<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic So in reference to your in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/fire-amp-application-blocking/m-p/2815949#M1933</link>
    <description>&lt;P&gt;So in reference to your articles you have pointed me to, you are relying on no collisions in SHA-256 from one you mark as malware and one that may be safe from a legitimate application. &amp;nbsp;I already read these prior to my question and I was hoping for a little more insight, if there is any, on how AMP for EP may be able to distinguish between these possible issues even if they are negligible at best/worst. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &amp;nbsp;Thanks for your reply. &amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 06 Feb 2017 19:09:41 GMT</pubDate>
    <dc:creator>Victor Garcia</dc:creator>
    <dc:date>2017-02-06T19:09:41Z</dc:date>
    <item>
      <title>Fire AMP Application Blocking</title>
      <link>https://community.cisco.com/t5/endpoint-security/fire-amp-application-blocking/m-p/2815947#M1930</link>
      <description>&lt;P&gt;I have a question about blocking an executable by our defined Application Blocking rule/list.&amp;nbsp; If I have a file called UpdateTask.exe and it is located in a user profile \.....\.....; will it black the application at is file location or will it block any executable that has the name UpdateTask.exe?&amp;nbsp; I ask because this issue can exist with the uninstall.exe files as well.&amp;nbsp; I do not want to add this exe to the block list if it includes all of them as opposed to the ones located in the file path.&amp;nbsp; Basically, just in case I am not clear, I do not want to block a legitimate updatetask.exe or uninstall.exe file, I only want to block those that are associated with malicious application's path.&amp;nbsp; I hope I am being clear enough, if not, please ask and I will try to word it better.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:00:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/fire-amp-application-blocking/m-p/2815947#M1930</guid>
      <dc:creator>Victor Garcia</dc:creator>
      <dc:date>2020-02-21T05:00:36Z</dc:date>
    </item>
    <item>
      <title>Please refer to the below url</title>
      <link>https://community.cisco.com/t5/endpoint-security/fire-amp-application-blocking/m-p/2815948#M1932</link>
      <description>&lt;P&gt;Please refer to the below url for User Guide.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.cisco.com/c/dam/en/us/td/docs/security/sourcefire/fireamp/fireamp-cloud/FireAMPUserGuide.pdf" target="_blank"&gt;http://www.cisco.com/c/dam/en/us/td/docs/security/sourcefire/fireamp/fireamp-cloud/FireAMPUserGuide.pdf&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/firesight/541/user-guide/FireSIGHT-System-UserGuide-v5401/AMP-Config.html" target="_blank"&gt;http://www.cisco.com/c/en/us/td/docs/security/firesight/541/user-guide/FireSIGHT-System-UserGuide-v5401/AMP-Config.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/AMP-Config.pdf" target="_blank"&gt;http://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/AMP-Config.pdf&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Hope to help.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2017 15:19:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/fire-amp-application-blocking/m-p/2815948#M1932</guid>
      <dc:creator>syeda3</dc:creator>
      <dc:date>2017-02-06T15:19:28Z</dc:date>
    </item>
    <item>
      <title>So in reference to your</title>
      <link>https://community.cisco.com/t5/endpoint-security/fire-amp-application-blocking/m-p/2815949#M1933</link>
      <description>&lt;P&gt;So in reference to your articles you have pointed me to, you are relying on no collisions in SHA-256 from one you mark as malware and one that may be safe from a legitimate application. &amp;nbsp;I already read these prior to my question and I was hoping for a little more insight, if there is any, on how AMP for EP may be able to distinguish between these possible issues even if they are negligible at best/worst. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &amp;nbsp;Thanks for your reply. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2017 19:09:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/fire-amp-application-blocking/m-p/2815949#M1933</guid>
      <dc:creator>Victor Garcia</dc:creator>
      <dc:date>2017-02-06T19:09:41Z</dc:date>
    </item>
  </channel>
</rss>

