<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best policies for Endpoint Security on Domain Controllers in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/best-policies-for-endpoint-security-on-domain-controllers/m-p/4563232#M6737</link>
    <description>So the default/recommended gets you visibility with no actions... they're being SUPER cautious on your domain controllers because it can break things badly if they get things wrong, and it could become difficult to fix.&lt;BR /&gt;You can now start turning things on, cautiously, monitoring them as you go.  I'd start with Files, Exploit Prevention, and Malicious Activity Protection.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Thu, 03 Mar 2022 17:35:20 GMT</pubDate>
    <dc:creator>Ken Stieers</dc:creator>
    <dc:date>2022-03-03T17:35:20Z</dc:date>
    <item>
      <title>Best policies for Endpoint Security on Domain Controllers</title>
      <link>https://community.cisco.com/t5/endpoint-security/best-policies-for-endpoint-security-on-domain-controllers/m-p/4562949#M6731</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am new to Cisco Endpoint security and I would like to set up the best policy settings on my DC's, i currently have the below set up but i believe these are out of the box settings, should so many protection features be set to 'Audit'?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;H4&gt;Conviction Modes&lt;/H4&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;These settings control how Secure Endpoint responds to suspicious files and network activity.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;Files&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;STRONG&gt;&lt;EM&gt;Quarantine&lt;/EM&gt;&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;Remove and report malicious files.&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;Network&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;STRONG&gt;&lt;EM&gt;Audit&lt;/EM&gt;&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;Report malicious network connections, but take no other action.&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;Malicious Activity Protection&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;STRONG&gt;&lt;EM&gt;Quarantine&lt;/EM&gt;&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;End ransomware-like processes, remove their executable, and report them.&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;System Process Protection&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;EM&gt;&lt;STRONG&gt;Audit&lt;/STRONG&gt;&lt;/EM&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;Report possible malicious tampering of critical operating system processes, but take no other action.&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;Script Protection&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;EM&gt;&lt;STRONG&gt;Audit&lt;/STRONG&gt;&lt;/EM&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;Report malicious scripts when they execute, but take no other action.&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;Exploit Prevention&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;EM&gt;&lt;STRONG&gt;Audit&lt;/STRONG&gt;&lt;/EM&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;Report binary code injection attacks against some processes, but take no other action.&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;Exploit Prevention - Script Control&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;EM&gt;&lt;STRONG&gt;Audit&lt;/STRONG&gt;&lt;/EM&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;Report when an application loads certain DLLs, but take no other action.&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;Behavioral Protection&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;EM&gt;&lt;STRONG&gt;Audit&lt;/STRONG&gt;&lt;/EM&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;Report malicious activity, but take no other action.&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2022 12:31:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/best-policies-for-endpoint-security-on-domain-controllers/m-p/4562949#M6731</guid>
      <dc:creator>johnmac</dc:creator>
      <dc:date>2022-03-03T12:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: Best policies for Endpoint Security on Domain Controllers</title>
      <link>https://community.cisco.com/t5/endpoint-security/best-policies-for-endpoint-security-on-domain-controllers/m-p/4563232#M6737</link>
      <description>So the default/recommended gets you visibility with no actions... they're being SUPER cautious on your domain controllers because it can break things badly if they get things wrong, and it could become difficult to fix.&lt;BR /&gt;You can now start turning things on, cautiously, monitoring them as you go.  I'd start with Files, Exploit Prevention, and Malicious Activity Protection.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 03 Mar 2022 17:35:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/best-policies-for-endpoint-security-on-domain-controllers/m-p/4563232#M6737</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2022-03-03T17:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: Best policies for Endpoint Security on Domain Controllers</title>
      <link>https://community.cisco.com/t5/endpoint-security/best-policies-for-endpoint-security-on-domain-controllers/m-p/4563238#M6738</link>
      <description>&lt;P&gt;I would refer you to pages 22 &amp;amp; 23 of the&amp;nbsp;&lt;A href="https://docs.amp.cisco.com/en/SecureEndpoint/Secure%20Endpoint%20Deployment%20Strategy.pdf" target="_self"&gt;Secure Endpoint (formerly AMP for Endpoints) Deployment Strategy&lt;/A&gt;&amp;nbsp;(November 30, 2021).&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will want to skip the installation of the device flow correlation (DFC) driver and disable the network portion of the policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the "&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/fireamp-endpoints/secure-endpoint-og.pdf" target="_self"&gt;Secure Endpoint Best Practices Guide&lt;/A&gt;" section "&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/fireamp-endpoints/secure-endpoint-og.html#PolicysettingsServer" target="_self"&gt;Policy settings: Server&lt;/A&gt;" there is a recommendation to be careful with the deployment of Exploit Prevention. You will want to test that functionality on a test DC before deploying the functionality on the production DCs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will also want to add the Cisco-Maintained Exclusion list for "Domain Controllers" to your policy.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Other then those items, you should be fairly safe using the "Server" recommendations.&lt;BR /&gt;&lt;BR /&gt;Files: &lt;FONT color="#339966"&gt;&lt;STRONG&gt;Quarantine&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;Network: &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Disabled&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;Malicious Activity Protection: &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Disabled&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;System Process Protection: &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Disabled&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;Script Protection: &lt;FONT color="#339966"&gt;&lt;STRONG&gt;Quarantine&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;Exploit Prevention: &lt;FONT color="#FF9900"&gt;&lt;STRONG&gt;Audit&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;Exploit Prevention - Script Control: &lt;STRONG&gt;&lt;FONT color="#FF9900"&gt;Audit&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;Behavioral Protection: &lt;STRONG&gt;&lt;FONT color="#339966"&gt;Protect&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2022 17:49:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/best-policies-for-endpoint-security-on-domain-controllers/m-p/4563238#M6738</guid>
      <dc:creator>johnosn</dc:creator>
      <dc:date>2022-03-03T17:49:32Z</dc:date>
    </item>
  </channel>
</rss>

