<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Evgeniy, in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/general-questions-about-amp/m-p/3051411#M1265</link>
    <description>&lt;P&gt;Hi Evgeniy,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I will try to answer first part of your questions.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The Indications Of Compromise are a correlation of data which collect information in simple if..else template, that may indicate a compromised client. That means infected with some known or unknown malware.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This IOC is based on openioc.com framework. Either you or Cisco can build up some usefull IOC templates to be ready to deploy in the system through AMP scan on a daily basis.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;David&lt;/P&gt;</description>
    <pubDate>Fri, 03 Mar 2017 13:45:11 GMT</pubDate>
    <dc:creator>David Janulik</dc:creator>
    <dc:date>2017-03-03T13:45:11Z</dc:date>
    <item>
      <title>General questions about AMP</title>
      <link>https://community.cisco.com/t5/endpoint-security/general-questions-about-amp/m-p/3051410#M1264</link>
      <description>&lt;DIV&gt;Hi, folks!&lt;BR /&gt;I have&amp;nbsp;the questions about IOC scan in AMP.&lt;BR /&gt;1) What is the purpose of this feature? Is it like a full system scan in any other antivirus/antimalware&amp;nbsp; software like McAfee?&lt;BR /&gt;2) Does every malware has it's own IOC? Or there is a one big cisco IOC file which is used for all malware types?&lt;BR /&gt;3) What will happen, if IOC scan find malware? Will AMP for endpoints be able to delete it?&lt;/DIV&gt;
&lt;DIV&gt;Thanks!&lt;/DIV&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:03:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/general-questions-about-amp/m-p/3051410#M1264</guid>
      <dc:creator>Evgeniy Ivanov</dc:creator>
      <dc:date>2020-02-21T05:03:20Z</dc:date>
    </item>
    <item>
      <title>Hi Evgeniy,</title>
      <link>https://community.cisco.com/t5/endpoint-security/general-questions-about-amp/m-p/3051411#M1265</link>
      <description>&lt;P&gt;Hi Evgeniy,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I will try to answer first part of your questions.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The Indications Of Compromise are a correlation of data which collect information in simple if..else template, that may indicate a compromised client. That means infected with some known or unknown malware.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This IOC is based on openioc.com framework. Either you or Cisco can build up some usefull IOC templates to be ready to deploy in the system through AMP scan on a daily basis.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2017 13:45:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/general-questions-about-amp/m-p/3051411#M1265</guid>
      <dc:creator>David Janulik</dc:creator>
      <dc:date>2017-03-03T13:45:11Z</dc:date>
    </item>
    <item>
      <title>What you want to achive is to</title>
      <link>https://community.cisco.com/t5/endpoint-security/general-questions-about-amp/m-p/3051412#M1266</link>
      <description>&lt;P&gt;What you want to achive is to have a catalogue. This is build up on full scan. Based of artifacts, where is taken from locations such as registry, system32 and memory.&lt;/P&gt;
&lt;P&gt;Also an important note, this is resource intensive, endpoint with a large files will take hours/days to finish.&lt;/P&gt;
&lt;P&gt;The added value from this results in events, which you can take an action of. If we talk about unknown malware, you are interested which workstations have such symptoms/files/behaviour.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;To download Sample Cisco Endpoint IOC documents please open a support ticket.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I hope this answers your questions.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2017 14:07:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/general-questions-about-amp/m-p/3051412#M1266</guid>
      <dc:creator>David Janulik</dc:creator>
      <dc:date>2017-03-03T14:07:44Z</dc:date>
    </item>
    <item>
      <title>Evgeniy - In addition to</title>
      <link>https://community.cisco.com/t5/endpoint-security/general-questions-about-amp/m-p/3051413#M1267</link>
      <description>&lt;P&gt;Evgeniy - In addition to djanulik's reply, if you have the demo data turned on in your console, the CozyDuke and PlugX stories give you some hands on training for IOCs. Both end with you loading a pre-built IOC into AMP. &amp;nbsp;Cisco has published some sample IOCs here: &lt;A href="https://docs.amp.cisco.com/Cisco%20Endpoint%20IOC%20Attributes.pdf"&gt;https://docs.amp.cisco.com/Cisco%20Endpoint%20IOC%20Attributes.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you want to build your own IOCs, there are many tools on the web to assist with this.&amp;nbsp;Personally, I like this one: &lt;A href="https://www.iocbucket.com/openioceditor"&gt;https://www.iocbucket.com/openioceditor&lt;/A&gt;, because it's fully web based, and I found the user interface to be very intuitive.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Back to your original question, to my knowledge, if an IOC is matched, AMP does not take action other than to raise an alert. As djanulik pointed out, and IOC is essentially nothing more than a search criteria that you can instruct AMP to alert you on when the criteria is matched. Now, if AMP determines that files that are associated with an IOC are otherwise malicious (using the ETHOS or SPERO engines), it will take the configured action against those files. If you take a look at the demo story for&amp;nbsp;Demo_Command_Line_Arguments_Meterperter, while reviewing the Device Trajectory &amp;nbsp;you'll see where they used CLI analysis to determine an IOC event had occurred on the endpoint. You'll also see that AMP only alerted on the IOC at the time that it occurred.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps!&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2017 15:35:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/general-questions-about-amp/m-p/3051413#M1267</guid>
      <dc:creator>SDavidParker</dc:creator>
      <dc:date>2017-03-03T15:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: Evgeniy - In addition to</title>
      <link>https://community.cisco.com/t5/endpoint-security/general-questions-about-amp/m-p/3707913#M1268</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the explanation . I had a quick query on this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I made a IOC using Mandiant software which had couple of MD5 hashes.&amp;nbsp; the query i had is do we need to scan the systems regularly to get the system who has those MD5 or can i get those alert as they are seen.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I do not want to run endpoint scan for IOCs. Just want to get alerted as soon as we see those hashes in the enviroment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Vaibhav&lt;/P&gt;</description>
      <pubDate>Mon, 17 Sep 2018 08:32:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/general-questions-about-amp/m-p/3707913#M1268</guid>
      <dc:creator>vaibhav581</dc:creator>
      <dc:date>2018-09-17T08:32:34Z</dc:date>
    </item>
    <item>
      <title>Re: Evgeniy - In addition to</title>
      <link>https://community.cisco.com/t5/endpoint-security/general-questions-about-amp/m-p/3708014#M1269</link>
      <description>&lt;P&gt;Currently, any uploaded IOC would require a scan be run on the endpoint for the IOC to be triggered.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, since you&amp;nbsp;are only matching on specific MD5s you could potentially convert the IOC to match using an Advanced Custom Detection. The only caveat&amp;nbsp;is that you would need to create this ACD logic yourself to ensure the correct results.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Sep 2018 11:50:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/general-questions-about-amp/m-p/3708014#M1269</guid>
      <dc:creator>Thomas Busch</dc:creator>
      <dc:date>2018-09-17T11:50:58Z</dc:date>
    </item>
  </channel>
</rss>

