<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco AMP in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/cisco-amp/m-p/4522808#M6565</link>
    <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;Evaluating Cisco AMP, and I would like some community feedback on how you see this product stacking up against Defender ATP etc.&lt;/P&gt;&lt;P class=""&gt;IMO:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P class=""&gt;AMP is lacking user logon monitoring. There is no analysis on this part. Failed logons to a server, creation of new accounts and so on, will not be detected. 2) Also the network connection monitoring is per default disabled for the server profile. Thats half the product, and it is not recommended for servers? Even when enabled it does not look for incoming connections, but only outbound. Because of this a externally initiated port scan is not registered. Same goes for inbound connections from malicious IPs. They are simply not traversing the engine. 3) Orbital (and addons)appears to give even more insight. Is it worth it or just garbage? Appears it only works on W10.&lt;/P&gt;&lt;P class=""&gt;Maybe I got something wrong. Hope to get some feedback from active customers.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Wed, 22 Dec 2021 16:29:22 GMT</pubDate>
    <dc:creator>miterkint</dc:creator>
    <dc:date>2021-12-22T16:29:22Z</dc:date>
    <item>
      <title>Cisco AMP</title>
      <link>https://community.cisco.com/t5/endpoint-security/cisco-amp/m-p/4522808#M6565</link>
      <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;Evaluating Cisco AMP, and I would like some community feedback on how you see this product stacking up against Defender ATP etc.&lt;/P&gt;&lt;P class=""&gt;IMO:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P class=""&gt;AMP is lacking user logon monitoring. There is no analysis on this part. Failed logons to a server, creation of new accounts and so on, will not be detected. 2) Also the network connection monitoring is per default disabled for the server profile. Thats half the product, and it is not recommended for servers? Even when enabled it does not look for incoming connections, but only outbound. Because of this a externally initiated port scan is not registered. Same goes for inbound connections from malicious IPs. They are simply not traversing the engine. 3) Orbital (and addons)appears to give even more insight. Is it worth it or just garbage? Appears it only works on W10.&lt;/P&gt;&lt;P class=""&gt;Maybe I got something wrong. Hope to get some feedback from active customers.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 22 Dec 2021 16:29:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/cisco-amp/m-p/4522808#M6565</guid>
      <dc:creator>miterkint</dc:creator>
      <dc:date>2021-12-22T16:29:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco AMP</title>
      <link>https://community.cisco.com/t5/endpoint-security/cisco-amp/m-p/4522817#M6566</link>
      <description>1. That's a SEIM function.. I wouldn't expect ANY AV/EDR/XDR to do that.&lt;BR /&gt;2. So with ANY EDR/XDR product performance is always a concern. TEST IT with your stuff and see how it goes for you. Default config is conservative so you don't freak out when your box takes a performance hit because you didn't read the deployment guide.&lt;BR /&gt;3. Win10/Server 2016 and higher. I think it is... but YMMV.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 22 Dec 2021 16:58:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/cisco-amp/m-p/4522817#M6566</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2021-12-22T16:58:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco AMP</title>
      <link>https://community.cisco.com/t5/endpoint-security/cisco-amp/m-p/4528785#M6581</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1292097"&gt;@miterkint&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;BR /&gt;some infos from my side.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Ad1:&lt;/STRONG&gt; The endpoint itself does not monitor and analyse user logons, even directly installed on a Domain Controller. This is out-of-scope for the endpoint product, and can be done with other Cisco Security products. We provide a Splunk app for Secure Endpoint, where we stream all Endpoint events into Splunk. For long term monitoring storing Windows Event Log and doing the necessary correlation may be an option, as Secure Endpoint is not a data lake.&lt;BR /&gt;If you want to query the endpoint directly for users related information, you can leverage Orbital to do so.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Ad2:&lt;/STRONG&gt; The policy in the UI is a recommendation to start. There are many customers enabling all engines on Server OS. You may review the Best Practice Guide for more insights:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/fireamp-endpoints/secure-endpoint-og.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/products/collateral/security/fireamp-endpoints/secure-endpoint-og.html&lt;/A&gt;&lt;BR /&gt;Monitoring all connections between all Servers in a Data Center, including the Applications is out-of-scope for the endpoint. This security layer is provided by our Data Center Security Products. Or, using network anomaly detection using Cisco Stealthwatch.&amp;nbsp;&lt;BR /&gt;
&lt;UL&gt;
&lt;LI&gt;Portscan: True, today such a feature is not available with Secure Endpoint. Hopefully in future versions when Host based Firewall (no ETA) will be added to the product.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Ad3:&lt;/STRONG&gt; Orbital works on Windows Workstation/Server, macOS and Linux. Find infos &lt;A href="https://orbital.amp.cisco.com/help/updates/" target="_self"&gt;here&lt;/A&gt;. It is a main component for investigation.&lt;BR /&gt;
&lt;UL&gt;
&lt;LI&gt;Real time search on the endpoint using simple SQL statements&lt;/LI&gt;
&lt;LI&gt;Generating a forensic snapshot (manually or automated using automated actions)&lt;/LI&gt;
&lt;LI&gt;Integration into an existing Security Architecture using the API&lt;/LI&gt;
&lt;LI&gt;It is used by our managed Threat Hunting Service to investigate endpoints.&lt;/LI&gt;
&lt;LI&gt;You may review the drawing showing the features included with Secure Endpoint and the Role of Orbital.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Orbital role in the Secure Endpoint Architecture.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/140848iC188FB2784C78718/image-size/large?v=v2&amp;amp;px=999" role="button" title="Orbital role in the Secure Endpoint Architecture.png" alt="Orbital role in the Secure Endpoint Architecture.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Hope this helps,&lt;BR /&gt;Greetings, Thorsten&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jan 2022 13:17:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/cisco-amp/m-p/4528785#M6581</guid>
      <dc:creator>Troja007</dc:creator>
      <dc:date>2022-01-10T13:17:57Z</dc:date>
    </item>
  </channel>
</rss>

