![]() ![]() Kaspersky Anti Targeted Attack includes the following components: Principle of operation of Kaspersky Anti Targeted Attack You can use the full functionality of the program (KATA and KEDR key) or partial functionality (only KATA key or only KEDR key). Kaspersky Endpoint Detection and Response (hereinafter also referred to as "KEDR"), which provides protection for the local area network of the organization.Kaspersky Anti Targeted Attack (hereinafter also referred to as "KATA"), which detects threats on the perimeter of the enterprise IT infrastructure.Make sure these components are enabled and working.Kaspersky Anti Targeted Attack Platform includes two functional blocks: The following components ensure the operation of KATA EDR: KATA EDR uses information received from application components. You can download the Kaspersky Endpoint Agent distribution package from the Kaspersky Anti Targeted Attack Platform distribution kit. In Kaspersky Endpoint Security 11.9.0, the distribution kit no longer includes the Kaspersky Endpoint Agent distribution package. The KATA EDR component is not compatible with EDR Optimum and EDR Expert components. You can select the KATA EDR component during installation or upgrade, as well as using the Change application components task. Integration with KATA EDR requires adding the Kaspersky Anti Targeted Attack Platform (KATA EDR) component and installing Kaspersky Endpoint Agent. In this case, the Kaspersky Endpoint Agent application also sends information to the Kaspersky Anti Targeted Attack Platform server about threats discovered by Kaspersky Endpoint Security for Windows as well as information about processing results for these threats. Kaspersky Endpoint Agent can integrate with Kaspersky Endpoint Security for Windows. Information about events on the computer is sent to the Kaspersky Anti Targeted Attack Platform server. ![]() The Kaspersky Endpoint Agent application is installed on individual computers on the corporate IT infrastructure and continuously monitors processes, open network connections, and files being modified.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |