<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Exploit prevention - exclusions 💃 in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/exploit-prevention-exclusions/m-p/4440526#M6270</link>
    <description>&lt;P&gt;UMontero, you indicate that it should be done by a TAC engineer. Does that mean it can be done by mere mortals?&lt;/P&gt;</description>
    <pubDate>Wed, 28 Jul 2021 17:02:50 GMT</pubDate>
    <dc:creator>Brad.Shaw</dc:creator>
    <dc:date>2021-07-28T17:02:50Z</dc:date>
    <item>
      <title>Exploit prevention - exclusions 💃</title>
      <link>https://community.cisco.com/t5/endpoint-security/exploit-prevention-exclusions/m-p/4262596#M5892</link>
      <description>&lt;P&gt;Hello guys,&lt;/P&gt;&lt;P&gt;Do you know if it is possible to exclude a file from Exploit Prevention engine? I havent found anything like that in the AMP console.&amp;nbsp; If this is not possible, is it on the roadmap?&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;Marcel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Dec 2020 19:36:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/exploit-prevention-exclusions/m-p/4262596#M5892</guid>
      <dc:creator>jmarcel2</dc:creator>
      <dc:date>2020-12-22T19:36:38Z</dc:date>
    </item>
    <item>
      <title>Re: Exploit prevention - exclusions 💃</title>
      <link>https://community.cisco.com/t5/endpoint-security/exploit-prevention-exclusions/m-p/4262626#M5893</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is possible, although it should be done by a TAC engineer.&lt;/P&gt;
&lt;P&gt;Otherwise, we have the option of putting Exploit Prevention in Audit or Disabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 22 Dec 2020 20:50:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/exploit-prevention-exclusions/m-p/4262626#M5893</guid>
      <dc:creator>UMontero</dc:creator>
      <dc:date>2020-12-22T20:50:54Z</dc:date>
    </item>
    <item>
      <title>Re: Exploit prevention - exclusions 💃</title>
      <link>https://community.cisco.com/t5/endpoint-security/exploit-prevention-exclusions/m-p/4273955#M5933</link>
      <description>&lt;P&gt;&lt;SPAN class="TextRun  BCX0 SCXP153943775" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun  BCX0 SCXP153943775"&gt;Good engagement, Marcel.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="TextRun  BCX0 SCXP153943775" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun  BCX0 SCXP153943775"&gt;&amp;nbsp;Message received ✉. Malo McWare was here but he jumped off a minute ago.&amp;nbsp;Meet me back at HQs. I know where he's going.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="TextRun  BCX0 SCXP153943775" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun  BCX0 SCXP153943775"&gt;(Disclaimer: this post is part of the AMP for Endpoints Advocacy Campaign on the Cisco Gateway)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Jan 2021 09:42:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/exploit-prevention-exclusions/m-p/4273955#M5933</guid>
      <dc:creator>Mariley Reinoso Olivera</dc:creator>
      <dc:date>2021-01-17T09:42:36Z</dc:date>
    </item>
    <item>
      <title>Re: Exploit prevention - exclusions 💃</title>
      <link>https://community.cisco.com/t5/endpoint-security/exploit-prevention-exclusions/m-p/4440526#M6270</link>
      <description>&lt;P&gt;UMontero, you indicate that it should be done by a TAC engineer. Does that mean it can be done by mere mortals?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jul 2021 17:02:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/exploit-prevention-exclusions/m-p/4440526#M6270</guid>
      <dc:creator>Brad.Shaw</dc:creator>
      <dc:date>2021-07-28T17:02:50Z</dc:date>
    </item>
    <item>
      <title>Re: Exploit prevention - exclusions 💃</title>
      <link>https://community.cisco.com/t5/endpoint-security/exploit-prevention-exclusions/m-p/4440592#M6274</link>
      <description>So are you asking if TAC engineers are mortals, or are you asking if there is actually a way for end users to do it?&lt;BR /&gt;At this point, it is still done in the back-end of your AMP tenant…&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Jul 2021 19:18:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/exploit-prevention-exclusions/m-p/4440592#M6274</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2021-07-28T19:18:30Z</dc:date>
    </item>
    <item>
      <title>Re: Exploit prevention - exclusions 💃</title>
      <link>https://community.cisco.com/t5/endpoint-security/exploit-prevention-exclusions/m-p/4440630#M6276</link>
      <description>&lt;P&gt;That answers the questions Ken. Actually I guess it answers two, the ethereal status of the TAC engineers, and my ability to do it myself. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jul 2021 20:09:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/exploit-prevention-exclusions/m-p/4440630#M6276</guid>
      <dc:creator>Brad.Shaw</dc:creator>
      <dc:date>2021-07-28T20:09:33Z</dc:date>
    </item>
    <item>
      <title>Re: Exploit prevention - exclusions 💃</title>
      <link>https://community.cisco.com/t5/endpoint-security/exploit-prevention-exclusions/m-p/4440968#M6277</link>
      <description>&lt;P&gt;Hello all,&lt;BR /&gt;we are constantly adding features and improvements to the Secure Endpoint product and the SecureX architecture. Custom Exploit Prevention exclusions are not possible today. There are a lot of Feature Requests or wishes for different areas of the product/architecture. FRs are helping us to change the priority for new upcoming product features and improvements. If you want, i can open a FR for you in the tool. To do so, you may send me a PM including the following information.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Company Name&lt;/LI&gt;
&lt;LI&gt;Connector Deployment count&lt;/LI&gt;
&lt;LI&gt;Ares (APJC, EMEAR, NAM)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I will send you back the FR number, so you can go in contact with with Cisco representative.&lt;/P&gt;
&lt;P&gt;Greetings,&lt;BR /&gt;Thorsten&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 09:35:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/exploit-prevention-exclusions/m-p/4440968#M6277</guid>
      <dc:creator>Troja007</dc:creator>
      <dc:date>2021-07-29T09:35:29Z</dc:date>
    </item>
  </channel>
</rss>

