<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best practice on Exclusions in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/best-practice-on-exclusions/m-p/3904373#M3005</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/873795"&gt;@EnverSingh7603&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;yes, you can/should use the Cisco Maintained exclusions. There are some points of view when installing AMP on a Server System.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Network monitoring: If the server provides services with high network activity, you should not install the DFC (network monitoring) component. You can, but there can be troubles. So test it.&lt;/LI&gt;
&lt;LI&gt;Use the right exclusions.&lt;/LI&gt;
&lt;LI&gt;The Tray icon can only connect once to the sfc.exe process from AMP. So, if there are multiple logged on users, you should disable the Tray icon in the policy.&lt;/LI&gt;
&lt;LI&gt;Troubleshooting and determining the necessary exclusions.
&lt;UL&gt;
&lt;LI&gt;Exclude Applications with high disk activity.&lt;/LI&gt;
&lt;LI&gt;Exclude Application which are generating executable code. Take an eagle eye on development systems. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/LI&gt;
&lt;LI&gt;you can enable Debug Logging and generating a diagnostic file. The diagnostic file can be checked with a tool, which you can download from Github:&amp;nbsp;&lt;A href="https://github.com/CiscoSecurity/amp-05-windows-tune" target="_blank" rel="noopener"&gt;https://github.com/CiscoSecurity/amp-05-windows-tune&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Here is a cool explanation from Luis Velazquez generating a Report as well.&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/advanced-threats/cisco-amp-100-usage-of-cpu/td-p/3877304" target="_blank"&gt;https://community.cisco.com/t5/advanced-threats/cisco-amp-100-usage-of-cpu/td-p/3877304&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;Greetings,&lt;/P&gt;
&lt;P&gt;Thorsten&lt;/P&gt;</description>
    <pubDate>Wed, 07 Aug 2019 07:27:06 GMT</pubDate>
    <dc:creator>Troja007</dc:creator>
    <dc:date>2019-08-07T07:27:06Z</dc:date>
    <item>
      <title>Best practice on Exclusions</title>
      <link>https://community.cisco.com/t5/endpoint-security/best-practice-on-exclusions/m-p/3904239#M3004</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry if this has been asked previously.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are commencing with a new deployment of AMP on servers, which is the best way to start developing your exclusions?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know there is a Cisco Maintained Exclusion set for Windows, but further to this what would be the best practice?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to run a tool/script that audits potential files and processes to be considered for exclusions?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:10:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/best-practice-on-exclusions/m-p/3904239#M3004</guid>
      <dc:creator>EnverSingh7603</dc:creator>
      <dc:date>2020-02-21T05:10:15Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice on Exclusions</title>
      <link>https://community.cisco.com/t5/endpoint-security/best-practice-on-exclusions/m-p/3904373#M3005</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/873795"&gt;@EnverSingh7603&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;yes, you can/should use the Cisco Maintained exclusions. There are some points of view when installing AMP on a Server System.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Network monitoring: If the server provides services with high network activity, you should not install the DFC (network monitoring) component. You can, but there can be troubles. So test it.&lt;/LI&gt;
&lt;LI&gt;Use the right exclusions.&lt;/LI&gt;
&lt;LI&gt;The Tray icon can only connect once to the sfc.exe process from AMP. So, if there are multiple logged on users, you should disable the Tray icon in the policy.&lt;/LI&gt;
&lt;LI&gt;Troubleshooting and determining the necessary exclusions.
&lt;UL&gt;
&lt;LI&gt;Exclude Applications with high disk activity.&lt;/LI&gt;
&lt;LI&gt;Exclude Application which are generating executable code. Take an eagle eye on development systems. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/LI&gt;
&lt;LI&gt;you can enable Debug Logging and generating a diagnostic file. The diagnostic file can be checked with a tool, which you can download from Github:&amp;nbsp;&lt;A href="https://github.com/CiscoSecurity/amp-05-windows-tune" target="_blank" rel="noopener"&gt;https://github.com/CiscoSecurity/amp-05-windows-tune&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Here is a cool explanation from Luis Velazquez generating a Report as well.&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/advanced-threats/cisco-amp-100-usage-of-cpu/td-p/3877304" target="_blank"&gt;https://community.cisco.com/t5/advanced-threats/cisco-amp-100-usage-of-cpu/td-p/3877304&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;Greetings,&lt;/P&gt;
&lt;P&gt;Thorsten&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 07:27:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/best-practice-on-exclusions/m-p/3904373#M3005</guid>
      <dc:creator>Troja007</dc:creator>
      <dc:date>2019-08-07T07:27:06Z</dc:date>
    </item>
  </channel>
</rss>

