<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AMP blocks Microsoft update to WSUS server in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/amp-blocks-microsoft-update-to-wsus-server/m-p/3438448#M2343</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Has anybody else experienced AMP blocking one of the last Microsoft updates.&amp;nbsp; The file blocked is below along with threat name and hash.&amp;nbsp; Also, is there a portal that gives more information on these threat names?&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://wsus.ds.download.windowsupdate.com/c/msdownload/update/software/secu/2015/10/ndp40-kb3098778-x86_0cac0a1d839d5db8363adb9d0d0633782e72cd9e.exe" rel="nofollow" target="_blank"&gt;http://wsus.ds.download.windowsupdate.com/c/msdownload/update/software/secu/2015/10/ndp40-kb3098778-x86_0cac0a1d839d5db8363adb9d0d0633782e72cd9e.exe&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;W32.Auto.EDEE5F.182447.in02&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaacf792b9f7596ce9888eda0a8593dd553b44a0615109fc068e1f96212c43f4&lt;/P&gt;&lt;P&gt;AAACF792B9F7596CE9888EDA0A8593DD553B44A0615109FC068E1F96212C43F4&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 21 Feb 2020 05:29:42 GMT</pubDate>
    <dc:creator>Austin Clark</dc:creator>
    <dc:date>2020-02-21T05:29:42Z</dc:date>
    <item>
      <title>AMP blocks Microsoft update to WSUS server</title>
      <link>https://community.cisco.com/t5/endpoint-security/amp-blocks-microsoft-update-to-wsus-server/m-p/3438448#M2343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Has anybody else experienced AMP blocking one of the last Microsoft updates.&amp;nbsp; The file blocked is below along with threat name and hash.&amp;nbsp; Also, is there a portal that gives more information on these threat names?&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://wsus.ds.download.windowsupdate.com/c/msdownload/update/software/secu/2015/10/ndp40-kb3098778-x86_0cac0a1d839d5db8363adb9d0d0633782e72cd9e.exe" rel="nofollow" target="_blank"&gt;http://wsus.ds.download.windowsupdate.com/c/msdownload/update/software/secu/2015/10/ndp40-kb3098778-x86_0cac0a1d839d5db8363adb9d0d0633782e72cd9e.exe&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;W32.Auto.EDEE5F.182447.in02&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaacf792b9f7596ce9888eda0a8593dd553b44a0615109fc068e1f96212c43f4&lt;/P&gt;&lt;P&gt;AAACF792B9F7596CE9888EDA0A8593DD553B44A0615109FC068E1F96212C43F4&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:29:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/amp-blocks-microsoft-update-to-wsus-server/m-p/3438448#M2343</guid>
      <dc:creator>Austin Clark</dc:creator>
      <dc:date>2020-02-21T05:29:42Z</dc:date>
    </item>
    <item>
      <title>Re: AMP blocks Microsoft update to WSUS server</title>
      <link>https://community.cisco.com/t5/endpoint-security/amp-blocks-microsoft-update-to-wsus-server/m-p/3438449#M2344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Austin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for reaching out to us.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following site operated by Cisco TALOS provides more information on our naming conventions for AMP.&lt;/P&gt;&lt;P&gt;http://www.talosintel.com/amp-naming/&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and best regards,&lt;/P&gt;&lt;P&gt;Shyue Hong&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Shyue Hong Chuang&lt;/P&gt;&lt;P&gt;Technical Marketing Engineer&lt;/P&gt;&lt;P&gt;Security Business Group&lt;/P&gt;&lt;P&gt;Cisco Systems&lt;/P&gt;&lt;P&gt;Email: schuang@cisco.com&lt;/P&gt;&lt;P&gt;Tel: +65 6317 5352&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Nov 2015 15:23:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/amp-blocks-microsoft-update-to-wsus-server/m-p/3438449#M2344</guid>
      <dc:creator>schuang</dc:creator>
      <dc:date>2015-11-11T15:23:55Z</dc:date>
    </item>
    <item>
      <title>Re: AMP blocks Microsoft update to WSUS server</title>
      <link>https://community.cisco.com/t5/endpoint-security/amp-blocks-microsoft-update-to-wsus-server/m-p/3438450#M2345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you explain what "Conviction of a file that takes place directly upon import (without Detonation)" means? &lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I'm a bit ignorant on this topic. Is this something that was convicted due to dynamic analysis or is the definition in a database somewhere? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Nov 2015 15:35:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/amp-blocks-microsoft-update-to-wsus-server/m-p/3438450#M2345</guid>
      <dc:creator>Austin Clark</dc:creator>
      <dc:date>2015-11-11T15:35:57Z</dc:date>
    </item>
    <item>
      <title>Re: AMP blocks Microsoft update to WSUS server</title>
      <link>https://community.cisco.com/t5/endpoint-security/amp-blocks-microsoft-update-to-wsus-server/m-p/3438451#M2346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Austin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It does look like the definition is in the AMP DB and returns as malicious based on a hash lookup without any (dynamic analysis) sandbox detonation.  I did run it through the a Sandbox anyway to understand what is triggering and it does exhibit some behaviours but perhaps our malware research team may need to take a closer look.  The following are a summary of the behavioral indicators flagged:&lt;/P&gt;&lt;P&gt;File Name of Executable on Disk Does Not Match Original File Name&lt;/P&gt;&lt;P&gt;Alternate Data Stream File Creation Detected&lt;/P&gt;&lt;P&gt;Process Modified an Executable File&lt;/P&gt;&lt;P&gt;Process Modified File in a User Directory&lt;/P&gt;&lt;P&gt;Downloaded PE Executable&lt;/P&gt;&lt;P&gt;Potential Code Injection Detected&lt;/P&gt;&lt;P&gt;Executable with Encrypted Sections&lt;/P&gt;&lt;P&gt;Outbound HTTP GET Request From URL Submission&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and best regards,&lt;/P&gt;&lt;P&gt;Shyue Hong&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Nov 2015 15:56:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/amp-blocks-microsoft-update-to-wsus-server/m-p/3438451#M2346</guid>
      <dc:creator>schuang</dc:creator>
      <dc:date>2015-11-11T15:56:19Z</dc:date>
    </item>
    <item>
      <title>Re: AMP blocks Microsoft update to WSUS server</title>
      <link>https://community.cisco.com/t5/endpoint-security/amp-blocks-microsoft-update-to-wsus-server/m-p/3438452#M2347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, Austin.&amp;nbsp; Thanks for the question.&amp;nbsp; This is actually a really timely coincidence, since today we happen to have several tech experts monitoring this very board for AMP questions.&amp;nbsp; So the fact that we happen to have a couple of high-profile false positive incidents coming up today -- rare, but does happen from time to time -- actually gives me a great opportunity to explain how AMP works in situations like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Specifically for situations like this, there is the "whitelist" feature.&amp;nbsp; Any time you find something that AMP classifies as a threat, but that you know to be benign, you can immediately resolve it via &lt;STRONG&gt;Application Control &amp;gt; Whitelists&lt;/STRONG&gt;.&amp;nbsp; Create a whitelist and add the SHA-256 of the file in question, and your AMP deployment will not convict the file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco works very hard to avoid falsely convicting files, but like I said, accidents and mis-classifications will happen occasionally.&amp;nbsp; Our product has been built with this reality in mind.&amp;nbsp; Our Talos team should have the underlying issue corrected soon, but you have complete control yourself in the meanwhile.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Nov 2015 15:57:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/amp-blocks-microsoft-update-to-wsus-server/m-p/3438452#M2347</guid>
      <dc:creator>brmcmaho</dc:creator>
      <dc:date>2015-11-11T15:57:27Z</dc:date>
    </item>
    <item>
      <title>Re: AMP blocks Microsoft update to WSUS server</title>
      <link>https://community.cisco.com/t5/endpoint-security/amp-blocks-microsoft-update-to-wsus-server/m-p/3438453#M2348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's really good information.&amp;nbsp; I was aware of the white list capability but was searching for a definite answer before doing so.&amp;nbsp; My searches online didn't return any info like I expected due to the high profile nature.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Furthermore, I believe wsus got the update anyway via https.&amp;nbsp;&amp;nbsp;&amp;nbsp; Immunet(clamAV) on my PC responded shortly after with some quarantined items.&amp;nbsp; I'm not 100% sure that they're related as the filenames are different but I can post that information if you're curious. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Nov 2015 16:09:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/amp-blocks-microsoft-update-to-wsus-server/m-p/3438453#M2348</guid>
      <dc:creator>Austin Clark</dc:creator>
      <dc:date>2015-11-11T16:09:51Z</dc:date>
    </item>
    <item>
      <title>Re: AMP blocks Microsoft update to WSUS server</title>
      <link>https://community.cisco.com/t5/endpoint-security/amp-blocks-microsoft-update-to-wsus-server/m-p/3438454#M2349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes what a coincidence.&lt;/P&gt;&lt;P&gt;We started getting several false positives yesterday including Google Chrome updates, Internet Explorer updates... we were told that the developers are working on it.&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Nov 2015 16:17:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/amp-blocks-microsoft-update-to-wsus-server/m-p/3438454#M2349</guid>
      <dc:creator>Patrick Moubarak</dc:creator>
      <dc:date>2015-11-11T16:17:56Z</dc:date>
    </item>
  </channel>
</rss>

