<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic thanks, was confused as I in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/file-policy-rule-question/m-p/2936242#M1859</link>
    <description>&lt;P&gt;thanks, was confused as I feel that sending SHA's, which is separate to threat grid, is also a dynamic action.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;from what I understand about file being sent, there should not be double ups being sent. Is it normal when a file is labelled as unknown for it to be constantly resent 100's of times?&lt;/P&gt;
&lt;P&gt;For example a semantic secars.dll file.&lt;/P&gt;</description>
    <pubDate>Wed, 27 Jul 2016 02:20:17 GMT</pubDate>
    <dc:creator>evan.chadwick1</dc:creator>
    <dc:date>2016-07-27T02:20:17Z</dc:date>
    <item>
      <title>File policy rule question</title>
      <link>https://community.cisco.com/t5/endpoint-security/file-policy-rule-question/m-p/2936237#M1818</link>
      <description>&lt;P&gt;when you choose to 'block malware', what does the product do for files that can't&lt;/P&gt;
&lt;P&gt;1/ be acted on for local analysis&lt;/P&gt;
&lt;P&gt;2/ be sent to the cloud for dynamic/spero anlysis&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Ie every other file other than 9 highlighed in the above categories&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:01:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/file-policy-rule-question/m-p/2936237#M1818</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2020-02-21T05:01:24Z</dc:date>
    </item>
    <item>
      <title>Hello Evan,</title>
      <link>https://community.cisco.com/t5/endpoint-security/file-policy-rule-question/m-p/2936238#M1830</link>
      <description>&lt;P&gt;Hello Evan,&lt;/P&gt;
&lt;P&gt;Please refer the following two links for the best understanding of file dispositions.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firesight/541/user-guide/FireSIGHT-System-UserGuide-v5401/AMP-Config.html&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/AMP-Config.html&lt;/P&gt;
&lt;P&gt;Feel free to let me know if you have any questions.&lt;/P&gt;
&lt;P&gt;Rate if post helps you&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Jetsy&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2016 05:35:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/file-policy-rule-question/m-p/2936238#M1830</guid>
      <dc:creator>Jetsy Mathew</dc:creator>
      <dc:date>2016-07-19T05:35:10Z</dc:date>
    </item>
    <item>
      <title>Hi, thanks for posting the</title>
      <link>https://community.cisco.com/t5/endpoint-security/file-policy-rule-question/m-p/2936239#M1840</link>
      <description>&lt;P&gt;Hi, thanks for posting the links, its a good reminder to have a re read.&amp;nbsp;&lt;BR /&gt;Perhaps if you could define what Cisco refers to as 'dynamic' it would be helpful.&lt;/P&gt;
&lt;P&gt;When creating a File Rule Cisco prepopulates a 'dynamic' list of 4 files.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These contain MSEXE, MSOLE2, NEW_OFFICE and PDF. So if these are the only files that can be dynamic it leads me to think I don't understand what Cisco means as dynamic.&lt;/P&gt;
&lt;P&gt;When I read this:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt; Note that you must configure a rule in the file policy with either a &lt;/SPAN&gt;&lt;EM class="z-UnivBold"&gt;Malware Cloud Lookup&lt;/EM&gt;&lt;SPAN&gt; or &lt;/SPAN&gt;&lt;EM class="z-UnivBold"&gt;Block Malware&lt;/EM&gt;&lt;SPAN&gt; action and a matching file type to calculate a file’s SHA value.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Is the calculation of a SHA value not dynamic?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2016 00:10:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/file-policy-rule-question/m-p/2936239#M1840</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2016-07-25T00:10:22Z</dc:date>
    </item>
    <item>
      <title>Hello Evan,</title>
      <link>https://community.cisco.com/t5/endpoint-security/file-policy-rule-question/m-p/2936240#M1842</link>
      <description>&lt;P&gt;Hello Evan,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you configure a rule in the file policy with either a &lt;/SPAN&gt;&lt;EM&gt;Malware Cloud Lookup&lt;/EM&gt;&lt;SPAN&gt; or &lt;/SPAN&gt;&lt;EM&gt;Block Malware&amp;nbsp;&lt;/EM&gt;&lt;SPAN&gt;action and a matching file type to calculate a file’s SHA value.It will query to check the sha value.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Rate if the post helps you&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Jetsy&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2016 14:13:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/file-policy-rule-question/m-p/2936240#M1842</guid>
      <dc:creator>Jetsy Mathew</dc:creator>
      <dc:date>2016-07-26T14:13:29Z</dc:date>
    </item>
    <item>
      <title>Hello Evan,</title>
      <link>https://community.cisco.com/t5/endpoint-security/file-policy-rule-question/m-p/2936241#M1852</link>
      <description>&lt;P&gt;Hello Evan,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I think you are referring to the list of files populated when you select "Dynamic Analysis Capable" as the file type in a File policy rule.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;These files types:&amp;nbsp;&lt;SPAN&gt;MSEXE, MSOLE2, NEW_OFFICE and PDF are the file types that can be successfully submitted to the cloud for Dynamic Analysis.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt; &lt;SPAN&gt;These file types can be submitted to the AMP &lt;A href="http://www.cisco.com/c/en_ca/products/security/amp-threat-grid-cloud/index.html" target="_blank" title="More Information: Threat Grid"&gt;Threat Grid&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;cloud or an on-premises &lt;/SPAN&gt;&lt;SPAN&gt;AMP Threat Grid&lt;/SPAN&gt;&lt;SPAN&gt; appliance for dynamic analysis.&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;The Threat Grid cloud runs the sample through a sandbox&amp;nbsp;environment&amp;nbsp;and evaluates behavioral indicators&amp;nbsp;to determine the Threat Score of a sample. A high enough Threat Score will result in the sample's SHA-256 hash returning a Malicious disposition. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;The Threat Score and Analysis Report of the sandbox run is available after successful submission and analysis.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Let me know if i have understood the question and if this is the answer that you were looking for.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2016 23:35:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/file-policy-rule-question/m-p/2936241#M1852</guid>
      <dc:creator>kwalcott</dc:creator>
      <dc:date>2016-07-26T23:35:44Z</dc:date>
    </item>
    <item>
      <title>thanks, was confused as I</title>
      <link>https://community.cisco.com/t5/endpoint-security/file-policy-rule-question/m-p/2936242#M1859</link>
      <description>&lt;P&gt;thanks, was confused as I feel that sending SHA's, which is separate to threat grid, is also a dynamic action.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;from what I understand about file being sent, there should not be double ups being sent. Is it normal when a file is labelled as unknown for it to be constantly resent 100's of times?&lt;/P&gt;
&lt;P&gt;For example a semantic secars.dll file.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2016 02:20:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/file-policy-rule-question/m-p/2936242#M1859</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2016-07-27T02:20:17Z</dc:date>
    </item>
    <item>
      <title>Hello Evan,</title>
      <link>https://community.cisco.com/t5/endpoint-security/file-policy-rule-question/m-p/2936243#M1862</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Hello Evan,&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Static and dynamic malware analysis:&lt;BR /&gt; A highly secure sandboxing environment helps you run, analyze, and test malware in order to discover previously unknown zero-day threats. Integration of Threat Grid’s sandboxing and static and dynamic malware analysis technology into AMP solutions results in a more comprehensive analysis checked against a larger set of behavioral indicator.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Apr 2017 14:15:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/file-policy-rule-question/m-p/2936243#M1862</guid>
      <dc:creator>Abha Jha</dc:creator>
      <dc:date>2017-04-06T14:15:52Z</dc:date>
    </item>
  </channel>
</rss>

