046.12.5 - Kaspersky Next EDR Foundations - Student Guide. Unit 3 - InGLES
046.12.5 - Kaspersky Next EDR Foundations - Student Guide. Unit 3 - InGLES
KL 046.12.5.
Kaspersky Next
EDR Foundations
Table of contents
Unit III. Security controls
Glossary
1. General
1.1. Purpose of the control components
1.2. Licensing
1.3. Control components in the installation package
2. Application Control
2.1. Operating principles
2.2. Setting up the component
2.3. Applications on the local network
2.4. Start of executable files on the computers
2.5. Inventory task
2.6. Creating categories
Manually
Based on KL categories
Based on certificates
Based on a file path
Based on location on removable drives
From the list of executable files
From the applications registry
By manually specifying hash, metadata or certificate
From a file or MSI package
Exclusions
Based on a folder
Based on computers
KL category of an executable file
How to add a program to a category
2.7. Using Application Control
Enabling Application Control
Application Control mode
Application Control rules
2.8. How it works
Local notifications and user requests
Where do user requests go?
Application Control events
Report on prohibited applications
2.9. Default deny mode
3. Device Control
3.1. Why Device Control is necessary and how it can help
3.2. Configuring Device Control
Connection buses
Device types
Rules for data storage devices
3.3. Removable drive access log
Access to Wi-Fi networks
Anti-Bridging
Glossary
KES
Kaspersky Endpoint Security
KSC
Kaspersky Security Center
KSN
Kaspersky Security Network
1. General
In this unit, we will study the control components of Kaspersky Next EDR Foundations and their
capabilities.
Application Control monitors users’ attempts to start programs and regulates application
launches through rules configured by the administrator.
Device Control brings the use of various devices into compliance with corporate policy. This
component includes the Anti-Bridging module, which regulates switching between network
adapters and thereby helps prevent unauthorized connections.
Web Control limits access to websites depending on their content; you can also block
addresses by masks.
1.2. Licensing
A Kaspersky Next EDR Foundations license lets you use the Application Control, Device Control,
and Web Control components. A Kaspersky Next EDR Optimum license provides the additional
capability of using the Adaptive Anomaly Control component.
Control components that are activated by a Kaspersky Next EDR Foundations license are enabled
by default in the properties of the Kaspersky Endpoint Security package that the Administration
Server Quick Start Wizard creates.
You just need to consider which components can be installed on workstations and which
components can be installed on server operating systems.
If some components are not installed on computers, you can add them without reinstalling
Kaspersky Endpoint Security.
Use the Change application components task of Kaspersky Endpoint Security. This task is
designed specifically for uninstalling or adding Kaspersky Endpoint Security components without
reinstalling the application. The task creates little traffic, as it reuses the MSI package of Kaspersky
Endpoint Security, which was saved on the client computer during the initial installation.
In the task properties, you can select the components to be installed, just like in an installation
package. Complete the task creation wizard. Then open the task properties and choose the
necessary components.
2. Application Control
Application Control helps enforce the corporate security policy by restricting the launch of software
on endpoints. At the same time, Application Control also reduces the computer infection risk by
decreasing the attack surface.
Application Control lets the administrator restrict which programs users can run on computers.
Permissions to start software are specified in special rules.
The category the program belongs to (categories are configured by the administrator)
Whether the Kaspersky Endpoint Security policy contains any rules that regulate the start of this
program category for this account.
Kaspersky Endpoint Security then identifies the current operating mode of Application Control:
Denylist: everything is allowed by default. Only the programs that belong to categories that the
administrator prohibited in the Kaspersky Endpoint Security policy are blocked. Meaning, if
there is no matching blocking rule, the program will be permitted to start.
Allowlist: everything is prohibited by default. Only the programs that belong to categories that
the administrator allowed in the Kaspersky Endpoint Security policy are permitted to start. If
there is no matching allowing rule, the program will be blocked.
Allowlist mode is used in the Default Deny approach. It is described in the respective section of
this chapter. Also, refer to the KL 032 Default Deny course for further details.
For example, Web browsers, Games, Third-party messengers, Allowed programs, etc.
Add all programs that you want to control to these categories. We describe how to do this in
the next section.
Categories are configured for the whole Administration Server in a single location: Operations
| Third-Party Applications | Application categories.
2. Create rules in the Kaspersky Endpoint Security policy for these categories.
In the rules configured for each application category in the Kaspersky Endpoint Security policy,
you can specify the action to perform on the applications that belong to the category:
Allow
Block
Categories are created on the Kaspersky Security Center Administration Server and are
transferred to client computers similarly to the way policies and tasks are transferred. Only changes
are sent during synchronization (rather than the complete list and contents of all categories).
Note that categories are specified for the whole Administration Server, but different rules may be
configured for different computer groups. For example, Skype can be prohibited for everybody
except certain individual users; additionally, marketers can be allowed to use it, with the
administrator receiving a corresponding notification every time it is started.
You can use each category only once in a Kaspersky Endpoint Security policy. In other words, if a
rule is already configured for a specific category, you will not be able to create another rule for this
category. Instead, you will have to create a new category.
Please keep in mind that the Application Control component does not work
without Kaspersky Security Center.
Before you create categories, make sure that Kaspersky Security Center already has information
about the applications installed on the network and regularly receives this data.
Applications registry informs the administrator about software installed on client computers.
The administrator can see which programs are installed on which computers. For example, if an
old version of a web browser is detected in the network, the administrator can upgrade it on all
computers at once.
Network Agent gets this data from the registry branches used to create the list of Programs
and Features. Depending on whether the computer is running a 32-bit or 64-bit version of
Windows, the changes are monitored in the following branches:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersi
on\Uninstall
The Network Agent scans the registry branches at startup and tracks changes in real time.
Executable files provide the administrator with information about all executable files that
Kaspersky Endpoint Security has detected on any computers connected to this Administration
Server. This list can be huge.
Application Control
Immediately after installation, the list of executable files is empty on the Administration Server.
To ensure that data on executable files is forwarded to the Server, the Application Control
component must be enabled.
However, there is an option for sending information about started applications; it is enabled by
default. You can find it in the Kaspersky Endpoint Security policy in Application Settings |
General Settings | Reports and Storage. This checkbox enables sending information about
running applications, as well as the results of the Inventory task.
Although this is a Kaspersky Endpoint Security task, it is not created by default. This means that
the list of executable files will include only those files that have been started on computers where
the Application Control component is enabled. However, some files start very rarely. It may take
a very long time until all executable files are intercepted and reported to the Administration Server.
A faster way to detect files is to use an Inventory task.
The Inventory task may consume a substantial amount of resources, so we do not recommend
running the task on all computers connected to the Administration Server. Instead, you can run the
task on a few reference computers, especially if the workstations were deployed from the same
image.
The Filled automatically from the selected devices method for filling a
category depends on the data that the Inventory task sends to the
Administration Server.
We recommend that you create a task for specific computers. With the standard settings, the task
searches for executable files in the following directories:
%SystemRoot%
%ProgramFiles%
%ProgramFiles(x86)%
The list of scanned folders is configurable. Information about the discovered files is sent to the
Administration Server and is available in the Web Console on the Operations | Third-Party
Applications | Executable Files page.
Unlike the monitoring components, this task can detect executable files within archives and
installation packages. To do so, enable the corresponding options: Scan archives and Scan
distribution packages.
When the task searches for executable files, it calculates their checksums, which may slow down
computers. To reduce resource consumption, you can use the Scan only new and changed files
option. Information about changes is obtained using iSwift technology, which performs minimal
calculations.
Alternatively, you can schedule the task to run during non-working time, or use the option that
suspends scheduled scans while the computer is being used and resumes them when the
screensaver is on or the computer is locked.
An application category is a list of conditions and exclusions that identify a program or a group of
programs. The list is displayed in Operations | Third-Party Applications | Application
Categories and is empty by default. New categories are created using a special wizard. There are
three types of categories:
Filled manually — conditions are added and changed only manually. For example, all
programs whose names include “zombies”, or all programs signed with the specified certificate.
Filled automatically from a folder — the administrator selects a directory, which is scanned
for the following files: EXE, COM, DLL, SYS, BAT, PS1, CMD, JS, VBS, REG, MSI, MSC, CPL,
HTML, HTM, DRV, OCX, and SCR. The Administration Server will also check the contents of
this directory on a schedule, calculate checksums of executable files (SHA256), and update the
list of category criteria. A network folder where all prohibited or allowed programs are copied
may come in handy.
Filled automatically from the selected devices — the administrator selects one or more
managed computers, and the Administration Server automatically puts executable files found
on the computers into the category. Meaning, you can specify a reference computer where, for
example, all allowed programs are installed.
At the first step, the New Category Wizard prompts you for the category name and creation
method. If you are not satisfied with the resulting category contents and want to choose a different
method, you will have to re-create the category.
Manually
For a manually filled category, conditions for the programs are specified in the list; each condition
can contain several parameters. If a program matches at least one condition, it is included in the
category. Conditions can be set by various methods, but all of them can be boiled down to the
Certificate — you can add certificates from the Administration Server storage to a category.
Files signed with these certificates will match the conditions of the category.
Application folder — all programs from the specified directory will be added to the category.
Removable drive — a special parameter that allows the administrator to create a separate
category for files started from a removable drive.
Metadata means the file name, version, application name, and vendor. The
version does not have to be specified exactly. You can select all files older or
younger than the specified version.
Various file characteristics constitute a single condition, rather than several individual conditions.
When specifying metadata, you can allow only files signed with a valid certificate, or those for
which KSN returns the Trusted response.
We will separately examine each type of condition for filling categories. Some types of conditions
let you add a large group of applications to the category all at once. Other types of conditions are
more suited to working with individual applications, and each condition describes a particular
application.
Based on KL categories
In practice, it is often necessary to prohibit unknown programs, for example, all games, or all
browsers, except for one. In other words, a blocking rule needs to be applied to a certain group of
files that have a specific attribute in common. This is not easy to do.
The solution is to use KL categories. These categories define a program class or type: email
programs, web browsers, development tools, electronic payment systems, etc. KL category
means that the programs are categorized by Kaspersky experts.
Information about program categories is included in downloadable databases. That is why the
Download updates to the repository task must run at least once before you can create
conditions based on KL categories.
Programs started on each computer are independently scanned for compliance with the conditions,
and if different database versions are used on different computers, the Application Control rules
may produce different effects. Also, if KSN Usage is enabled on a computer, it will try to receive the
latest data about KL categories in real time.
Kaspersky experts cannot process and categorize all executable files that exist in the world. All
uncategorized files are automatically put in the Other Software category.
Based on certificates
You can add certificates from the Administration Server storage to a category. Files signed with
these certificates will match the conditions of the category.
Although this is a relatively reliable method, the Server repository may not contain all the necessary
certificates. If a certificate is missing, manually import it into the repository before configuring
Application Control.
Application folder — defines the local path to the file. The administrator can, for example, prohibit
starting executable files from the desktop or from the whole user’s home directory.
Alternatively, the administrator can permit starting executable files from system folders
(C:\Windows, C:\Program Files) and prohibit from all other computer locations.
This condition is recursive, meaning that it applies to files in subfolders of the specified folder.
This is another condition type that considers only the file location.
Device type — only one value is allowed: Removable drive. Essentially, the purpose of this
condition type is to let the administrator prohibit running programs from removable drives using
Application Control rather than Device Control.
The administrator can create a condition based on the list of Executable files that have been
started on client computers or were detected by an Inventory task.
Information about started executable files will be transferred only after you
enable the Application Control component.
You can add an executable file to a category based on one of the following conditions:
Hashsum (SHA256)
Metadata
Certificate
The Applications registry contains programs installed on computers and displayed in their list of
Programs and Features. Network Agents gather names and attributes of these programs and
transfer them to the Administration Server. The gathered information about installed programs does
not contain data about the program executable files, so you can only use metadata to create a
condition.
Metadata means the file name, version, application name, and vendor. The
version does not have to be specified exactly. You can select all files older or
younger than the specified version.
With this option, you can use one of the following conditions, but you will have to specify the value
manually:
File hash
Metadata
Certificate
When selecting a file on the drive, the administrator can specify a simple SHA-256 condition for it,
or a more flexible condition based on metadata or a certificate.
A hashsum unambiguously identifies a file. This condition should be used when an exact match is
important. For example, hashsums are used in the automatically filled categories described earlier,
because it is important to permit starting the exact file versions installed on the reference computer
or included in an approved distribution. Any changes made to the file by malware or malevolent
users will change the hashsum, preventing the file from starting.
Hashsums are also convenient if you need to prohibit files from starting even if they have been
renamed. Renaming does not affect the hashsum, so a blocking rule will still work.
That said, you may need to include several application versions in a category. In this case, you
should create a condition based on file attributes, such as file name, author, and version number.
The condition can be based on an exact version number, or all versions greater than or less than
the specified value, or all versions starting from the specified value, etc. This lets you block old
program versions or recent releases that have not been approved yet.
+ In general, you should use metadata-based conditions for commercial software that is likely to be
digitally signed by the vendor’s certificate. To control open-source and freeware programs, use
other condition types.
If you specify an MSI package or archive in a condition, the Administration Server will automatically
unpack them into a temporary folder and include data about all executable files within the MSI
package or package in the category. Thus, if you specify an MSI distribution, the category will
include not only the installation file, but also the program files.
Exclusions
If you need to prohibit all programs that match the specified conditions except for one, add an
exclusion to the category. Exclusions can use the same types of conditions. The programs that
satisfy at least one of the specified conditions will be excluded from the category.
Based on a folder
The next way to create a category is to base it on a folder, which lets you dynamically change the
contents of the category. The contents of such a category are updated when the source folder
contents change (executable files are deleted or added). Also, you can make a category update on
a schedule.
This method of creating a category is useful if the company has a repository of program
distributions to be installed on corporate computers. These programs must be allowed to start. The
administrator may occasionally add programs to the list or replace them with newer versions.
To avoid manually updating category rules for allowed distributions, place them into a folder and
make the Administration Server automatically monitor changes and add the parameters of detected
files to the dedicated category. Afterwards, the administrator will only have to create one allowing
rule for this category in the policy to allow all the used programs to start.
You can also select Include dynamic-link libraries (.DLL) in this category. If this checkbox is
selected, Kaspersky Security Center will calculate checksums of DLL files and add them to the
category along with executable files.
It makes sense to pay attention to DLL files, because Windows permits starting processes from
them through the rundll32.exe utility. In general, some processes started from library files may be
allowed, while others may need to be blocked.
In this regard .dll files are similar to script files (*.js or *.vbs), which are not executable, but are
started via the cscript.exe (or wscript.exe) utility, and can also be allowed or blocked.
To include scripts in a category, select the Include script data in this category option.
A folder-based category will include the found files; their SHA-256 checksums will serve as the
condition.
This method of creating a category does not let you add exclusions.
Based on computers
In addition to the repository of allowed program distributions, there may be a reference computer in
the organization where all the programs used in the company are installed. Such a reference
computer is usually necessary for creating images to be deployed on new workstations. Such a
deployment installs the operating system and all programs necessary for work on the computer,
and the whole process takes much less time than installing everything from distributions. The
administrator periodically upgrades programs on the reference computer and updates the image
accordingly.
With this approach, it makes sense to automatically allow all programs installed on the reference
computer. To do this, you need to scan the computer, add all programs to a category, and then
create an allowing rule for it in the policy. This is purpose of a category that gets automatically filled
Unlike folder-based categories, where the changes are monitored by the Administration Server
itself, with a computer-based category, the Administration Server relies on the detection of
executable files by Kaspersky Endpoint Security. This means that a reference computer must have
Kaspersky Endpoint Security installed and the Application Control component enabled; the
Inventory task must also be run on the reference computer.
The administrator can specify the scanning interval in the same way as for a folder-based category.
A computer-based category will include the found files; their SHA-256 checksums will serve as the
condition.
This method of creating a category does not let you add exclusions.
There is a list of executable files in the properties of each managed computer. These are the files
that will be added to the category based on the computer. The list of executable files is
supplemented by:
The Inventory task, which scans the client computers’ folders specified in its properties
Application Control which, when enabled, collects information about all executable files started
on client computers
Network Agent also gathers information from the Windows registry about software, but only about
installed applications.
If the administrator wants to know which KL category includes a specific executable file, they can
find this information either in Kaspersky Endpoint Security interface on the client computer, or in the
Administration console. Local categories (which may vary slightly on different computers because
of different database versions) are available in the Application Activity Monitor window.
The list of executable files that we can see on the Kaspersky Security Center Administration Server
consists of all executable files detected by Kaspersky Endpoint Security on all computers
connected to this Administration Server, so this list can be very long.
Information about executable files can be used for troubleshooting as well as for planning the rules.
The administrator can view the attributes and KL category of each file.
There can be a lot of files on the list, and the search and filter options come in very handy. You can
search for a file using a part of its name, or apply a filter and search by the values of various file
attributes.
Other useful file information is also available: the computers on which it was first detected and
when, when it performed network activity for the first time, and whether it is signed with a
certificate.
The Advanced section displays checksum information and details of the certificate used to sign the
file.
Suppose you notice something new when looking through the list of executable files detected on
computers connected to Kaspersky Security Center, and decide to add the program to a category.
You don’t need to memorize its name and go to program categories. You can simply select the
necessary executable file and perform the Assign to category command.
Then select whether to add the file to an existing category or a newly created one. Select whether
to add programs to a category or exclusion.
The program will be added based on the hashsum or certificate used to sign its executable file.
Notice that Application Control is disabled by default. That is why the information about
executable files is not sent by default. The first thing the administrator needs to do before
configuring rules or even before creating categories is to simply enable the component with the
default settings.
By default, right after you enable Application Control, it will be in Test mode. We recommend that
you test rules first. Instead of blocking applications, the component will only send events to the
Administration Server: Application startup prohibited in test mode or Application startup
allowed in test mode. You can generate a report based on these events, analyze it, adjust the
rules if necessary, and then switch them to block mode. Later, to test new rules without interrupting
the existing rules, the administrator can add a rule with Test mode status. After you make sure the
new rules do not disrupt needed applications, Enable them.
Each rule (regardless of the selected mode: allowlist or denylist) can use one of the following three
statuses:
Block means that the Application Control component uses the rule.
Rule is disabled means that the Application Control component does not use the rule.
Test mode means that Kaspersky Endpoint Security will always permit the start of the
programs to which this rule applies, but will send information about starting these programs to
the Administration Server.
The Control DLL and drivers checkbox enables you to prevent the start of DLL libraries and
drivers, but this setting increases the load on the computer. We recommend using it only when
necessary, for example, with a strict Default Deny approach.
You can have as many rules as you want. Blocking rules always have a higher priority. The denylist
and allowlist have different sets of rules. For example, if you first select the Denylist tab, add a rule,
and then switch to the Allowlist tab, your rule will not be there.
Users or groups is a list of local users and groups who are either allowed or denied the right to
start applications in the selected category.
Trusted updaters — consider all programs of this category to be trusted updaters (we will
describe them later).
Blocking has a higher priority than allowing. For example, if a rule is configured to allow all users to
start a program but prohibit the user abc\Tom, this user will not be able to start the program
according to this rule.
In denylist mode, the list of rules is initially empty. In allowlist mode, it contains two system rules
that cannot be deleted:
Trusted updaters — if this rule is enabled, applications installed by trusted updaters will not be
blocked even if there are no allowing rules for them. It is a special KL category that includes
programs that download and install module updates, for example, Adobe Updater, Chrome
Component Updater, etc. The rule is enabled by default, meaning, trusted updaters are allowed.
Golden Image — contains the executable files necessary for the operating system, as well as
executable files supplied with the system (various standard utilities and applications); the
purpose is to prevent Kaspersky Endpoint Security from accidentally blocking files important for
the operating system.
The list lacks up and down buttons, because the order of the rules does not matter. When a
program starts on a computer, Kaspersky Endpoint Security analyzes all enabled rules together.
Different rules regulate start of different application categories; but some programs may belong to
several categories at once. If there is at least one rule according to which program start must be
prohibited, it will be prohibited regardless of what the other rules say.
If a program does not belong to any category, it will be allowed in denylist mode and blocked in
allowlist mode.
When a program start is blocked on the client computer, Kaspersky Endpoint Security shows a
pop-up notification so that the user is not confused about the reason for the application behavior.
If the user needs this program for work, the pop-up notification permits sending the administrator a
request to allow the program to start. The user should click the Request access link in the
notification window and then click the Send button.
The text of the pop-up notification, as well as the request to allow a program to start, can be
modified in the Kaspersky Endpoint Security policy. You can use variables there to provide
information about a specific event, for example, the name of the blocked application, the computer
where the event was logged, etc.
The standard User requests event selection contains the Application startup blockage
message to administrator events registered over the last 7 days.
The Application startup blockage message to administrator event is registered when a user
sends a request to allow a program to start. Such an event includes the request text along with the
information about the computer, username, and the program in question: complete information
necessary for the administrator to make a decision.
A user might need a program urgently. As a result, if the administrator rarely opens User requests,
it might be worthwhile to configure email notifications for the Application startup blockage
message to administrator event. This will let the administrator process the requests as soon as
possible.
Request events can be used to modify application categories. The event contains all relevant
information about the blocked file, including its SHA256 hash. The administrator can use the
Assign to category command to immediately add the blocked file to an existing or a new
category, either as an inclusion condition or as an exclusion.
By default, all events except for Application startup allowed are transferred to the Administration
Server. If Test mode is used for rules, it might be worthwhile to create a selection for the
Application startup prohibited in test mode event.
Based on the Application startup prohibited event, Kaspersky Security Center generates a
report on prohibited applications, which shows the distribution of the number of blocked starts on
client computers by application. Switch to the Details tab to view information about all computers
Default Deny is a scenario when Application Control prohibits devices from running any programs
except those specified in allowing rules configured in the allowlist of Application Control.
The main difficulty when working in Default Deny mode (when the start of uncategorized programs
is prohibited by default) is that the operating system may stop working because system files that
are not explicitly allowed will be blocked along with other programs. That is why there is an allowing
rule for operating system files in the allowlist by default.
For example, you might have a policy for using programs on computers used as point-of-sale
(POS) terminals. Only special programs should be allowed to start on them, and all unknown
programs must be prohibited.
Various configurations of allowing rules are possible, but in any case, it will be necessary to create
one or more categories for system executable files and to configure allowing rules for them.
Categories can be created using one of the following methods:
Use a reference computer with the operating system and allowed programs installed for
creating an automatically filled category.
Use a directory with distributions of allowed programs for creating an automatically filled
category.
Use KL categories.
For those programs for which allowing rules are configured not to be blocked after upgrades, use
the standard Trusted updaters rule. This rule exists by default in the list and cannot be deleted,
but it is disabled by default. When enabled, the programs downloaded and installed by applications
included in the Trusted updaters category will not be blocked even if no corresponding allowing
rules are configured.
The administrator can also manually select the Trusted updaters checkbox for a category in the
properties of an allowing rule.
For more details about configuring Kaspersky Endpoint Security to default deny, refer to the KL
032 course.
3. Device Control
In this section, we examine the Device Control component, which lets us regulate the connection of
different types of devices to users' computers.
The main purpose of the Device Control component is clear from its name. It lets the
administrator monitor various devices in the corporate network and, if necessary, prohibit using
some of them.
The Device Control component allows the administrator to enforce corporate security standards
by specifying which devices can be used on computers, by whom, and when. Rules may be
applied to removable drives, printers, CD/DVD, non-corporate network connections, Wi-Fi, etc.
The most popular use case for this component is blocking USB flash drives. A user may bring an
infected file from home. Additionally, whether accidentally or deliberately, a user may carry away
files that are of commercial value for the company.
Different settings are available for different device types. Maximum flexibility is provided for the
following types of storage devices:
Hard drives
Removable drives
Floppy disks
CD/DVD drives
You can specify which accounts are allowed / prohibited to access the devices. You can permit only
the copying of information from devices and prohibit writing. You can also configure a schedule to
allow access to devices only during business hours.
Other device types can only be allowed or blocked, without any flexible settings.
More globally, Device Control can block a connection bus completely, meaning that any devices
connected to a specific physical port of the computer will be inaccessible.
Keyboards and mice cannot be blocked, since they are not subject to Device
Control rules. To protect against attacks when an infected USB flash drive
pretends to be a keyboard, install and use the BadUSB Attack Prevention
component.
Device Control permits you to draw up a list of trusted devices that will always be accessible,
regardless of the rules. Plus, you can specify which users will be allowed to work with each specific
trusted device.
Also, the administrator will be able to grant temporary access to a prohibited device if a user needs
to work with it.
Device Control is configured in the Kaspersky Endpoint Security policy. From the component
properties, you can open the rules for device types, connection bus settings, or the list of trusted
devices, or configure Anti-Bridging.
Connection buses
Kaspersky Endpoint Security permits blocking connected devices by interface type (bus):
USB
FireWire
Infrared port
Serial port
Parallel port
PCMCIA
The administrator can block, for example, all USB devices, and then configure rules to allow
devices of some type.
Device types
Rules for devices have a higher priority. If the USB bus is prohibited but removable drives are
allowed, USB flash drives will work.
By default, rules for devices work with the Depends on connection bus
action. In other words, if the bus is prohibited, the device will be prohibited. To
allow the connection of a device whose bus is prohibited, you can simply
change the rule’s action to Allow.
Kaspersky Endpoint Security permits blocking only those types of devices that are included in the
list. You cannot add new device types to this list.
For data storage devices, you can use rules to define flexible conditions for accessing the device.
For example, you can explicitly define the list of users, type of operation (read/write), and usage
time. You can do that for:
Hard drives
Removable drives
Floppy disks
CD/DVD drives
Mobile phones, tablets, media players, and other portable devices may be
treated either as portable devices (MTP) or as removable drives when
connected as external data carriers.
For data storage devices, you can create access rules and specify the following parameters in a
rule:
Users and/or user groups that are allowed to use the devices. You can select accounts from
the domain to which the computer where the Administration Console is started belongs, or
among local users if there is no domain. The rule will work on any computer where the policy is
enforced. The Everyone universal account is always available.
Access schedule and Operation type — when access is allowed and when it is prohibited.
You can manage Read and Write permissions independently. The schedule is specified by
hours and days of the week. For example, you can allow Read operations for removable drives
each workday from 8:00 AM to 9:00 PM for Everyone, but Write operations only for
Administrators and only during business hours.
If several rules match a user, the rule priority is taken into account. If rule priorities are equal, the
most restrictive rule will be applied.
You can combine the rules. For example, you can prohibit all removable drives, but make an
exclusion for administrators, allowing them to use USB flash drives during business hours.
The changed policy comes into operation as soon as it is enforced. For example, if removable data
carriers become blocked while a user is copying something to a connected USB flash drive, it will
become unavailable as soon as the policy is enforced and the next operation will be blocked.
If removable drives are allowed but not welcome at the company, you can configure logging events
each time they are accessed. Then for each of the selected operations, a corresponding event will
be sent to the Administration Server, File operation performed. This event will indicate who tried
to access which specific file. Write and delete operations are logged.
By default, attempts to access removable drives are not logged. If you enable this logging, you can
select which operations should be logged, for which file formats, and for which user accounts.
Text files
Video files
Audio files
Graphic files
Executable files
Office files
Databases
Archives
File operation performed events are not generated by default. You can enable
them in the Kaspersky Endpoint Security policy, in General Settings |
Interface | Notification Settings.
Device Control permits you to regulate access to Wi-Fi networks. Three actions can be taken when
a device connects to a network:
Allow
Block
Block with exceptions — this option contains additional settings that let you create a list of
trusted Wi-Fi networks based on:
Network name
Authentication type
Encryption type
A network is considered trusted only if all the specified parameters match. If the network
name is not specified, it may vary.
Connecting corporate laptops to public Wi-Fi networks is not always desired. You can use Device
control to disable Wi-Fi. However, for laptops, which users may take home, this is not the best
solution. It makes more sense to use the Block with exceptions option and specify the trusted
networks, i.e. the corporate and home networks.
Anti-Bridging
Device Control includes the Anti-Bridging component, which lets the administrator prohibit users
from using two network adapters simultaneously to prevent unauthorized bridges to the internal
network that bypass perimeter protection.
For example, suppose a user’s computer is connected to the corporate network. The user has
connected a Wi-Fi adapter to the computer and configured it to act as a wireless access point. This
access point may be used by people for whom it was not created—criminals who may exploit
vulnerabilities in the adapter, brute-force the username and password, or employ other methods to
bypass protection. As a result, the user’s computer will be compromised, and criminals will have a
stepping stone to further develop the attack vector. In this case, Anti-Bridging is a part of
protection that stops criminals from gaining access to the internal network, because as soon as the
user turns on the Wi-Fi adapter, Anti-Bridging automatically disrupts all network connections,
including access to the local network: only the Wi-Fi network will be active.
In both cases, there are two networks — local and Wi-Fi — on the user’s computer, which is
connected to the organization’s network. To eliminate simultaneous operation of the two networks
and give preference, for example, to a wired connection, the administrator needs to turn On all
types of devices in the Anti-Bridging settings and give maximum priority to the network adapter. In
this case, the user will not be able to turn on a Wi-Fi network on a computer unless the wired
network is disabled.
The Anti-Bridging component is disabled by default. To enable it, in the Device Control
properties, click the corresponding link and Enable Anti-Bridging in the window that opens. After
Anti-Bridging is enabled, Kaspersky Endpoint Security will block already established connections
according to the connection rules. The higher the rule on the list, the higher its priority. Anti-
Bridging can block all connections except the one that has maximum priority. To do this, in the
Anti-Bridging window, turn On all adapter types and arrange them in the order of priority. The
default order is as follows:
1. Network adapter
2. Wi-Fi
3. Modem
If several wired connections are set up, only one of them will be allowed
(arbitrarily selected). If the Wi-Fi adapter is not connected to a network, it will
not be blocked until the user tries to connect.
When the user attempts to connect a prohibited device, a pop-up notification is displayed.
If notifications are disabled, the user might think that there is a hardware problem, contact technical
support, or try to ‘fix’ it without assistance, potentially aggravating the situation. The administrator
can modify the notification text, for example, adding the contact information of the specialist or
department responsible for endpoint protection.
Notification templates are available in the Kaspersky Endpoint Security policy, in the Device Control
settings.
If pop-up notifications about blocking are enabled, they will contain a Request access link, which
can be neither disabled nor hidden.
If the user sends a request, it will be sent to the Administration Server as an event with the
Warning severity level. Similar to the other control components, requests are displayed in a special
selection named User requests. The administrator does not have to react to a request. However, if
they want to, they can, for example, configure corresponding email notifications in the Kaspersky
Endpoint Security policy.
1. The user generates a file with a request key in the local interface of Kaspersky Endpoint
Security.
2. The user sends the request access file to the administrator (for example, by email).
3. The administrator reviews the request and, if the answer is affirmative, creates a special
access key file.
After this, the selected device (and only that device) becomes accessible for the time span
specified by the administrator. The user cannot pause temporary access to use it later; and the
administrator cannot remotely revoke temporary access.
It goes without saying that many users may believe that their devices are blocked by mistake, and
will ask the administrator for temporary access. To avoid numerous requests, you can disable this
ability: in the Kaspersky Endpoint Security policy, on the Device Control tab, clear the Allow
request for temporary access checkbox.
You can request temporary access directly from the blocked access pop-up message, or from the
local interface of Kaspersky Endpoint Security using the Request access to device button in the
properties of the Device Control component.
The window that opens by default lists the currently connected devices, including blocked ones (to
display all devices that ever connected to the computer, apply the For the entire runtime filter).
Select the device to which you want to receive temporary access and click the Generate request
access file button. Specify how long you will need to access the device (by default, 24 hours), click
the Save button, and send the *.akey file to the administrator.
Temporary access is granted to a specific user for the specified device on the specified computer.
That is why the access key file is generated using the client computer’s shortcut menu, not in the
policy or group properties.
Find the necessary client computer and, on its shortcut menu, select Grant access in offline
mode.
In the window that opens, switch to the Device Control tab and click the Browse button to select
the .akey file received from the user.
The Administration Server checks the file integrity and whether the file is for the selected computer,
and then displays the request. If necessary, the administrator can change the access duration and
activation window. Both periods cannot be less than an hour or more than 999 hours. The default
value for both is 24 hours.
Then save the generated access key to an *.acode file, and send it to the user.
Thus, the key is generated for a specific device and the computer from which the user generated
the request access file. Other devices will still be blocked, and the device for which the access was
granted will be blocked on other computers.
The key is also bound to the username. Another user will not be able to access the same device on
the same computer using this access key. If temporary access is activated by the user who
requested it and another user logs on to the computer during the allowed period, they will not be
able to use the device.
In the same window where the request key was generated, the user clicks the Activate access
key button and specifies the received .acode file. The device can be used immediately. Neither
restart nor synchronization with the Administration Server is necessary.
The key must be activated before the specified activation window expires, and the access duration
countdown starts at the moment of activation. The device may be connected at any time (or even
several times) during this period, or not connected at all. The access countdown cannot be paused.
Kaspersky Endpoint Security has an event named Temporary access to device activated with
the Warning severity level. However, this event is not forwarded to the Administration Server by
default. You can enable forwarding of this type of event in the Kaspersky Endpoint Security policy
under Events.
Trusted devices
If the company has removable drives that must be allowed always and everywhere, it might be
worthwhile to make them trusted.
Trusted devices are specified in the Kaspersky Endpoint Security policy, in Device Control |
Trusted devices.
To make information about a device accessible in a policy, first connect the device to a computer
where Kaspersky Endpoint Security is installed with the Device Control component enabled; then
wait for the connection event to reach the Administration Server.
Device ID
Device model
Mask of device ID
The first two options let you select the device that you want to make trusted. Its ID or model will be
added to the list. The Administration Server must have the device in its database. If the
Administration Server is unaware of this particular device, you can’t make it trusted.
You can also specify the ID or model of a device using a mask with the '*' or '?' wildcards. In this
case, it doesn’t matter if the device is known to the Administration Server as long as the
administrator knows about it. You can find the Device ID in the Windows Device Manager in the
device properties. It looks will look something like this:
'USBSTOR\DISK&VEN_&PROD_USB_FLASH_DRIVE&REV_1.01\574B17001160&0'
When adding a mask, you can replace a part of the ID with '*' or '?' to make it applicable to multiple
devices. This helps when a company has a lot of devices with similar IDs that should be trusted.
Adding a device by model can also help in this case if all devices are from the same vendor and of
the same type.
First, select the device. To conveniently search for a device, you can use the search field, or
filter devices by type and view the filter results on the fly.
Then specify which user accounts are allowed to work with this device.
There is also a Comment field that you can fill in, for example, to describe why this device (or a
group of devices) needs to be trusted.
You can also export/import the list of trusted devices in XML format. This capability may come in
handy, for example, when you need to edit the name of a trusted device displayed in the Kaspersky
Security Center interface, add many similar devices, save a backup copy of the list of trusted
devices, or move the list to another Administration Server.
Temporary access to the device activated (Warning) — this is not sent to the Server by default.
Operation with the device allowed (Info) — this is disabled by default, which means that it is not
generated even locally.
File operation performed (Info) — this is disabled by default, which means that it is not
generated even locally.
Every time a user attempts to connect a blocked device, an event is sent to the Administration
Server. It contains the time, computer name, bus or device type, the device ID, operation, and
account.
The event is named Operation with the device prohibited. It is Critical and is displayed in the
Critical events selection. If necessary, the administrator can make a separate selection for
blocked device access attempts.
An Operation with the device allowed event, which has the Info severity, will be sent if a non-
prohibited device is connected. The number of such events shows the frequency of use of USB
flash drives, local printers, scanners, removable drives, etc.
All events, including user requests, are stored on the server for 30 days by default.
The Report on Device Control events provides a general view of Device Control operation. It
displays a chart with the distribution of its responses by usernames. By default, the report includes
all actions—device connection, disconnection, and blocking. To generate a report about device
blocking only, leave only the Device connection blocked checkbox selected in the Settings
section of the report properties.
If necessary, you can configure receiving daily email report about who and when tried to connect,
for example, USB flash drives. This is accomplished using the Deliver reports task, which is
described in Unit IV. Management.
4. Web Control
In this section, we examine the Web Control component, which lets us regulate user access to
resources on the internet.
The purpose of Web Control is to filter internet access according to the internal policy of the
company. It is typically used to block social networks, music, video, non-corporate web email, etc.
during business hours. If a user tries to open such a site, either a notification that the access is
blocked or a warning about an undesired site can be displayed, depending on the settings in the
policy.
Web Control operates similarly to various control systems. The administrator creates a set of
blocking and allowing rules. The rule properties include addresses or content type, user accounts,
schedule, and the action.
Web Control is configured in the Kaspersky Endpoint Security policy. Order matters: the first
matching rule is applied. There are two default rules, which are applied depending on the selected
operation mode:
By default, the Allow all universal rule is used and nothing is blocked.
Rule status:
Active
Inactive
For example, a rule can be created for testing purposes. If the rule is not currently being
used, you can disable it instead of deleting it.
Action:
Allow
Block
Warn
Filter type:
By content categories
By types of data
Optional parameter. You can also use predefined categories created by Kaspersky experts.
List of addresses:
Users:
You can flexibly configure various rules for different users. For example, HR can visit
LinkedIn, but all other employees cannot.
Schedule: you can specify the time period when the rule is applied, for example, working hours
only.
Access can be denied or allowed by site address. The administrator can explicitly specify the URLs
to be blocked or use the * wildcard to block sites by address masks—for example, *.fm or \*shop\*.
Categories and data types are auxiliary parameters. Kaspersky Endpoint Security can
independently analyze contents of webpages and classify pages to the following categories:
Video
Audio
Office files
Executable files
Archives
Graphic files
Scripts
For details about web site categories, refer to the product documentation
(https://support.kaspersky.com/Legal/WebCategories/en-us/206917.htm).
The administrator can restrict access to any category or data type but cannot edit or add lists of
categories or data types; this is performed on the Kaspersky side.
Filtering by category and type can be combined within a rule: for example, you can block office files
and archives received by web mail.
Sites are categorized using a database of known addresses as well as heuristic analysis of page
content. Page reputation can also be requested from Kaspersky Security Network.
Data types are hardcoded in Kaspersky Endpoint Security and include the following file types:
Executable Win32 PE—exe, dll, ocx, scr, drv, vdx and other extensions of Win32 PE files
files Microsoft Installer Archive—msi
Office files Open XML documents—docx, xlsx, pptx, dotx, potx and others
Office 2007 macro enabled docs—docm, xlsm, pptm, dotm
MS Office documents—doc, xls, ppt, dot, pot
Adobe Acrobat—pdf
Let’s mention some specifics of Kaspersky Endpoint Security types and categories:
Data types inside archives are not checked — if Executable files are prohibited but archives
are not, archived executable files will be allowed.
PDF documents are included in the Office files category. Therefore, if this category is blocked,
some sites that use PDFs may display incorrectly.
Flash videos in SWF format can be blocked only by an extension mask, usually *.swf.
Exclusions
Sometimes a site can be blocked by mistake. For example, a corporate portal may be recognized
as a social network, or online training can be blocked because of video files. In this case, you need
to create an allowing rule in Web Control. You can configure an allowing rule giving access to some
categories or data types located on the specified resources.
To have such a rule applied before the blocking rules, place it higher on the list.
For example, the corporate policy can prohibit internet use during business hours and allow only
the corporate site. An exclusion can be made for the IT department. In this case, the administrator
creates a general rule: during business hours, deny everybody everything. Two allowing rules are
then added above it: one allowing any content to IT department employees, and the other allowing
everybody access the corporate site.
Rule diagnostics
When there are many rules, it is sometimes difficult to monitor which of them were applied and
why. Accordingly, Kaspersky Endpoint Security has an offline rule diagnostics tool for Web Control.
Rule diagnostics is available in the local interface of Kaspersky Endpoint Security: open the Web
Control and click Rules diagnostics. It opens a window where you can specify the conditions of a
test request:
Specify an account
Then click Scan and you will see if Web Control blocks this address. The list of rules applicable to
the test request will also be displayed in the order of application.
For example, the administrator can check whether access to an employee’s personal home mail
server is blocked by the rule that blocks web mail. Or if users complain that they cannot access an
allowed site, you can find out which rule is working incorrectly.
If Web Control blocked only part of a web page, the user might not notice. If a page is completely
forbidden, a replacement page with a Web Control message will be displayed: either an indication
that access is blocked or a warning about an undesired site.
If a website is blocked (using the Block action configured in a rule), access will be denied.
However, if users disagree with the policy and still want to access the web resource, they can use
the Request access link in the Web Control message.
The user can edit the text of the request and send it to the administrator. Requests are sent to the
Administration Server as events and end up in the User requests selection.
To monitor situations when a user ignores the warning about undesired access and opens the site,
enable sending the Undesirable content was accessed after a warning event that has the
Warning severity. These events are not sent to the Administration Server by default.
If a user sends a request, it will be transferred to the server as a Warning event. As with the other
control components, requests are displayed in a special selection named User requests. The
administrator does not have to react to a request. However, if they want to, they can, for example,
configure the corresponding email notifications in the Kaspersky Endpoint Security policy.
In both cases, an event contains the access time, site URL, applied rule, computer name, user
account and Web Control action. If the rule was created for a category or data type, they are also
specified.
Notification template
Notification templates are available in the Kaspersky Endpoint Security policy, in the Web Control
settings. You can use variables.
Temporary access to the unwanted content after warning activated — Warning; this is not sent
to the Administration Server by default.
Web Control independently processes each object that comprises a site. That is
why, for example, when graphic files are prohibited, a separate even is created
for each little image that is blocked. An attempt to access a forbidden site can
result in sending hundreds of events, which does not necessarily signify that the
user is browsing the internet day and night.
Reports come in handy for regular control and general information. The Report on Web Control
shows how often each rule was matched, and in which mode.
The Details tab provides detailed information about each instance when a rule was triggered.