<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Test the functionality of AMP for endpoints in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/test-the-functionality-of-amp-for-endpoints/m-p/4171933#M5738</link>
    <description>&lt;P&gt;I would like to test/verify that my Cisco AMP for Endpoints is working correctly .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is integrated with Umbrella but when I pull reports, only activity related to other security events is shown (URLs, IPs, e.t.c).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I filter for AMP events - it shows no activity ever - as far back as I can go.&amp;nbsp; Which means no event has ever happened or it is not working !!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help is appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 22 Oct 2020 16:14:30 GMT</pubDate>
    <dc:creator>Mordred36</dc:creator>
    <dc:date>2020-10-22T16:14:30Z</dc:date>
    <item>
      <title>Test the functionality of AMP for endpoints</title>
      <link>https://community.cisco.com/t5/endpoint-security/test-the-functionality-of-amp-for-endpoints/m-p/4171933#M5738</link>
      <description>&lt;P&gt;I would like to test/verify that my Cisco AMP for Endpoints is working correctly .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is integrated with Umbrella but when I pull reports, only activity related to other security events is shown (URLs, IPs, e.t.c).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I filter for AMP events - it shows no activity ever - as far back as I can go.&amp;nbsp; Which means no event has ever happened or it is not working !!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help is appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 16:14:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/test-the-functionality-of-amp-for-endpoints/m-p/4171933#M5738</guid>
      <dc:creator>Mordred36</dc:creator>
      <dc:date>2020-10-22T16:14:30Z</dc:date>
    </item>
    <item>
      <title>Re: Test the functionality of AMP for endpoints</title>
      <link>https://community.cisco.com/t5/endpoint-security/test-the-functionality-of-amp-for-endpoints/m-p/4172317#M5739</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1115660"&gt;@Mordred36&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;AMP for Endpoints console does not show Umbrella Events. Umbrella itself does not generate an "Event". A DNS request does not include detailed endpoint information. How Umbrella is integrated.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;SecureX: Umbrella should be configured as&amp;nbsp; a Module. At any time you add an URL to the SecureX Ribbon search, to a casebook and so in, it included the disposition provided by Umbrella.&lt;/LI&gt;
&lt;LI&gt;Context Menu: Umbrella is shown up in the context menu. So at any time working in the Device Trajectory or other parts of the UI, you can directly pivot to Umbrella.&lt;/LI&gt;
&lt;LI&gt;You can directly block domains from the context menu (if the right API is configured and licensed).&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Threat Response gives you all information from Umbrella.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Optional: the Endpoint License includes Cognitivie analytics, where the whole Web Traffic Log is processed. This would generate Events in AMP. The difference here is, Cognitive includes the whole URL. This can be interesting during and investigation.&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Domain &lt;A href="http://www.xyz.com" target="_blank"&gt;www.xyz.com&lt;/A&gt;&amp;nbsp;--&amp;gt; Reputation is good, maybe suspicious&lt;/LI&gt;
&lt;LI&gt;URL &lt;A href="http://www.xyz.com/patch/file" target="_blank"&gt;www.xyz.com/URL_patch/file&lt;/A&gt;&amp;nbsp;--&amp;gt; The URL is marked as malicious&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Greetings,&lt;BR /&gt;Thorsten&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Oct 2020 06:07:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/test-the-functionality-of-amp-for-endpoints/m-p/4172317#M5739</guid>
      <dc:creator>Troja007</dc:creator>
      <dc:date>2020-10-23T06:07:01Z</dc:date>
    </item>
    <item>
      <title>Re: Test the functionality of AMP for endpoints</title>
      <link>https://community.cisco.com/t5/endpoint-security/test-the-functionality-of-amp-for-endpoints/m-p/4172573#M5740</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/547768"&gt;@Troja007&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Thanks for the quick response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess what I am really interested in is Cisco AMPs behavior as an Endpoint AV solution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am an MSP with several clients who I am monitoring with Cisco Umbrella and AMP. One of them comes and tell me that they had a virus or malware on their computer and asks me to show him that their AMP component is working correctly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do I do that? As an example - like how you can pull Symantec AV event logs and alert logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Oct 2020 13:42:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/test-the-functionality-of-amp-for-endpoints/m-p/4172573#M5740</guid>
      <dc:creator>Mordred36</dc:creator>
      <dc:date>2020-10-23T13:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: Test the functionality of AMP for endpoints</title>
      <link>https://community.cisco.com/t5/endpoint-security/test-the-functionality-of-amp-for-endpoints/m-p/4176048#M5766</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1115660"&gt;@Mordred36&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;first of all, AMP is an EDR/XDR solution including traditional protection engines.&lt;/P&gt;
&lt;P&gt;Enclosed two summary pages for the whole protection and EDR/XDR stack.&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="50%"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AMP_EDR_XDR_1.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/87352i8F1BFD4C66C57CFA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AMP_EDR_XDR_1.png" alt="AMP_EDR_XDR_1.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;TD width="50%"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AMP_EDR_XDR_2.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/87353i239CC951F29D8C09/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AMP_EDR_XDR_2.png" alt="AMP_EDR_XDR_2.png" /&gt;&lt;/span&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;BR /&gt;How to check if an endpoit is working correctly. There are several ways to do this.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;using the local&amp;nbsp;ConnectivityTool.exe&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;generating a eicar.com test file to see if an event is uploaded to the cloud.&lt;/LI&gt;
&lt;LI&gt;Typing a command line to check if this is reported to cloud.&lt;BR /&gt;Example:&amp;nbsp;C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -encoded cABpAG4AZwAgAGcAbwBvAGcAbABlAC4AYwBvAG0A&lt;BR /&gt;This is an ecoded powershell command to ping google.com&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;Checking configured exclusions.&lt;/LI&gt;
&lt;LI&gt;Using Orbital Endpoint search to query components of the connector.&lt;/LI&gt;
&lt;LI&gt;Checking in UI if all is up-to-date&lt;/LI&gt;
&lt;LI&gt;Generating a diagnostic package and analyze the logs using the AMP connector tuning tool:&amp;nbsp;&lt;A href="https://github.com/CiscoSecurity/amp-05-windows-tune" target="_blank"&gt;https://github.com/CiscoSecurity/amp-05-windows-tune&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;If you have access to the endpoint, you can use the AMP healthchecker:&amp;nbsp;&lt;A href="https://github.com/CiscoSecurity/amp-05-health-checker-windows" target="_blank"&gt;https://github.com/CiscoSecurity/amp-05-health-checker-windows&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If there is a threat not detected, we have to take a deeper look. Such a question can only be answered when having log files, knowing the hash of the file and so on. If you expect something is wrong, the best way in such a case, is to open a TAC Case.&lt;/P&gt;
&lt;P&gt;Greetings,&lt;BR /&gt;Thorsten&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 18:58:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/test-the-functionality-of-amp-for-endpoints/m-p/4176048#M5766</guid>
      <dc:creator>Troja007</dc:creator>
      <dc:date>2020-10-29T18:58:41Z</dc:date>
    </item>
  </channel>
</rss>

