license agreement, after which the script will install all product components
BU
according to the parameters specified in the yml file.
RI
ST
DI
RE
OR
ED
A distributed installation of Kaspersky Unified Monitoring and Analysis Platform requires several
additional steps in comparison with an all-in-one installation. You need to prepare an ssh key. Step-
PI
• Generate an ssh key to authenticate the installer on all target hosts. Command example:
CO
ssh-keygen –N “”
• Copy the public ssh key to all servers where Kaspersky Unified Monitoring and Analysis
BE
Platform components will be installed (core, collector, correlator, storage nodes). Command
example:
TO
FQDN and IP address of the target server for each component (core, storage, collectors and
NO
26
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
correlators). Pay special attention to the storage section that describes the configuration of the
ClickHouse cluster. Specify where to install replicas, which shard they will belong to and where
to deploy ClickHouse Keeper services. In our diagram, we have a two-node ClickHouse cluster
BU
(kuma-storage1.abc.lab and kuma-storage2.abc.lab), these are two replicas of a single shard,
meaning, a high-availability configuration. The storage is controlled by ClickHouse Keeper
services; there should be an odd number of them, 3 or 5, in such a configuration.
RI
In our example, two ClickHouse Keepers (keeper: 1 and keeper: 2) are deployed on the
ClickHouse cluster nodes and one more ClickHouse Keeper (keeper: 3) is installed on the core
ST
server.
DI
dedicated servers, because the system response time is important for them.
RE
• Copy your Kaspersky Unified Monitoring and Analysis key file to the /kuma-ansible-
installer/roles/kuma/files/ folder and rename it license.key
• Run the install.sh script with the name of the prepared Ansible yml file as a parameter, for
example:
OR
./install.sh distributed.inventory.yml
Then accept the license agreement, after which the script will connect to other servers, copy
ED
files there, and install components in accordance with the parameters specified in the yml file.
27
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Let’s look at the possible configurations of a four-node ClickHouse cluster.
A shard contains a unique piece of data. A replica is a copy of this data piece.
BU
The numbers specified for replicas, shards and keepers in the configuration file are their IDs, not a
quantity. A shard without replicas contains nothing. Each shard must consist of one or more replicas.
RI
The first configuration example: 1 four-replica shard
Advantages:
ST
• The most reliable way to store data (4 copies)
DI
Shortcomings:
RE
• Since there is only one shard in this configuration, a SELECT query cannot run in parallel on
different nodes
• Additional resources are required for multiple replications of data between all nodes
OR
Advantages:
ED
Shortcomings:
PI
• The least reliable way to store data (if a node malfunctions, part of data will be lost).
CO
• A fairly reliable way to store data (if a cluster node malfunctions, data will not be lost).
TO
T
NO
28
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Starting with version 2.1, KUMA has High Availability mode. High availability is achieved by installing
Core on a Kubernetes cluster. A special distribution is used for installation: kuma-ansible-installer-ha-
OR
2.1.0.XXX.tar.gz. The cluster is configured in the Ansible inventory file.
It is important to understand that only the Core service along with mongodb, victoria-metrics, grafana
and vmalert are installed on Kubernetes. Therefore, it makes no sense to install the other KUMA
ED
These services can be successfully installed on the host, but outside the Kubernetes cluster; and if
the host malfunctions, Core will fail over automatically, while other services will not.
PI
29
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
A high-availability KUMA configuration in a production environment will most likely look like the
diagram in the slide above.
OR
There are 2 node roles in Kubernetes:
• Control Plane fulfills most of the cluster management and administration tasks, stores
metadata and distributes the workload
ED
A pod is an abstraction in Kubernetes that manages a group of application containers and shared
PI
Each pod is scheduled to a worker node where it remains until termination or deletion. In case of a
worker node failure, identical pods are scheduled on other available nodes in the cluster.
The following KUMA services run in a dedicated pod, each service in a dedicated container:
BE
• core
• mongodb
• victoria-metrics
TO
• grafana
• vmalert
T
All other services run outside the Kubernetes cluster. The Storage cluster is organized using
NO
30
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
ClickHouse tools. A load balancer is located between the Kubernetes cluster and the other KUMA
services. During installation, KUMA can automatically configure nginx as a balancer. The balancer
handles KUMA core traffic (ports 72XX) and the service traffic of the cluster (ports 6443, 9443, 8132).
BU
KUMA traffic goes from external services (storage, collectors, correlators) to worker nodes and in the
reverse direction.
RI
You can find more details in the Kubernetes documentation
• https://docs.k0sproject.io/v1.24.6+k0s.0/high-availability/
ST
• https://docs.k0sproject.io/v1.24.6+k0s.0/networking/?h=net
DI
RE
OR
ED
PI
There is a native k0s application for managing a Kubernetes cluster, but the best option is to use the
CO
cd /tmp/
curl -L
https://github.com/derailed/k9s/releases/download/v0.27.3/k9s_Linu
TO
x_amd64.tar.gz | tar zx
sudo mv k9s /usr/bin
You must run k9s together with a configuration file with the Kubernetes cluster connection settings.
T
31
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• On the host where the kuma-ansible-installer/artifacts/k0s-kubeconfig.yml installer was run
• On the main Control Plane node in the home directory of the user specified in the inventory file
as ansible_user, /root/k0s-kubeconfig.yml by default
BU
It is best to use the following command to export the path of k0s-kubeconfig.yml to a variable:
RI
export KUBECONFIG=/root/k0s-kubeconfig.yml
ST
Then you will be able to run k9s without parameters.
You can view and manage services from the interface. In KUMA Pod, you can see which containers
are running; you can also view the logs of each specific service here.
DI
2.3. Web console
RE
OR
ED
PI
CO
The installation takes a few minutes. When it completes, you can manage Kaspersky Unified
BE
Monitoring and Analysis Platform through its web interface at https://<FQDN of the server running the
core service>:7220
After the installation, Kaspersky Unified Monitoring and Analysis Platform has only one administrator
TO
account:
• Username: admin
T
• Password: mustB3Ch@ng3d!
NO
32
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
We recommend that you change the password as soon as you log on to the web interface. You can
also create other accounts with the administrator, analyst or operator role.
BU
RI
ST
DI
RE
OR
This is the main menu of Kaspersky Unified Monitoring and Analysis Platform. Let’s see what is
where:
• Dashboard — the monitoring page that contains widgets with various real-time statistics. The
ED
user can configure several layouts with different widgets and switch between them as needed
or have them rotated on a dedicated monitor in TV mode
PI
confirmed alert. You can create an incident from an alert automatically or manually and link
several alerts to it if necessary
• Events — the page for manually searching and analyzing events in the database and for re-
analysis of historical events by retrospectively applying correlation rules
BE
• Assets — the page for managing your organization’s computers (assets) where you can import
computers from Kaspersky Security Center, add them manually and organize into categories
• Reports — you can configure the reports’ appearance and generation schedule here. Report
TO
◦ Services — this is the page for configuring and managing Kaspersky Unified Monitoring
T
and Analysis Platform services: collectors, correlators, storage and Windows agents.
NO
33
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
You can create new service configurations and reload settings or restart services
◦ Resources — you can configure resources necessary for service configurations here
BU
• CyberTrace — nested Kaspersky CyberTrace interface; this section appears after you
configure integration with Kaspersky CyberTrace
• Task manager — task results. Tasks include asset importing requests to Kaspersky Security
RI
Center, LDAP account importing requests, Kaspersky Threat Lookup requests, export of events
from the ClickHouse database, retroscanning and some other activities. Tasks are created
ST
automatically as a result of specific user actions in the console. On this page, you can see the
created tasks, consult their results or re-run them.
• Settings — the global settings of Kaspersky Unified Monitoring and Analysis Platform, in
DI
particular, license management, user and role settings, tenant settings, integration with
Kaspersky and third-party solutions and systems, etc.
RE
• Sources status — this section displays the list of sources that send data to collectors; you can
apply policies to sources and monitor their statuses
• Metrics visualize Prometheus data about the load and status of Kaspersky Unified Monitoring
OR
and Analysis Platform services
ED
PI
CO
BE
TO
Let’s talk a bit about resources in KUMA. Most of the KUMA settings are configured as resources. For
example, to create and install a collector or correlator service, you must create the appropriate
configuration as a resource.
T
NO
34
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
In addition to services, KUMA has many other elements that are stored as different types of
resources, such as secrets, normalizers, correlation rules, active lists, and others. All these are also
OR
resources that can be saved, reused, imported and exported. In a sense, resources define the KUMA
operation logic.
As a result of installation with the deploy_example_services = true parameter, the following services
T
35
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• Core (the kuma-core service), which uses the following ports:
BU
◦ 7210/tcp to receive connections from other KUMA services
RI
becomes available when you configure integration with Kaspersky CyberTrace)
ST
◦ 7232/tcp to receive connections from the core service
DI
• [OOTB] KSC collector uses the following ports
RE
◦ 7233/tcp to receive connections from the core service
◦ 7230/tcp to receive connections from the core service and events from the collector
CO
◦ 2181/tcp, 2182/tcp for interactions between ClickHouse and ClickHouse Keeper and
BE
The ports used for internal communications are displayed on the Services page of the web interface,
in the API port column. The ports used for receiving and sending events are not displayed in this
table. You can find them in the connector properties within the service settings.
T
The installation wizard creates rules for ports in the server’s firewall.
NO
36
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
If services encounter issues in a distributed installation of Kaspersky Unified Monitoring and Analysis
Platform, first of all, check the firewall and open all ports that KUMA services use.
BU
Full and up-to-date information on ports is always available in the online help at
https://support.kaspersky.com/help/KUMA/3.2/en-US/217770.htm
RI
ST
DI
RE
OR
If deploy_example_services = false, the list of active services is empty after the installation.
ED
However, there are service templates that simplify manual installation; click the Add service button
and then install the necessary service (daemon) on the respective KUMA server.
PI
For example, start with Storage services, then proceed to the Correlator and then to Collector; if
necessary, add services of Windows and Linux Agents.
CO
In our labs, we demonstrate a distributed installation so that the participants can better and quicker
understand the architecture of Kaspersky Unified Monitoring and Analysis Platform and see for
themselves that creating services manually is not difficult.
BE
TO
T
NO
37
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Starting with KUMA version 2.1, the Reload button was renamed to Update configuration; we click it
to update service configuration after modifying it. The Log button downloads the log of the
OR
corresponding service. The logs are located in the following directories:
• /opt/kaspersky/kuma/storage/<ID>/log/storage
• /opt/kaspersky/kuma/collector/<ID>/log/collector
ED
• /opt/kaspersky/kuma/correlator/<ID>/log/correlator
The Status column shows the service status. In addition to the On and Off statuses, other statuses
PI
may be displayed there, indicating that, for example, a configuration update or restart is required, or
that there is an error in the service log. You will see this in the labs. Understanding the state of each
CO
service is very important to ensure the correct operation of the entire KUMA system.
BE
TO
T
NO
38
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
KUMA updates out-of-the-box resources automatically, which means that new correlation rules,
normalizers, connectors and other resources become available to users soon after they are published
OR
on the update servers.
This is configured in Settings | Repository update; the default update schedule is every 24 hours.
After the task completes, the number of packages and the number of resources in the packages are
ED
displayed, and the administrator can import them into KUMA, for example, into the folder of the
Shared tenant, to make them available to all tenants.
Each resource has an ID in the MongoDB database; when you import an existing resource, KUMA will
PI
39
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
You cannot modify out-of-the-box resources in KUMA (regardless of their origin: built in or imported
from the updatable repository).
OR
The corresponding message is displayed on a blue background in the resource properties. This
prevents overwriting custom changes when new resources are imported. Resources would have the
same ID in this case, and it is impossible to track the revision history of each individual resource or
ED
compare versions.
To make any changes, copy the necessary resource and work with the copy.
PI
For example, you almost always have to modify connectors and normalizers, e.g. enable saving of
raw events or add some kind of transformation to the normalization scheme.
CO
40
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
We will not describe multitenancy in detail in this course; we’ll just outline the concept.
OR
Multitenancy is a configuration aspect that you should keep in mind during the initial setup of the
services.
Tenant is a way to divide data access within an installation into several logical segments.
ED
In essence, an installation is the core around which all other services, collectors, correlators and
agents are organized.
PI
With a single core, it is possible to separate data access thanks to tenants; in this case, a single
KUMA installation serves several organizations or organizational units (tenants) and the data of each
organization (tenant) is not available to someone from another organization (tenant).
CO
Each resource, service and event pertains to a tenant. It looks like a folder structure in the interface;
each tenant’s root folder is named after the respective tenant. We will arrange all resources and
service configurations into these folders as they are created, and grant access to data of a specific
BE
For example, a user who has administrator rights in tenant-1 can create resources, edit settings, etc.
within it, but does not have any rights in tenant-2 and cannot even see it. A user who has operator
TO
rights can only search for events and create reports, but can neither create services or resources nor
modify settings.
At the same time, there are two special tenants: Main and Shared.
T
NO
The Main tenant is the principal tenant that is always created, even if the customer does not use
41
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
multitenancy. The Main tenant owns all out-of-the-box resources; integrations with various third-party
systems, multitenancy mode and access permissions of all users are configured globally in the Main
tenant.
BU
Another special tenant is Shared; you do not need to explicitly grant access to its resources in
contrast to ordinary tenants. Everyone can access resources that belong to the Shared tenant.
RI
The idea is that some of the resources that tenants use in Kaspersky Unified Monitoring and Analysis
Platform are always the same, for example, sources of the same type, normalizers, correlation rules,
ST
enrichment rules, etc. To avoid creating the same entities for each tenant, you can create them in the
Shared tenant; then they will be available to everyone. As a result, you have a single configuration
repository; only the users who have permissions for the Main tenant can create and reconfigure these
DI
resources, but everyone can use them.
RE
If a lot of tenants (different organizations) use the same Kaspersky Unified Monitoring and Analysis
Platform installation, they can use a single ClickHouse cluster as a centralized event storage. Data
from all tenants will be sent to this storage, but each user account will have access only to the events
of its tenant.
OR
So, when we talk about any piece of data in KUMA (events, alerts, services), a tenant is its property,
for example, every event has the TenantId field. That is, during any interaction with the KUMA
interface or API, the system checks which tenants the user account has access to.
ED
42
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Only one user who can access the web interface is created during an installation. This is the
Administrator user with the General admin role. This role has the highest access to all the settings of
OR
Kaspersky Unified Monitoring and Analysis Platform. When administrators grant access to a tenant to
an account, they select a user role for it. Each role has specific permissions (what is allowed and what
is prohibited), which cannot be changed. A role can be described as a set of actions that a user can
perform in the system.
ED
You can create a user account in Settings | Users. An account has the following settings:
• Name
PI
• Login
CO
• Role in a tenant: administrator, analyst, operator. For example, a user can have the
administrator role in the London tenant and the operator role in the Bristol tenant
BE
• Password
• API access rights — you can explicitly specify what actions the user can perform via API
Users can change their own names, login names, email addresses and passwords. Users cannot
TO
change their own roles. Only the General admin can create users. An administrator can also change
any account parameters, including the user’s role. You cannot delete users in the web interface, but
you can disable them.
T
The General admin can work with global settings that are not bound to individual tenants in Kaspersky
NO
Unified Monitoring and Analysis Platform. We are talking about performance metrics, users,
43
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
integrations with Threat Intelligence, IRP, etc. Only the General admin can create tenants.
To grant a user the General admin role, configure the respective option in the account properties.
BU
User privileges
RI
• General admin has the highest possible privileges in KUMA
ST
• Tenant administrators can do anything within their tenant, for example, change or delete
entities (such as report templates) created by other users
• The Tier 2 Analyst role is intended for users responsible for configuring the KUMA system to
DI
receive and process events from a specific tenant. They also create and configure correlation
rules.
RE
• The Tier 1 Analyst role is intended for users responsible for configuring the KUMA system to
receive and process events from a specific tenant. They also create and configure correlation
rules. Users with this role have fewer rights than a tier 2 analyst.
OR
• The Junior Analyst role is intended for users who work with security threats of a specific
tenant. A user with this role can use resources of the shared tenant via REST API.
• The Access to shared resources role is intended for working with the shared tenant. Users
ED
with this role have read permission on shared resources. Only a user who has the General
admin role can edit resources in the shared tenant.
44
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
In Kaspersky Unified Monitoring and Analysis Platform, you can configure integration with AD to
enable users to authenticate under their domain accounts.
OR
ED
PI
CO
BE
You can specify an AD group in the role properties in Kaspersky Unified Monitoring and Analysis
TO
Platform. If an account belongs to several groups that have different roles in a tenant, it receives the
role with the least permissions.
T
NO
45
Chapter 2. Deployment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
KUMA supports integration with ADFS and FreeIPA. ADFS extends domain authentication. If the
ADFS service is configured in the domain, you can enable Single Sign-On on the KUMA side and log
OR
on to the KUMA web console as a domain user.
To do so, create a connection group and configure rules in the ADFS Management Console, then
copy the group ID, Web API ID, ADFS server address and KUMA web console address. If everything
ED
is configured correctly, the ‘Sign in via ADFS’ option will appear on the KUMA logon page.
FreeIPA is an integrated identity and authentication solution for Linux networked environments, a
counterpart of Microsoft Active Directory.
PI
KUMA has only one connection for domain authentication, which means that you can use either AD or
CO
FreeIPA.
BE
TO
T
NO
46
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Chapter 3. Event collecting and processing
3.1. Collecting events
BU
In this section, we will study how events are collected, which connectors are available in Kaspersky
Unified Monitoring and Analysis Platform, and what is the difference between connectors and
RI
collectors. You will also learn when KUMA agents for Windows and Linux come in handy.
ST
DI
RE
OR
ED
PI
Each service has a so-called API port for technical communications within Kaspersky Unified
Monitoring and Analysis Platform.
Collector, correlator and storage services receive their settings in response to requests that they send
BE
to the API port of the core service (kuma-core). This happens every time when a service starts.
The core service (kuma-core) can also send a command to the API port of a particular service to
reload its settings or restart the service. It is the administrator who initiates commands via the web
TO
interface.
First of all, SIEM obtains events from external sources and normalizes them, thus simplifying
correlations, storage and manual analysis.
T
Collectors are responsible for this in Kaspersky Unified Monitoring and Analysis Platform. A collector
NO
47
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
can either wait for events from an active source or request events from a passive source. In the
former case, a collector listens on a port; in the latter case, it establishes a connection or sends
requests to the source’s port. The administrator configures what port to listen on or what address and
BU
port to query using the connector resources specified in the collector settings.
When a collector starts, it connects to the API port of the core service (kuma-core, port 7210/tcp by
RI
default) to retrieve its settings and find out which port to listen on or where to send requests. An
administrator or analyst can use the web interface to manually reload settings or restart the service. In
this case, the core service sends the respective command to the API port of the collector service.
ST
If several collector services are installed on a single server, each will have its own API port, which is
set up dynamically during the service installation.
DI
The collector usually sends processed (normalized) events to the correlator and to the storage
RE
concurrently. By default, the correlator listens for events on port 7231/tcp, and the storage listens on
port 7230/tcp.
Collector settings
OR
ED
PI
CO
BE
Events undergo several processing stages in the collector (see the diagram):
TO
• Then the events are converted to CEF (Common Event Format); this process is named
normalization
T
NO
48
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• Next, uninteresting (from the organization’s point of view) events are filtered out
• Then a group of similar events can be aggregated into a single event with collective
characteristics
BU
• And finally, events are enriched using the core database (dictionaries, GeoIP, KSC, LDAP) and
requests to external systems (DNS, Threat Intelligence)
RI
Steps of the collector setup wizard correspond to event processing stages:
ST
• Transport — specify the connector responsible for extracting individual events
• Event parsing — specify the normalizer that will convert events to CEF format
DI
• Event filtering — specify the filtering rules with conditions that will select ‘interesting’ events
RE
• Event enrichment — specify the enrichment rules
Processed events are usually forwarded to the correlator and storage in two independent streams.
The Routing area of the collector settings defines this behavior.
OR
Let’s now study collector settings in the order of applying.
Connector
ED
PI
CO
BE
TO
A connector is a resource that describes how to retrieve messages from a particular source.
T
The connector can be passive, i.e. listen to some port to which active sources send data, or active,
NO
49
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
and then the connector itself connects to passive sources (database, reading from a file, etc.) to
retrieve data.
BU
You can create and configure a connector as an independent resource and then select it in the
Connector drop-down list. In this case, the connector settings will not be editable from the collector
setup wizard. You will be able to modify its settings in Resources only. This is the micro-configuration
RI
principle. Everything that is saved as resources can be used as building blocks in various service
configurations. When a resource is modified, the new settings will be used in all services that work
with this resource.
ST
A connector can be configured inside the collector (inline), but then it will belong to the internal
configuration of the collector service and you will not be able to use this connector when configuring
DI
other services.
RE
Connection settings
OR
ED
PI
CO
BE
Connector settings depend on its kind. Kaspersky Unified Monitoring and Analysis Platform permits
creating the following connectors:
• tcp, udp, http, netflow, sflow describe how to receive data from active external sources
TO
• sql, ftp, nfs, smtp, smtp-trap, kafka, nats describe how to connect to external sources to
retrieve events
• diode describe how to collect events from an isolated network segment. In this scheme, KUMA
NO
50
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
components accumulate data in a specific directory inside an isolated network segment, and
then this data is sent to another directory in an external segment
BU
Most kinds of connections have the URL parameter that specifies the address and port for
establishing connections. tcp, udp and http connections describe waiting for connections, and you do
RI
not need to specify an address in the URL field; you can specify only a port as :5140, i.e. a colon and
the port number. This is an abbreviation of 0.0.0.0:5141, which means that the service will accept
ST
connections on all addresses of its server on the specified port. If necessary, you can specify an
address to make a service accept connections only on this particular address.
DI
In connections designed for requests to external systems (sql, ftp, nfs, smtp, kafka, nats), the URL
field is essential: without it, the service will not know where to connect.
RE
A file connection allows you to specify a folder and mask of files from which data will be retrieved.
OR
ED
PI
CO
BE
• sql connector: in the query field, specify the query to be run in the database; identity column
is the column to search for event identifiers, and identity seed is the identifier of the event
TO
starting from which you need to read data (if you want to start from scratch, leave this field
empty)
• kafka connector: in the topic field, specify the topic which you want to subscribe the connector
T
to, and in the groupID field, specify an identifier (any) for this connector that it will use to
‘present’ itself to Kafka
NO
51
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• nats connector: in the subject field, specify the subject to subscribe to
• wec connector: in the windows logs field, specify names of the logs from which events will be
collected
BU
• wmi connector: in the remote hosts field, specify addresses of remote hosts from which events
will be collected; you will also need to specify accounts and log names
RI
A detailed description of all parameters in different types of connectors is available in the online help
at
ST
https://support.kaspersky.com/help/KUMA/3.2/en-US/233592.htm
DI
In addition to the main parameters, there are additional parameters that are the same for most
connectors. For example, the buffer size (how much data to accumulate in each portion), text
encoding, encryption (you can configure mutual authentication between the source and collector),
RE
data compression using the Snappy utility to reduce network transmission overhead, and writing
debugging information to journalctl.
Let’s study how to receive Windows events. In this scenario, the collector receives events from
another component of Kaspersky Unified Monitoring and Analysis Platform, the KUMA agent for
Windows, rather than directly from the source.
ED
The KUMA agent reads events from the specified Windows event logs and forwards them to the
respective collector.
PI
The KUMA agent is similar to all other KUMA services: it receives its settings from the core service by
connecting to the core API port. It also accepts commands from the core service; this way, the
CO
administrator can remotely reload the agent’s settings or restart its service.
BE
TO
T
NO
52
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
The KUMA agent can collect events from the local Windows Event Log; in this case, a WEC
(Windows Event Collector) connector is used.
OR
Each agent must be registered as a service in the KUMA web interface. However, it is impractical to
have hundreds or thousands of agent services in the interface; and for this reason, we do not
recommend that you install a KUMA agent on every computer on the network (although this is
ED
technically feasible).
What to do if there are thousands of computers on the network? The following options are possible:
PI
• Assign one or more computers, for example, a domain controller, as event collectors. For this
purpose, configure Windows Event Collector, subscribe to receiving events from remote
CO
computers (event sources) and store them on the local computer (event collector). Events
gathered from remote computers will get into the Forwarded Events log in this case.
Therefore, it is enough to install a KUMA agent with a WEC connector only on event collectors
BE
• Install the KUMA agent with a WMI (Windows Management Instrumentation) connector on a
dedicated computer.
TO
T
NO
53
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
An agent with a WMI connector can remotely connect to other computers and pick up events from
their logs.
OR
ED
PI
CO
BE
When installed on a Windows OS, KUMA Agent can read text files and transfer data to a KUMA
TO
collector. A single agent installed on a Windows server can report data from Windows Event logs and
text log files. For example, you will no longer need to use network folders to get Exchange Server
transport logs, IIS logs, etc. To configure reading events from a file, select the file connector. One line
of a file is treated as one event. Line delimiters: \n.
T
NO
A Windows agent also has another connector type: ETW (Event Tracing for Windows). This connector
54
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
has a specific task: it receives events from the Microsoft-Windows-DNSServer {EB79061A-A566-
4698-9119-3ED2807060E7} provider. KUMA Windows agent uses the ETW transport to retrieve an
extended DNS log, diagnostic events, and analytical data about the operation of the DNS server. This
BU
provides much more information than the DNS debug log, with less impact on DNS server
performance.
RI
After the KUMA agent for Windows has received events, it forwards them to the collector for
processing.
ST
Windows agent
WEC connector
DI
RE
OR
ED
PI
CO
Before installing the KUMA agent, configure it as a service in the web interface. To do this, first
prepare the agent configuration on the Resources | Services | Agents page.
If you create a KUMA agent with a WEC connector, its main setting is the Windows logs field; list the
BE
Windows logs whose events need to be forwarded to the collector here. You can choose preset logs:
Application, System, Security, HardwareEvents and ForwardedEvents. To receive events from other
local logs (for example, Sysmon), type in its name. Full name of the Sysmon log is Microsoft-
TO
Windows-Sysmon/Operational.
WMI connector
T
NO
55
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
If you create a KUMA agent with a WMI connector, the main settings are Default credentials and
Remote hosts.
OR
In the Default credentials field, specify an account that has Event Log Readers permissions with
which the agent will connect to the remote Windows Event Log.
In the Remote hosts area, list addresses of the target remote computers, then add an individual list
ED
of logs for each host and specify an account. You can use the account from the Default credentials
field or another one. This information can only be specified manually.
PI
The account is added as a Secret resource of Credentials kind, meaning, a login and password that
are stored in the MongoDB database on the core in an encrypted form.
CO
ETW connector
BE
TO
T
NO
56
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
You need to set up a session on the DNS server in advance. An ETW connector can only work locally,
i.e. the agent must be installed on the server where the DNS service is running. This connector can
OR
receive events from one provider only: {EB79061A-A566-4698-9119-3ED2807060E7} -
Microsoft‑Windows‑DNSServer.
ED
PI
CO
BE
TO
We’ve studied the Connector section, i.e. how the KUMA agent will get events.
Now let’s look at the Destination section that describes where to send the collected data. Specify the
T
address, port and protocol of the collector that will receive data from the agent.
NO
57
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
There can be several destinations; i.e. a single KUMA agent can copy the stream into several
collectors, for example, to process different types of events in different collectors.
BU
In addition to the basic connection parameters, there are several technical settings such as encryption
(you can configure a secure connection between an agent and a collector), a delimiter between
events, buffer size, the number of worker processes, compression, debugging, and others.
RI
KUMA agent for Windows is quite demanding in terms of delimiter and encryption settings. It is
important that the same delimiter is specified in the Destination section of the agent and in the
ST
collector settings; for Windows events, the delimiter must be ‘\0’. It is equally important that the same
values are specified in the TLS mode field both in the KUMA agent and in the collector.
DI
A template of KUMA agent for Windows is available among the preset resources.
RE
OR
ED
PI
CO
When the KUMA agent configuration is ready, publish the agent service. In the Active services
BE
section, click the Add service button; then select the necessary agent configuration and click Create
service.
The KUMA core will generate a unique identifier for the service, which will be used for starting the
TO
service on a remote computer. The red status means that the KUMA agent service is not running on
any remote computer.
T
NO
58
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
A published service receives a unique identifier that the KUMA agent uses to retrieve its settings.
Copy this identifier (click the Copy ID button) and use it as an installation parameter when deploying
OR
KUMA Windows agent.
Services of other types (collectors, correlators, repositories) are created in a similar manner. When
creating a service, the administrator performs the following steps:
ED
• Publishes the configuration on the list of services and gets a unique identifier for the new
PI
service
• Installs the service on a Linux system and binds it to the published configuration using its
CO
unique identifier
To install the KUMA Windows Agent, use the kuma.exe file included with the Kaspersky Unified
Monitoring and Analysis Platform distribution; by default, it is located in the folder /kuma-ansible-
BE
installer/roles/kuma/files/
This is not an ordinary Windows installer, it is rather a utility for installing and managing the services of
KUMA agent for Windows.
TO
To register the KUMA agent as a service, run kuma.exe with the following parameters:
kuma.exe agent --core <URL of the API port of the core service>
--id <copied agent id> --user <account with the Log on as a
T
59
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
The following command outputs the complete list of the utility capabilities:
kuma.exe --help
BU
In particular, this utility can display the list of installed agents (if there are more than one of them for
some reason) or uninstall an agent service (using its identifier).
RI
Notice that the KUMA agent has an empty space in the API port column. The communication between
the agent and the core is one-way; the KUMA agent informs the core about its state every 15
ST
seconds, and the core can send the restart or configuration reload command in response.
DI
RE
OR
ED
PI
As a result of the installation, an ordinary Windows service will be deployed. The executable file of this
CO
service is the same kuma.exe file that is copied to the folder C:\Program Files\Kaspersky Lab\KUMA\.
It is worth adding that the KUMA agent does not store the settings locally. The connection parameters
are specified in the service start line. When the agent starts, it connects to the KUMA core to receive
its settings. If the agent cannot connect to the core when its service starts, it will not be able to retrieve
TO
the settings and will not know which logs to collect or where to send them.
60
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
If errors occur during the service installation, their description is usually clear enough to understand
what to do.
OR
For example, the error No mapping between account names and security IDs was done means that
the specified account cannot be found in the domain.
The process cannot access the file because it is being used by another process means that an agent
ED
service is already running on this host and another one cannot be installed. To install another agent
service, you need to stop the current ones. That is, there may be several KUMA agent services in the
system and they can be running concurrently.
PI
The service did not start due to a login failure means that the account does not have the permission to
CO
Log on as a service.
If the description is not clear and you don’t understand what the problem is, try to run the same
command without the --install parameter. This command also starts the agent, but does not register
BE
the service in the system. In this case, the KUMA agent will output a detailed work log to the
command line and it most likely will contain additional descriptions that will help you solve the
problem.
TO
In our example, the error The service did not respond to the start or control request in a timely fashion
is quite vague; but when you run the agent without the --install parameter, another error explains that
there are problems with the secret in the agent configuration.
T
NO
61
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
If the KUMA agent service has been successfully installed in the system, but events still do not arrive
to the collector service input, select the debug checkbox in the agent settings to record extended
OR
information. You can find errors in the KUMA agent log file C:\ProgramData\Kaspersky
Lab\KUMA\agent\<service ID>\agent.log
2. Run the KUMA agent in real time without the --install parameter
PI
3. Read the debugging information in the current session output on the command line and
monitor the collector at the same time
CO
4. When events start arriving to the collector, stop the KUMA agent
In this case, after the KUMA agent service is reinstalled in the system, events cannot fail to get to the
BE
collector.
A few tips on what is important to pay attention to in step 3 so that events begin to flow into the
collector.
TO
First, you already know that a KUMA agent transmits its status to the core every 15 seconds and then
the core may make it reload its settings or restart its service.
T
Second, search for the lines that begin with the prefixes [connector ‘…’] and [destination ‘…’]
NO
62
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
If there are errors in the [connector …] lines, it means that the KUMA agent fails to retrieve Windows
events. This may happen due to various reasons, for example, the account does not have rights to
read the Windows Event Log, or the remote host from which it needs to pick up events is inaccessible,
BU
or something else.
If there are errors in the [destination …] lines, it means that the KUMA agent has retrieved Windows
RI
events, but cannot send them anywhere because the destination is unavailable. The reasons may
vary again, perhaps the collector service is not running, or an incorrect address:port is specified in the
Destination section of the agent settings. It is also important (we have already mentioned this) that
ST
the same delimiter is specified in the Destination section of the agent settings and in the collector
configuration (for Windows events, the \0 delimiter must be used) and the same values are specified
DI
in the TLS mode field for the KUMA agent and collector.
Linux agent
In addition to KUMA agent for Windows, there is also the KUMA agent for Linux. In terms of
installation, everything is very similar to installing the KUMA agent for Windows. First, create an agent
configuration and publish the service in the web interface, then pass the URL of the core service, the
TO
service ID and the path to the folder where service files will be stored to the agent as parameters.
The kuma utility for running the Linux agent is also included with the Kaspersky Unified Monitoring
and Analysis Platform distribution; by default, it is located in the /kuma-ansible-
T
installer/roles/kuma/files/ folder.
NO
63
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
When you start the Linux agent, the process runs until it is interrupted. To make Linux agent start
automatically as a service, specify the required agent startup configuration in Systemd.
BU
Unlike KUMA agent for Windows, the KUMA agent for Linux can read data from files, for example,
audit.log or syslog. Out-of-the-box normalizers are also available for these files.
RI
ST
DI
RE
OR
Windows and Linux KUMA agents equally act as an intermediary between the source and collector.
ED
Agents are almost collectors, they can receive events on a specific port or connect to the source and
pick up events. The difference is that agents cannot normalize events, they collect events and
transmit them to the collector in the same raw form, i.e. they act as redirectors and can copy the flow
PI
to several collectors.
CO
When you create an agent configuration, almost the same types of connectors are available as for
collectors:
• tcp, udp, http describe how to receive data from active external sources
BE
• ftp, nfs, smtp, smtp-trap, kafka, nats describe how to connect to external sources to retrieve
events
• file connectors describe how to read data from a file (on Windows and Linux)
TO
• wec, wmi, etw describe how to collect Windows events (work on Windows agents only)
In the connector settings, Auditd is a switch for a mechanism that groups auditd log event entries
received from the connector into a single event.
T
We have already talked about the Destination section, it describes where to send the collected data.
NO
64
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Specify the address, port and protocol of the collector that will receive data from the agent.
Another example of using a KUMA agent is encryption. For example, there is some source that does
BU
not support encryption, but you want to receive its data in an encrypted form. In this case, you can
install KUMA agent on the source host and configure it to listen on some localhost port, and then send
data over a secure connection to the collector.
RI
Troubleshooting Linux agent
ST
DI
RE
OR
ED
If Linux agent startup configuration is specified in Systemd, you can use the following command to
CO
For diagnostics, you can consult the service log using journalctl or just stop the service and then
start:
65
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
If no events arrive when the agent is started, select the debug checkbox in the agent settings to
record extended information and then consult the agent log. Pay special attention to the lines that
OR
begin with the prefixes [connector ‘…’] and [destination ‘…’]
If there are errors in the [connector …] lines, then the KUMA agent cannot receive events, for
example, if a file connector is used, then the files not found message means that either the file is
ED
really missing or the account does not have permission to read this file.
If there are errors in the [destination …] lines, then the KUMA agent cannot connect to the destination,
it may be inaccessible or a wrong address:port is specified in the Destination section of the agent
PI
settings.
CO
If there are no errors but events do not arrive to the collector, check whether the necessary ports are
open in the firewall on the Linux agent side, maybe events do not reach even the agent.
SQL connector
BE
TO
T
NO
66
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Let’s take a closer look at another connector type, sql. It can connect to various SQL databases:
OR
• MSSQL
• MySQL
• PostgreSQL
ED
• SQLite3
• Oracle DB
• Firebird SQL
PI
• CockroachDB
CO
• URL is set as a Secret resource of the urls kind. The database address, instance name and
account are specified here
BE
• Identity seed is the identifier of the event starting from which the connector will need to read
data. If you want to start from scratch, leave this field empty. After each connection, the
TO
connector will save the value of the last read seed to ‘know’ which events it has already
retrieved and which are new
The Query field contains the SELECT statement to retrieve events from the database according to
T
67
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Connecting to the KSC database via the SQL connector
BU
RI
ST
DI
RE
Let’s find out how Kaspersky Unified Monitoring and Analysis Platform can retrieve Kaspersky
OR
Security Center events from its Microsoft SQL database.
Sure, Kaspersky Security Center can send events to the SIEM system in different formats (syslog,
CEF, LEEF) itself. But Kaspersky Security Center cannot send events in CEF or LEEF format with the
ED
Select license (a higher license is required), and as far as the syslog format is concerned, you must
select the types of events that need to be sent to SIEM first.
PI
Besides, Kaspersky Security Center can send only events, while its SQL database also stores other
data useful for analysis in Kaspersky Unified Monitoring and Analysis Platform that you can obtain
CO
The connector for Kaspersky Security Center is available out of the box. It uses two queries to the
SQL database: one of them retrieves events, and the other retrieves the list of devices connected to
Kaspersky Security Center.
BE
The preset query uses the default database name KAV; if the database has a custom name
in your installation, specify it in the Query field.
TO
In the URL field, specify the database connection parameters. Different syntax is used for different
types of databases. For Microsoft SQL, the syntax is as follows:
T
68
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Even though you specify the password explicitly, it will not be compromised. When you save the
secret, the password is encrypted and then stored in the MongoDB database on the core. If you want
to modify the secret, when you open it, the URL field will be empty, i.e. the password will no longer be
BU
displayed explicitly.
Therefore, to avoid re-typing the connection string when you need to change the password or just
RI
correct a typo, we recommend that you copy the connection string from the Description field when you
create the secret for the first time (naturally, without specifying the password explicitly).
ST
The Secret separately switch lets you save credentials separately from the URL.
The syntax of the URL field for different types of databases is described in the online help at
DI
https://support.kaspersky.com/help/KUMA/3.2/en-US/220746.htm
RE
Troubleshooting an SQL connector
OR
ED
PI
CO
BE
If you’ve configured a collector with a connector to the SQL database but events do not arrive to
Kaspersky Unified Monitoring and Analysis Platform, check the service log via journalctl using the
following command:
TO
journalctl -f -u kuma-collector-ID
Pay special attention to the lines that begin with the prefixes [connector ‘…’] and [destination ‘…’]
T
Errors in the [connector …] lines will show whether it is possible to connect to the SQL database. The
NO
69
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
most common errors are an incorrect database server address, or an incorrect database name in the
Query field, or problems with the account during authentication.
BU
Errors in the [destination …] lines may mean that there are issues with the correlator or storage
service, i.e. the event collector retrieves events from the SQL database, but they cannot reach the
storage and accumulate in the collector buffer.
RI
3.2. Normalization of events
ST
In this section, we will talk about the Kaspersky Unified Monitoring and Analysis Platform data model,
which incoming data formats KUMA supports and what capabilities are available when converting
data to KUMA format.
DI
RE
OR
ED
PI
CO
Events arrive to the collector in the raw form. Different sources provide data in different formats
(syslog, CEF, xml and others). To compare them, you need to bring them to a common form, i.e., map
fields of the original format to the KUMA format and save the field values accordingly. Moreover, the
BE
same information (email, url, hash) may be found in different fields of source events, or there may
even be just some data structure separated by special characters instead of fields.
The process of bringing all this together is named normalization or parsing. This is the most important
TO
process in the collector, because all other processes (filtration, aggregation, enrichment, correlation)
heavily depend on normalization.
T
NO
70
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
When events get into the collector, the next stage of their processing is normalization, parsing an
event into fields and writing the values of the source fields into the fields of the KUMA data model (the
OR
diagram shows 5 green rectangles: these are 5 stages of event processing in the collector). Note that
KUMA uses the CEF (Common Event Format) format.
The so-called normalizer is responsible for event parsing. This is another type of resource that
ED
describes the algorithm of how and which data of the source event to write to the KUMA format. You
can create and modify normalizers on the respective page of the web interface (Resources |
Normalizers).
PI
This stage is a must, a collector cannot exist without a normalizer. The round icon indicates that a
preset normalizer is available; click it to open its settings.
71
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
The KUMA data model is based on CEF (Common Event Format) with some additions. The CEF
provides fields for most data that can be found in events such as computer names, addresses, ports,
OR
file names and checksums, identifiers of processes, users and devices. If standard CEF fields are
insufficient, there are also special fields (for example, DeviceCustomString*) that an analyst can fill
with custom data. There are about 130 fields in total.
ED
KUMA adds its own fields that store the unique identifier of the event in KUMA (ID field), identifier of
the collector or correlator service that created the event (ServiceID field), the entire original event
(Raw field), unparsed fields: the part of the event from the Raw field that failed to be converted (Extra
PI
field), cyber intelligence data that can be obtained by CyberTrace enrichment (TI field), fields with
geodata, and others. There are about 40 fields in total.
CO
For a complete list of fields in Kaspersky Unified Monitoring and Analysis Platform data model, see
the online help at https://support.kaspersky.com/help/KUMA/3.2/en-US/217941.htm
Types of normalizers
BE
TO
T
NO
72
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
The primary task of the normalizer is to transform the values of the initial event fields into the KUMA
normalized event fields (CEF). For this purpose, map the initial fields to the KUMA fields in the
OR
Normalizer settings.
Normalizers have a type that depends on the parsing method, i.e. what input data we expect. A
collector can have only one main normalizer, meaning, you need to create a separate collector with
ED
the respective normalizer for each event format. Otherwise, events will pass through the collector and
will be written to the storage in the raw form.
Events typically have one of the widespread formats. Kaspersky Unified Monitoring and Analysis can
PI
• csv (comma-separated values) — you need to specify the delimiter between the values in the
normalizer
• kv (key-value pairs) — specify the delimiter between pairs and the delimiter within a pair in the
normalizer settings
BE
• xml
• json
TO
If incoming raw events have a standard format (CEF, syslog, NetFlow, IPFIX or SFlow), you can use
T
73
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
If there is no ready-made normalizer for some source in KUMA, KUMA provides a flexible mapping
mechanism to convert source events of any format into KUMA events. The regexp normalizer type is
used for this purpose, which allows you to extract data based on regular expressions.
BU
Kaspersky Unified Monitoring and Analysis Platform development plans include continuous expansion
of supported formats, built-in mapping and example mapping for widespread event sources.
RI
Extended KUMA data model
ST
DI
RE
OR
ED
You can create new fields in the KUMA data model. When creating a new field, add a prefix that
PI
indicates the data type to its name. The following data types are supported:
CO
• S. — string
• N. — number
• F. — floating-point number
BE
Arrays can be used only in kv and json normalizers. A prefixmust be uppercase. In one of the course
labs, you will have the opportunity to extend the KUMA data model by creating a custom field.
T
NO
74
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Field mapping
BU
RI
ST
DI
RE
The Mapping settings consist of a list of pairs: a source field – the field of the normalized KUMA
OR
event.
If the normalizer has the cef, syslog, netflow, ipfix or sflow type, you can click the Apply default
mapping button, and data will be mapped automatically based on the CEF format structure.
ED
To configure mapping for a normalizer of another kind, you must understand what fields an initial
event may have.
PI
One of the ways to understand this is to save an initial event into a special Raw field of a normalized
event. By default, KUMA stores initial events only if errors occur during normalization. When
CO
debugging the normalizer, you can set the Keep raw event parameter to Always.
Another way to map fields is to take a raw event, paste it into the Event examples field and try to
write mapping based on this event. If event format does not match the normalizer, you will
BE
immediately see the ‘normalization error’ message and will need to change the normalizer type.
Apart from saving the entire initial event, the normalizer can also write unmapped fields to a special
Extra field. The Save extra fields option regulates this behavior. For example, there is an xml event
TO
that has six fields. Say, we have written mapping rules for four fields only in the normalizer; then if the
Save extra fields option is enabled, the two unprocessed fields will be written to Extra, and if the
Save extra fields option is disabled, they will simply be discarded.
T
NO
75
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Extra field
BU
RI
ST
DI
RE
The Extra field is a very powerful tool that can be used for normalization, correlation and search.
OR
You can use the Extra field as a hint to see what other useful but unextracted information the original
event contains, i.e. mapping is not written for it.
ED
The Extra field has json format; you can search for events by this field, i.e. send a SELECT query to
the ClickHouse database. You can search for a particular value of some field, or you can use the
JSONExtractString function for a granular search.
PI
And the most important feature of the Extra field is that you can leave it unnormalized and use field
values in the Extra.<name of a field inside Extra> format in correlation rules. For example, if you want
CO
to use values of the EventData.Data.CommandLine field from Extra in a correlation rule, specify it as
Extra.EventData.Data.CommandLine. A good example is the Sysmon utility. Some events may
contain hundreds of fields; the KUMA format is clearly not enough to normalize this amount, but there
BE
is no need to fully normalize Sysmon; instead, you can simply use values in the Extra field format.
Converting fields
TO
T
NO
76
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
A normalizer can convert data on the fly before writing to the fields of a normalized event: change to
lowercase, shorten to the specified length or cut out an arbitrary substring using a regular expression.
OR
The following operations are available:
• substring — cut out a substring (you need to specify its initial and final positions)
PI
• replace — if the initial value contains the specified substring, replace it with the specified text
You can configure multiple transformations for the same value, for example, trim and convert to
T
lowercase.
NO
77
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
In particular, the regexp transformation comes in handy if the initial event has a field with various text
information. In this case, you can use regexp to map different parts of the source field to different
KUMA fields.
BU
RI
ST
DI
RE
OR
The example shows that the original event contains an encoded command; if you apply the correct
conversion, this command will be displayed instead of the HEX string.
ED
Typically, it is more convenient to create a separate collector service for each type of event source,
NO
78
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
but sometimes you may need one collector service to receive and normalize events from different
types of sources, for example, if you have too many collectors or you have a limited number of ports
that you can open on firewalls. This collector logic can be configured on the Parsing settings tab.
BU
You can specify source addresses and their corresponding normalizers there. This is convenient in
some situations, but it lowers performance.
RI
ST
DI
RE
OR
ED
This method is available for collectors with UDP, TCP, and HTTP connectors. If a UDP, TCP, or HTTP
connector is specified in the collector at the Transport step, then at the Event parsing step on the
Parsing settings tab you can specify several IP addresses and specify which normalizer should be
PI
used for events coming from specified addresses. The following normalizers are available: json, cef,
regexp, syslog, csv, kv, xml. All sources that send data to a collector must use the same transport as
the collector (UDP, TCP or HTTP).
CO
You can organize Syslog and regexp normalizers into a chain: set additional normalization conditions
depending on the value of the DeviceProcessName field. The difference with additional normalization
(which will be discussed later) is that you can specify shared normalizers. Using this additional level of
BE
Extra normalizers
TO
T
NO
79
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
You can use several normalizers in a collector sequentially. We are no longer talking about
normalization that depends on the source IP address. Here we are talking about a situation where an
OR
event passes through several different normalizers that can be applied depending on the event
contents. For example, events from a Windows Event Log may have different structures and,
depending on the value of the Event ID field, they should be parsed differently.
ED
Additional normalizers can also contain conditions and pass events to other normalizers. This
hierarchy can theoretically be infinitely deep. But in practice you will hardly ever need numerous
normalization levels.
PI
For example, there are several sources that output events in CEF format. Instead of using multiple
collectors, you can send events from multiple sources to a single collector. The DeviceProcessName
CO
field of a normalized event will contain the source name. Then you need to create additional
normalizers that will check the value of the DeviceProcessName field. If the value is Source_1, then
fields will be mapped according to one algorithm, and if the value of the DeviceProcessName field is
Source_2, then another algorithm will be applied.
BE
It is important that a condition checks the value of an initial event’s field using the name of this field in
the initial event.
TO
T
NO
80
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Additional normalization is configured only in the properties of the main normalizer and is written from
scratch, i.e., you cannot use an existing resource as an additional normalizer.
OR
The settings consist of a list of conditions and the corresponding normalizers. In conditional
normalization, only simple conditions are allowed: they verify that a single field of the initial event has
the specified value. For example, whether the Event.System.EventID field has the value 4608 or the
ED
It is important that a condition checks the value of an initial event’s field using the name of this field in
the initial event.
CO
Extra normalizers applied when a condition is met have the same settings as the primary (parent)
normalizer. They also have a kind that determines the format of incoming data and a table that maps
fields of the initial and normalized event.
BE
Note that additional normalizers are implicit resources. This means that they are not listed as entities
among other resources. They are only accessible through the properties of the primary (parent)
normalizer. You cannot use an existing named normalizer set up in the Resources when configuring
TO
conditional normalization.
T
NO
81
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Each normalizer has one more section of settings where you can configure enrichment without
sending requests to external systems. For example, dictionary enrichment. If an event contains only a
OR
numeric code, the normalizer can add the respective description from the dictionary to the event. We
will describe these settings and dictionary settings later in our course.
ED
PI
CO
BE
TO
When you create a normalizer, it is convenient to have an example of the original event at hand. You
T
can copy it to the Event examples field and monitor on the fly how the fields of the original event will
NO
82
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
We have an event from Blue Coat ProxySG in our example; you can see that it has the key:value
format. The delimiter between values is “=”, and the delimiter between pairs is “|”.
BU
However, if you select the parsing method kv (key:value), you will see the “Normalization error”
message below the Event examples field. The problem is that the event beginning “Bluecoat|” looks
abnormal to our normalizer.
RI
What can you do in this case? You can change the parsing method to regexp, use a regular
expression to cut out everything that goes after “Bluecoat|” and write to the msg field in the following
ST
format: (?P<msg>.*).
Then create an additional normalizer and pass the value of the msg field without any conditions to its
DI
input.
RE
OR
ED
PI
CO
Let’s see what happens in the additional normalizer. The normalizer receives a fragment of the
original event that we saved into the msg field, without “Bluecoat|”.
BE
Now, you can use the kv (key:value) parsing method with the “|” (pipe) delimiter between pairs and the
“=” delimiter between values.
After that, map the source fields to the corresponding fields of KUMA.
TO
Since we know that this normalizer is designed for Blue Coat ProxySG events, we can enrich the
DeviceVendor and DeviceProduct fields with the BlueCoat and Proxy constants, respectively. You can
configure this on the Enrichment tab.
T
NO
83
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Thus, we were able to process the event using two normalizers: in the first, we removed the part that
couldn’t be processed by an out-of-the-box normalizer, and in the second, we used the preset kv
OR
normalizer.
ED
PI
CO
BE
TO
84
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Filtering
BU
RI
ST
DI
RE
After normalization, a collector filters events. This stage has several objectives:
OR
• Reduce the stream of events at the output of the collectors that determines the license cost
Filtering, unlike normalization, is optional. A collector does not have any filters by default.
PI
CO
BE
TO
T
NO
85
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Filters are resources. You can create them in Resources | Filters and then select ready filters in the
collector settings. You can also configure a new filter right from the collector configuration. However,
such filters will be built into the collector and will not be displayed among other resources.
BU
Inside, a filter is a composite condition that consists of simple conditions combined by logical
operators AND, OR and NOT. You can group conditions to manage the operator precedence.
RI
Every simple condition consists of a comparison operator and values to compare (left operand and
right operand). You can choose some event field, constant or data from a dictionary for left and right
ST
operand; some operators may need some special data. For example, the inSubnet operator implies
that the left operand is an event field containing an IP address, and the right operand is a constant
whose value is a subnet with a mask.
DI
For a complete list of possible comparison operations and settings, please refer to the online help at
RE
https://support.kaspersky.com/help/KUMA/3.2/en-US/217880.htm
Some of the supported comparison operations do not make much sense in the filters intended for a
collector. It is important to understand what information the collector possesses during the filtering
OR
phase and what information is not yet available. For example, active lists can only be used in
correlators, not in collectors; therefore, conditions that check if event attributes match the active list
will not work. The inCategory, inActiveDirectoryGroup and TIDetect conditions will not work either,
because these fields are added to an event during the enrichment stage that follows filtering.
ED
PI
CO
BE
TO
Filter conditions can also be set and viewed in source code mode. You can switch between modes
T
when creating filtering criteria. To switch to source code mode, click the Code button. When you
NO
switch between modes, the configured condition filters are preserved. If the filter code is not displayed
86
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
on the Code tab after you bind the created filter to a resource, switch to the Builder tab and return to
the Code tab. The filter code will be displayed.
BU
Aggregation
RI
ST
DI
RE
OR
Aggregation is the next event processing step after filtering in a collector. Aggregation allows you to
replace a group of related events with a single event that characterizes the entire group. Aggregation
ED
is often applied to events from network equipment (for example, NetFlow). Instead of treating each
connection as a separate event, a collector can combine all connections with the same addresses and
ports over the specified period of time into a single event.
PI
Base events that have been aggregated do not go any further. The aggregated event is forwarded
CO
instead.
Aggregation simplifies analysis and reduces resource consumption and EPS at the collectors’ output,
which reduces the license cost.
BE
TO
T
NO
87
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Aggregation is configured as rules, which are another kind of resources. You can configure
aggregation rules in the resources and then use them in the collector settings. Alternatively, you can
OR
configure inline aggregation rules right in the collector settings.
• Identical fields — lists fields of (normalized) events whose values must coincide. For example,
ED
• Unique fields — lists the fields whose values must be preserved in the aggregate event. For
example, if you specify the DestinationPort field in Unique fields rather than in Identical
fields, the aggregate event will combine base events with connections to different ports, and
CO
the DestinationPort field of the aggregate event will list all ports to which connections were
established
• Sum fields — values of these fields from base events will be summed up and written into the
BE
respective fields of the aggregated event (each field will be summed up separately)
• Triggered rule lifetime — time limit. When the specified period is over, accumulation of base
event stops, the collector creates the respective aggregated event and starts collecting events
TO
• Threshold — a limit on the number of events. As soon as the specified number of events with
identical fields have been accumulated, the collector creates an aggregated event and begins
collecting events for the next aggregated event
T
NO
An aggregated event is created when either the time threshold or the event number threshold is
88
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
reached, whichever occurs first.
You can add a filter to an aggregation rule (similarly to an enrichment rule) to apply it only to events
BU
that meet the specified conditions rather than to all events.
Enrichment
RI
ST
DI
RE
OR
ED
After aggregation and before the events are output, they get enriched based on rules. Although
normalizer also contains enrichment settings, enrichment in the normalizer and enrichment by the
rules have different capabilities. Enrichment rules allow you to configure requests to external systems
PI
(DNS, LDAP, CyberTrace, etc.), while the normalizer can only use information from the event,
dictionaries and constants.
CO
Apart from requests to external systems, enrichment by the rules is the same as enrichment in the
normalizer. This provides analysts with more options to get the required results.
BE
TO
T
NO
89
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Enrichment rules are resources. Like filters, they can be named (and edited separately from the
collector in Resources | Enrichment rules) or built into the collector (such rules are not displayed
OR
among the resources).
Enrichment rule settings contain the information source and the event field into which data from the
source is recorded. Every source has its own additional parameters. Available sources: constant,
ED
Later in our course, there will be examples of enrichment using DNS, GeoIP, LDAP, CyberTrace and
dictionaries. Enrichment with the Event source allows you to fill in an event field based on the value of
PI
an already filled field (transformations are possible). The Template source allows you to construct a
field value from the values of several other fields. The Go template format is used:
CO
Two types of CyberTrace enrichment are available: cybertrace and cybertrace-http. When using the
former type, it is easy to reach the limit on simultaneous connections to CyberTrace. In this mode,
BE
requests are processed one at a time, and a queue of enrichment requests accumulates in KUMA.
The cybertrace-http enrichment type was designed to solve this problem; when used, requests to
CyberTrace are processed in batches, rather than one at a time. The cybertrace-http method is
recommended for use in systems with a large event flow. Cybertrace-http performs significantly better
TO
90
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
You can configure enrichment in the normalizer (which is a part of a collector), directly in a collector (in
the form of rules) and in the correlator (also in the form of rules). Enrichment rules are resources.
OR
Enrichment settings configured in the normalizer are not resources and always belong to the
normalizer.
A normalizer cannot query external systems; for this reason, not all enrichment sources are available:
ED
• dictionary — to write a value from the dictionary into the specified field. A dictionary is a set of
PI
key:value pairs, so you need to specify a key to get the respective value. You can use the value
of an already populated event field for the key. For example, you can use a dictionary to
complement numerical operation code with a description.
CO
• event — to populate the field with a value obtained by converting another field
BE
• template — to populate the field with a combination of constants and values of several other
fields
DNS enrichment
TO
T
NO
91
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Let’s consider an example of enrichment using a DNS query. The CEF model has special fields for IP
addresses and names of devices related to an event. There are three pairs of such fields:
OR
• DeviceAddress, DeviceHostName — attributes of the device that created the event (for
example, a proxy server)
• SourceAddress, SourceHostName — attributes of the device that performed the action logged
ED
in the event (for example, the device that established a network connection)
• DestinationAddress, DestinationHostName are attributes of the device where the action logged
in the event was directed to
PI
DNS enrichment fills the missing value in each of these pairs based on the available field. For
CO
In a similar manner, a rule can populate an address based on the name if the reverse address
resolution request returns a non-empty response. This, of course, depends on the correctness of DNS
configuration.
TO
Each address-name pair is enriched independently. If both address and name fields are filled in, DNS
enrichment is not performed.
T
NO
92
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
The fields that DNS enrichment works with are preset and have been listed above. Meaning, you
cannot reconfigure a DNS enrichment rule to change which field to read the name/address from and
OR
which field to write the address/name to.
• The Cache disabled option allows you not to use cached responses
A collector can receive thousands or even tens or hundreds of thousands of events per second, and
BE
each DNS query takes time. Disabling the cache will cause delays in event processing and require
buffering a large volume of events waiting for the enrichment result. Therefore, you should only
disable DNS cache for debugging.
TO
You can configure an enrichment rule to be applied only to those events that satisfy specific
conditions. To do so, specify a filter in the rule.
93
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
You can download a GeoIP database, which determines the geographical location by IP address, to
Kaspersky Unified Monitoring and Analysis Platform, and use this data to enrich events.
OR
In Settings | Common, import data from a file to KUMA. The file must be in CSV format.
Kaspersky specialists developed a script that converts MaxMind and IP2Location databases into CSV
format.
ED
There is a link to this script and command descriptions in the online help at
https://support.kaspersky.com/help/KUMA/3.2/en-US/233257.htm
PI
You can import only one file; if you import another one, it will overwrite data in the KUMA database.
Data is exported in the same format, except for IP address ranges. If CIDR range is used (1.0.0.0/24),
CO
the export file will contain the start and end IP addresses (1.0.0.0 — 1.0.0.255).
BE
TO
T
NO
94
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
After the GeoIP database is loaded to the Kaspersky Unified Monitoring and Analysis Platform, you
can configure enrichment rules. The source type is geographic data. Each IP address can have 5
OR
attributes in the database:
• Country
• Region
ED
• City
• Latitude
PI
• Longitude
The rule specifies from which field of the normalized event to extract the IP address and into which
CO
KUMA fields to write geographical data. KUMA has a set of internal fields for these purposes.
95
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
When the collector outputs events, they are sent to the correlator and storage. The storage properties
specify the retention time for events; by default, ordinary events are stored for 14 days, and audit
OR
events are stored for a year. Some events need to be stored for a long time, while several days are
enough for others.
Kaspersky Unified Monitoring and Analysis Platform allows you to configure different retention time for
ED
different types of events. So-called spaces serve this purpose. A space is a method of grouping
events in the storage by some attribute (filter).
PI
CO
BE
TO
T
NO
If you open the list of active services and select a Storage service, it will have the Go to partitions
96
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
button. Partitions help KUMA ‘understand’ which events to delete when their retention period expires.
Two partitions are created every day: for audit events (KUMA Audit) and for all other types of events
BU
(KUMA Default). If spaces are configured, then a partition will also be created for each space.
You can delete any partition except KUMA Audit manually if necessary: click the three-dot menu to the
left of the partition and select Delete.
RI
ST
DI
RE
OR
ED
In KUMA, you can move old events that need long-term preservation from a fast and expensive
ClickHouse storage to a slow and cheap storage (so-called cold storage). The system provides a
PI
unified search with all SQL capabilities for all data regardless of the storage location.
An HDFS (Hadoop Distributed File System) cluster or local drives mounted in the operating system
CO
can be used as a cold storage subsystem. When you add a disk for cold storage, retention period
settings appear in the properties of the Storage resource.
The hot and cold days add up to make the total retention period. In our example, events will be moved
BE
to cold storage on the second day and then stored for 60 days, i.e. the total retention period is 61
days. Cold storage is configured separately for ordinary and audit events.
TO
T
NO
97
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
In KUMA, the ClickHouse cluster configuration is specified in the properties of the Storage resource.
In a distributed installation, the Storage resource will most likely have to be created from scratch and it
OR
is important to correctly specify the FQDN of the cluster nodes and configuration of shards, replicas
and keepers; otherwise, the service will not start.
When you connect an HDFS cold storage to a ClickHouse cluster, the path must include subfolders
ED
denoting the shard number and replica number. These folders must be created on HDFS in advance.
If your ClickHouse cluster consists of one node, i.e. 1 shard, 1 replica, you do NOT need to
specify /1/1/ at the end of the path (see the previous slide). KUMA will do this automatically.
PI
CO
BE
TO
T
NO
98
Chapter 3. Event collecting and processing KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
The list of partitions shows when a partition moves from hot storage to cold and when it will be
deleted. If cold storage is not enabled, these two dates will be the same.
OR
In our example, we’ve configured transfer to cold storage on the second day; older events must be
moved to cold storage. KUMA checks the partition lifetime every hour and when the kuma-core
service restarts.
ED
PI
CO
BE
TO
You can see that after the nearest partition lifetime check, events older than 24 hours have been
T
moved to cold storage. You can also see the date when the partition will be permanently deleted from
NO
the system.
99
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Chapter 4. Integrations
Integrations allow Kaspersky Unified Monitoring and Analysis Platform to receive additional
BU
information from external systems. Integrations are configured for the core (kuma-core) service, which
then shares information with other services: collectors and correlators.
For example, integrations with Kaspersky Security Center and LDAP provide KUMA with detailed
RI
information about computers connected to Kaspersky Security Center and domain user accounts,
which can be used in filters and correlation rules.
ST
Let’s focus on the following integrations now:
DI
• Kaspersky Security Center
• LDAP
RE
• Kaspersky Threat Lookup
• Kaspersky CyberTrace
https://support.kaspersky.com/help/KUMA/3.2/en-US/217927.htm
ED
Integration of Kaspersky Unified Monitoring and Analysis Platform with Kaspersky Security Center
100
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
pursues the following objectives:
• Fill the KUMA database of assets (computers) with information about managed devices from
BU
Kaspersky Security Center
• Implicitly enrich events with links to asset identifiers, if such an asset exists in the KUMA
database
RI
• Use specially prepared Kaspersky Security Center tasks to manually and automatically
respond to security incidents
ST
For integration, the KUMA core connects to the API port of Kaspersky Security Center server (13299
by default) and authenticates using an account that has read access to information about devices.
DI
Running tasks requires additional permissions.
RE
OR
ED
PI
CO
Kaspersky Security Center permits using an Active Directory account or an internal Kaspersky
Security Center account. Internal Kaspersky Security Center accounts are considered to be more
BE
secure. Therefore, to prepare for the integration with Kaspersky Security Center, we recommend that
you create a new internal account in Kaspersky Security Center for connections from Kaspersky
Unified Monitoring and Analysis Platform.
TO
To import information about managed devices from Kaspersky Security Center to the KUMA core, the
account needs the Basic functionality permissions in Kaspersky Security Center. To run Kaspersky
Security Center tasks as response, the Basic functionality permissions for Kaspersky Endpoint
Security are required.
T
You can also use roles instead of permissions; in this case, the Kaspersky Endpoint Security
NO
101
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Administrator role grants all necessary permissions (including read access to information about
devices).
BU
RI
ST
DI
RE
OR
On the Kaspersky Unified Monitoring and Analysis Platform side, specify the account attributes in a
Secret resource that has the credentials kind. Secrets are designed to store sensitive information
such as passwords and certificates. The data specified in secrets is stored in an encrypted form and
ED
The integration is configured in Settings | Kaspersky Security Center. You can configure connection
to several Kaspersky Security Center servers here. For each server, specify a connection name (any)
PI
• URL — the connection address of the Kaspersky Security Center server in the format <name
or IP address>:<API port>
• Secret — a resource of the credentials kind with a user name and password for accessing
Kaspersky Security Center
BE
If you do not use a connection to Kaspersky Security Center anymore, you can disable (the Disabled
checkbox) or delete it.
TO
T
NO
102
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
First of all, integration with Kaspersky Security Center is required to populate the Kaspersky Unified
Monitoring and Analysis Platform asset database.
OR
Assets are computers. They provide specialists who analyze events with additional context. KUMA
can implicitly enrich events with asset identifiers if an event contains the name or address of a
computer. An asset identifier is a link to additional information about the computer, which the specialist
ED
By default, assets are automatically imported from Kaspersky Security Center every 12 hours; you
can change this schedule if necessary. You can also click the Import KSC assets button to import
PI
them on demand (this will not affect the scheduled import in any way).
CO
Kaspersky Unified Monitoring and Analysis Platform imports all computers with Kaspersky Security
Center Network Agent that has connected to Kaspersky Security Center, i.e. whose Connection time
field is non-empty in the Kaspersky Security Center SQL database.
BE
Along with basic information about the computer that includes its name, address, timestamp of the
last connection to Kaspersky Security Center and other standard attributes, information about
hardware and software is imported, including the operating system version and vulnerabilities. This
information is collected by Kaspersky Security Center Network Agent.
TO
T
NO
103
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Quite a lot of fields appeared in asset properties starting with KUMA 2.1. These are mainly fields that
KUMA receives from KSC via Open API.
OR
Useful fields:
• KSC extended status — a text description of a status, why it is yellow or red (if the status is
green, this field is normally empty)
• Encryption status
• Protection last updated — when the last database update task was run
T
• Information last updated — when information about the device was last updated in KSC
NO
104
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
You can create custom fields if necessary.
BU
RI
ST
DI
RE
OR
Custom fields are set up in Settings | Assets. Only a user who has the General admin role can use
this functionality.
You can use regular expressions to restrict field values. For example, if a field must contain only
numeric values, you can use a regular expression to prohibit any characters other than digits.
ED
Or, for example, if a field must contain the email address of the device owner, prohibit any values that
do not match the [email protected] format.
PI
After the General admin creates custom fields, they become available for editing in an asset card in
the Custom fields area.
CO
The regular expression a field value must match is displayed below the field.
If a custom field is empty, it is not displayed in the asset card, but becomes available when you switch
BE
to edit mode.
TO
T
NO
105
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
You can manually add assets that cannot be imported. Note that you will have to manually specify all
computer attributes such as its address, FQDN, operating system name and version and hardware
OR
specifications. You cannot specify information about vulnerabilities when adding assets manually.
ED
PI
CO
BE
TO
You can group assets into categories. An installation contains examples of asset categories. You can
delete them or add new categories that better serve your purposes. Categories form a hierarchy. Each
category has one of the following criticality levels:
T
• Low
NO
106
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• Medium
• High
BU
• Critical
You can add a computer to several categories. Initially, all assets get into the Uncategorized assets
category.
RI
You can use asset categories in conditions within filters or correlation rules. For example, you can
ST
create alerts of higher severity for critical assets.
DI
RE
OR
ED
PI
You can manage the structure of assets using the category shortcut menu.
CO
For example, you can pin an important category as a separate tab to be able to quickly access its
contents. You can also recursively display assets of child categories, create subcategories and
change the properties of the current one, for example, the level of importance and the filling method.
BE
You can delete a category only if it is empty, i.e. no asset is associated with it.
TO
T
NO
107
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
When working with numerous assets, you can use search and configure it as a set of conditions
similar to filters: left and right operands, and a comparison operator. Any field from the asset
OR
properties, including new ones, can be used for the left operand.
108
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• Manually
• Active — dynamically, if assets meet specific conditions. For example, have a specific version
of the operating system or are located in a specific subnet
BU
• Reactive — using correlation rules, i.e. when a correlation rule is triggered, the asset will be
moved to the specified group
RI
ST
DI
RE
OR
ED
If the Active category filling method is used, you can use several conditions for grouping:
• Build number
PI
• OS
• IP address
CO
• FQDN
• CVE
BE
The conditions are set in the following format: left operand (one of the abovementioned conditions),
operator (greater than, less than, equals to, ilike, inSubnet, etc.) and the value to compare.
You can combine conditions with logical operators AND, OR and NOT.
TO
After you have set up a condition, test it. The Test conditions button displays the list of devices that
match the specified condition. This is especially useful when configuring complex conditions.
T
You can also set up the categorization period here, meaning, how often conditions will be checked for
the entire list of assets. Periods from 1 to 24 hours are available.
NO
109
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Collectors use the database of assets to implicitly enrich events with asset identifiers. This enrichment
enables analysts to consult information about computers when analyzing events. All information about
OR
the asset is stored separately from the event in the MongoDB database managed by the KUMA core
service. Only internal fields are added to an event:
• DeviceAssetID
ED
• SourceAccountID
• DestinationAssetID
PI
The collector receives information about assets from the core and fills in the asset identifier field in the
events in the following cases:
CO
• If the corresponding field with the name contains the FQDN of the asset. For example, if the
SourceHostName field contains an FQDN, the collector will add the SourceAssetID field with
the asset identifier to the event. The address specified in the SourceAddress field is of no
BE
importance
• If the corresponding address field contains the asset address and the name field is empty. For
example, if the DestinationAddress field contains the address of a known asset and there is no
name in the DestinationHostName field, the collector will add the DestinationAssetID field with
TO
If the name field contains a value that does not match any FQDN in the asset database, the collector
does not check the address field and does not supplement the event with the asset identifier. This
T
situation may arise either when the *HostName field contains an FQDN, but it does not match any
NO
110
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
asset, or when the *HostName field contains a computer name rather than its FQDN.
BU
RI
ST
DI
RE
OR
To keep track of various actions with assets in Kaspersky Unified Monitoring and Analysis Platform,
configure asset audit events.
The following types of audit events are available (destinations are configured separately for each of
them):
PI
Storage and Correlator (for events that need to be correlated) services usually act as the destination.
Asset audit events pertain to the Base type, not Audit. Remember this when querying events.
Alternatively, you can pass the following values as a search condition:
T
NO
111
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
DeviceCategory = 'Audit assets'
or
BU
DeviceAction like 'assets%'
RI
ST
DI
RE
OR
ED
KUMA can delete assets for which information is out of date. If no information about an asset is
updated during a synchronization, such an asset is marked as archived. Depending on the settings,
an archived asset can either be deleted after its storage period expires or can be stored indefinitely.
PI
112
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Just as integration with Kaspersky Security Center allows you to fill the database of assets, integration
with LDAP fills the database of user accounts. Information about users adds context to event analysis,
OR
similarly to information about assets. The user identifier field provides a link to detailed information
about the user, such as when the account was created, groups that include it and when the user last
logged on to the system.
ED
Unlike assets that you can see and edit in the web interface, accounts are not displayed in the
interface and cannot be added manually.
You can use inActiveDirectoryGroup conditions in filters and correlation rules for events that contain
PI
113
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
LDAP integration, like other integrations, is configured in Settings | LDAP server.
OR
You can configure connection to several different servers. For each server, you need to specify the
following:
• Secret — a resource of credentials kind with the user name and password for authentication on
the LDAP server. The user must have permissions to read information about users and groups
ED
in LDAP. In Active Directory, any domain user has these permissions by default
• URL—server address and port, 389 for LDAP and 636 for LDAPS by default
PI
Among other parameters, you can encrypt connections; to do so, create a Secret (of certificate kind)
CO
114
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Event enrichment with the account ID can be configured in the collector only, because a LDAP
enrichment rule differs from other enrichment rules. In the Event enrichment section, there is a
OR
dedicated button: Add enrichment with LDAP data.
• LDAP accounts mapping — name of the domain whose information the collector will use. It is
ED
• LDAP enrichment mapping — configure the mapping rules: which values of event fields to take,
PI
which account attributes to compare with, and which field to populate with the link to the
account
CO
The collector checks values of the UserName and UserID fields and maps them to account
information. If a match is found, the collector adds the SourceAccountID or DestinationAccountID field
with the corresponding identifier to the event.
BE
TO
T
NO
115
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
By default, assets are automatically imported from Kaspersky Security Center every 12 hours; you
can change this schedule if necessary. You can also click the button Import KSC assets to import
OR
them on demand (this will not affect the scheduled import in any way).
You can see imported information via the event interface. This is only possible if the collector enriches
events with the SourceAccountID or DestinationAccountID field. When you view an event, this field
ED
Let’s walk through an example that will require us to use several different enrichment options and
NO
LDAP integration.
116
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Suppose a source sends events that contain usernames, but KUMA cannot associate them with
accounts from Active Directory due to differences in the record format. The analyst would like to see
information about users from Active Directory in events, but this doesn’t work ‘out of the box’, because
BU
the source sends user names in the <Domain Name>\\<Username> format in the
DestinationUserName field. Meanwhile, Active Directory does not use this format for usernames.
RI
The analyst needs to configure enrichment tools to add the DestinationUserID field with the objectSid
value to events. The collector will map this field to an imported account and implicitly enrich the event
with the DestinationAccountID field.
ST
DI
RE
OR
ED
PI
To begin with, we need to split the value of the DestinationUserName field into the domain name and
user name.
CO
Let’s use regular expressions to cut out the left part and supplement “ABC” with “.LAB” so that the
domain name matches the LDAP data. Write the result to the DestinationNtDomain field.
BE
In a similar manner, we’ll use regular expressions to out the right part and convert the value into
lowercase. The result should replace the original field, DestinationUserName.
TO
T
NO
117
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Next, we need to add the user’s SID to the DestinationUserID field of the event. You can do this in the
following way (this solution is maybe not the most elegant, but it is quite efficient):
OR
• Export user names and SIDs to a CSV file
• Use dictionary enrichment in the normalizer, because the normalization stage precedes
ED
requests to external systems, and we will have a field with the user’s SID before LDAP
enrichment
PI
A dictionary is a Kaspersky Unified Monitoring and Analysis Platform resource that stores key:value
pairs. Dictionaries are designed to enrich events with static information. For example, add an
CO
operation description based on its available code. Or supplement a user name with the respective
SID.
• Name
You can compose a dictionary manually or import from a CSV (comma-separated values) file. When
importing, Kaspersky Unified Monitoring and Analysis automatically recognizes the delimiter.
T
NO
118
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Now that the dictionary is ready, we need to configure the normalizer to use it. Dictionaries are stored
in the core service database. Collectors receive dictionaries that are listed in their properties with the
OR
settings.
To enrich events with the user’s SID, you need to add another enrichment element with the following
settings to the normalizer:
ED
• Dictionary — name of the dictionary into which we have imported user names and SIDs from
PI
Active Directory
• Key fields — the field whose value you want to use as a key to search the dictionary for. In this
CO
example, it is the username from the DestinationUserName field (abbreviated and lowercase)
• Target field — the field where you want to write the value from the dictionary that corresponds
to the specified key. In this case, it is DestinationUserID
BE
For the collector to receive the dictionary and start using the new settings, make it reload the settings:
click the respective command on the three dot menu of its service on the service management page.
TO
T
NO
119
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Now, if we look at the normalized events, we will see that:
OR
• The DestinationUserName field contains a simple username in lowercase letters
• The DestinationNtDomain field contains the domain name in all capital letters
• The DestinationAccountID field contains the user identifier from the Kaspersky Unified
Monitoring and Analysis Platform database that opens a card with information about the user
imported from Active Directory
PI
The first three changes result from the enrichment that we configured in the normalizer. The last
change is the result of LDAP enrichment based on the value of the DestinationUserID field.
CO
BE
TO
T
NO
120
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
If LDAP enrichment is configured, response via Active Directory is available in alerts and incidents in
the Related users section, and even in events. The SourceAccountID and DestinationAccountID
OR
fields contain links to account properties.
• Block an account
ED
121
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
KUMA can only have one LDAP connection to one domain. The account used for LDAP queries must
have the appropriate permissions, otherwise an error is displayed.
OR
The slide shows common response-related mistakes, for example, lack of the necessary rights or an
attempt to move an account to a non-existent group.
If the ‘Password never expires’ option is set up for an account, an attempt to reset its password will
ED
return an error. The same will happen if the ‘User cannot change password’ option is enabled.
The Response rules resource has the ‘Response via Active Directory’ rule type. Such a rule works
PI
122
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Kaspersky Threat Lookup is a subscription service. The customer’s analysts can search extensive
Kaspersky Threat Lookup cyberintelligence database for information about files (by hash) and web
OR
resources (by IP or URL). A response to the request includes detailed data about the object, for
example, its geographical distribution, reliability, known attacks related to it (if any), etc.
Typically, the customers’ analysts use the Kaspersky Threat Intelligence Portal web interface for
ED
queries.
Kaspersky Unified Monitoring and Analysis Platform enables them to configure integration with
Kaspersky Threat Lookup through special APIs and search for information about files and web
PI
resources without leaving the KUMA web console, right from the event.
CO
A subscription to Kaspersky Threat Lookup is not included with Kaspersky Unified Monitoring and
Analysis Platform licenses. Customers must purchase a Kaspersky Threat Lookup subscription if they
want to integrate it into KUMA.
BE
TO
T
NO
123
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Integration with Kaspersky Threat Lookup (KTL) is configured in Kaspersky Unified Monitoring and
Analysis Platform web console on the Settings | Kaspersky Threat Lookup page and contains only
OR
two options:
• The secret with credentials for authentication in Kaspersky Threat Intelligence Portal (a
required parameter)
ED
• A proxy server address—specify it if the customer uses a proxy server for connecting to the
internet (an optional parameter)
PI
The address where to send KTL requests is not specified anywhere. It is permanent and coincides
with the address of the web version of Kaspersky Threat Intelligence Portal: https://tip.kaspersky.com
CO
Querying Kaspersky Threat Lookup requires the same credentials as authentication in Kaspersky
Threat Intelligence Portal web console:
• Username
BE
• Password
• Certificate
• Certificate password
TO
Specify all these parameters in a Secret resource of the ktl kind. A certificate for accessing Kaspersky
TIP is supplied in *.pfx format with a password, and you must also specify this password in the secret.
T
124
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• Web only — can use only the web version of Kaspersky TIP
• API only — can only send queries through the Kaspersky TIP API
BU
• Full — can use the web portal and API equally
In the KUMA settings, you must specify a user with API or FULL access.
RI
ST
DI
RE
OR
ED
After you configure integration with Kaspersky Threat Lookup, new capabilities become available in
the event interface. KUMA automatically recognizes lines that contain file hashes, IP addresses and
URLs and turns them into links. Clicking on this link opens either information from the KTL about the
PI
corresponding indicator or, if this indicator has not been previously queried, a pane with the KTL
search settings.
CO
In the search settings, you can select specific information categories. Data categories are different for
different indicator types (hash, IP, URL). Information about the (Trust) Zone is available for all
indicators. Green means that you can trust the object. Red corresponds to dangerous objects. There
BE
can be many entries in a group. For example, the ‘File downloaded from URLs’ group that lists
addresses from which the file with the requested hash has been downloaded may contain multiple
entries. You can limit the number of records in the response.
TO
To query a new attribute, click the Request button. As a result, Kaspersky Unified Monitoring and
Analysis Platform creates and immediately launches a Kaspersky Threat Lookup query task. When
the task completes, clicking on the indicator will open a pane with information about the object from
the KTL instead of the query setup pane.
T
NO
125
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
You can monitor the tasks’ progress in the Task manager. You can only consult the result and restart
the task. If a task fails, hover the mouse over the task status bar to see a brief description of the error.
OR
You cannot see or change any task parameters here.
Responses to KTL requests are saved to a dedicated cache, which then helps display additional
information about objects in events. When you click on a hash or address in an event, KUMA checks
ED
if the cache contains information about that object and if yes, displays it in a special side pane. There
is the date and time when the information was received at the bottom of the card, and if you believe
that the information is outdated, click the Update button to re-send the request.
PI
Information from KTL is not added to events and therefore cannot be used in filters and correlation
conditions. It is only available for context analysis.
CO
126
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Kaspersky CyberTrace is a platform for managing cyberintelligence data. Kaspersky CyberTrace
loads indicators of compromise from a variety of sources and helps SIEM systems find indicators in
OR
the events being processed.
Kaspersky Unified Monitoring and Analysis Platform can interact with CyberTrace in two modes:
• In continuous integration mode, similarly to another SIEM system, i.e. redirect the event stream
ED
Requests are more useful in this case. They help Kaspersky Unified Monitoring and Analysis Platform
find out that some objects in an event are indicators of compromise. In filters and correlation rules,
CO
you can apply TIDetect conditions to events enriched with such requests. That is, you can eventually
receive alerts about events that contain indicators of compromise. Only Kaspersky CyberTrace
enrichment rules are necessary for this.
BE
• Build Kaspersky CyberTrace interface into the KUMA interface, which allows analysts to
manage KUMA and Kaspersky CyberTrace as a single system
TO
127
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Port 9999 is used for enrichment rules in CyberTrace (you can change it in the CyberTrace settings).
Port 443 on the CyberTrace side is used for filling Internal TI and interactions with the CyberTrace
interface.
BU
The KUMA core acts as a proxy when you work with the Kaspersky CyberTrace interface built into the
Kaspersky Unified Monitoring and Analysis Platform interface. The nested interface is available on
RI
TCP port 7222 (while the regular KUMA web interface port is TCP 7220). You cannot change this in
the KUMA interface, because it is specified in the core service startup options on the Linux server.
ST
DI
RE
OR
ED
Integration with Kaspersky CyberTrace is configured in Kaspersky Unified Monitoring and Analysis
PI
Platform web console on the Settings | Kaspersky CyberTrace page and contains the following
options:
CO
• Host — address of the server where the primary Kaspersky CyberTrace service is running
• Port — the port of the CyberTrace web interface (and API port), 443 by default
BE
• Secret — a resource of credentials kind with the user name and password for authentication in
CyberTrace. Permissions of this user in CyberTrace will determine the appearance of the
CyberTrace subinterface in KUMA.
TO
Integration with Kaspersky CyberTrace at the web interface and API levels requires that Multi-user
mode is enabled in Kaspersky CyberTrace. This functionality is available with any commercial
CyberTrace license, but is not available with a free license.
T
If Multi-user mode is not activated, the attempt to configure CyberTrace integration on the KUMA side
will fail. To make sure multi-user mode has been activated, consult Settings | Licensing on the
NO
128
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Kaspersky CyberTrace side.
BU
RI
ST
DI
RE
OR
If you integrate the products successfully, a new Kaspersky CyberTrace section will appear in the
KUMA interface, which will show the full Kaspersky CyberTrace interface with all its capabilities.
When you work with the nested CyberTrace interface, web browser’s requests are forwarded to a
special port 7222/tcp on the KUMA core, and the core component proxies all requests to the original
ED
address of CyberTrace web interface (by default, port 443/tcp of the CyberTrace server).
PI
CO
BE
TO
T
Event enrichment from CyberTrace works as follows. The analyst sets up an enrichment rule in the
NO
129
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
collector and specifies which of the event fields to compare with indicators of compromise in
CyberTrace along with the indicators’ type: Hash, IP or URL.
BU
The collector sends a request to CyberTrace, CyberTrace compares the transmitted attributes with
indicators, and in case of a match, sends the indicator details to KUMA. When the collector receives a
non-empty response, it adds two fields to the event: TI indicator with the value of the matched
RI
indicator and Indicator category with name of the data feed where the indicator was found. You can
use these parameters in filters and correlation rules.
ST
In the event interface, the Indicator category field expands and shows various attributes of the
indicator of compromise: where and when it was detected, what other indicators it is related to, and so
on
DI
There is the TI field in the KUMA data model. This is an internal KUMA field that combines a TI
RE
indicator and Indicator category; use the TI field when searching for events in the storage, in filter
conditions and correlation rules.
OR
ED
PI
CO
BE
• URL — CyberTrace listen address. The default port is 9999. Optionally, you can limit the
number of connections and requests per second in the connection
• Mapping between the event fields and types of indicators to compare. Select a KUMA event
T
field on the left (for example, FileHash) and the respective indicator type on the right (in this
case, hash; for other fields, it can be URL or IP). You can configure comparison of multiple
NO
130
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
event fields with different types of indicators within a single rule
Optionally, you can specify a timeout and a filter if you want to save resources.
BU
When collector processes an event, it generates a separate event to be sent to CyberTrace. For the
mapping shown on the screenshot, the event format will be as follows:
RI
Id=<value of the ID field> | ip=<destinationAddress field value> |
hash=<value of the DeviceCustomString4 field> | url=<value of the
FilePath field> | hash=<value of the FileHash field> |
ST
DI
RE
OR
ED
PI
You can find the connection address (which is specified in the enrichment rule in the URL field, see
the previous screenshot) in the CyberTrace settings in the Settings | Service | Connection settings
CO
Kaspersky CyberTrace supports multitenancy mode, which permits you to configure a dedicated port
for requests of each CyberTrace and KUMA client. For this purpose, create a new tenant for KUMA in
BE
Settings | Tenants, specify the port where CyberTrace accepts requests and set the same port in the
connection on the Kaspersky Unified Monitoring and Analysis Platform side.
TO
T
NO
131
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
When you install Kaspersky CyberTrace, the initial setup wizard starts, which prompts you to select
your SIEM system type. Kaspersky CyberTrace uses different regular expressions to parse events
OR
received from different SIEM systems.
If KUMA is selected in the wizard, CyberTrace will expect events of a strictly defined format;
mismatching events will be discarded.
ED
If another SIEM system is chosen, then most likely standard regular expressions will be used to
extract hashes, IP addresses and URLs. In this case, if you want to set up additional integration with
KUMA, you can create a separate tenant in CyberTrace, which will await events in KUMA format.
PI
If an indicator is detected, in addition to enriching the KUMA event, this indicator will be displayed in
CO
Kaspersky CyberTrace in the Detections section. The respective source event that CyberTrace
received from KUMA will also be shown there.
BE
TO
T
NO
132
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
In addition to the nested web interface, integration with Kaspersky CyberTrace permits sending
indicators from KUMA events to the InternalTI data feed in CyberTrace.
OR
The scenario is as follows:
• When investigating an incident, the analyst decides that some of the KUMA events are related
to the incident and contain characteristic indicators of compromise: file hashes, IP or URLs of
ED
dangerous servers
• The analyst clicks the indicator in the KUMA event and selects the command Add to Internal
PI
TI of CyberTrace
• KUMA sends the selected value to CyberTrace, where it is added to the InternalTI data feed (a
CO
• If CyberTrace enrichment and the corresponding correlation rules are configured, KUMA will
generate alerts for new events that contain the published indicators
BE
KUMA automatically recognizes hashes, IP addresses and URLs in events using built-in (non-
configurable) regular expressions. After you configure integration with CyberTrace, all hashes, IP and
URLs in any fields of KUMA events (even if they constitute only a part of the field value) become links
that open a menu with the command to send the indicator to CyberTrace.
TO
On the CyberTrace side, you can find the transmitted indicators in the Indicators section. Filter the
table: select InternalTI in the Suppliers column. Attributes of such an indicator will include a link to the
initial event in Kaspersky Unified Monitoring and Analysis, from which the analyst sent the indicator to
T
CyberTrace.
NO
133
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
4.5. Kaspersky Endpoint Detection and Response
BU
RI
ST
DI
RE
OR
Integration of Kaspersky Unified Monitoring and Analysis Platform with Kaspersky Endpoint Detection
and Response allows you to perform response tasks on assets using Kaspersky Endpoint Agent.
It is assumed that the Kaspersky Endpoint Detection and Response solution has already been
deployed on the customer’s network. Detailed information about this is provided in course KL 025:
ED
During the integration, the KUMA core connects to the Central Node server and registers as an
PI
external system for API requests. Integration is only possible with a Kaspersky Symphony XDR
license.
CO
On the Kaspersky Unified Monitoring and Analysis Platform side, specify the Central Node connection
address and port, as well as the certificate that will be used for secure connections. You need to
BE
create a Secret resource of kata/edr kind for this purpose. There is the Download icon in such a
resource; click it to generate an archive with a certificate and a private key. Unpack this archive and
add the contents to the same secret.
TO
T
NO
134
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
When you save the connection, Kaspersky Unified Monitoring and Analysis Platform sends an API
request to the Central Node to register as an external system. The Centra Node administrator must
OR
authorize the KUMA core service.
KUMA sends a request to the kaspersky/kata/response_api docker container on the Central Node. If
this container is not running for some reason, an error will be displayed in the integration window
ED
Upon successful integration with Kaspersky Endpoint Detection and Response, a new KEDR
NO
response button appears in the properties of assets where Kaspersky Endpoint Agent is installed.
135
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
The following types of response are possible:
• Enable network isolation — Kaspersky Endpoint Agent uses the Windows packet filter to
BU
isolate the computer from the network. Network isolation blocks all incoming and outgoing
packets and connections except for those for which exclusions are specified
RI
• Add prevention rule — create a rule to block the file by checksum (MD5 or SHA256), on all
computers or on the current one
ST
• Delete prevention rule
DI
execute a command, specify:
◦ The executable file to run on the computer. The file must be located on the target
RE
machine. The task does not permit selecting a file on your computer, copying it to the
target computer and running it there
Kaspersky Automated Security Awareness Platform is an online training platform that helps users
learn about information security rules and cybersecurity threats they may encounter in real life, and
T
136
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
The documentation is available at https://support.kaspersky.com/ASAP/1.0/en-US/204775.htm
You can work with this platform via API. First, generate a token with the necessary permissions.
BU
The following permissions are sufficient for integration with KUMA:
RI
• Get reports
ST
However, you can only generate one token; and if you intend to use API in several different systems,
creating a single token with maximal permissions might make sense.
DI
To configure integration in KUMA, you will need to copy the token and Open API URL.
RE
OR
ED
PI
CO
On the KUMA side, integration with Kaspersky ASAP is configured in the Settings | Kaspersky
BE
Automated Security Awareness Platform. Create a Secret resource, select the Token type and
copy the token from Kaspersky ASAP. In addition to the token, you must specify the address where
KUMA will send API requests to.
TO
Also, specify an email address where reports will be sent when users complete training modules.
Response via Kaspersky ASAP is available in the properties of user accounts that are displayed in
alerts and incidents in the Related users section.
T
First, KUMA checks whether the user’s email address is registered with Kaspersky ASAP, and if so,
NO
137
Chapter 4. Integrations KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
displays information from Kaspersky ASAP: what group this user belongs to, which courses has
assigned, which of them are completed and which are in progress.
BU
Training modules are assigned to groups in Kaspersky ASAP. An administrator creates a group,
assigns the necessary training modules to it (topics and levels of complexity may vary), adds user
accounts to the group, and starts the training process.
RI
As part of threat response, KUMA can move a user to a group with a different training program.
ST
If a group is not available, it means that training has already started and a new user cannot be added.
You can either move the user to an available group or create a new group with the desired learning
path.
DI
In any case, training can only be started in the Kaspersky ASAP platform, while KUMA helps track the
progress.
RE
OR
ED
PI
CO
BE
TO
T
NO
138
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Chapter 5. Correlation and work with events
5.1. Working with events
BU
In this section, we will study the tools that you can use in Kaspersky Unified Monitoring and Analysis
Platform to work with events that have already been saved into the storage.
RI
ST
DI
RE
OR
ED
A collector outputs normalized base or aggregated events and sends them to the correlator and
storage. Correlation events output by a correlator and audit events generated by the core service
(kuma-core) are also saved into the storage. An analyst can find any events in the storage and
PI
• Lollipop chart that displays distribution of the detected events over time
BE
• Table with found events; you can customize its columns. You can select to display any set of
event fields in the table. Since the storage contains normalized events, the list of possible fields
is limited to the KUMA data model (CEF and internal KUMA fields) Above the search bar, there
TO
• Over which period to search (you can specify an arbitrary interval). The same period is
T
139
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• Name of the storage to query. You can search through several storages simultaneously. Note
that grouping queries, retroscan, and export to TSV are not supported when you search across
multiple clusters.
BU
You can save the parameters for future reuse.
You can export the displayed events to TSV (tab separated value) format.
RI
ST
DI
RE
OR
ED
To see the full contents of an event, select it in the table. Details are displayed in the side pane. An
event may contain links to additional context:
PI
140
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
The histogram shows the distribution of the found events over time and their number within each
interval.
OR
You can interactively select an interval on the timeline with the mouse and the Show events button
will appear. When you click it, the web console will automatically narrow down the interval and display
the respective events.
ED
PI
CO
BE
TO
Sometimes, for troubleshooting or analysis, you need to limit the search to events of a particular
T
collector. Each event has an internal ServiceID field that contains the identifier of the KUMA service
NO
that created the event. Since base events are created by a collector, their ServiceID contains the
141
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
collector’s identifier. This field allows you to find all events output by a collector.
The Kaspersky Unified Monitoring and Analysis Platform web interface provides a convenient way to
BU
get a list of events of a particular service (collector or correlator) in a couple of clicks instead of
manually setting up such a query. To do so, select the service in the list of services (Resources |
Active services) and click Go to events. This action opens a new browser tab with the Events
RI
section where the search by the ServiceID of the corresponding service is already configured. The
analyst only needs to run the query or enable automatic refreshment for the results.
ST
DI
RE
OR
ED
An event search query is an SQL query that the core sends to the ClickHouse storage. ClickHouse
PI
supports distributed query processing on all cluster nodes concurrently (if the storage is a multi-shard
cluster) and returns search results to the core that displays them in the web interface.
CO
To fine-tune the query, you do not have to know SQL syntax (although this knowledge would be very
useful). The KUMA web interface provides graphical tools for creating and modifying SQL queries. In
particular, you can click on any field value in the table of found events and add that value to the
BE
142
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
The pane with detailed description of an event provides the same capability. Instead of clicking on the
value, hover the mouse over the field until the ‘plus’ and ‘minus’ buttons appear. The ‘plus’ button
OR
adds the field value as a condition to the query. The ‘minus’ button adds the selected value as an
exception.
ED
PI
CO
BE
TO
After you receive a list of events, you often need to group them in order to isolate a cybersecurity
incident. KUMA can group events by one or more fields for the resulting list of events.
T
To group events, you no longer need to manually adjust the query text — you can click on the field in
NO
the Events section and select + Add Group BY in the context menu. You can sequentially select
143
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
multiple fields for grouping; the fields will be automatically added to the query string. After you’
selected the necessary fields, click Run query. As a result, events will be grouped by the specified
fields. Found groups will be displayed in the Groups area. Display is available in table and card form.
BU
You can switch between display modes. You can also export groups and events in TSV format.
You can exclude a group from the filter. The query will change automatically.
RI
ST
DI
RE
OR
ED
If you want to return to the original query, click Return to initial query. You can switch between the
groups and view their contents. You can remove a group from the grouping, thereby going back a
step. Statistics, retroscan by group and export to TSV are also available.
PI
If you want the result of grouping to be time-independent (because events are constantly arriving),
CO
you can fix the relative interval and apply it as an absolute interval so that events of interest do not
disappear from the query.
BE
TO
T
NO
144
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Click the icon to the left of the search bar to open SQL builder, where you can edit the query in GUI.
OR
In a query, you can specify:
• WHERE — conditions that the events must meet (in the <event field> <operator> <value>
ED
format). Available operators depend on the type of data that the selected field contains
• ORDER BY — by which field(s) to sort the results (by default, not to sort, which in reality
means sorting by time when the event was added to the database)
PI
All these parameters are standard SQL query directives; search capabilities are limited to SQL query
syntax. In particular, the wildcard character for an arbitrary substring is %, not *.
Previously saved search parameters are available in the extended query configuration interface: click
BE
the Saved searches button. Users with the Analyst role can see only their own saved queries. The
administrator can see saved searches of all users and can delete them.
TO
T
NO
145
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
You can display statistics on the event search page. Statistics show the distribution of values for each
field within the found events. An analyst can use statistics to quickly filter out the most numerous
OR
events and focus on rare events.
Statistics are displayed in a side pane. To open the statistics pane, click the three dots in the upper
right corner and select the respective command in the menu. This menu also contains a command for
ED
When working with events in KUMA, you can save your custom sets of event fields.
NO
146
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
This is convenient because different sources usually have specific fields that contain useful
information.
BU
RI
ST
DI
RE
OR
For example, let’s consider EDR telemetry events that KATA receives from KEA installed on the hosts.
Telemetry is stored in the Kafka database, there is a special connector for it, and a normalizer has
been added.
ED
You can configure a custom view with the fields that deserve attention in these events. In the picture,
we’ve selected 8 fields and arranged them in the necessary order:
PI
• Timestamp
• DeviceHostName
CO
• SourceUserName
• Name
• DeviceAction
BE
• DestinationAddress
• Technique
TO
• Tactic
If you click the gear icon and then ‘Save current preset’, you will be able to instantly apply this view
when working with events of this collector.
T
It probably makes sense to create a set of fields for each source: for Windows events, for KSC, for
NO
147
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
netflow, etc.
5.2. Correlation
BU
The next large topic is correlation. In this section, we’ll study how to find useful information that may
indicate cybersecurity incidents in the data that flows into the correlator. Let’s look at various tools that
Kaspersky Unified Monitoring and Analysis Platform uses to detect correlations.
RI
ST
DI
RE
OR
ED
Correlation rules are another kind of Kaspersky Unified Monitoring and Analysis Platform resources.
They are used in the settings of the correlator service, but you can create and modify them
PI
about a hundred correlation rules and a description document are also provided. Importing rules into
KUMA takes a few seconds.
There are three types of correlation rules in Kaspersky Unified Monitoring and Analysis Platform:
BE
• Simple correlation rules analyze each event individually and are applied if an event meets the
specified conditions. For example, a simple rule can be applied when an event about a
detected network attack comes from Kaspersky Security Center
TO
• Standard correlation rules analyze combinations of events and can respond to accumulation of
specific events or to events that arrive in a particular order. Also, standard rules can compare
events. Examples of standard rules:
T
148
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
◦ 30 failed brute-force attempts followed by a successful logon (a successful password
attack)
◦ Kaspersky Security Center sent a threat detection event and then there were no threat
BU
neutralization events within an hour (an unprocessed threat)
• Operational correlation rules are similar to simple rules, but they fill so-called active lists with
RI
values from events instead of creating correlation events.
For example, you can make an operational rule that will fill the active list with all dangerous
ST
links intercepted in the mail. And then you can create a simple rule that will be applied when a
computer accesses one of these addresses.
DI
A combination of these rules will detect connection to a dangerous address that has been sent
by email, even if a long time has elapsed between the message arrival and opening the link
RE
Simple correlation rule
OR
ED
PI
CO
BE
• General settings that determine the rule type, its priority (for alerts), propagated fields and
TO
• Selectors, i.e. conditions for selecting events and applying the rule based on the selected
events
T
• Actions: enrichment for correlation events, active list filling, where to send correlation events
and whether to create alerts if the conditions are met
NO
149
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
A simple rule always contains one selector. A simple rule is applied to each event that matches
the specified condition. For example, when groups with high privileges are modified or when you need
to convert a KATA detection into an alert in KUMA.
BU
A simple rule is designed for alerts that should be triggered when even a single event that meets
specific conditions is detected. Therefore, a simple rule contains only one selector that sets conditions
RI
for this rule.
Selector is a filter. Therefore, in the selector settings, you can select a ready preconfigured filter from
ST
among the available resources. Alternatively, you can configure a new inline filter. In the selector
settings, you can use other filters within the nested conditions, similarly to other filters. Meaning, you
can create a complex condition: (event field value equals X) or (conditions of the filter Y are met).
DI
RE
OR
ED
PI
CO
A simple rule is applied every time when an event that matches the selector’s filter arrives. The
analyst can configure a rule to trigger one or more of the following actions:
BE
• Output — create a correlation event that will be sent to the specified destinations (typically, to
the storage) and for which an alert will be generated (or supplemented)
• Loop — forward the correlation event to the input of the same correlator for recursive
processing
TO
• Update active lists — add or remove an entry to/from an active list based on the contents of the
event fields
• Enrich the correlation event using a dictionary, initial event data, constant or template, without
T
requests to external systems (i.e., the same enrichment as in a normalizer in a collector). You
NO
150
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
can set up enrichment in the correlator just like in a collector
• Move an asset to a category (or delete from a category). You can only select a category with
Reactive filling
BU
RI
ST
DI
RE
OR
General rule settings include its kind (simple, standard, operational), priority and additional settings
that depend on the rule kind.
ED
Only those rules that create correlation events have priority: simple and standard, but not operational.
Alerts are generated (or supplemented) based on correlation events. The rule priority determines the
PI
priority of the respective alert: Low, Medium, High or Critical. An analyst or administrator can change
alert priority when investigating an incident
CO
In a simple rule, the Propagated fields parameter simply lists which fields of the base event the
correlator will copy to the correlation event when the rule is applied. This parameter is required, and
you must specify at least one field.
BE
For example, if a simple rule is triggered by events about network attacks, it is logical to list the fields
with information that characterize the attack in the Propagated fields: the attacker’s address, the
victim’s address and the type of attack. The analyst should check which fields of the base events
contain this information and list them as ‘Propagated fields’.
TO
In case of a simple rule, a correlation event will contain a link to the base event, and the analyst can
always find details about the incident even if field copying via ‘Propagated fields’ is not configured.
T
But if analysts plan to create other rules to be applied not only to base events but also to correlation
NO
events, the fields copied to the correlation event will determine the conditions that the analyst will be
151
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
able to use for it.
BU
RI
ST
DI
RE
OR
When such a rule is applied, correlation events will be saved to the storage. You can find them by the
Correlated value of the Type field, or, for example, by the ServiceID of the correlator service.
A correlation event card has the Detailed view button that opens the event’s details, in particular:
ED
• Base events that matched the rule (in case of a simple rule, there is one base event)
A correlation event is not the same as an alert. We will tell you about alerts after all the correlation
CO
rules. However, the detailed view of a correlation event resembles an alert very much.
152
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Let us remind you that simple correlation rules react only to individual events, and if you want to find
relationships between several events or a sequence of events, you need to use standard correlation
OR
rules.
Let’s take a simple example: the analyst believes that a single event of accessing a dangerous URL
from a network computer does not require close attention, but would like to be informed about
ED
numerous connections during a short period of time. This example can have a few variations:
• Simply a lot of connections to dangerous URLs: from different computers and to different URLs
PI
• A lot of connections from the same computer to the same dangerous URL
All these situations can be described by standard correlation rules in Kaspersky Unified Monitoring
and Analysis Platform.
BE
TO
T
NO
153
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Let’s talk about variations of this example. What if the analyst does not care where connections to a
dangerous address are established from: the same computer or different ones? What settings must
OR
the rule have in order to be triggered after three connections to the same dangerous address from any
computer?
Only RequestUrl must be specified for the identical fields. In this case, events will be grouped only by
ED
the value of the dangerous address. In other words, the correlator will react after the threshold (3) is
exceeded for the events with the same RequestUrl field values, i.e., connections to the same
dangerous address. There are no other limitations in the correlator (except that these are KATA
PI
events generated by the url_web or ids technology), which means that connections from any
computers are taken into account.
CO
BE
TO
T
NO
154
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Let’s modify the conditions: make the rule detect three connections to the same dangerous address
from the same computer. To be notified when three or more connections to a dangerous address are
OR
established in 30 seconds from the same computer, the analyst needs to configure a correlation rule
with the following general parameters:
• Kind: Standard
ED
• Threshold: 3
• Pick out only events that match the selector filter: url_web events from the KATA product
• Accumulate events in a bucket for 30 seconds from the moment when the bucket was created
TO
(that is, from the moment when the first event was added to the bucket)
155
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Standard rules are more complex and can be used in very different ways, depending on the scenario.
To better understand them, let’s look at our examples from the point of view of the correlator logic.
OR
Note an important principle of standard rules. Standard rules organize all incoming events into groups
(so-called buckets) by values of Identical fields, and then process each group independently. The
criteria are checked separately within each bucket. Therefore, a rule is always applied to a bucket
ED
Values of the fields listed as Identical fields will be copied to the correlation event (similar to the
Propagated fields parameter in a simple rule).
PI
CO
BE
TO
T
NO
156
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Now, let’s focus on the last situation where many connections are detected from the same computer
to the same dangerous URL.
OR
In order to single out these situations, you need to specify the fields that contain the computer’s
address and a dangerous URL in the Identical fields parameter. In case of Kaspersky Anti Targeted
Attack Platform events, these are the SourceAddress and RequestUrl fields. Accordingly, a correlation
ED
rule with these settings will create a separate bucket for each combination of SourceAddress and
RequestUrl values and apply the ‘many’ criterion (3 in our case, which is defined among other rule
settings) to each group separately.
PI
CO
BE
TO
T
NO
157
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
The ‘many’ criterion consists of two parts: how many events and during what period. The period is set
by the Window parameter in the general settings of a standard rule.
BU
In a more generalized sense, the Window parameter determines the bucket’s lifetime. It works as
follows:
RI
• Selectors determine which events will be grouped (if an event does not match any selector, it
will not fall into any bucket)
ST
• If an event matches a selector and there is already a bucket with the same set of identical field
values as in this event, it goes there
DI
• If an event matches a selector, but its identical field values do not match any bucket, a new
bucket is created with the lifetime specified by the Window parameter
RE
• As soon as a bucket’s lifetime ends, it is deleted
• If a new event with a set of identical field values matching a bucket that no longer exists arrives
later, a new bucket is created and the lifetime countdown starts again
OR
Meaning, a bucket accumulates events during its lifetime (or observation window), then gets deleted
and events can accumulate anew. This occurs concurrently and independently for each combination
of identical field values.
ED
PI
CO
BE
TO
Let’s assume that in our example about many connections to the same dangerous address from the
T
same computer, ‘many’ means 3 or more connections in 30 seconds. The Window parameter in the
NO
general settings of the rule specifies ‘30 seconds’. ‘3 or more’ is defined by the Selector threshold in
158
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
the selector settings.
Also, selector has a filter to select events. In this case, we do not intend to simply count all events that
BU
have the SourceAddress and RequestUrl fields. We are interested in events about connecting to a
dangerous address. Such events are generated, for example, by Kaspersky Anti Targeted Attack
Platform. Therefore, let’s configure the selector to pick out Kaspersky Anti Targeted Attack Platform
RI
events about dangerous connections (in this case, url_web events).
The rule will be applied if a bucket accumulates the number of events specified in the Selector
ST
threshold parameter during its lifetime. Later, we will look at examples where there may be more than
one selector and there are other conditions in addition to the thresholds.
DI
RE
OR
ED
PI
CO
What if a bucket accumulates much more events than the selector threshold prescribes during its
lifetime? In the Actions section, there are several subsections where the analyst has a choice of
identical output options (send to storage, send back to the correlator, etc.):
BE
• On first threshold — create a correlation event only after the threshold is exceeded for the first
time and ignore further accumulations during the bucket’s lifetime. For example, if a bucket
accumulates 10 events in 30 seconds while its threshold is 3, there will be only one correlation
event after the third accumulated event
TO
• On every threshold — create a correlation event each time when the threshold is exceeded
during the bucket’s lifetime. That is, if a bucket accumulates 10 events and the threshold is 3, 3
correlation events will be created: after the 3rd, 6th and 9th event gets in the bucket
T
• On subsequent threshold — create a correlation event at all thresholds exceeds except the first
NO
one, i.e. after the 6th, 9th, etc. events if the threshold is 3.
159
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
What is the purpose of this option if we have On every threshold and skipping the first
threshold doesn’t seem to make any practical sense? To differently react to the first and
subsequent thresholds. For example, you can configure to send only the first correlation event
BU
to the correlator input, but add all correlation events to the storage. Or add only data from the
first event to an active list and skip other thresholds, since there are no new artifacts for the list
in subsequent events
RI
• On timeout — standard rules also allow you to configure what to do when the bucket lifetime is
over. This action is only used together with the Recovery option in the selector settings; we will
ST
tell you about it later.
DI
RE
OR
ED
PI
Let’s further complicate the example and proceed with studying correlation rule settings. There is the
CO
Unique fields parameter in the General settings of a standard rule. It is optional and makes a bucket
count only events with unique values of the selected fields.
When events are added to a bucket, the rule will compare the value of the unique fields of the new
BE
event with the values of the unique fields of the existing events within the bucket. If one of the events
in the bucket already has the same combination of the unique fields as a new event, the new event is
discarded and not added to the bucket.
TO
Unique fields allow you to implement the following scenario: suppose you do not consider 3
connections from the same computer (or even two different computers) to a dangerous address in 30
seconds to be a big problem. However, you would like to receive alerts if 3 different computers
connect to the same dangerous address within 30 seconds.
T
NO
To achieve this, specify SourceAddress for the Unique fields parameter. Buckets will still count
160
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
events of connecting to a dangerous address, but events will only be added to the bucket if they
contain a new computer address in SourceAddress. And the rule will only be applied if a bucket
accumulates 3 events with different SourceAddress values.
BU
RI
ST
DI
RE
OR
You can configure several selectors within a standard rule. This permits accumulating different types
of events (in the broad sense) in a bucket, and allows the rule to be applied not only when a certain
ED
number of similar events are detected, but also when a certain combination of related but different
events is accumulated.
For example, you can create a rule that will be applied if 50 failed password bruteforce attempts are
PI
• An event selector with the "failed login attempt: invalid password" condition (the specific
condition will depend on which system the events came from and which fields contain the
necessary information) and the threshold of 50
• An event selector with the "successful login attempt" condition and threshold 1
BE
In general, a rule with multiple selectors is applied when thresholds are exceeded for all selectors.
T
NO
161
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
In the previous example with a password bruteforce, the rule will be applied regardless of the order of
events. Even if there was a successful logon first and then 50 failed attempts. This is also suspicious,
OR
but does not mean that there was a successful bruteforce attack. A successful password bruteforce
assumes that a successful logon followed numerous failed attempts.
To add such a condition to a rule, you need to configure the Order by parameter that allows you to
ED
compare timestamps of different events. In particular, you can compare the timestamp of a successful
logon event with the timestamps of unsuccessful attempts.
In general, if the Order by parameter is enabled, the rule first accumulates events in different
PI
selectors until all of them reach their thresholds in the bucket. When all thresholds are reached, the
Order by parameter checks timestamps in the selectors. Order by uses timestamps as a condition,
CO
meaning, Order by is the name of the field from which the timestamp is taken. If Selector 1 reaches
the threshold before Selector 2, the rule is triggered. To change the order, swap selectors (drug-n-
drop), because the Order by parameter is based on the order of selectors.
BE
Since a bucket may contain multiple events from each selector, the question arises: from which
events will the Order by parameter take field values for comparing? The answer is: from the first
event of each selector.
TO
T
NO
162
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Now, let’s return to the scenario when a rule is triggered at the end of the group’s lifetime — the On
timeout action. On timeout actions are only used if the rule has a selector with the Recovery option
OR
enabled.
Let’s look at an example. Protection solutions successfully neutralize most of the malicious objects
detected on the network, which is of little interest. But analysts would like to receive alerts about those
ED
rare cases when a dangerous object was detected but the protection solution has failed to delete it.
How can you configure this in KUMA?
If an object has been processed successfully, a detection event will be followed by a disinfection or
PI
deletion event. If an object has failed to be neutralized, there will be no disinfection or deletion event
after the detection event. You can use this difference to configure the rule.
CO
• Identical fields — threat identifier (or file name if the protection application does not assign
BE
• Window — 1 hour
• Second selector — ‘dangerous object disinfected’ or ‘dangerous object removed’ event with
threshold 1 and the Recovery checkbox selected.
‘Recovery’ means that if the respective selector has reached its threshold by the moment of
T
163
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• Action — On timeout, so that the conditions for applying the rule are checked only after the
bucket’s lifetime expires
BU
Such a rule is applied if there is no disinfection event (no recovery selector events) within an hour
(observation window) after a dangerous object is detected (first selector). The rule is applied when the
lifetime (observation window) of the bucket created when an object is detected expires.
RI
You can use recovery selectors not only with the On timeout action. But On timeout actions only
work if the rule has a selector with the Recovery flag.
ST
Variables
DI
RE
OR
ED
PI
CO
Values of event fields, active lists or dictionaries may be not enough to implement some cybersecurity
scenarios.
Variables may come in handy here. They contain a specific function whose result you can use in
correlators in Kaspersky Unified Monitoring and Analysis Platform.
BE
There are several types of functions that you can call in variables:
• Mathematical operations
T
164
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
You can use the result:
BU
• When working with active lists and tables
RI
• In correlation rules, when looking for Identical and Unique fields
ST
• Global variables are declared at the correlator level and are available in any correlation rule.
The same variable can take different values in different selectors of the same rule, depending
DI
on the filter conditions
• Local variables are declared at the level of selectors in the correlation rules
RE
OR
ED
PI
CO
For example, you want to pay special attention to cases when the KATA IDS technology detects
BE
something on a weekend.
You can use the extract_from_timestamp function, which allows you to represent time information in
the format of years, months, days, hours, minutes, seconds, or days of the week. Step-by-step
TO
• Declare the weekday variable with this function and pass the value of the DeviceReceiptTime
field and time format as a parameter. Possible options are: y, M, d, h, m, s, wd.
T
extract_from_timestamp(DeviceReceiptTime, ‘wd’)
NO
165
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• In the selector filter, specify the conditions for the KATA product and IDS technology, and
another condition if the variable value is Saturday or Sunday. When referencing the variable,
type $ before its name.
BU
• To display the value of a variable in a correlation event:
RI
◦ Add the variable to an enrichment rule that will write its value to a field of the correlation
event
ST
You can use variables in standard correlation rules to compare values of different fields in different
selectors. This is demonstrated in one of our labs.
DI
RE
OR
ED
PI
CO
Here is the list of functions that you can call in variables in Kaspersky Unified Monitoring and Analysis
Platform.
The syntax for declaring various variables is described in detail in the online help at
BE
https://support.kaspersky.com/help/KUMA/3.2/en-US/234740.htm
166
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• append — adds characters to the end of the string
BU
• substring — allows you to cut out a substring from a string
• index_of — returns the first position of a character or substring in a string; the index is zero-
based
RI
• last_index_of — returns the last position of a character or substring in a string; the index is
zero-based
ST
• tr — truncates the string
DI
in a string
• regexp_capture — allows you to get data that matches a regular expression from the source
RE
string
• extract_from_timestamp — allows you to get information about time in the form of year, month,
CO
• truncate_timestamp — allows you to round down time and then convert it into epoch format.
Time rounding options are 1s, 1m, 1h, 24h
• time_diff — allows you to calculate the time interval between two timestamps in epoch format
TO
• Round
T
• Ceil — round up
NO
167
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• Floor — round down
BU
• Pow — exponentiate
RI
• active_list — gets information about a value in the specified column from AcliveList
ST
active_list('ActiveList,'Score',RequestUrl)
DI
context_table('tbl1', 'list_field1', 'key1', 'key1_val')
RE
• dict — gets information about the value that corresponds to the specified key
dict('exampleDictionary',SourceAddress)
OR
• table_dict — gets information about a value in the specified column
table_dict('TableDict','SID',SourceUserName)
ED
168
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
An active list is a list in the memory of a correlator that accumulates data from events to be used in
comparison conditions of correlation rules. Lists help identify patterns over long periods of time.
BU
For example, an analyst would like to receive alerts if a connection to a dangerous URL that has
previously been encountered in email is detected in the organization’s web traffic. This combination
may indicate a successful attack, whereas just messages with dangerous links on the one hand and
RI
connections to dangerous addresses on the other hand happen quite often and do not imply a serious
incident.
ST
To sort these situations, you need two selectors and the Order by parameter:
• The first selector will pick out ‘dangerous URL detection in email’ events with threshold 1
DI
• The second selector will pick out ‘dangerous URL detection in web traffic’ events with
threshold 1
RE
• URL will be the grouping field
• The Order by parameter will compare timestamps of events and check if the web request was
logged after the email was received
OR
This rule will work, but what Window value to specify in it? You can specify an hour, but then you won’t
be aware of incidents when a user clicks a link in a yesterday’s email or clicks a link from a Friday’s
email on Monday. You can specify 7 days, but this will dramatically increase requirements for the
ED
correlator’s memory because all buckets are stored there. With a week’s lifetime, the correlator will
have to store a huge number of buckets in its memory.
Instead, you can adopt a different approach: configure a rule to fill in a list with addresses found in the
PI
mail, and another rule to check if a dangerous address found in web traffic matches a value in the list
filled from email. This way, the correlator will store only the list of addresses in the memory instead of
CO
Active lists are stored in the correlator memory, but are regularly cached to disk; this way, a list will not
be lost if the service restarts or malfunctions. If several correlator services use the same active list
BE
169
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
To use an active list in the correlator, create it as a resource first. This resource has only a few
settings:
OR
• List name
• The lifetime of entries in the list (an optional parameter). If you do not specify it, entries will live
indefinitely long in the list. Whether this is justified depends on what data is stored in the list.
ED
PI
CO
BE
TO
Correlation rules fill active lists. The Actions tab contains the Active lists update area in addition to
T
the Output and Loop actions, where you can specify which lists to fill with what values from the
NO
170
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
correlation event when applying the rule.
A single rule can fill multiple lists or perform multiple operations on a single list. The following
BU
operations are available:
RI
• del — remove an entry from the list
• get — enrich the correlation event with data from the list (we will provide an example later)
ST
• sum — add a constant, the value of a correlation event field, or the value of a local variable to
the value of a field from the active list
DI
Let’s start by filling a list. In the properties of the set command, specify:
• Key fields — values of these fields will be the keys of the list’s entries. All entries in a list have
RE
a table structure (the Key column and its attributes); in the conditions of correlation rules, you
can only match events against keys from a list. A key is the combination of the values of all the
listed fields. You will be able to compare only with the whole key rather than with a part of it
OR
• Mapping defines the key attributes. Every attribute has a name (arbitrary) and a value. You can
either take an attribute’s value from an event field or set it as a constant. You can use attributes
to enrich events and for correlation conditions. There must be at least one attribute
ED
If a key exists already, a set operation will overwrite its attributes with the values from the fields of the
new event.
The del operation has only the Key fields parameter; it deletes the record with the corresponding key.
PI
CO
BE
TO
T
NO
171
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Any rule can fill a list. However, simple and standard rules always create correlation events. Alert
creation can be disabled. To silently fill a list without creating correlation events, use operational rules.
OR
Operational rules are designed for filling active lists and context tables (we will talk about them later).
An operational rule has the following settings:
• A selector without a threshold. It defines conditions for events whose fields will be added to the
ED
list
• The action (update the specified active list) with the trigger On every event; names of the key
PI
fields for the list and the fields from which the context will be taken are also specified here
A selector without a threshold means that operating rules react to individual events, i.e. behave like
CO
simple rules.
Only set, delete and sum operations are available in an operational rule. The get operation does not
make sense here because it enriches correlation events, and an operational rule does not create such
BE
events.
TO
T
NO
172
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
To make correlator use a list, it is enough to create rules that fill an active list, and the correlator will
automatically create it in the memory.
OR
Since active lists reside in the correlator’s memory, to view their contents, you need to open the list of
Active services, select the Correlator service and click the button Go to active lists.
ED
PI
CO
BE
TO
The Go to active lists command displays all active lists of the correlator, the number of entries in them,
the list size and the path to its file on the disk (where the list is cached). An analyst can export, import
T
or clear a list.
NO
173
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
The contents are exported in JSON format. You can import CSV, TSV and JSON.
An analyst can also display the contents of a list to consult its entries, find out when they were created
BU
or updated and when their lifetime expires if it is configured. An analyst can manually delete and add
(but not edit) entries.
RI
ST
DI
RE
OR
ED
To access the contents of an active list, you can use the following methods in a correlation rule
selector:
PI
• Key fields of the event that you use to check if the list contains such a record
Values of the event’s key fields are compared only with the keys of the list’s entries. Attributes
BE
• Key fields of the event that you use to check if the list contains such a record
• Context of the record, i.e. you can check not only if an URL is present in the active list, but
also, for example, whether its context includes the User field with the [email protected] value
T
NO
174
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
You can compare contents of two active lists in a similar manner; i.e. there can be an active list
in the left and right operands at the same time.
BU
• A variable with the active_list function
RI
ST
DI
RE
OR
You can use attributes of an active list’s entries to enrich correlation events. For instance, in our
example with connecting to an emailed dangerous address, you can add the name of the message
ED
recipient to the correlation event. For this purpose, you need to configure the operational rule to save
it as an attribute in the active list. Then in a simple correlation rule on the Actions tab, select to
perform the get operation on the active list and write the contents of the respective entry attribute from
PI
175
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Context tables are an evolution of the concept of active lists. They perform similar tasks and have
similar functionality. In general, the approach to working with them is the same. Context tables, unlike
OR
active lists, have a more strict and ordered structure. In this sense, they are much more like database
tables. Fields in context tables are typed.
A context table (as well as an active list) can be used in different correlators. In this case, a separate
ED
context table entity is created for each correlator. Thus, the contents of the context tables used by
different correlators are different, even if the ID and name of the context tables are the same. Context
tables let you work with data arrays, for example, a context list field can contain an array of IP
PI
You can add, edit, delete, import and export records in a correlator context table.
CO
When a record is deleted from a context table after its lifetime expires, a service event is created in
the correlator. These events only exist in the correlators. They are not forwarded to other destinations.
Service events are sent for processing by the correlation rules of the correlator where the context
BE
table operates. You can configure correlation rules to monitor these events; this can help you process
security events and identify threats.
Context tables can be used in correlation rules. Here, too, everything is very similar to active lists,
TO
except that one more additional operation can be performed with a context table: merge. This
operation lets you add the value of a field from a correlation event, a local variable or a constant to the
existing value of a field in the context table.
T
NO
176
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Retrospective scanning
BU
RI
ST
DI
RE
Typically, a correlator only works with real-time events that it receives from collectors.
OR
But sometimes, you need to apply correlation rules to historical events. Retrospective scanning
serves this purpose. The Retroscan command is available on the three-dot menu in the upper right
corner of the event search page.
ED
The Retroscan command creates a retroscan task, where the analyst configures:
PI
• Name of the correlator service that will apply rules to historical events
• Whether to perform incident responses configured for the correlator (responses will be
described later in our course)
BE
The analyst does not explicitly configure which events to retroscan. Instead, the task uses the current
search settings:
• Timespan
177
Chapter 5. Correlation and work with events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• The core queries the storage
BU
• The core forwards the events to the correlator configured in the task and specifies which rules
to apply
The created task appears on the Task manager page, where the analyst can monitor its progress.
RI
When the task completes, you can find its correlation events by the Go to Events command from its
three-dot menu. Correlation events created by retrospective scanning have an additional ReplayID
ST
field that stores the unique identifier of retroscanning.
You can re-run a retroscan task using its three-dot menu. The new correlation events will have a
DI
different ReplayID.
Retroscan is also useful when debugging correlation rules. To test a rule, you can run it in Retroscan
RE
mode on the corresponding historical events instead of reproducing incidents in real time.
OR
ED
PI
CO
BE
TO
T
NO
178
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Chapter 6. Response, alerts, reports and monitoring
6.1. Alerts
BU
Correlator outputs correlation events. They are not alerts by themselves, but when a correlation event
appears, the core always either creates a new alert or supplements an existing alert (retroscanning
RI
does not necessarily create alerts).
ST
DI
RE
OR
ED
The general principle of generating alerts is as follows. When a new correlation event appears, the
core checks the rule that created the event:
PI
• If there are no open alerts for this rule, a new alert is created with a link to the correlation event
CO
• If there is a new, assigned or escalated but not closed alert for the same rule, a link to the new
correlation event is added to it
An alert accumulates correlation events up to a threshold (16MB), after which the alert is considered
BE
full and new events will no longer be added to it. However, new alerts will not be created either, so it is
important to keep an eye on full alerts.
Analysts can:
TO
• Change the priority of an alert (its initial priority is calculated as the average of the correlation
rule criticality and the criticality of the category that the asset belongs to)
T
179
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• Escalate, i.e. convert an alert into an incident
In Kaspersky terms, an incident is a confirmed alert. An incident can be bound to several alerts;
BU
for example, if an analyst discovers initial compromise and lateral movement during an
investigation and links these alerts to a single incident
• Close an alert for one of the following reasons: processed, incorrect data or an incorrect
RI
correlation rule
ST
Closed alerts are not displayed by default. This is controlled by the filter configured for the Status
column. An analyst can filter the alert table by any column.
DI
RE
OR
ED
PI
Click an alert to open its details. The analyst can perform all processing activities here: change
CO
• Correlation events related to the alert (every time a rule is applied, a correlation event is
generated; these events are added to an existing alert while it remains open)
180
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
You can open a card with the details of an associated asset or user from an alert.
OR
Each alert also contains a history of changes where an analyst can leave comments for other
analysts, for example.
ED
PI
CO
BE
TO
You can also consult all events related to the alert: correlation and base.
It is worth noting that an alert is a kind of virtual container into which all related artifacts, events,
T
assets and accounts are copied. Alerts are stored in the MongoDB database on the KUMA core.
NO
181
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
You can configure notifications about alerts in Kaspersky Unified Monitoring and Analysis Platform. To
do this, you need to specify the SMTP server parameters in Settings | Common:
OR
• Host — smtp server address
• Secret — authentication parameters; you can leave them empty if the server supports
ED
anonymous connections
• From — the address that will be specified in the From field of the messages
PI
The Monitoring notifications option pertains to event source monitoring policies; this is described in
the corresponding section of our course.
CO
SMTP settings are also used for emailing reports and notifications to KUMA users.
BE
TO
T
NO
182
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
After you’ve configured SMTP server settings, set up a notification template. It is also a resource. One
template is available in the list of resources by default.
OR
You can change the notification subject and text as follows:
• Subject — a string where you can use values of the correlation event fields in the following
format:
ED
{{.EventField}}
PI
• Template — message where you can also use field values in the same format.
CO
183
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
The last step is to set up a notification rule.
RE
OR
Notification rules reside in Settings | Alerts | Notification rules. You need to specify the following in
a rule:
• Name
ED
• Recipient addresses — you can add any addresses, not only KUMA users
• Correlation rules that will trigger sending the notification. An email is sent only when a rule is
matched for the first time, i.e. if there are no other open alerts created by this rule
PI
• Notification template
CO
BE
TO
T
NO
184
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
In Kaspersky Unified Monitoring and Analysis Platform, when a correlation rule is triggered, an alert of
the same name is created, which accumulates correlation events until it is closed.
OR
But you can configure so-called segmentation rules that will create separate alerts if a correlation
event satisfies specific conditions. These conditions are set in the segmentation rules.
For example, if the DestinationUserName of a correlation event belongs to some Active Directory
ED
group, then a separate alert will be created for such a correlation event. The alert name will have the
following format:
PI
A selector works with correlation events in a segmentation rule; therefore, it is important that the
correlation event must be enriched with the necessary fields from the base event.
Let us remind you that alerts are generated as a result of correlation rule triggering, i.e. each alert is
related to a correlation rule.
TO
Users complained about the following when working with alerts in KUMA 2.0:
• An alert accumulates correlation events until its status changes to Closed, i.e. regardless of
whether this alert is assigned to someone or escalated to an incident, events continue to
T
185
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• Alert size is limited to 16MB; when this threshold is reached, it is considered to be full and
correlation events are no longer added to it. But new alerts are not created either, so it is
important to monitor overflowing alerts
BU
• Segmentation rules work only for specific field values and these values have to be specified
manually. For example, there is a correlation rule that detects brute force attempts. The
correlation event contains the value of the DestinationUserName field: the account whose
RI
password is being brute-forced. Since a correlation rule tracks behavior, all events end up in
the same alert no matter what account is brute-forced.
ST
To have different alerts generated for different values of the DestinationUserName field, the
analyst can configure segmentation rules. The problem is that you CANNOT simply request
DI
"Create a separate alert for each unique DestinationUserName". You must explicitly specify the
account for which a separate alert must be created. For example, if [email protected] and
RE
[email protected] accounts are specified in a rule, a separate alert will be created for each of them
in case of a brute-force attempt; but if there is an attempt to brute-force [email protected], the
correlation event will be sent to a common alert.
OR
All these inconveniences were fixed in KUMA starting with version 2.1:
• An alert accumulates correlation events while it has the New status. As soon as its status
changes, the next triggering of the correlation rule generates a new alert
ED
• You can limit the number of correlation events in a rule. When the threshold is reached, a new
alert will be created
• In the segmentation rules, you can specify the field based on which segmentation will be
PI
You can add several fields; in this case, a separate alert will be created for each unique set of
values
BE
TO
T
NO
186
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
Alert segmentation is configured in two stages in KUMA:
RE
OR
• Create a segmentation rule as a resource
187
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
• By event limit—specify the threshold value for the number of correlation events
• By identical fields—specify one or more fields; a separate alert will be generated for each
unique value or set of values
BU
Also, for each type of segmentation rule, you can configure alert naming rules.
RI
An alert name will contain name of the correlation rule in any case, but you can also use Go
templates to add a suffix: plain text or values of the necessary event fields.
ST
DI
RE
OR
ED
Red frame: After an alert status changes from New to any other, a new alert is created next time
CO
Green frame: If there is no segmentation rule of the ‘By event limit’ type, a new alert accumulates
events and may overflow. As a result, nothing is added to an overflowed alert. If there is a
BE
segmentation rule of the ‘By event limit’ type, a new alert will be created every time when the
threshold is reached. In our example, the threshold was reached 2 times.
Yellow frame: Segmentation rule of type ‘By identical field’ with two fields: SourceUserName and
TO
SourceHostName. Each unique set of values generates a separate alert and adds values of these
fields to its name.
By default, the value of the {{.Timestamp}} field is also added to the name of an alert generated using
T
segmentation. It is not very useful, and the analyst should think the naming over.
NO
188
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
Multiple segmentation rules may be created for one correlation rule. In this case, segmentation rules
are applied sequentially, and all their naming rules add the respective suffixes separated with "|" (the
topmost line in the screenshot). The analyst should keep this in mind to avoid duplication of suffixes in
BU
different segmentation rules.
6.2. Response
RI
In this section, we will study response tools (including automated response) available in Kaspersky
Unified Monitoring and Analysis Platform and how you can use them.
ST
DI
RE
OR
ED
PI
Incidents need to be responded to. Kaspersky Unified Monitoring and Analysis Platform saves time by
automatic response to correlation events:
CO
• Running a Kaspersky Security Center task (for example, to update databases and scan critical
areas of the computer)
• Running a script — the script will be executed on the server where the correlator service is
BE
• Launching a Kaspersky Endpoint Detection and Response task — for example, to isolate an
infected device or run an executable file
TO
• Launching a Kaspersky Industrial CyberSecurity for Networks task — to change the status of
the device in the industrial network
• Via Active Directory — for example, to block a user account, reset its password, add or remove
T
189
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
To be able to automatically run Kaspersky Security Center tasks in response to correlation rules, first
of all, integrate Kaspersky Unified Monitoring and Analysis Platform with Kaspersky Security Center
OR
(which is described in the Integrations section of this course).
Also, the tasks on the Kaspersky Security Center side must be created in advance. They must be
configured as follows:
ED
• The task must pertain to Kaspersky Endpoint Security for Windows or Kaspersky Endpoint
PI
• The task must be created for a set of computers (rather than a group)
CO
To be able to run tasks, grant the permission to modify and run Kaspersky Endpoint Security tasks to
the account specified in the Kaspersky Security Center integration settings in KUMA. The easiest way
BE
to achieve this is to grant the Kaspersky Endpoint Security Administrator role to this account on the
Kaspersky Security Center side. KUMA needs the modification permission to be able to assign a task
to computers related to the alert.
TO
T
NO
190
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
An analyst can run tasks manually from the card of an asset imported from Kaspersky Security
Center. The KSC response button displays the list of available tasks (see the task requirements
OR
above). Select one of them and click Start. The task will be assigned to the selected computer with
the schedule Immediately. If the Kaspersky Security Center server successfully synchronizes with the
computer, the task will start immediately. If forced synchronization fails for some reason, the computer
will run the task after a scheduled synchronization with Kaspersky Security Center. By default,
ED
To run Kaspersky Security Center tasks automatically, create a response resource with the following
NO
191
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
settings:
• Kind — ksctasks
BU
• Kaspersky Security Center Task — one of the tasks that meets the requirements
• Event field — the field that contains the identifier of the asset where the task needs to be run.
You can select one of the following: SourceAssetID, DestinationAssetID, DeviceAssetID. Which
RI
field to choose depends on what events the correlation rule applies to and what fields are filled
in those events. In Kaspersky Security Center events, the identifier of the compromised
ST
computer is usually specified in the DestinationAssetID field
• Filter — an additional filter to run the task when some additional conditions are met rather than
DI
every time when the correlation rule is applied
You need to add the created response resource to the correlator configuration. Since response is a
RE
setting of a correlator rather than that of a specific correlation rule, it is applied when any rule is
matched. In order to use different actions for different correlation rules, there is a filter in the response
settings where you can specify conditions, for example, name of the matched correlation rule.
OR
ED
PI
CO
BE
Kaspersky Security Center tasks provide limited capabilities and are applicable only to assets
imported from Kaspersky Security Center.
TO
The analyst can create a script to run in response to a matched correlation rule (bash, perl or any
other script that can be executed on a Linux server). To make the script affect specific computers or
accounts, you can pass event field values to it as parameters.
T
NO
Copy the prepared script to the following folder of the correlator service
192
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
/opt/kaspersky/kuma/correlator/<service identifier>/scripts
Then you need to configure a response resource with the following settings:
BU
• Kind — script
RI
• Filter — additional conditions for a response (to run the script not after every application of
each correlation rule)
ST
• Script file name — the file must be located in the abovementioned folder
• Script arguments — you can pass values of the correlation event fields in the Go template
DI
format:
{{.EventField}}
overall security situation. They consist of widgets that visualize various statistics.
PI
CO
BE
TO
T
A dashboard layout defines which widgets to show, what to show on them and how to position widgets
NO
193
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
on the page. Each user can create a custom set of layouts and switch between them to get different
slices of network status.
BU
The created layouts are sorted alphabetically, and unless the preferred layout is selected, the first
layout on the list is displayed by default. You can select a preferred layout to see it when you open the
dashboard. To do so, click the star to the left of the layout name in the list of layouts.
RI
To adjust a layout, expand the list of layouts, hover over the name of the necessary layout, wait for the
pencil image to appear to the right of the name and click it.
ST
DI
RE
OR
ED
PI
Every layout has general settings and a set of widgets, each with its own additional settings.
• The reporting period (widgets can use the layout’s period or have their own)
BE
• Layout name
To add a new widget to a layout, use the Add widget drop-down list. To remove or modify a widget,
click the gear button in the upper right corner of the widget.
TO
T
NO
194
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
A variety of widgets are available in Kaspersky Unified Monitoring and Analysis Platform layouts; each
has a more or less fixed view of the information displayed. In standard widgets, you can change only
OR
the reporting period and a few auxiliary display options.
• Alerts
ED
• Assets
• Incidents
PI
• Event sources
• Users
CO
• Active lists
• Events
BE
https://support.kaspersky.com/help/KUMA/3.2/en-US/218042.htm
TO
T
NO
195
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
The Events widget is of most interest because it allows you to run an SQL query in the event storage
and visualize the response. It enables the analyst to customize dashboards almost unlimitedly. If
OR
some information type is stored in the database, you can retrieve and display it.
The Events widget has three sections of settings. The first section contains SQL query settings
(similar to those on the event search page), visualization method, reporting period (the same as the
ED
layout reporting period by default) and the option that allows you to add data of the previous period.
Meaning, you can see data over the current and previous period on a single chart to assess the
dynamics.
PI
• To present data in a chart, you need to specify by which field to combine events (in the Select
parameter, the field with the value attribute), and which field to use to calculate the metric for
the group (the field with the metric attribute and metric type: count, min, max, avg, sum)
• For a table, you need to specify which event fields to display in the table columns and
BE
(optionally) by which fields to group records and by which field to count the metric for the group
• For a counter, specify the query conditions, the metric count field and the metric (count, min,
max, avg, sum)
TO
• For a histogram, the metric is fixed (count by id, i.e. the histogram simply visualizes distribution
of events over time) and you only need to specify the query conditions
T
NO
196
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
In the second section of the settings, you define axes for graphs.
OR
The third section sets other visualization parameters: graph orientation, colors, legend, summing up,
widget name and description.
ED
PI
CO
BE
TO
Reports are built from the same elements as the dashboard, but they can be generated on a
schedule, saved to a file and emailed.
T
Reports are generated to templates (similarly to dashboard views that are based on layouts).
NO
197
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Report templates have almost the same settings as dashboard layouts. A template has a reporting
period and a set of widgets. Unlike a dashboard, a report template does not have a refresh rate, but
OR
has a lifetime for storing reports in the KUMA database and a logo to be displayed in the reports. You
can use any image for the logo.
Available widgets and their settings are exactly the same as in dashboard layouts.
ED
PI
CO
BE
TO
You can set up a schedule for generating a report (via the three-dot menu of its template). You can
T
choose the time when to create a report and the frequency in days, weeks, months or years.
NO
198
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
You can also specify email addresses below the schedule to have the report emailed. The SMTP
server parameters specified in Settings | Common are used for sending reports.
BU
You cannot specify arbitrary recipient addresses here; you can only select from addresses specified in
Settings | Users.
RI
ST
DI
RE
OR
The following report formats are available in KUMA in addition to HTML: PDF, CSV, Split CSV, Excel.
ED
Split CSV is an archive with CSV files, where each widget is saved as a separate file. To ensure
correct generation of PDF reports, you need to install additional packages on the Core host.
PI
• nss
• gtk2
• atk
BE
• libxkbcommon
• libdrm
• at-spi2-atk
TO
• mesa-libgbm
• alsa-lib
T
199
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
sudo yum install nss gtk2 atk libxkbcommon libdrm at-spi2-atk
mesa-libgbm alsa-lib
BU
The packages required for Astra Linux are listed in the documentation https://support.kaspersky.com/
help/KUMA/3.2/en-US/231034.htm
RI
Mitre Att&ck (Adversarial Tactics, Techniques & Common Knowledge) is a globally-accessible
ST
knowledge base of adversary tactics and techniques based on real-world observations created by the
Mitre Corporation.
DI
Information is presented in the form of matrices in the MITRE ATT&CK knowledge base. Each matrix
is a table where column headers correspond to cybercriminals' tactics, i.e. the main stages of a cyber
RE
attack or preparation for it, and cells correspond to techniques, i.e. the methods of implementing these
tactics. For example, according to MITRE ATT&CK, data collection is an attack tactic, and collection
methods, such as automated collection or collecting data from removable media, are techniques.
OR
ED
PI
CO
BE
KUMA lets you evaluate how your correlation rules “cover” the elements of the MITRE matrix. To do
this, you need to download a list of elements in the form of a json file, load it into KUMA, map your
TO
correlation rules to MITRE techniques, export this information from KUMA and load it into MITRE
ATT&CK Navigator.
T
NO
200
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
The MITRE list is available at https://github.com/mitre/cti/releases; you need to select the necessary
release. KUMA 3.2 supports version 14.1.
OR
ED
PI
CO
BE
In KUMA, upload the list to Settings | Common | MITRE Techneques List Settings. You can also
TO
201
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
After uploading the list, you can map your correlation rules to the loaded techniques. You can do this
in the correlation rule settings.
OR
ED
PI
CO
BE
After mapping the correlation rules, you can export a file for MITRE ATT&CK Navigator from KUMA.
TO
To do this, click the three dots icon under Resources | Correlation rules.
T
NO
202
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Then open https://mitre-attack.github.io/attack-navigator/, and in the Open Existing Layer area click
Upload form local to upload the file exported from KUMA.
OR
ED
PI
CO
BE
6.5. Metrics
TO
In this section, we will talk about monitoring event sources and about the performance characteristics
of KUMA services that are displayed as metrics.
T
NO
203
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
There is the Sources status section in the side menu of the KUMA interface. It displays the list of
sources that send data to collectors. A source is a virtual entity that has the following parameters:
OR
• DeviceProduct
• DeviceHostName
• DeviceAddress
ED
• DeviceProcessName
• Tenant
PI
We can find values of these parameters in the fields of events that arrive to the collectors. Each
unique set of values is registered as a separate source whose event flow is displayed over the last
CO
week.
The list of sources is refreshed and events are counted every minute.
BE
You can open events of a particular source from this page: select the required source and click the
events link. This will get you to the Events section. Conditions of the search query will be set up
automatically.
TO
T
NO
204
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Data on the frequency and number of incoming events is an important indicator of the system state.
For example, you can see when the flow of events grows or decreases abnormally, or even stops.
OR
Monitoring policies keep track of such situations. Specify the lower threshold in the policy (the upper
threshold is optional) and how events will be counted (policy type):
• By EPS — the number of events per second over the specified period of time. The average
ED
value for the entire period is calculated, but you can additionally track peaks during the
specified intervals
PI
The policy must be applied to an event source. After that, the source status can be either green
CO
(everything is fine) or red (is abnormal) — in this case, a Monitoring event is generated. You can also
configure emailing notifications to any address.
BE
TO
T
NO
205
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
Another important source of information about Kaspersky Unified Monitoring and Analysis Platform is
the Prometheus metrics available on the Metrics page. It shows statistics of events at the input and
OR
output of various services, statistics of delays in event processing by various services, error metrics
and buffer usage.
For example, if a service buffer starts to grow dramatically, it may mean that the service cannot send
ED
events to the destination (there is a network error or hardware is malfunctioning) or fails to handle the
flow of events (incorrect configuration or resource estimation error).
Metrics also show the load on the operating system in general and the load that KUMA services
PI
206
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
There are several preconfigured panels in the Metrics section. By default, metrics of collector services
are displayed. Click on the KUMA Collectors header to switch to the correlator, core, storage or tenant
OR
metrics. Every section shows its own metrics.
You can additionally filter the displayed metrics by service names: show the load for the selected
services or all together.
ED
Experts familiar with Prometheus and the PromQL query language can also create and customize
their own information panels.
PI
CO
BE
TO
T
NO
207
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
The following metrics can be useful for Collector services:
• IO | Processing EPS — input collector flow — the number of events processed per second
BU
• IO | Output EPS — output collector flow — the number of events sent to the destination per
second
• IO | Output Disk Buffer Size — the current size of the disk buffer; zero means that no batch of
RI
events is buffered, everything is fine. If the buffer grows, it may mean that the destinations
(correlator, storage) are unavailable
ST
• IO | Output Event Loss — the number of events lost per second. A loss may occur if they can
neither be sent out nor written to the buffer if it is full (the buffer size is set in a connector
DI
resource)
• Normalization | Raw & Normalized event size — shows which collectors retain raw events and
RE
the average sizes of raw and normalized events
• Normalization | Errors — the number of normalization errors per second. It grows if the format
of incoming events does not match the normalizer type
OR
• Filtration | EPS — the number of events discarded by the collector per second. Shows how
filters optimize the flow of events at the output of the collector, which also affects the license
count
• Aggregation | EPS — the number of input and output events per second in an aggregation rule.
ED
• Enrichment | Queue — the size of the enrichment request queue. Shows you if a particular
enrichment rule is a bottleneck.
PI
• Enrichment | Errors — the number of enrichment source access errors per second
CO
• Process | all metrics — general metrics of each collector service, show the impact on the
operating system
• OS | all metrics — general metrics of the operating system, show utilization of CPU, RAM, Disk
and the average load on the system
BE
TO
T
NO
208
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
The following metrics can be useful for Correlator services:
OR
• IO | Processing EPS — input correlator flow — the number of events processed per second
• IO | Output EPS — output correlator flow — the number of events sent to the destination per
second
• Correlation | EPS — the number of correlation events generated by a correlation rule per
ED
second
• Correlation | Buckets — the current number of correlation groups (buckets) inside a correlation
PI
rule (only for Standard rules). Correlation buckets live in the correlator’s memory during the
time specified in the Window parameter of the correlation rule. This metric helps keep track of
rules with large observation windows that can potentially affect utilization of system resources.
CO
• Correlation | Rate Limiter Hits — shows how often the correlation rule is triggered per second.
The default limit is 100. If more than 100 events to which the rule is applicable arrive in a
second and the metric has hit the ceiling, you need to increase the Rate limit in the correlation
BE
rule
• Correlation | Active Lists On-Disk Size — shows the current size of each active list on the disk
• Response | RPS — number of response rule activations per second. If the number is
TO
• Process | all metrics — general metrics of each collector service, show the impact on the
operating system
T
• OS | all metrics — general metrics of the operating system, show utilization of CPU, RAM, Disk
NO
209
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
BU
RI
ST
DI
RE
The following metrics can be useful for Storage services:
OR
• ClickHouse | General | Active Queries — the total number of currently executed queries
• ClickHouse | Insert | EPS — the number of events written to the storage per second.
• ClickHouse | Insert | Rejected Insert QPS — the number of write requests (per second) that the
ClickHouse node rejected
ED
• ClickHouse | Insert | Failed Inserts QPS — the number of unsuccessful write requests (per
second)
PI
• ClickHouse | Insert | SELECT QPS — the number of unsuccessful read requests (per second)
ClickHouse cluster nodes. Normally, this number should be equal to the number of nodes in the
ClickHouse cluster
• ClickHouse | Replication | Read-only Replicas — the number of ClickHouse replicas that are in
BE
• ClickHouse | Replication | Active Replication Fetches — the number of active data replication
processes at the moment
TO
• Agent | all metrics — general metrics of each storage service that show the impact on the
operating system
• OS | all metrics — general metrics of the operating system, show utilization of CPU, RAM, Disk
and the average load on the system
T
NO
KUMA also monitors metrics of the agent, core and other components. For the full list of metrics,
210
Chapter 6. Response, alerts, reports and monitoring KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
D
TE
consult the online help at https://support.kaspersky.com/KUMA/3.2/en-US/218035.htm
BU
RI
ST
DI
RE
OR
ED
PI
CO
BE
TO
T
NO
211
KL 034.3.2
Kaspersky Unified
Monitoring and Analysis
Platform
Lab guide
Table of contents
1. Install Kaspersky Unified Monitoring and Analysis Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Task A: Install KUMA services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Task B: Change the web console administrator password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Task C: Get acquainted with demo resources and create storage services. . . . . . . . . . . . . . . . . . 14
Task D: Create a correlator service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Task E: Create a collector service and send a test event to KUMA . . . . . . . . . . . . . . . . . . . . . . . . 36
Task F: Add a Kaspersky Endpoint Security license key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
2. Configure receiving events from Windows Event Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Task A: Create a service account for the agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Task B: Create a secret resource for the kuma account. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Task C: Configure the KUMA agent resource to collect Windows events via WMI . . . . . . . . . . . . 65
Task D: Configure a collector to receive Windows events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Task E: Install the KUMA agent service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Task F: Make sure events arrive. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
3. Configure receiving events from a Windows DNS analytic log (optional) . . . . . . . . . . . . . . . . . . . . 85
Task A: Create a collector. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Task B: Create an ETW session. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Task C: Configure and install a KUMA agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Task D: Make sure events arrive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
4. Configure receiving Linux events (optional). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Task A: Create a resource with a collector configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Task B: Install the collector service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Task C: Create a resource with a Linux agent configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Task D: Install the Linux agent and check for events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Task E: Configure the Linux agent to start automatically (optional) . . . . . . . . . . . . . . . . . . . . . . . 122
Task F: Create and test a correlation rule (optional). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
5. Configure receiving Kaspersky Security Center events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Task A: Create a login for the collector account on the SQL server . . . . . . . . . . . . . . . . . . . . . . . 131
Task B: Configure and install the collector service for KSC events . . . . . . . . . . . . . . . . . . . . . . . 137
Task C: Make sure events arrive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
6. Configure receiving Kaspersky Anti Targeted Attack Platform events . . . . . . . . . . . . . . . . . . . . . . 148
Task A: Configure and install the collector service for KATA events. . . . . . . . . . . . . . . . . . . . . . . 148
Task B: Configure sending KATA events to the collector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
7. Configure receiving EDR telemetry from KATA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Task A: Configure and install the collector service for EDR telemetry . . . . . . . . . . . . . . . . . . . . . 159
Task B: Make sure events arrive at the collector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
8. Configure DNS data enrichment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Task A: Configure a DNS connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Task B: Add an enrichment rule to a collector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Task C: Make sure enrichment works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
9. Configure GeoIP data enrichment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Task A: Convert a MaxMind GeoIP database to a format that KUMA supports . . . . . . . . . . . . . . 178
Task B: Upload geodata to KUMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Task C: Create an enrichment rule and add it to the collector . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Task D: Make sure enrichment works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
10. Import information about computers from Kaspersky Security Center . . . . . . . . . . . . . . . . . . . . 190
Task A: Configure an account for connections from KUMA in Kaspersky Security Center . . . . . 190
Task B: Configure a connection to Kaspersky Security Center . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Task C: Import assets and categorize them . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Task D: Manually add a computer to the list of assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
11. Configure event enrichment using Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Task A: Create an Active Directory connection in the KUMA settings . . . . . . . . . . . . . . . . . . . . . 209
Task B: Set up event enrichment in a KATA collector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Task C: Make sure KATA events contain detailed information about the user . . . . . . . . . . . . . . . 214
12. Configure enrichment with CyberTrace data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Task A: Configure integration with the CyberTrace web user interface . . . . . . . . . . . . . . . . . . . . 218
Task B: Configure KUMA’s connection to CyberTrace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Task C: Add an event enrichment rule to the collector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Task D: Make sure enrichment works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
13. Configure cold storage for events in KUMA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Task A:Mount disks for cold data storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Task B: Configure cold data storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Task C: Make sure events arrive at the cold storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
14. Create a simple correlation rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Task A: View a KATA IDS event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Task B: Create a simple correlation rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
Task C: Add the rule to the correlator settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Task D: Test the rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
15. Create a standard correlation rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
Task A: Study a KATA URL Reputation event. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
Task B: Configure a standard correlation rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
Task C: Add the rule to the correlator settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
Task D: Test the rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
16. Configure an alert for events logged in a specific order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Task A: Prepare filters to select url_web and url_mail events from KATA . . . . . . . . . . . . . . . . . . 271
Task B: Create a standard correlation rule with an order by filter. . . . . . . . . . . . . . . . . . . . . . . . . 274
Task C: Add the rule to the correlator settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
Task D: Test the rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
17. Create a correlation rule using a local variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Task A: Configure a simple correlation rule using a local variable . . . . . . . . . . . . . . . . . . . . . . . . 281
Task B: Add the rule to the correlator settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
Task C: Test the rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
18. Create an operational correlation rule to fill an active list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
Task A: Prepare an active list for malicious addresses found in email . . . . . . . . . . . . . . . . . . . . . 290
Task B: Create an operational correlation rule to fill the active list . . . . . . . . . . . . . . . . . . . . . . . . 291
Task C: Add the rule to the correlator settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Task D: Test the rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
19. Create a correlation rule using an active list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Task A: Create a correlation rule that uses an active list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Task B: Add the rule to the correlator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Task C: Test the rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
20. Run retrospective scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Task A: Simulate an incident. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Task B: Create a standard correlation rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Task C: Add the rule to the correlator settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Task D: Perform retrospective scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
21. Configure a response by running a Kaspersky Security Center task . . . . . . . . . . . . . . . . . . . . . 315
Task A: Prepare a critical areas scan task in Kaspersky Security Center . . . . . . . . . . . . . . . . . . 315
Task B: Run the task via the computer properties in the KUMA web console . . . . . . . . . . . . . . . 320
Task C: Configure an automated response to an alert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Task D: Add supplementary fields to the correlation rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
Task E: Update the correlator settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Task F: Make sure the automated response works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
22. Configure a response by running a Kaspersky Endpoint Detection and Response task. . . . . . . 330
Task A: Create a secret resource for integration with KATA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Task B: Configure integration between KUMA and KATA EDR . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Task C: Run a task via the computer properties in the KUMA web console. . . . . . . . . . . . . . . . . 334
23. Study reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
Task A: Study and modify the preconfigured dashboard layouts . . . . . . . . . . . . . . . . . . . . . . . . . 348
Task B: Create a new layout with a widget about audit events . . . . . . . . . . . . . . . . . . . . . . . . . . 349
Task C: Create a report based on an existing template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
24. Send a request to KUMA via the REST API (optional). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
Task A: Create a token for sending requests to KUMA via the REST API . . . . . . . . . . . . . . . . . . 363
Task B: Task B: Find and close KUMA alerts via the REST API. . . . . . . . . . . . . . . . . . . . . . . . . . 367
25. Configure the Event router service (optional). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Task A: Create a configuration for the Event router service . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Task B: Install the Event router service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
Task C: Configure event streams to pass through the Event router service. . . . . . . . . . . . . . . . 377
Task D: Make sure events arrive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
26. Create a rule based on an entropy calculation (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Task A: Configure a normalizer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Task B: Create a correlation rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
Task С: Test the correlation rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You are preparing to demonstrate the capabilities of Kaspersky Unified Monitoring and Analysis
Platform. To show a distributed installation, you are going to deploy KUMA services on three servers.
Contents
Task C: Get acquainted with demo resources and create storage services
All management will be performed remotely from the administrator’s workstation. The
administrator will use the ssh client to install and configure Kaspersky Unified Monitoring
and Analysis Platform and then the web interface of the product.
1
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
1. Log in as
ABC\Administrator,
password: Ka5per$Ky
4. Click Open
2
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
8. Download the KUMA license key (ask the instructor where to get it):
It is very important not to make a mistake here, because if there is a typo in the address,
the contents of the web page with the error will be downloaded and placed in the
license.key file. With such a "license", KUMA installation will fail.
9. Make sure the correct license file has been downloaded by running the command:
10. After executing the command, you should see the serial number.
If you see HTML tags instead of the serial number, then there was probably a mistake in
the URL when downloading the license. Correct the URL and download again.
3
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
ls
tar -xvzf
kuma.tar.gz
13. To make sure the kuma-ansible-installer directory was created as a result of unpacking the
kuma.tar.gz archive, run the following command again:
ls
14. Go to the folder with the KUMA distribution using the command
cd kuma-ansible-installer
15. Make sure the folder is not empty. In particular, make sure it contains the installation script
install.sh and file templates describing various installation types in *.yml format:
ls
16. Get acquainted with the structure and default installation parameters in the template file. To do so,
run:
mcedit distributed.inventory.yml.template
4
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
5
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
19. Run the following command to open and view the downloaded file
mcedit distributed.inventory.yml
6
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
7
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
su
ssh-keygen –N ""
23. When prompted for a file name (Enter file in which to save the key (/root/.ssh/id_rsa):), press
ENTER without typing any data
24. Copy the SSH key to all nodes where KUMA components will be installed, including kuma-
core.abc.lab. Let’s start with the kuma-core.abc.lab server:
yes
Enter the password Ka5per$Ky for the root user on the server you are copying the
key to
8
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
To save time, press the up key in the console to display the previous command.
Change the hostname in the command from kuma-core.abc.lab to kuma-storage-
1.abc.lab
yes
Enter the password Ka5per$Ky for the root user on the server you are copying the
key to
To save time, press the up key in the console to display the previous command.
Change the hostname in the command from kuma-storage-1.abc.lab to kuma-storage-
2.abc.lab
9
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
yes
Enter the password Ka5per$Ky for the root user on the server you are copying the
key to
30. Copy the license.key file to the folder with KUMA files:
cp /home/admin/license.key roles/kuma/files/
If you plan to activate the product using a key file, it must be located in this particular
folder and be named license.key.
./install.sh distributed.inventory.yml
Yes
10
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
33. Wait for the installation to complete. You should see a message stating that the process ended
successfully:
34. Scroll up the text in the terminal and make sure there are no messages about unavailability of
target hosts and no errors in the PLAY RECAP section:
unreachable=0
failed=0
35. Enter the following commands to exit superuser mode and the installer directory:
exit
cd ..
11
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
If the page does not open, in the PuTTY terminal connected to kuma-core, run the
reboot command to restart the server
If a browser warning about an insecure connection appears, select Advanced and then
Proceed to kuma-core.abc.lab (unsafe)
12
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
42. Click OK
13
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
46. Switch to the License subsection and make sure KUMA is activated with the license key
14
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
15
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
49. Notice that the list includes only the core service so far. Click Add service
16
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
The service status is shown in the respective column. The color red means that the
service is not running yet or is running with errors. To complete the process of creating a
service, you need to install it on the corresponding KUMA server. We will need the
identifier of the created service for the installation.
To open the resource settings, click the resource name in the Name column.
55. Scroll down the list of
settings to ClickHouse
cluster nodes
17
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Shard ID 1
Replica ID 2
Keeper ID 2
Shard ID 0
Replica ID 0
Keeper ID 3
61. Select the created [OOTB] Storage service in the web console and click Copy ID to copy its
identifier to the clipboard
18
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
67. To install the storage service, run the following command with these parameters (type everything
on a single line):
19
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
After you enter the installation command, the terminal "freezes". You do not need to wait
until the command is executed, because it is waiting for the second storage service to
connect.
68. Return to the KUMA web console and click the Refresh icon next to the search box to check the
status of the storage service
The service is still red, but now the console displays the FQDN of the endpoint where we
have installed the service and the API port through which other KUMA services can
interact with it.
69. Click + Add service again to add a storage service to the second node of the ClickHouse cluster
70. Scroll down the list of demo resources and select [OOTB] Storage
20
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Both services are red, but they will both turn green when we install the service on the
kuma-storage-2.abc.lab server and add an allow rule for its API port.
73. Select the record of the created [OOTB] Storage service in the web console and click Copy ID to
copy its identifier to the clipboard
21
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
79. To install the storage service, run the following command with these parameters (type everything
on a single line):
22
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
80. Return to the KUMA web console and click the Refresh button to check the status of the storage
service
81. Make sure both [OOTB] Storage services have the green status now, which means that they are
running
Typically, after services are installed, it takes 2-3 minutes to start them and update their
status in the web console. If several minutes have passed and the services have not
changed their status to green, ask your instructor for help.
82. Click Add service again to add a storage service to the third node of the ClickHouse cluster
83. Scroll down the list of demo resources and select [OOTB] Storage
23
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
85. Make sure one more Storage service appears in the list
86. Select the record of the created [OOTB] Storage service in the web console and click Copy ID to
copy its identifier to the clipboard
If you closed this window, run PuTTY (you can find shortcuts for it on the desktop, in the
Start menu and on the taskbar); in the Host Name (or IP address) field, type kuma-core;
then click Open. To log in, use the username admin and password Ka5per$Ky
24
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
88. To install the storage service, run the following command with these parameters (type everything
on a single line):
89. Return to the KUMA web console and click the Refresh button to check the status of the third
storage service
25
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
92. Expand the tree on the left and select the OOTB node
To open the resource settings, click the resource name in the Name column.
26
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
27
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
100. Click the Run query button below the query field to search the KUMA storage for events
101. Notice that the storage has already received an internal KUMA audit event. Open this event. Click
on an empty space within the row that contains the event (be careful not to click a value in any of
the columns).
28
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
If the event is not found, try to increase the search time interval. Change it from 5 minutes
(the default value) to 15 minutes or 1 hour and repeat the search.
29
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
As with a storage service, to finish creating a correlator service, you need to install it on
the corresponding KUMA server.
To open the service properties, click its name in the Service column
30
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
111. Notice that the correlator contains a set of pre-configured correlation rules
31
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
The correct storage addresses are used since we have edited the [OOTB] Storage
destination resource
32
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
115. Note the recommended command syntax for installing the service with the specified settings on
the KUMA server
116. Copy the command to the clipboard by clicking the icon in the lower right corner of the code
block.
117. Open the window with the SSH session to the kuma-core.abc.lab server
33
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
119. Type sudo before the copied command to run it with superuser privileges; it should look as
follows:
120. Press ENTER to run the command; use the password Ka5per$Ky to elevate privileges
124. Make sure the [OOTB] Correlator service has the green status now, which means that it is
running
34
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
To open the resource settings, click the resource name in the Name column.
128. Pay attention to the default
value of the resource’s URL
setting. The correlator
service address is incorrect.
Delete it
35
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
36
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
As with other services, to finish creating a collector service, you need to install it on the
corresponding KUMA server.
To open the service properties, click its name in the Service column.
37
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
138. Pay attention to the port where the connector will receive events from sources
38
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
141. Notice that the collector uses the [OOTB] CEF normalizer
We will not elaborate on these settings now; they will be covered later.
142. Click the X button to close the pane with event parsing settings
39
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
144. Notice that the collector sends events to the correlator and to the storage
40
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
146. Note the recommended command syntax for installing the service with the specified settings on
the KUMA server
147. Copy the command to the clipboard by clicking the icon in the lower right corner of the code
block.
148. Open the window with the SSH session to the kuma-core.abc.lab server
150. Type sudo before the copied command to run it with superuser privileges; it should look as
follows:
155. If the service has the Update required status, select its checkbox and click the Update
configuration button
157. Make sure the [OOTB] CEF service has the green status now, which means that it is running
42
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
158. Return to the window where an ssh session to the kuma-core.abc.lab server is opened
If you closed the previous session, start PuTTY, connect to the kuma-core.abc.lab server
and log in as admin with the password Ka5per$Ky
159. In the terminal, make sure you are logged on as the admin@kuma-core user and run the
following command to make sure you are in the /home/admin directory:
pwd
If the user or directory is incorrect, the easiest solution is to close the PuTTY session and
reconnect to kuma-core.abc.lab.
160. Create an events folder and download the events.zip archive into it
mkdir ~/events
cd ~/events
curl -L https://kas.pr/kuma32events -o events.zip
unzip events.zip
43
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
The contents of the archive you’ve downloaded may differ from what is shown in the
screenshot.
164. Click the Run query button to search the KUMA storage for events
165. Make sure a new event with the Network attack detected description in the Name column arrives
at the server
44
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
The dc, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines must be
powered on.
45
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
If a browser warning about an insecure connection appears, select Advanced and then
Proceed to ksc.abc.lab (unsafe)
46
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
47
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
48
Lab 1. Install Kaspersky Unified Monitoring and Analysis Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Conclusion
In this lab, you have learned how to quickly set up a distributed installation of KUMA with all services
and settings required to receive and process CEF events. You have learned how to:
• Copy the KUMA installation files to the server from which the installation will be performed
49
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Scenario. You want to send events from Windows logs to KUMA. For this purpose, KUMA uses
collector services and a Windows Agent that collects events directly or through WMI queries. In our
labs, we perform this task by sending WMI queries to target devices.
A special KUMA agent service sends WMI queries. It can send queries locally and to remote devices.
The agent forwards the received raw events to the KUMA collector service, which normalizes and
processes them.
To successfully start the KUMA agent service, you need an account that has the Log on as a service
permissions; and to successfully receive events, this account must be able to read logs of all target
devices.
Contents
Task C: Configure the KUMA agent resource to collect Windows events via WMI
The dc, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines must be
powered on.
50
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
For example, right-click the Start button, begin typing users in the search bar and under
the Active Directory Users and Computers app, select Run as administrator
3. Click the Create a new user in the current container button to create a new account
51
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
5. Click Next
52
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
53
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
54
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
19. Click OK
For example, right-click the Start button, begin typing local in the search bar, and under
the Local Security Policy app, select Run as administrator
55
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
21. In the Local Security Policy window, open the Local Policies | User Rights Assignment node
22. Scroll down the list of settings and double-click Log on as a service to reconfigure it
56
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
57
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
28. Click OK
For example, right-click the Start button, begin typing computer in the search bar and
under the Computer Management app, select Run as administrator
58
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
30. In the Computer Management window, open System tools | Local Users and Groups | Groups
59
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
60
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
38. Click OK
39. In the Computer Management window, right-click the Computer Management (local) node. In
the shortcut menu, select Connect to another computer
41. Click OK
61
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
42. In the Computer Management (KSC) snap-in, open System Tools | Local Users and Groups |
Groups
62
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
50. Click OK
63
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
64
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
a. Name: [Lab]
[email protected]
b. Tenant: Main
c. Kind: credentials
d. User: [email protected]
e. Password: Ka5per$Ky
60. Make sure a new entry has appeared in the list of secret resources: [Lab] [email protected]
In this task, you will create a KUMA agent configuration to collect Windows events.
65
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Kind wmi
Defaul [Lab]
t [email protected]
crede
ntials
In the drop-down list, select the [Lab] [email protected] secret resource created in the
previous task. This resource will be used to send WMI queries to the target devices that
you will specify now. The [email protected] service account is perfect for this, because it has
the right to read logs of Windows devices, which you granted in the first task.
66
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
66. In the Remote hosts section, start filling in the list of devices from which the agent will collect
events. Click on the empty area under the name of the Host column to start entering data
Server admin-laptop
Domain abc.lab
68. Log type: select the Security and System checkboxes in the drop-down list
70. Continue filling in the Remote hosts list. Click + Add to add a new entry to the list
Add ksc.abc.lab and dc.abc.lab to the list of devices from which events will be collected.
Set the values of the Domain, Log type and Secret fields similarly to the ones that we
previously configured for admin-laptop.
67
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Server ksc
Domain abc.lab
Secret as default
Server dc
Domain abc.lab
Secret as default
74. In the Destinations section, specify the connection settings for the collector service where the
agent will forward the collected events:
Kind tcp
URL kuma-core.abc.lab:5140
68
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Pay attention to the port number — it belongs to the [OOTB] CEF collector. In this lab, you
will not create a separate collector service to receive events from Windows logs. Instead,
we will reconfigure the CEF collector to handle events from two different sources. There is
no technical need for such a solution. We do this in the lab to demonstrate the
functionality.
69
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
80. Go to Resources | Active services and open the [OOTB] CEF collector
70
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Note that the same delimiters must be used in the agent settings and in the
configuration of the collector service that will receive data from the agent. In the agent
settings, we selected \0 for the delimiter, so we must choose the same value in the
collector settings.
71
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
86. Specify the IP address 10.28.0.61 in the block with the [OOTB] CEF normalizer
89. Select [OOTB] Microsoft Products for KUMA 3 as the normalizer for this block
72
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
91. In Resources | Active services, select the [OOTB] CEF WMI collector
92. Click the Restart button to restart the service and apply the new collector settings
94. Verify that the status of the [OOTB] CEF WMI collector service is green. This means that it is up
and running without errors
73
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
74
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
d. Click Login
75
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
103. Make sure the kuma.exe file appears in the C:\Users\Administrator\Desktop\KUMA folder
76
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
109. Select the created [Lab] Agent Windows WMI service in the web console and click Copy ID to
copy its identifier to the clipboard
For example, right-click the Start button and select Windows PowerShell (Admin)
77
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
111. Go to the .\Desktop\KUMA folder, where you downloaded the agent installer
cd .\Desktop\KUMA\
Instead of <agent service ID>, paste the value that you copied to the clipboard in one of
the previous steps.
114. Type y and press ENTER again to accept the user agreement
115. Enter the password Ka5per$Ky to use the abc\kuma service account
117. Verify that the agent service is running by entering the command
Get-Service *kuma*
78
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
119. Return to the web console and open Resources | Active services
120. Click the Refresh icon next to the search box to update the status of services
121. Make sure the status of the [Lab] Agent Windows WMI service is green
122. In the KUMA web console, open Resources | Active services and select the checkbox in the
row with the [OOTB] CEF WMI collector
123. Click the Go to events button to display a list of events from the collector
A new tab with the Events page of the KUMA web console will open
79
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
124. Notice that the query string contains the collector service ID
125. Make sure new events have arrived at the KUMA storage (DeviceProduct = Windows)
126. Click on the third icon to the left of the Run query button to open the query builder
Let’s find events from each of the devices specified in the agent parameters to make sure
events are arriving from all devices
127. Click the Add condition button to add another criterion to the WHERE operator
Start typing the name of the field to search for. Then use the suggestion in the drop-down
list and select the appropriate DeviceHostName value.
80
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
130. Notice that a new query has appeared in the query field
132. Make sure admin-laptop.abc.lab is specified in the DeviceHostName field of all found events
If nothing is found, try to increase the search interval from 5 minutes to 15 minutes or the
last hour.
If necessary, add a column with the host name to the table. To do this, click on the gear
icon under the Run query button and select the DeviceHostName field
81
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
133. Repeat the search for the dc.abc.lab and ksc.abc.lab devices
134. Make sure the KUMA storage receives events from all the specified devices
135. Make sure the collector continues to receive and normalize CEF events. To do this, return to the
PuTTY window where the connection to kuma-core was established. Resend events with the
command:
If you closed PuTTY, run it from the Start menu and reconnect to the kuma-core host
using the admin account with the password Ka5per$Ky. Do not forget to change to the
events directory using the cd events/ command
82
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Type the Name field name in the left operand field. Scroll through the filtered fields to find
the Name field. The filtered list contains fields whose name contains Name. The list is
sorted alphabetically.
142. Make sure a new event with the description Network attack detected in the Name column arrives
at the server
Conclusion
The lab demonstrates how to send Windows events to KUMA using a collector and an agent via WMI.
To accomplish this, the following is required:
83
Lab 2. Configure receiving events from Windows Event Log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
• Windows Agent service installed on a Windows computer and connected to the KUMA collector
and core
This lab also demonstrates the collector’s ability to receive events in different formats from different
sources.
84
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
Your network uses a DNS running on Microsoft Windows, and you want to receive events from the
DNS server log using Event Tracing for Windows (ETW). To do this, you need to create a collector,
configure an ETW session, and configure and install the KUMA agent on the DNS server.
Contents
The dc, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines must be
powered on.
2. Click + Add
85
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
86
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
11. Click OK
87
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
88
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
23. Connect to kuma-core using the admin account with the password Ka5per$Ky
24. Paste the command from the clipboard and add sudo to the beginning
27. Make sure the created service has appeared in the list and its status is green
89
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
The dc, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines must be
powered on.
90
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
32. Click OK
Keep in mind that such a session will not be restored after a reboot. However, we are not
yet going to restart machines in our lab environment, so it’s OK. To have the session
restored after a server restart, create it in Startup Event Trace Sessions.
91
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
39. Click OK
92
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
93
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
44. Click OK
94
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
For example, click the Start menu, start typing "active", and run Active Directory Users
and Computers
95
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
96
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
54. Click OK
For example, click the Start menu, start typing active, and run Active Directory Users
and Computers
97
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
98
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
68. Click OK
99
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
We granted the ABC\Kuma account the permissions to read the necessary data and the
"Log on as a service" permissions on the domain controller. This configuration may not be
consistent with best practices in production environments. In our lab, we do this to save
time and keep the scenario simple. For example, in a production environment, you may
not want to edit the Default Domain Controllers Policy.
100
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
101
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
102
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
88. Select the checkbox in the row for the new service
103
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
92. Click OK
93. Copy the kuma.exe file from the KUMA folder on the desktop to this folder
104
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
96. The file that opens contains the agent installation string
The DC virtual machine, where we are going to install the agent, does not have a GUI. We
will edit the installation command remotely to conveniently copy the agent’s service ID.
97. Replace the characters ID with the value from the clipboard
101. Log in to DC using the Administrator account with the password Ka5per$Ky
105
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
gpupdate /force
103. Run the agent installation script by sequentially executing the following three commands,
pressing ENTER for each of them:
PowerShell
cd C:\kuma\
.\agent-install.ps1
104. The installer will show the user agreement. Type Y and press ENTER to accept it
Get-Service *kuma* | fl
106
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
If the service is displayed as disabled, click the Refresh icon next to the search box to
update statuses.
109. Select the checkbox for the [Lab] Windows ETW collector
107
Lab 3. Configure receiving events from a Windows DNS analytic log KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
(optional)
You can run the Computer Management snap-in from the Start menu. To connect to
DC.ABC.LAB, right-click the root node in the snap-in and select Connect to another
computer
Conclusion
In this lab, you configured a mechanism to receive events from DNS logs. To use incoming data
efficiently in a production environment, you will need to fine-tune the ETW session. This is required in
order to receive only relevant events, since even in this small lab environment, a session generates
approximately 1 EPS.
108
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You want to receive events from computers running Linux (Ubuntu), in particular, when the the root
account is used for remote access to servers via SSH. To do this, you need to install the Linux agent,
configure the collection of data from the /var/log/auth.log log, install a collector, and create a
correlation rule.
If the agent is installed on an Oracle server in your lab, the log name will be
/var/log/secure.
Contents
109
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
110
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
10. Click OK
111
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
112
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
21. A command for installing the collector will be generated in the window. Copy it to the clipboard
using the icon in the lower right corner of the area with the code
113
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
114
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
27. Paste the command for installing the collector from the clipboard, and add sudo before the
copied command in order to execute it with superuser permissions. You should end up with the
following:
30. Make sure the [Lab] Linux audit service has the green status now, which means that it is running
115
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
The dc, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines must be
powered on.
116
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
b. Kind: file
c. File path:
/var/log/auth.log
If the agent is installed on an Oracle server in your lab, the log name will be
/var/log/secure.
117
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
b. kind: tcp
c. URL: kuma-
core.abc.lab:5142
118
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
119
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
49. Use the following commands to create a working directory for the agent (press ENTER after each
command):
120
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
The terminal will "freeze". This means that we have started the agent. Do not interrupt its
operation. Let’s check for events and configure automatic start of the agent service on the
server.
52. Return to the KUMA web console and open Resources | Active services
53. Click the Refresh icon next to the search box to update the status of services
54. Make sure the [Lab] Linux audit service has the green status now, which means that it is running
121
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
61. Select the checkbox for the [Lab] Agent Linux service
122
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
66. In this line, replace the <ID> characters with the agent’s service ID from the clipboard in two
places
71. In the left pane of WinSCP, find and select the configuration file
124
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
78. The last command displays the status of the service. Make sure the service is active and is
configured to start automatically
86. Find events that were generated as a result of the failed login attempt
125
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
126
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
DeviceProcessName='sshd'
AND DestinationUserName='root'
127
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
128
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
106. Click OK
129
Lab 4. Configure receiving Linux events (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Conclusion
130
Lab 5. Configure receiving Kaspersky Security Center events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You want KUMA to receive Kaspersky Security Center events, including security events from
computers managed via Kaspersky Security Center. The simplest method is to query the SQL
database that stores all Kaspersky Security Center events along with events that endpoint security
applications send to KSC.
Appropriate collector and normalizer templates are available by default. The administrator only needs
to adjust the KSC database connection parameters for the collector and install the service.
Contents
Task A: Create a login for the collector account on the SQL server
Task B: Configure and install the collector service for KSC events
The dc, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines must be
powered on.
131
Lab 5. Configure receiving Kaspersky Security Center events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
For example, right-click the Start button, begin typing SQL in the search bar, and below
Microsoft SQL Server Management Studio 18, select Run as administrator
3. Click Connect
132
Lab 5. Configure receiving Kaspersky Security Center events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
5. Right-click Logins
133
Lab 5. Configure receiving Kaspersky Security Center events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
7. Click Search
8. Click Locations
10. Click OK
134
Lab 5. Configure receiving Kaspersky Security Center events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
135
Lab 5. Configure receiving Kaspersky Security Center events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
20. Click OK
22. Click OK
24. Click OK
136
Lab 5. Configure receiving Kaspersky Security Center events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
137
Lab 5. Configure receiving Kaspersky Security Center events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
31. Pay attention to the status of the created [OOTB] KSC SQL service
As with other services, to finish creating a collector service, you need to install it on the
corresponding KUMA server.
138
Lab 5. Configure receiving Kaspersky Security Center events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
33. Select [OOTB] KSC MSSQL and click the Duplicate button
139
Lab 5. Configure receiving Kaspersky Security Center events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
36. In the URL field, specify the Kaspersky Security Center database connection settings in a single
line:
sqlserver://abc%5Ckuma:[email protected]/SQLEXPRESS?databas
e=KAV
140
Lab 5. Configure receiving Kaspersky Security Center events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
To open the service properties, click its name in the Service column.
40. Switch to the Transport section
41. Click the button. In the drop-down list, select the [OOTB] KSC MSSQL – copy connector
resource
141
Lab 5. Configure receiving Kaspersky Security Center events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
43. Notice that the service already uses the default event normalizer
We still will not dwell upon the parsing, filtering, aggregation and event enrichment
settings; other labs will be devoted to them. For now, let’s take it for granted that the
minimum necessary parsing settings for the corresponding type of incoming events are
preconfigured in the collector resources.
142
Lab 5. Configure receiving Kaspersky Security Center events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
45. Notice that the collector sends events to the correlator and to the storage
47. Note the recommended command syntax for installing the service with the specified settings on
the KUMA server
48. Click the icon in the lower right corner of the code block to copy the command to the clipboard
143
Lab 5. Configure receiving Kaspersky Security Center events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
50. Open the window with the SSH session to the kuma-core.abc.lab server
52. Type sudo before the copied command to run it with superuser privileges; it should look as
follows:
56. Make sure the [OOTB] KSC SQL service has the green status now, which means that it is
running
If the service has the Restart required status, select it and click the Restart button.
Task C: Make sure events arrive
In the KUMA console, display the list of events that have arrived at the [OOTB] KSC SQL collector
from the KSC database over the last 5 minutes. Make sure the list is not empty. Review the arriving
events.
57. Select the [OOTB] KSC SQL collector in the web console and click Go to events to open the list
of events from this collector
145
Lab 5. Configure receiving Kaspersky Security Center events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
A new tab with the Events page of the KUMA web console will open.
58. Notice that the query string contains the collector service ID
59. Make sure the list of events is being filled with new events received via the configured collector
146
Lab 5. Configure receiving Kaspersky Security Center events KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Conclusion
The lab demonstrates how to configure receiving events from the Kaspersky Security Center
database in KUMA using an active collector and an sql connector.
This integration method (via querying the database) is recommended and has a number of
advantages over integration with a passive KUMA collector, which receives events sent by the
Kaspersky Security Center server.
147
Lab 6. Configure receiving Kaspersky Anti Targeted Attack Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
events
You want to analyze Kaspersky Anti Targeted Attack Platform events in KUMA. The default normalizer
resource for Kaspersky Anti Targeted Attack events is created automatically when KUMA is installed.
But there is no dedicated collector resource for these events. Create a new collector for Kaspersky
Anti Targeted Attack and configure Kaspersky Anti Targeted Attack to send events there.
Contents
Task A: Configure and install the collector service for KATA events
The dc, kata-cn, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines
must be powered on.
148
Lab 6. Configure receiving Kaspersky Anti Targeted Attack Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
events
2. Click Collectors
5. Click Save
7. Click + Add
149
Lab 6. Configure receiving Kaspersky Anti Targeted Attack Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
events
Kaspersky Anti Targeted Attack can send events using TCP and UDP. UDP does not
guarantee delivery, so it is better to use the TCP transport for important events.
150
Lab 6. Configure receiving Kaspersky Anti Targeted Attack Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
events
16. Click OK
151
Lab 6. Configure receiving Kaspersky Anti Targeted Attack Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
events
28. Open the window with the SSH session to the kuma-core.abc.lab server
30. Type sudo before the copied command to run it with superuser privileges; it should look as
follows:
34. Make sure the [Lab] KATA service has the green status now, which means that it is running
35. In a new web browser window, open the Kaspersky Anti Targeted Attack Central Node web
console at https://kata-cn.abc.lab:8443
If a browser warning about an insecure connection appears, select Advanced and then
Proceed to kata-cn.abc.lab (unsafe).
153
Lab 6. Configure receiving Kaspersky Anti Targeted Attack Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
events
154
Lab 6. Configure receiving Kaspersky Anti Targeted Attack Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
events
155
Lab 6. Configure receiving Kaspersky Anti Targeted Attack Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
events
a. Host/IP: kuma-
core.abc.lab
b. Protocol: TCP
c. Port: 5143
e. Heartbeat: 10 minutes
53. Log out from the system: click the Administrator username in the lower left corner and select
Log out
You need to log out in order to generate an event in KATA and receive it at the collector.
54. Return to the browser window with the KUMA web console
56. Select the [Lab] KATA collector and click Go to events to open the list of its events
156
Lab 6. Configure receiving Kaspersky Anti Targeted Attack Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
events
A new tab with the Events page of the KUMA web console will open.
57. Notice that the query string contains the collector service ID
157
Lab 6. Configure receiving Kaspersky Anti Targeted Attack Platform KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
events
Conclusion
The lab demonstrates how to create and configure a new Kaspersky Anti Targeted Attack Platform
event collector service and how to configure Kaspersky Anti Targeted Attack Platform to send events
to KUMA.
158
Lab 7. Configure receiving EDR telemetry from KATA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
If you do not have a KEDR installation in the lab environment, skip this lab and proceed to the next.
You want to promptly receive up-to-date versions of normalizers and correlation rules published by
Kaspersky experts. To do so, configure updates from Kaspersky servers in KUMA, download updates,
then import available resources to the Shared tenant. Use the received data to normalize the EDR
telemetry from the lab environment.
Contents
Task A: Configure and install the collector service for EDR telemetry
159
Lab 7. Configure receiving EDR telemetry from KATA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
4. Click + Add
b. Kind: kata/edr
c. URL: 10.28.0.51:443
160
Lab 7. Configure receiving EDR telemetry from KATA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
161
Lab 7. Configure receiving EDR telemetry from KATA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
We created it in one of the previous labs. If this folder is absent, create it.
17. Click + Add
162
Lab 7. Configure receiving EDR telemetry from KATA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
24. Click OK
163
Lab 7. Configure receiving EDR telemetry from KATA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
164
Lab 7. Configure receiving EDR telemetry from KATA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
36. Open the window with the SSH session to the kuma-core.abc.lab server. If you closed PuTTY,
start it and reconnect to kuma-core.abc.lab. Authenticate as admin with the password
Ka5per$Ky
38. Type sudo before the copied command to run it with superuser privileges; it should look as
follows:
165
Lab 7. Configure receiving EDR telemetry from KATA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
51. Select the [Lab] KEDR telemetry service and click the Restart button
166
Lab 7. Configure receiving EDR telemetry from KATA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
53. Make sure the [Lab] KEDR telemetry service has the green status now, which means that it is
running
54. Select the [Lab] KEDR telemetry collector and click Go to events to open the list of its events
A new tab with the Events page of the KUMA web console will open.
55. Make sure events have arrived
167
Lab 7. Configure receiving EDR telemetry from KATA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
If there are no events, wait 5 minutes and click the Run query button.
The Event details pane will open on the right. Notice that KUMA has parsed the EDR
telemetry event already and displays its attributes.
Conclusion
This lab demonstrates how to use the automatic resource update subsystem to get up-to-date
versions of normalizers and correlation rules published by Kaspersky experts and then to use the
downloaded KEDR telemetry event normalization settings to create a collector service in KUMA.
168
Lab 8. Configure DNS data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Scenario. You want to add missing data about computer names and IP addresses to events. For
example, if a raw event contains only an IP address but no name, or vice versa, you want the collector
to query DNS and add the data from the DNS response to the event. To do this, set up a DNS
enrichment rule in Kaspersky Unified Monitoring and Analysis and add this rule to the [OOTB] CEF
normalizer.
Contents
The dc, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines must be
powered on.
169
Lab 8. Configure DNS data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
6. Click + Add
170
Lab 8. Configure DNS data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
14. Click OK
By default, the [OOTB] CEF normalizer saves raw events only when it encounters an error
during normalization, for example, because of an incorrect format. If an event is
processed without errors, extra information will be discarded. To be able to compare a
normalized event with its raw version, we need to see what other data the initial event
contained.
171
Lab 8. Configure DNS data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
16. In the KUMA web console, open the Resources | Active services section
17. Click the name of the [OOTB] CEF WMI service to open its settings
172
Lab 8. Configure DNS data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
173
Lab 8. Configure DNS data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
28. Open the window with the SSH session to the kuma-core.abc.lab server
If you closed PuTTY, run it and connect to kuma-core.abc.lab as admin with the password
Ka5per$Ky.
29. Make sure you are in the events folder. If necessary, navigate to it using the command:
cd ~/events
34. Find a new event named Network attack detected and click on an empty space in its row to
open it
175
Lab 8. Configure DNS data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
The missing information (source name and destination address) was obtained through
DNS enrichment. The raw data contains neither the FQDN admin-laptop.abc.lab nor the
IP address 10.28.0.10.
Conclusion
176
Lab 8. Configure DNS data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
177
Lab 9. Configure GeoIP data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You want to supplement events with geolocation data based on IP addresses specified in various
fields of the initial event. You can use geodata from third-party sources such as MaxMind or
IP2Location, but they need to be converted to a format that KUMA 2.0 supports. Convert a MaxMind
GeoIP database to a format that KUMA supports. Upload the converted data to KUMA, configure a
geodata enrichment rule, and add this rule to the [OOTB] CEF normalizer.
Contents
1. Go to https://help.kaspersky.com
2. Scroll down the list of products and open the documentation for KUMA 3.2
178
Lab 9. Configure GeoIP data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
4. In the search box, enter MaxMind and open the article Converting geographic data from MaxMind
and IP2Location
5. Read the article and study the geodata format used in KUMA
6. Download the script that converts data from MaxMind and IP2Location to the KUMA geodata
format (use the corresponding link in the article)
179
Lab 9. Configure GeoIP data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
For example, right-click the Start button and select Windows PowerShell (Admin).
180
Lab 9. Configure GeoIP data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
10. Run the following command to convert MaxMind data from the C:\Max\MaxMind.zip archive to the
KUMA geodata format:
11. Wait for the script to complete (this may take several minutes). When ready, the message
Successfully done will appear in the console.
181
Lab 9. Configure GeoIP data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
17. Wait for the data to be uploaded successfully (which may take several minutes).
182
Lab 9. Configure GeoIP data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
When ready, the console will display the message After uploading geodata you must
restart services with ‘geographic data’ enrichment rules.
183
Lab 9. Configure GeoIP data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
b. Tenant: Main
During geodata enrichment, an IP address will be extracted from the SourceAddress field
of a KUMA event, and the corresponding geodata will be obtained from the database.
184
Lab 9. Configure GeoIP data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
185
Lab 9. Configure GeoIP data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
186
Lab 9. Configure GeoIP data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
187
Lab 9. Configure GeoIP data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
39. Open the window with the SSH session to the kuma-core.abc.lab server
If you closed PuTTY, run it and connect to kuma-core.abc.lab as admin with the password
Ka5per$Ky.
cd ~/events
In this task, it is important to send just a single event. If the utility sends several events,
the collector will "glue" them together and the normalizer will not be able to process them
correctly. To send exactly one event, add the --limit 1 parameter to the usual send
command. This sets a limit on the number of events per second.
43. Find the event that arrived at the [OOTB] CEF WMI collector. To do so, open Resources | Active
services and select the checkbox in the row with the collector service [OOTB] CEF WMI. Click
Go to events
188
Lab 9. Configure GeoIP data enrichment KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Conclusion
The lab demonstrates how to prepare and upload geodata to KUMA and then enrich the received
events with this information.
189
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
You want to populate the list of assets (computers) to take into account the asset’s category and
status when handling events. The easiest way to achieve this is to import computer information from
Kaspersky Security Center.
Contents
Task A: Configure an account for connections from KUMA in Kaspersky Security Center
Following the principle of minimum sufficiency, open Kaspersky Security Center and grant the
kuma.abc.lab user account the minimum permissions necessary for obtaining data about devices and
running Kaspersky Endpoint Security for Windows tasks on these devices.
The dc, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines must be
powered on.
190
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
If a browser warning about an insecure connection appears, select Advanced and then
Proceed to ksc.abc.lab (unsafe).
4. To quickly find the kuma user account in the table, type its name in the search field and press
ENTER
5. Select the kuma user that has the User type in the table and click the Assign role button
191
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
This role is sufficient for automating responses by launching Kaspersky Endpoint Security
tasks as well as for obtaining data about computers where the Network Agent is installed.
192
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
193
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
a. Name: ksc.abc.lab
b. URL: ksc.abc.lab:13299
c. Secret: [Lab]
[email protected]
If the Secret drop-down list does not show any records and the console hangs, refresh
the page or open Connection parameters in a new browser window.
194
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
Manually place the Admin-Laptop computer in the High business impact category. Create a filter to
automatically add assets to the Critical business impact category with the following parameters: the
OS version contains ‘Windows Server’.
20. Select the Main | Uncategorized assets category in the left pane
21. Click the Import KSC assets button (at the top right)
195
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
If you see devices that have already been included in Uncategorized assets, then the
import task has already been created automatically without you clicking the Import KSC
assets button. Proceed with the instructions anyway.
23. Click OK
196
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
29. Make sure the Main | Uncategorized assets category now contains the ADMIN-LAPTOP and
KSC devices
197
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
198
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
34. In the category tree on the left, expand the Main | Categorized assets node, then expand
Business impact
35. Click the Add category button below the tree of categories
199
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
b. Parent: Main /
Categorized assets /
Business impact
c. Categorization kind:
Manually
d. Severity: High
200
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
42. Click the Link to category button in the lower right corner
201
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
44. Select the Main | Categorized assets | Business impact | High business impact category in
the tree on the left
202
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
b. Parent: Main /
Categorized assets /
Business impact
c. Categorization kind:
Active
d. Severity: Critical
56. Open the Main | Categorized assets | Business impact | Critical business impact category in
the tree on the left
57. Make sure the KSC device has been automatically moved to the asset category
203
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
204
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
a. Asset name: DC
b. Tenant: Main
c. IP address: 10.28.0.10
d. FQDN: dc.abc.lab
64. Make sure a new DC device has appeared in the Uncategorized assets category
The manually created DC asset satisfies the criterion of the dynamic Critical business
Impact category. Make sure the device moves to this category automatically.
65. Open the Main | Categorized assets | Business impact | Critical business impact category in
the tree on the left. The DC device has most likely not yet been moved to this category.
This dynamic group of assets is updated once an hour; let’s start the categorization
manually to avoid waiting so long.
66. Hover the mouse cursor over the Critical business impact category, click … to the right of the
asset name and select Start categorization
205
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
69. Open the window with the SSH session to the kuma-core.abc.lab server
If you closed PuTTY, run it and connect to kuma-core.abc.lab as admin with the password
Ka5per$Ky.
206
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
cd ~/events
71. To replay recorded events from the event05 file, run the following command (type it on a single
line):
73. Find the events that have arrived at the [OOTB] CEF WMI collector
Open Resources | Active services, select the checkbox in the row for the [OOTB] KSC
collector service. Click Go to events, and then click on the magnifying glass icon.
207
Lab 10. Import information about computers from Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center
The missing information about the source name and destination IP of the network attack
was obtained thanks to DNS enrichment; this data allowed the system to link the event
with the admin-laptop.abc.lab and dc.abc.lab assets.
Conclusion
This lab demonstrates how to import assets from Kaspersky Security Center, how to create them
manually and how to categorize them. A subsequent lab will show how you can use asset categories
in the conditions of correlation rules.
208
Lab 11. Configure event enrichment using Active Directory KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You want to import information about domain users to KUMA to be able to enrich events with this
data. This will allow you to see extended information about accounts in events and configure
correlation rules based on account membership in Active Directory groups. For this purpose,
configure an LDAP connection to the domain controller in the KUMA settings.
Contents
Task C: Make sure KATA events contain detailed information about the user
The dc, kata-cn, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines
must be powered on.
Start the kata-cn virtual machine, which is required for this lab.
1. In the KUMA web console, open the Settings section
209
Lab 11. Configure event enrichment using Active Directory KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
210
Lab 11. Configure event enrichment using Active Directory KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
a. Name: abc.lab
b. Secret: [Lab]
[email protected]
c. URL: dc.abc.lab:389
d. Type: insecure
e. Base DN:
DC=abc,DC=lab
[Lab] [email protected] is a secret with access credentials that we created in one of the
previous labs for the kuma.abc.lab service account. We will use this secret because the
permissions of this account are quite sufficient for sending LDAP requests.
211
Lab 11. Configure event enrichment using Active Directory KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
11. In the KUMA web console, open the Task manager section
12. Make sure the Accounts import task manually created by the Administrator has appeared in the
list
16. Click the name of the [Lab] KATA service to open its settings
212
Lab 11. Configure event enrichment using Active Directory KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
213
Lab 11. Configure event enrichment using Active Directory KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
This table establishes a mapping between the KUMA event fields and account attributes
obtained from LDAP, whose values will be checked during the enrichment process. If a
value of a KUMA event field matches an attribute from Active Directory, the corresponding
Windows account data will be used to enrich the KUMA event and will be added to the
field specified in the KUMA event field to write to field.
Send [email protected] an email containing a link to a test page that imitates a malicious site. Find the
corresponding event from Kaspersky Anti Targeted Attack in the KUMA console and make sure it
214
Lab 11. Configure event enrichment using Active Directory KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
26. Open PowerShell and run the following command (type it on a single line) to send an email:
27. In the KUMA console, find the events that have arrived at the [Lab] KATA collector
Open Resources | Active services, select the checkbox in the row with the [Lab] KATA
collector service and click Go to events.
28. Find and open the event that has URL from mail detected in the Name column and [email protected]
in the DestinationUserName column
If the event does not arrive, try sending the email again using 10.28.0.51 as the IP
address of the KATA SMTP server.
215
Lab 11. Configure event enrichment using Active Directory KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
216
Lab 11. Configure event enrichment using Active Directory KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Conclusion
This lab demonstrates how to add account information from Active Directory to KUMA, how to
configure LDAP enrichment in collector service settings, and where to find this information in the
events that arrive.
217
Lab 12. Configure enrichment with CyberTrace data KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You want to enrich data in KUMA with information from data feeds provided by Kaspersky
CyberTrace. This will allow analysts to see additional information and the context of threats
associated with the indicator from the KUMA event.
Configure an enrichment rule and connection to CyberTrace in the KUMA settings. Enable data
enrichment from CyberTrace for the KUMA event normalizer.
Contents
The cybertrace, dc, kata-cn, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-
laptop machines must be powered on.
Start the cybertrace virtual machine, which is required for this lab.
218
Lab 12. Configure enrichment with CyberTrace data KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Ask the trainer where to find the key file for Kaspersky CyberTrace.
2. Start Google Chrome and go to https://cybertrace.abc.lab
6. Click Browse
219
Lab 12. Configure enrichment with CyberTrace data KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
a. Name: [Lab]
[email protected]
ab
b. Tenant: Main
c. Kind: credentials
d. User: admin
e. Password: Ka5per$Ky
a. Host: 10.28.0.13
b. Port: 443
220
Lab 12. Configure enrichment with CyberTrace data KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
20. Notice that the CyberTrace section has appeared on the menu in the KUMA web console; open it
and wait for the CyberTrace console to load
221
Lab 12. Configure enrichment with CyberTrace data KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
23. Make sure the following values are set in the Service listens on area:
a. IP address: 0.0.0.0
b. Port: 9999
c. URL: 10.28.0.13:9999
223
Lab 12. Configure enrichment with CyberTrace data KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
28. Click + Add mapping four times to add four new entries to the Mapping section
29. Fill in the KUMA field and CyberTrace indicator fields with the following values:
SourceAddress ip
DestinationAddress ip
FilePath url
DeviceCustomString4 hash
This table maps KUMA event fields to the CyberTrace indicator fields that will be
compared during the enrichment process. If the hash, IP address or URL from a KUMA
event matches a CyberTrace indicator, then CyberTrace data will be used to enrich the
KUMA event.
31. Click Create new in the lower-left corner to create and save the resource
224
Lab 12. Configure enrichment with CyberTrace data KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
32. In the KUMA web console, open the Resources | Active services section
33. Click the name of the [OOTB] CEF WMI service to open the collector settings
225
Lab 12. Configure enrichment with CyberTrace data KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
ioc_type: IP
Doing this will cause only IP addresses to be displayed in the list of indicators of
compromise.
43. Copy an IP address that CyberTrace treats as an indicator of compromise to the clipboard
226
Lab 12. Configure enrichment with CyberTrace data KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
44. Open the window with the SSH session to the kuma-core.abc.lab server
If you closed PuTTY, run it and connect to kuma-core.abc.lab as admin with the
password Ka5per$Ky.
cd events/
mcedit event07
47. Paste the IP address copied from CyberTrace at the very end of the test event (the dst field). As
a result, it should look like this:
CEF:0||netflow|IPFIX|||4|deviceInboundInterface=11
deviceOutboundInterface=89 src=10.28.0.150 spt=151354 in=149
proto=TCP flexNumber1=1 flexNumber1Label=packets dpt=53
dst=<address from the clipboard>
227
Lab 12. Configure enrichment with CyberTrace data KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
49. Run the following command to replay recorded events from the event07 file. Pay attention to the
parameter at the end:
51. Find the event that arrived at the [OOTB] CEF WMI collector.
Open Resources | Active services, select the checkbox in the row with the [OOTB] CEF
WMI collector service and click Go to events. Look for the event where the
DestinationAddress field contains the IP address that you specified in the event07 file.
52. To open the new event, click on an empty space in its row
228
Lab 12. Configure enrichment with CyberTrace data KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
229
Lab 12. Configure enrichment with CyberTrace data KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Conclusion
The lab demonstrates how to set up integration between KUMA and CyberTrace and enrich KUMA
events with CyberTrace data.
230
Lab 13. Configure cold storage for events in KUMA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You want to optimize event storage in Kaspersky Unified and Analysis Platform by moving some
events to low-performance hardware that is less expensive.
Contents
The dc, kata-cn, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines
must be powered on.
231
Lab 13. Configure cold storage for events in KUMA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
3. Click Open
5. In AWS, an unformatted 30GB drive is connected to the kuma-storage-1 virtual machine; find out
its name using the following command (the drive name will be specified at the beginning of the
line with the command output; memorize it):
lsblk | grep 30
If the lab is performed on Vmware ESXi with Oracle storages, the disk is named sdb; you
don’t need to check this — just use the sdb name in further commands.
6. Format the cheap low-end disk designed for cold storage of events:
232
Lab 13. Configure cold storage for events in KUMA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
9. Press ENTER three times without entering any data when prompted for the partition number and
the first and last sectors
10. Run the w command to write the configured changes to the disk
11. If your lab environment is deployed in AWS, run the following command to find out the name of
the created partition:
lsblk | grep 30
12. Write down or save the partition name. You will need it when editing the fstab file
233
Lab 13. Configure cold storage for events in KUMA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
If the lab is performed on Vmware ESXi with Oracle storages, the partition will be named
sdb1; you don’t need to check this — just use the sdb1 name in further commands.
13. Format the partition to an xfs file system using its name from the previous step:
In a VMWare ESXi environment with Oracle, the command will look like this: sudo mkfs
-t xfs /dev/sdb1.
14. Create the /media/backup directory that the cold storage disk will be mounted to:
In a VMWare ESXi environment with Oracle, the command will look like this: sudo
mount /dev/sdb1 /media/backup.
234
Lab 13. Configure cold storage for events in KUMA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
17. Add the configuration of the mounted disk to /etc/fstab to ensure that it persists after the operating
system restarts on kuma-storage-1.abc.lab. To do this, open the file with the command:
In a VMWare ESXi environment with Oracle, the line will look like this: /dev/sdb1
/media/backup xfs defaults 0 2.
The file contents in the screenshot may differ from the file contents in your lab
environment. It is important to correctly add the new line to the end of the file. Keep in
mind that columns in this file are separated by tabs or spaces.
It is critical that you edit the fstab file without introducing any typos. If you make a typo, a
problem is very likely to arise the next time the virtual machine starts. Check each
character carefully, including slashes.
19. Press F10 and select Yes to save and close the file
20. Close the PuTTY window with the admin@kuma-storage-1 user session. We won’t need it
anymore
235
Lab 13. Configure cold storage for events in KUMA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
25. In AWS, an unformatted 30GB drive is connected to the kuma-storage-2 virtual machine; find out
its name using the following command (the drive name may differ from the drive name on kuma-
storage-1; it will be specified at the beginning of the command output; memorize it):
lsblk | grep 30
If the lab is performed on Vmware ESXi with Oracle storages, the disk is named sdb; you
don’t need to check this — just use the sdb name in further commands.
26. Format the cheap low-end disk designed for cold storage of events:
In a VMWare ESXi environment with Oracle, the command will look like this: sudo
fdisk /dev/sdb.
236
Lab 13. Configure cold storage for events in KUMA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
29. Press ENTER three times without entering any data when prompted for the partition number and
the first and last sectors
30. Run the w command to write the configured changes to the disk
237
Lab 13. Configure cold storage for events in KUMA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
31. If your lab environment is deployed in AWS, run the following command to find out the name of
the created partition:
lsblk | grep 30
32. Write down or save the partition name. You will need it when editing the fstab file
If the lab is performed on Vmware ESXi with Oracle storages, the partition will be named
sdb1; you don’t need to check this — just use the sdb1 name in further commands.
33. Format the partition to an xfs file system using its name from the previous step:
In a VMWare ESXi environment with Oracle, the command will look like this: sudo mkfs
-t xfs /dev/sdb1.
34. Create the /media/backup directory that the cold storage disk will be mounted to:
In a VMWare ESXi environment with Oracle, the command will look like this: sudo
mount /dev/sdb1 /media/backup.
238
Lab 13. Configure cold storage for events in KUMA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
37. Add the configuration of the mounted disk to /etc/fstab to ensure that it persists after the operating
system restarts on kuma-storage-2.abc.lab.
In a VMWare ESXi environment with Oracle, the line will look like this: /dev/sdb1
/media/backup xfs defaults 0 2.
The file contents in the screenshot may differ from the file contents in your lab
environment. It is important to correctly add the new line to the end of the file. Keep in
mind that columns in this file are separated by tabs or spaces.
It is critical that you edit the fstab file without introducing any typos. If you make a typo, a
problem is very likely to arise the next time the virtual machine starts. Check each
character carefully, including slashes.
39. Press F10 and select Yes to save and close the file
40. Minimize the PuTTY window with the admin@kuma-storage-2 user session. We will need it later
239
Lab 13. Configure cold storage for events in KUMA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
43. Select an [OOTB] Storage service (any except the keeper, which is installed on kuma-
core.abc.lab) and click Go to partitions
44. Notice the available partitions, stored events and values in the Transfer to cold storage column
240
Lab 13. Configure cold storage for events in KUMA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
These are dates when events will be automatically moved to cold storage. Since we have
not yet configured cold storage on the KUMA side, this is actually the date when the
corresponding events will be deleted.
241
Lab 13. Configure cold storage for events in KUMA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
At this point, these settings specify only the retention time for the main storage.
49. Scroll down the resource
settings card to the Disks for
cold storage area
242
Lab 13. Configure cold storage for events in KUMA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Retention 1
period
Cold retention 31
period
Audit 365
retention
period
Audit cold 0
retention
period
As a result, KUMA audit events will be stored only on the fast drives of the main storage
for 365 days, after which they will be deleted from the system. All other events will be
stored for 1 day on the fast drives of the main storage, then they will be transferred to the
slow disks of the cold storage and retained for 31 days more.
53. Scroll down the window. For In the Path field, don’t forget the trailing slash / at the
the added disk in the lower end of the disk path.
part of the window, specify
the following parameters for
the disks that provide cold
storage of events:
a. FQDN: Local
b. Name: Backup
c. Path: /media/backup/
243
Lab 13. Configure cold storage for events in KUMA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
59. Click the Refresh button (the icon next to the search box) periodically to monitor the status of
storage services
60. Wait for the services to restart and the Status to become green, which means that the service
has started and is running without errors.
62. Notice the available partitions, stored events and values in the Transfer to cold storage column
244
Lab 13. Configure cold storage for events in KUMA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You may have a smaller list of partitions — partitions are created every day. The dates
have changed according to the current settings of the [OOTB] Storage service. For Kuma
Default partitions, the date of transfer to the cold storage should be tomorrow and storage
expiration should be next month (+31 days from today).
245
Lab 13. Configure cold storage for events in KUMA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
63. Open the window with the SSH session to the kuma-storage-2.abc.lab server
If you closed PuTTY, run it and connect to kuma-storage-2 as admin with the password
Ka5per$Ky.
64. Run the following command to make sure that after new settings were applied, database
partitions were created into which events that meet the configured cold storage criteria have
already been moved:
Events are moved to cold storage when they expire in primary (hot) storage. In our lab
environment, a day must pass before this occurs. If you install KUMA and complete this
lab on the same day, new partitions will be created only the next day, because sufficiently
old events simply do not exist in the storage. If the storage contains events for the
previous day (that is, you started completing the labs yesterday), the backup partitions
may appear some time later today. You can proceed to the next lab, and return to this one
in about half an hour.
69. Notice the available data about new partitions (size on disk, number of events, event transfer date
and time)
246
Lab 13. Configure cold storage for events in KUMA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
72. Set the time period for events: last month, excluding the current date when you are performing
this task
In our example, we chose the interval of June 1-17, because the lab was performed on
June 18.
74. In the query field, add the following condition to display only non-audit events:
76. Notice that all the matching events have been found, and the logic and syntax of the search query
do not change regardless of the partition where events are located
247
Lab 13. Configure cold storage for events in KUMA KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
By doing this, only events from the cold storage will be displayed in the search results
(non-audit events over the last month, excluding the current date).
Conclusion
This lab demonstrates how to optimize storage in Kaspersky Unified and Analysis Platform by
creating additional database partitions and storing historical data on cheaper low-performance
hardware.
248
Lab 14. Create a simple correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You want to receive alerts when the IDS technology of Kaspersky Anti Targeted Attack detects a
dangerous object in the traffic of computers that belong to the High business impact asset category.
Contents
The dc, kata-cn, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines
must be powered on.
249
Lab 14. Create a simple correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
2. In the Resources section, click Active services. Select the row with the [Lab] KATA collector
service and click Go to events.
Kaspersky Anti Targeted Attack events should appear in the list, including several events
named IDS event detected.
3. Open the latest IDS event detected event that has destination address 10.28.0.10
If the DestinationAddress column is not displayed in the search results, click the gear
icon to add it.
To generate alerts for such events, you need to configure a condition that unambiguously
describes events of this type. The following fields come in handy: DeviceProduct: KATA,
and DeviceEventClassId: ids.
It is the result of an implicit enrichment (i.e. not as a result of applying an enrichment rule)
of an event with data about assets. This means that when configuring a correlation rule,
you can add a condition that checks if the computer belongs to a particular asset category.
6. And note the DeviceCustomString1 field that contains the name of the detected threat
250
Lab 14. Create a simple correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
251
Lab 14. Create a simple correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
8. Go to Resources |
Correlation rules
b. Kind: Simple
c. Propagated fields:
DeviceCustomString1
d. Severity: Medium
252
Lab 14. Create a simple correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
A simple rule is applied every time when an event that matches the specified conditions is
detected.
To speed up field selection, type a part of the field name in the combo box: this will narrow
down the list to the matching fields. When you see the necessary field in the list, select it.
You can do this several times for different fields.
Generally, KATA IDS alerts are not very important when considered by themselves. But
we will specify an additional condition that these detections relate to highly important
assets.
If DeviceProduct = KATA
If DeviceEventClassID = ids
253
Lab 14. Create a simple correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Output sends the correlation event to the storage, and Loop to correlator sends it back
to the correlator’s input. Loop enables you to cascade correlation rules when the result of
triggering one rule is a condition for another rule.
24. In the KUMA web console, open the Resources | Active services section
255
Lab 14. Create a simple correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
26. In the window that opens, switch to the Correlation section and click Link
256
Lab 14. Create a simple correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
nslookup bandtester.com
257
Lab 14. Create a simple correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
34. Make sure a [Lab] KATA IDS detection alert has appeared on the list
258
Lab 14. Create a simple correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Conclusion
This lab demonstrates how to create a simple correlation rule (one where each event that meets the
specified conditions triggers the rule), how to configure conditions for a correlation rule, how to add a
computer category to the conditions, where to find the results of correlation rules’ operation.
It is the correlator service that applies correlation rules. When a rule is triggered, the service creates a
correlation event. The kuma-core service generates alerts when correlation events appear. All
correlation events related to the same rule are added to the same alert. If an analyst closes an alert, a
new alert will be created when new correlation events of this type appear.
Subsequent labs will demonstrate how to create more complex correlation rules.
259
Lab 15. Create a standard correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
KATA URL reputation technology generates a large number of detections, most of which are not very
important. You only want to receive alerts from KUMA when the same computer establishes multiple
connections to a dangerous URL in a short period of time.
Contents
The dc, kata-cn, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines
must be powered on.
curl http://www.kaspersky.com/test/wmuf
260
Lab 15. Create a standard correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
3. Find the events that have arrived at the [Lab] KATA collector
Open Resources | Active services, select the checkbox in the row with the [Lab] KATA
collector service and click Go to events.
261
Lab 15. Create a standard correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
In this example, we will use the DeviceProduct and DeviceEventClassId fields, which
have the KATA and url_web values respectively.
262
Lab 15. Create a standard correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
7. Go to Resources |
Correlation rules
b. Kind: standard
c. Identical fields:
SourceAddress,
RequestUrl
d. Window, sec: 30
e. Severity: Medium
The rule will group events where the SourceAddress and RequestUrl fields coincide and
count them separately for each group. The correlation event will only contain a link to the
first event that meets the criteria. This is quite reasonable since the rule deals with events
of the same type.
263
Lab 15. Create a standard correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
13. Select the Save filter checkbox under the Filter field
If DeviceProduct = KATA
If DeviceEventClassID = url_web
265
Lab 15. Create a standard correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
266
Lab 15. Create a standard correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
267
Lab 15. Create a standard correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
30. Open the PowerShell window and run the following command
32. Make sure the [Lab] Multiple connections to a malicious URL from the same host alert has
appeared on the list
There is only one related event, which corresponds to the correlation rule setting Base
event keep policy: first.
35. Click the Close alert button to close the alert and remove it from the list
268
Lab 15. Create a standard correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
37. Return to the list of alerts and make sure the closed alert is not displayed
38. Note that the Status heading is highlighted yellow, which means that a filter has been configured
for this header
269
Lab 15. Create a standard correlation rule KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Conclusion
This lab demonstrates how to create a standard correlation rule that reacts to a combination of
events, how to close an alert and where to find closed alerts if necessary.
270
Lab 16. Configure an alert for events logged in a specific order KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You want to generate a higher priority alert if Kaspersky Anti Targeted Attack detects a connection to a
malicious URL that has been previously detected in email.
Contents
Task A: Prepare filters to select url_web and url_mail events from KATA
Create two filters: for url_web events from KATA and url_mail events from KATA.
The dc, kata-cn, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines
must be powered on.
271
Lab 16. Configure an alert for events logged in a specific order KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
DeviceProduct='KATA'
AND DeviceEventClassID='url_mail'
272
Lab 16. Configure an alert for events logged in a specific order KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
12. Name the filter [Lab] KATA url from web detection
DeviceProduct='KATA'
AND DeviceEventClassID='url_web'
273
Lab 16. Configure an alert for events logged in a specific order KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
b. Kind: standard
c. Identical fields:
RequestUrl
d. Window, sec: 30
f. Severity: Critical
274
Lab 16. Configure an alert for events logged in a specific order KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
The rule correlates events where the same dangerous URL is detected in different types
of traffic, i.e. in different types of events. That’s why we specified RequestUrl in Identical
fields. We also enabled saving all events, since the rule correlates events of different
types and they may all be interesting to analyze.
275
Lab 16. Configure an alert for events logged in a specific order KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
276
Lab 16. Configure an alert for events logged in a specific order KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
277
Lab 16. Configure an alert for events logged in a specific order KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
35. In the PowerShell window, run the following command (type it in a single line):
curl http://www.kaspersky.com/test/wmuf
38. Make sure a [Lab] Connection to URL earlier detected in mail alert has appeared on the list
The alert should appear after a few seconds. If it does not appear, try changing the email
subject arbitrarily and repeating the commands a couple of times with an interval of 5
seconds.
40. Pay attention to the list of related events; they are grouped by the RequestUrl field
The correlation event includes both events that triggered the alert, which corresponds to
the correlation rule settings Base event keep policy: all.
42. Click the Close alert button, select the Responded reason, and click OK
279
Lab 16. Configure an alert for events logged in a specific order KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Conclusion
280
Lab 17. Create a correlation rule using a local variable KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You want to receive alerts if KATA URL reputation technology detects something on specific days of
the week. For example, we consider some situations to be normal on weekdays but suspicious if they
occur on weekends. To achieve this, we will need to perform additional actions on the data contained
in source events. KUMA provides variables and functions for this purpose.
Contents
The dc, kata-cn, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines
must be powered on.
281
Lab 17. Create a correlation rule using a local variable KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
4. Click Duplicate
b. Propagated fields:
DeviceCustomString1,
DeviceCustomString2,
$weekday
Enter the value $weekday manually and click Add "$weekday". We will write the day on
which the event is logged into this variable.
8. Click + Add
a. Variable: weekday
282
Lab 17. Create a correlation rule using a local variable KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
DeviceProduct='KATA'
AND DeviceEventClassID='ids'
AND $weekday=[
'current_day_of_the_week_in_English',
'Saturday',
'Sunday'
]
We are specifying today’s day of the week in order to demonstrate how the rule works and
the creation of an alert. In real life, specify days in accordance with the intended detection
logic, for example, Saturday and Sunday to receive alerts about events that occur only on
weekends. This lab is expected to run on a weekday, so we add the current day of the
week, e.g. Wednesday, to the selector conditions.
283
Lab 17. Create a correlation rule using a local variable KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
c. Target field:
DeviceCustomString2
284
Lab 17. Create a correlation rule using a local variable KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
b. Target field:
DeviceCustomString2La
bel
c. Constant: Weekday
Technically, this enrichment is not required for the rule to work. We’ve added it to simplify
the analyst’s work. The analyst will immediately see the day of the week the event
occurred on. There will be no need to check the calendar. The name of the day of the
week will be saved in the DeviceCustomString2 field. We use the
DeviceCustomString2Label field to specify a meaningful name for the analyst’s
convenience.
285
Lab 17. Create a correlation rule using a local variable KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
17. In the KUMA web console, open the Resources | Active services section
286
Lab 17. Create a correlation rule using a local variable KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
nslookup bandtester.com
287
Lab 17. Create a correlation rule using a local variable KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
26. Make sure a [Lab] KATA IDS detection on weekdays alert has appeared on the list
29. Click on an entry in the Related events area to open the properties of the corresponding
correlation event
30. Notice that the value of the local variable weekday is written in the DeviceCustomString2 field
of the correlation event
When the URL was accessed, KATA generated several events at once, so we have
several correlation events in the alert.
288
Lab 17. Create a correlation rule using a local variable KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
If other correlation rules have been triggered, close the corresponding alerts too.
Conclusion
The lab demonstrates how you can use variables and functions in KUMA correlation rules to
transform the initial data.
289
Lab 18. Create an operational correlation rule to fill an active list KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You want to improve detection of cases when a user clicks a malicious link that has previously been
detected in an email message. In particular, you want the rule to be applied even if several hours have
passed (but no more than a day) between the message delivery and clicking the link. To do this, you
need to maintain a list of dangerous addresses found in email over the last 24 hours.
Contents
Later, we will create a rule that will fill this list with addresses from KATA url_mail events.
The dc, kata-cn, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines
must be powered on.
290
Lab 18. Create an operational correlation rule to fill an active list KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
b. Tenant: Main
c. TTL: 86400
291
Lab 18. Create an operational correlation rule to fill an active list KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
b. Kind: operational
15. Click + Add active list action and fill in the parameters:
b. Operation: Set
292
Lab 18. Create an operational correlation rule to fill an active list KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
17. Make sure the new rule has appeared on the list
18. In the KUMA web console, open the Resources | Active services section
293
Lab 18. Create an operational correlation rule to fill an active list KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
294
Lab 18. Create an operational correlation rule to fill an active list KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
26. Open the PowerShell window and run the following command (type it in a single line):
28. Select the checkbox next to the correlator service and click the Go to active lists button at the
top
31. Make sure the list contains a record with the Key field that begins with
http://www.kaspersky.com/test/wmuf
32. Click the record and make sure the URL field contains the test pseudo-dangerous address
Conclusion
This lab demonstrates how to create an active list and fill it with data from events. You can use this
data in other correlation rules, too.
In this lab, we used an operational rule to fill a list. Such a rule can only change contents of active
lists; it does not create correlation events or alerts.
Not only operational, but also simple and standard correlation rules can fill active lists. You can export
and import the contents of lists.
296
Lab 19. Create a correlation rule using an active list KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You want to receive alerts if a malicious link detected in traffic has previously been encountered in an
email. You have already created an active list for dangerous links detected in email. Now, create a
correlation rule that will be applied if a dangerous link detected in traffic is also present in the active
list.
Contents
The dc, kata-cn, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines
must be powered on.
297
Lab 19. Create a correlation rule using an active list KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
3. Click + Add
b. Kind: simple
c. Propagated fields:
RequestUrl,
SourceAddress
d. Severity: Critical
298
Lab 19. Create a correlation rule using an active list KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
KATA and url_web are constants, and [Lab] Malicious URLs detected in mail is an active
list.
299
Lab 19. Create a correlation rule using an active list KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
13. In the KUMA web console, open the Resources | Active services section
300
Lab 19. Create a correlation rule using an active list KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
23. Open the PowerShell window and run the following command (type it in a single line):
curl http://www.kaspersky.com/test/wmuf
24. Open the KUMA web console and switch to the Alerts section
25. Make sure a [Lab] Connection to URL earlier detected in mail (active list) alert has appeared on
the list
26. Select the alert and click the Close alert button below the list
Conclusion
This lab demonstrates how to use active lists when you create conditions for a correlation rule.
301
Lab 20. Run retrospective scanning KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You want to detect situations when an RCE attack is performed sequentially on networked devices,
followed by PowerShell being launched on the attacked device. Also, you want to find out if this has
happened in the past. Do this using retrospective scanning.
Contents
The dc, kata-cn, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines
must be powered on.
1. Open the window with the SSH session to the kuma-core.abc.lab server.
If you closed the previous session, start PuTTY, connect to the kuma-core.abc.lab server,
and log in as admin with the password Ka5per$Ky.
302
Lab 20. Run retrospective scanning KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
cd ~/events
3. Run the command to send the prepared event from the event15 file. Note that the --limit 1
parameter must be specified in the command:
6. Find the events that have arrived at the [OOTB] CEF WMI collector
Open Resources | Active services, select the checkbox in the row with the [OOTB] CEF
WMI collector service and click Go to events.
303
Lab 20. Run retrospective scanning KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
7. Find and open events with the netflow and Windows 10 values in the DeviceProduct field
304
Lab 20. Run retrospective scanning KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Since the name and IP address of the attacked host are written into different fields after normalization
(the host is first reported as a destination and then as a source), we cannot correlate such events
using identical fields. You will need to write values from the initial event fields into the local variable
$host in each selector, and then group events by the values written to the local $host variable.
305
Lab 20. Run retrospective scanning KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
b. Tenant: Main
c. Kind: standard
b. Window, sec: 10
d. Severity: Critical
We will write the address of the attacked device from the events informing about the RCE
attack and powershell.exe launch into the $host variable.
306
Lab 20. Run retrospective scanning KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
a. Alias: RCE
Message='RCE
Vulnerability
Execution'
a. Variable: host
b. Value:
DestinationHostName
For the RCE attack event, write the value from the DestinationHostName field into the
$host variable.
307
Lab 20. Run retrospective scanning KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Message='Powers
hell launch'
a. Variable: host
b. Value: SourceHostName
308
Lab 20. Run retrospective scanning KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
For the powershell.exe launch event, write the value from the SourceHostName field into
the $host variable.
c. Target field:
DeviceHostName
We’ve further enriched the correlation event with the value of the $host variable. If the rule
is triggered, the value of the $host variable will be written into the DeviceHostName field
of the correlation event.
309
Lab 20. Run retrospective scanning KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
310
Lab 20. Run retrospective scanning KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
41. Open the three-dot menu (…) in the upper-right corner and select Retroscan
Retrospective scanning takes into account the specified storage, time period and search
criteria.
311
Lab 20. Run retrospective scanning KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You can select from among the rules that are specified in the correlator settings.
46. Switch to the Task Manager
section
49. A new tab with events will open. Make sure the search results contain detected events
51. Pay attention to the event type Correlated and the name of the correlation rule
52. Notice that the correlation event was enriched with the value of the $host variable, which was
written into the DeviceHostName field of the correlation event
312
Lab 20. Run retrospective scanning KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
The correlator outputs correlated events. The KUMA core service then creates alerts from
them.
54. A new tab will open with the Alerts section selected and the alert open. Study the information in
the Related events and Related endpoints sections
55. Make sure correlation was applied to the historical events that were generated during the first
task
Conclusion
313
Lab 20. Run retrospective scanning KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
314
Lab 21. Configure a response by running a Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center task
Contents
Task B: Run the task via the computer properties in the KUMA web console
The dc, kata-cn, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines
must be powered on.
315
Lab 21. Configure a response by running a Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center task
3. Go to Devices | Tasks
316
Lab 21. Configure a response by running a Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center task
a. Application: Kaspersky
Endpoint Security for
Windows
7. Click Next
318
Lab 21. Configure a response by running a Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center task
15. In the Scan scope list, leave the Kernel memory, Running processes and startup objects
and Disk boot sectors options enabled
319
Lab 21. Configure a response by running a Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center task
Task B: Run the task via the computer properties in the KUMA
web console
In the Assets section, find the admin-laptop computer and run the created Kaspersky Security
Center task there.
320
Lab 21. Configure a response by running a Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center task
321
Lab 21. Configure a response by running a Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center task
23. Click the Kaspersky Endpoint Security icon in the notification area to open the local interface of
Kaspersky Endpoint Security for Windows
24. In the main window of Kaspersky Endpoint Security, click the Reports tile
25. In the Reports window, scroll to the bottom of the left pane and select Scan
26. Make sure the scan task has started on the computer
27. In the local interface, the running task is displayed as Custom scan
322
Lab 21. Configure a response by running a Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center task
323
Lab 21. Configure a response by running a Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center task
b. Tenant: Main
e. Event Field:
SourceAssetID
This field contains the identifier of the computer where the task will run. To run it on the
DestinationAccessID computer too, you need to create another response rule.
Priority=4
324
Lab 21. Configure a response by running a Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center task
Here priority is a ratio calculated using the following formula: priority = (correlation rule
priority + maximum weight of affected hosts) / 2. If none of the affected hosts is registered
in KUMA as an asset, then the priority will be equal to the rule priority. None – 0; Low – 1;
Normal – 2; High – 3; Critical – 4.
325
Lab 21. Configure a response by running a Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center task
42. Go to Resources |
Correlation rules
326
Lab 21. Configure a response by running a Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center task
46. In the KUMA web console, open the Resources | Active services section
47. Select the checkbox for the [OOTB] Correlator service and click the Update configuration
button above the list
327
Lab 21. Configure a response by running a Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center task
49. Open the PowerShell window and run the following command
curl http://www.kaspersky.com/test/wmuf/
50. Open the Alerts section in the KUMA web console and make sure a new [Lab] Connection to
URL earlier detected in mail alert with Critical priority has appeared
51. Open Kaspersky Endpoint Security reports and switch to the Scan section
52. Make sure the on-demand scan task has started again
328
Lab 21. Configure a response by running a Kaspersky Security KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Center task
Conclusion
This lab demonstrates how to run Kaspersky Endpoint Security tasks configured in Kaspersky
Security Center from the KUMA console. It also shows how to set up an automated response,
including starting Kaspersky Security Center tasks, when a correlation event occurs.
329
Lab 22. Configure a response by running a Kaspersky Endpoint KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Detection and Response task
You want to run Kaspersky Endpoint Detection and Response tasks on affected devices in case of a
dangerous situation. To do this, you need to configure integration with KATA EDR. It will then be
possible to respond to detected incidents by running Kaspersky Endpoint Agent tasks from KUMA.
Contents
Task C: Run the task via the computer properties in the KUMA web console
The dc, kata-cn, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines
must be powered on.
3. Click + Add
330
Lab 22. Configure a response by running a Kaspersky Endpoint KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Detection and Response task
b. Tenant: Main
c. Kind: kata/edr
331
Lab 22. Configure a response by running a Kaspersky Endpoint KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Detection and Response task
332
Lab 22. Configure a response by running a Kaspersky Endpoint KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Detection and Response task
a. Host: kata-cn.abc.lab
b. Port: 443
19. In a new web browser window, open the Kaspersky Anti Targeted Attack Central Node web
console at https://kata-cn.abc.lab:8443
If a browser warning about an insecure connection appears, select Advanced and then
Proceed to kata-cn.abc.lab (unsafe).
333
Lab 22. Configure a response by running a Kaspersky Endpoint KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Detection and Response task
23. In the Server list, find the entry that corresponds to the new KUMA system with the Pending
status. Click Accept
Task C: Run a task via the computer properties in the KUMA web
console
Use the KEDR functionality to respond to the [Lab] RCE + Powershell run alert that was generated in
one of the previous labs.
26. In the list of alerts, find [Lab] RCE + Powershell run and open it
334
Lab 22. Configure a response by running a Kaspersky Endpoint KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Detection and Response task
335
Lab 22. Configure a response by running a Kaspersky Endpoint KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Detection and Response task
a. Traffic direction:
Outbound
a. Traffic direction:
Outbound
336
Lab 22. Configure a response by running a Kaspersky Endpoint KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Detection and Response task
41. Close the Kaspersky Endpoint Agent notification window and return to the KUMA web console
The web console remains accessible thanks to the exceptions specified in the network
isolation task settings.
43. Click on the arrow in the Related events section to expand the list of base events related to the
correlation event
337
Lab 22. Configure a response by running a Kaspersky Endpoint KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Detection and Response task
338
Lab 22. Configure a response by running a Kaspersky Endpoint KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Detection and Response task
47. Start Notepad and paste the data from the clipboard there
339
Lab 22. Configure a response by running a Kaspersky Endpoint KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Detection and Response task
50. Return to the KUMA web console and close the event card
b. Command line parameters: Get-FileHash <the full path along with the script name from
the alert>
340
Lab 22. Configure a response by running a Kaspersky Endpoint KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Detection and Response task
This lets us remotely calculate the hash sum of the script that was run during the incident.
56. In the KUMA web console, open the Task manager section
57. Make sure the Run program via KEDR task created by the Administrator has appeared in the list
of tasks
58. Wait for the Run program via KEDR task to become Completed
60. In the task results card, click on the icon to the right of the Standard stream output field to
download a file with the output of the Get-FileHash command
341
Lab 22. Configure a response by running a Kaspersky Endpoint KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Detection and Response task
61. Copy the calculated hash of the malicious script from the downloaded output.txt file to the
clipboard
63. Expand the Main | Business impact node and select the High business impact category
342
Lab 22. Configure a response by running a Kaspersky Endpoint KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Detection and Response task
66. In the Task type drop-down list, select Add prevention rule
b. File hash #1: <paste the script hash from the clipboard>
343
Lab 22. Configure a response by running a Kaspersky Endpoint KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Detection and Response task
344
Lab 22. Configure a response by running a Kaspersky Endpoint KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Detection and Response task
If a browser warning about an insecure connection appears, select Advanced and then
Proceed to kuma-core.abc.lab (unsafe)
If the page does not open, try using the IP address https://10.28.0.61:7220 instead of the
FQDN.
77. Expand the Main | Business impact node and select the High business impact category
345
Lab 22. Configure a response by running a Kaspersky Endpoint KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Detection and Response task
346
Lab 22. Configure a response by running a Kaspersky Endpoint KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Detection and Response task
Conclusion
The lab demonstrates how to run Kaspersky Endpoint Detection and Response tasks from the KUMA
console to respond to detected information security incidents.
347
Lab 23. Study reports KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You want to organize the Dashboard to monitor the general security situation of the network. In
addition to the data that illustrates operation of Kaspersky Unified Monitoring and Analysis, you want
to know who opens the management interface of Kaspersky Unified Monitoring and Analysis and from
which computers. Create a new dashboard layout and configure a widget to display the web console
connection statistics.
You also want to regularly receive a report with information about triggered correlation rules by email.
Do this using a standard report template for an overview of security events.
Contents
The dc, kata-cn, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines
must be powered on.
By default, no layout has priority, and the layout whose name comes first alphabetically is
displayed.
348
Lab 23. Study reports KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Almost everything is configurable: widgets’ size and position, chart types, displayed
information, time span and the refresh rate.
349
Lab 23. Study reports KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
7. In the Dashboard section, expand the list of layouts in the upper right corner and select + Create
layout
a. Tenants: Main
350
Lab 23. Study reports KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
b. Tenant: Main
11. Click on the button to the left of the query text to open the query builder
351
Lab 23. Study reports KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
12. In the Select area, expand the first list on the second row and choose SourceAddress
13. In the Group By area, clear the default Name choice and select SourceAddress instead
b. Operation: =
b. Operation: =
This condition will filter out audit events unrelated to user activity, such as service status
changes.
19. Open the section with the wrench icon to complete setting up the widget
20. Rename the widget Source IP addresses connected to the web interface
Notice that all connections to the console have been established from the same IP
address so far.
353
Lab 23. Study reports KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
To do this, hover the mouse over the bottom right corner of the widget until the pointer
turns into a diagonal arrow; press the left mouse button and hold it while stretching the
widget to the desired size.
25. Click the Save button in the lower-left corner to save the layout
354
Lab 23. Study reports KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
26. Log in to the ksc machine as abc\administrator with the password Ka5per$Ky
27. Run the Google Chrome browser and go to the KUMA web console at https://kuma-
core.abc.lab:7220/
If a browser warning about an insecure connection appears, select Advanced and then
Proceed to kuma-core.abc.lab (unsafe).
28. Log in to the system under the admin account with the password Ka5per$Ky
30. Make sure the widget shows two connection addresses now
355
Lab 23. Study reports KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
356
Lab 23. Study reports KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
a. Host: 10.28.0.10
b. Port: 25
c. From: [email protected]
35. In the KUMA web console, open the Reports section and switch to the Templates tab
Although the templates have the same names as the layouts on the Dashboard, they are
separate entities.
357
Lab 23. Study reports KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
39. Configure the general template settings at the top of the page:
a. Tenants: Main
358
Lab 23. Study reports KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
40. Click on the Delete button below the logo in the report header
41. Click Upload logo to replace the logo in the report header with a custom one
44. Make sure the Kaspersky.TechEdu logo is displayed correctly in the report template
359
Lab 23. Study reports KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
46. Click the name of the Daily Alerts Overview template and select Edit schedule
a. Schedule: On
c. Time: 00:00
51. Click the name of the Daily Alerts Overview template and select Run report
360
Lab 23. Study reports KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
A browser tab with the Generated Reports page of the web console will open
automatically.
52. Notice that a Daily Alerts Overview report has appeared at the top of the list.
361
Lab 23. Study reports KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Conclusion
This lab demonstrates how to use the dashboard and reports in the KUMA web console. In particular,
it shows how to create new dashboard layouts and report templates, how to add new widgets based
on event search and how to set up scheduled reporting.
362
Lab 24. Send a request to KUMA via the REST API (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You want to test sending requests to KUMA via the REST API for further integration with external
systems. To do this, you need to create a token in KUMA, and then use this token to send requests.
Contents
Task A: Create a token for sending requests to KUMA via the REST API
Task B: Find and close KUMA alerts via the REST API
The dc, kata-cn, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines
must be powered on.
363
Lab 24. Send a request to KUMA via the REST API (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
364
Lab 24. Send a request to KUMA via the REST API (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
365
Lab 24. Send a request to KUMA via the REST API (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
A token is a secret and should not be stored and transmitted in plaintext. We save it in
Notebook only for convenience during lab work.
366
Lab 24. Send a request to KUMA via the REST API (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
a. GET /alerts
b. POST /alerts/close
10. Notice that the token is no longer visible even to the user who created it
Task B: Task B: Find and close KUMA alerts via the REST API
Get acquainted with the syntax of KUMA REST API requests, send a GET request via Postman to
retrieve the list of active alerts, and then close one of them using a POST request.
367
Lab 24. Send a request to KUMA via the REST API (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
For example, right-click the Start menu, begin typing Postman in the search bar, and
under the Postman app, select Run as administrator.
13. Make sure the GET method is selected in the query field
15. Under the query string, on the Params tab, fill in the first row of the Query Params table:
368
Lab 24. Send a request to KUMA via the REST API (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
18. Paste the token generated in the last task into the Token field
If a warning about an untrusted certificate appears, click Disable SSL Verification and
click Send again.
369
Lab 24. Send a request to KUMA via the REST API (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
370
Lab 24. Send a request to KUMA via the REST API (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
24. Change the method in the query string from GET to POST
{
“id” : “<insert the id in quotes>”,
“reason” : “responded”
}
32. Go to Alerts
33. Make sure the [Lab] RCE + Powershell run alert is not in the list
371
Lab 24. Send a request to KUMA via the REST API (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
34. Click on the name of the Status column and select Closed in the filter to display closed alerts as
well
35. Make sure the [Lab] RCE + Powershell run alert has the Closed, responded status after the
request is executed
Conclusion
The lab demonstrates how to get data about KUMA alerts via the REST API and close them.
372
Lab 25. Configure the Event router service (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Suppose one of the collectors is behind a thin channel and you want to optimize the data flow
between the collector and its destinations (correlator and storage). You need to configure and install
the Event router service and reconfigure the destinations.
Contents
Task C: Configure event streams to pass through the Event router service
The dc, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines must be
powered on.
2. Click + Add
373
Lab 25. Configure the Event router service (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
5. Click + Add
374
Lab 25. Configure the Event router service (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
7. Click Save
375
Lab 25. Configure the Event router service (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
15. To log in, use the username admin and password Ka5per$Ky
16. Paste the installation command from the clipboard, add sudo to the beginning of the line, and
execute the command
376
Lab 25. Configure the Event router service (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
17. Return to the KUMA web console and open Resources | Active services
18. Make sure the status of the [Lab] Event router service is green
377
Lab 25. Configure the Event router service (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You do not need to manually enter this value. As soon as you place the cursor in the URL
field, you will be prompted to select the Event router service you’ve created. Your port
number may be different.
378
Lab 25. Configure the Event router service (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
379
Lab 25. Configure the Event router service (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
39. In the KUMA web console, open Resources | Active services and select the checkbox in the
row with the [OOTB] CEF WMI collector service
380
Lab 25. Configure the Event router service (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
The stream of events from the agent is quite intensive, so new events should arrive
almost every second.
Conclusion
In this lab, you configured and installed the Event router service. By doing this, you optimized the
traffic between the collector and its destinations. Events flow in a single stream from the collector to
the Event router service, and then split into two identical streams: one goes to the storage, the other
to the correlator. This is useful functionality when the collector is located behind a thin channel, for
example, in a regional branch of an organization.
381
Lab 26. Create a rule based on an entropy calculation (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
You want to use an entropy calculation to monitor situations when a user enters the password instead
of the user name. This happens sometimes. When it does, the password should be considered
compromised, because the user name may be transmitted in cleartext and appear in logs. In this
example, an entropy calculation can help the correlator to distinguish a password from a user name.
To implement this scenario in this lab, you will need to expand the KUMA event schema, convert the
data of one of the fields of a received event, and write the conversion result to a new field.
Contents
The dc, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines must be
powered on.
382
Lab 26. Create a rule based on an entropy calculation (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
3. Expand the tree on the left and select the [OOTB] node
4. Find the [OOTB] Microsoft Products for KUMA 3 normalizer and select its checkbox
5. Click Duplicate
383
Lab 26. Create a rule based on an entropy calculation (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
7. Click it to open
8. Scroll down the window a little. In the Mapping area, click the + Add row button
384
Lab 26. Create a rule based on an entropy calculation (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
We have created a new field and thus extended the KUMA event schema. F. at the
beginning of a field name defines its type as a float. We will compute the entropy of the
string containing the user name and save it in this new field.
385
Lab 26. Create a rule based on an entropy calculation (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
20. Click OK
386
Lab 26. Create a rule based on an entropy calculation (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
22. Make sure a new normalizer has appeared on the list: [OOTB] Microsoft Products for KUMA 3
- copy
387
Lab 26. Create a rule based on an entropy calculation (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
388
Lab 26. Create a rule based on an entropy calculation (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
This normalizer is quite resource intensive. It may "hang" for a long time during the saving
process. Please be patient.
29. Select the checkbox for the [OOTB] CEF WMI collector
The dc, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines must be
powered on.
389
Lab 26. Create a rule based on an entropy calculation (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
390
Lab 26. Create a rule based on an entropy calculation (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
DeviceEventClassID = 4625
AND F.user_name_entropy >= 3.2
For this lab, the value 3.2 was determined empirically. If you implement such rule logic in
real conditions, then the threshold value should also be selected empirically. Rules for
generating user names and password complexity requirements may vary.
391
Lab 26. Create a rule based on an entropy calculation (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
392
Lab 26. Create a rule based on an entropy calculation (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
49. Click OK
393
Lab 26. Create a rule based on an entropy calculation (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
The dc, ksc, kuma-core, kuma-storage-1, kuma-storage-2 and admin-laptop machines must be
powered on.
394
Lab 26. Create a rule based on an entropy calculation (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
57. Click OK
395
Lab 26. Create a rule based on an entropy calculation (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
396
Lab 26. Create a rule based on an entropy calculation (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
397
Lab 26. Create a rule based on an entropy calculation (optional) KL 034.3.2. Kaspersky Unified Monitoring and Analysis Platform
Conclusion
In this lab, you learned how to detect compromised passwords using an extended KUMA event
schema and enrichment with an entropy calculation.
398