<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic how to control endpoint AMP devices? in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/how-to-control-endpoint-amp-devices/m-p/3540308#M2328</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How to push the custom malicious file block policy to 5000 internal endpoint AMP devices?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 21 Feb 2020 05:00:22 GMT</pubDate>
    <dc:creator>james.song1</dc:creator>
    <dc:date>2020-02-21T05:00:22Z</dc:date>
    <item>
      <title>how to control endpoint AMP devices?</title>
      <link>https://community.cisco.com/t5/endpoint-security/how-to-control-endpoint-amp-devices/m-p/3540308#M2328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How to push the custom malicious file block policy to 5000 internal endpoint AMP devices?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:00:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/how-to-control-endpoint-amp-devices/m-p/3540308#M2328</guid>
      <dc:creator>james.song1</dc:creator>
      <dc:date>2020-02-21T05:00:22Z</dc:date>
    </item>
    <item>
      <title>Re: how to control endpoint AMP devices?</title>
      <link>https://community.cisco.com/t5/endpoint-security/how-to-control-endpoint-amp-devices/m-p/3540309#M2329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi James,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To apply a custom list of files to be blacklisted, you can add the SHA-256 hashes of the files into a simple custom detection list and have that list applied to one or more groups of your internal endpoint AMP devices.&amp;nbsp; You can also create lists for Application (execution) Blocking.&amp;nbsp; Cisco AMP for Endpoints has a Retrospective Security capability that has Cisco AMP for Endpoints polling the AMP Cloud for what we call a retrospective queue at configurable periodic intervals and will automatically pick these up and retrospectively quarantine blacklist files previously or now seen on the endpoint.&amp;nbsp; As blacklisted applications are executed, they are now blocked.&amp;nbsp; During outbreak control situations, do take into consideration caching of file dispositions on the endpoints and if caches needs to be flushed for your operations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Details can be found in "Outbreak Control" Chapter 3 of the AMP for Endpoints (FireAMP) User Guide:&lt;/P&gt;&lt;P&gt;&lt;A href="https://immunet-janus-helpdoc.s3.amazonaws.com/FireAMPUserGuide.pdf" title="https://immunet-janus-helpdoc.s3.amazonaws.com/FireAMPUserGuide.pdf"&gt;https://immunet-janus-helpdoc.s3.amazonaws.com/FireAMPUserGuide.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks and best regards,&lt;/P&gt;&lt;P&gt;Shyue Hong&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Nov 2015 02:12:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/how-to-control-endpoint-amp-devices/m-p/3540309#M2329</guid>
      <dc:creator>schuang</dc:creator>
      <dc:date>2015-11-19T02:12:44Z</dc:date>
    </item>
  </channel>
</rss>

