<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ransomware Question in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/ransomware-question/m-p/2956094#M599</link>
    <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can anyone confirm, is AMP can stop spam emails micro enabled (ransomware) attachments or we need to also buy the SPAM license?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Waiting for your prompt reply.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 05:02:58 GMT</pubDate>
    <dc:creator>Saeedullah Khan</dc:creator>
    <dc:date>2020-02-21T05:02:58Z</dc:date>
    <item>
      <title>Ransomware Question</title>
      <link>https://community.cisco.com/t5/endpoint-security/ransomware-question/m-p/2956094#M599</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can anyone confirm, is AMP can stop spam emails micro enabled (ransomware) attachments or we need to also buy the SPAM license?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Waiting for your prompt reply.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:02:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/ransomware-question/m-p/2956094#M599</guid>
      <dc:creator>Saeedullah Khan</dc:creator>
      <dc:date>2020-02-21T05:02:58Z</dc:date>
    </item>
    <item>
      <title>Hi Khan,</title>
      <link>https://community.cisco.com/t5/endpoint-security/ransomware-question/m-p/2956095#M602</link>
      <description>&lt;P&gt;Hi Khan,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;AMP checks files with following extensions.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;MSEXE&lt;/LI&gt;
&lt;LI&gt;PDF&lt;/LI&gt;
&lt;LI&gt;MSCAB&lt;/LI&gt;
&lt;LI&gt;MSOLE2&lt;/LI&gt;
&lt;LI&gt;ZIP&lt;/LI&gt;
&lt;LI&gt;ELF&lt;/LI&gt;
&lt;LI&gt;MACHO&lt;/LI&gt;
&lt;LI&gt;MACHO_UNIBIN&lt;/LI&gt;
&lt;LI&gt;SWF&lt;/LI&gt;
&lt;LI&gt;JAVA&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;Unsupported File Types&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Windows Connector currently does not scan ELF, JAVA, xar(pkg), MACHO, MACHO_UNIBIN, or ASCII.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The file disposition will be checked against cloud. To reduce spam, you should probably look for Email security appliance (ESA) product.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2016 09:19:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/ransomware-question/m-p/2956095#M602</guid>
      <dc:creator>David Janulik</dc:creator>
      <dc:date>2016-12-13T09:19:54Z</dc:date>
    </item>
    <item>
      <title>Thanks for your reply.</title>
      <link>https://community.cisco.com/t5/endpoint-security/ransomware-question/m-p/2956096#M604</link>
      <description>&lt;P&gt;Thanks for your reply.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Actually, spam received ".&lt;SPAN style="font-size: 12.0pt;"&gt;docm, &lt;/SPAN&gt;&lt;SPAN style="font-size: 12.0pt; line-height: 115%;"&gt;.xlsm&lt;/SPAN&gt;" extension files and when opened the file, they encrypted the mostly word/excel files.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can AMP will control this issue?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Saeed&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2016 09:33:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/ransomware-question/m-p/2956096#M604</guid>
      <dc:creator>Saeedullah Khan</dc:creator>
      <dc:date>2016-12-13T09:33:07Z</dc:date>
    </item>
    <item>
      <title>Can you open a support case?</title>
      <link>https://community.cisco.com/t5/endpoint-security/ransomware-question/m-p/2956097#M605</link>
      <description>&lt;P&gt;Can you open a support case? We can check the file disposition convicted at the time you opened it. From your side do the file trajectory investigation. This should help you to track down executed actions from it.&lt;/P&gt;
&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2016 09:46:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/ransomware-question/m-p/2956097#M605</guid>
      <dc:creator>David Janulik</dc:creator>
      <dc:date>2016-12-13T09:46:35Z</dc:date>
    </item>
  </channel>
</rss>

