<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Indication of Compromise Alerts Flooding my Outlook Inbox in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/indication-of-compromise-alerts-flooding-my-outlook-inbox/m-p/4575039#M6764</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1321172"&gt;@richard.wing&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;we are aware of this issue and are working on a solution. Hopefully we will provide Cloud IOC exclusions soon. Today I cannot share any ETA for this, but you may ping your Cisco representative for details.&lt;/P&gt;
&lt;P&gt;Until we provide this feature, please open a TAC case, so we can add an appropriate exclusion to the backend detection engine.&lt;BR /&gt;Greetings, Thorsten&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 21 Mar 2022 12:59:04 GMT</pubDate>
    <dc:creator>Troja007</dc:creator>
    <dc:date>2022-03-21T12:59:04Z</dc:date>
    <item>
      <title>Indication of Compromise Alerts Flooding my Outlook Inbox</title>
      <link>https://community.cisco.com/t5/endpoint-security/indication-of-compromise-alerts-flooding-my-outlook-inbox/m-p/4563087#M6733</link>
      <description>&lt;P&gt;Event Type: Cloud IOC&lt;/P&gt;&lt;P&gt;File: powershell.exe&lt;/P&gt;&lt;P&gt;File path:&amp;nbsp;C:/Windows/system32/WindowsPowerShell/v1.0/powershell.exe&lt;/P&gt;&lt;P&gt;I get this alert for all CyberArk EPM Clients where the CyberArk EndPoint Management (EPM) Agent uses PowerShell scripts to implement CyberArk EPM Policies. It's blocking the&amp;nbsp;C:\Program Files\CyberArk\Endpoint Privilege Manager\Agent\PASAgent\SFDP.dll from running. How to I stop Cisco Secure Endpoint from blocking it?&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2022 15:08:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/indication-of-compromise-alerts-flooding-my-outlook-inbox/m-p/4563087#M6733</guid>
      <dc:creator>richard.wing</dc:creator>
      <dc:date>2022-03-03T15:08:01Z</dc:date>
    </item>
    <item>
      <title>Re: Indication of Compromise Alerts Flooding my Outlook Inbox</title>
      <link>https://community.cisco.com/t5/endpoint-security/indication-of-compromise-alerts-flooding-my-outlook-inbox/m-p/4563126#M6735</link>
      <description>You can mute it by opening one of the alerts and clicking on the bell.&lt;BR /&gt;Exclusions might work, but the Cloud IOCs are based on behavior that it looks at after the fact.&lt;BR /&gt;</description>
      <pubDate>Thu, 03 Mar 2022 15:43:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/indication-of-compromise-alerts-flooding-my-outlook-inbox/m-p/4563126#M6735</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2022-03-03T15:43:20Z</dc:date>
    </item>
    <item>
      <title>Re: Indication of Compromise Alerts Flooding my Outlook Inbox</title>
      <link>https://community.cisco.com/t5/endpoint-security/indication-of-compromise-alerts-flooding-my-outlook-inbox/m-p/4575039#M6764</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1321172"&gt;@richard.wing&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;we are aware of this issue and are working on a solution. Hopefully we will provide Cloud IOC exclusions soon. Today I cannot share any ETA for this, but you may ping your Cisco representative for details.&lt;/P&gt;
&lt;P&gt;Until we provide this feature, please open a TAC case, so we can add an appropriate exclusion to the backend detection engine.&lt;BR /&gt;Greetings, Thorsten&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2022 12:59:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/indication-of-compromise-alerts-flooding-my-outlook-inbox/m-p/4575039#M6764</guid>
      <dc:creator>Troja007</dc:creator>
      <dc:date>2022-03-21T12:59:04Z</dc:date>
    </item>
    <item>
      <title>Re: Indication of Compromise Alerts Flooding my Outlook Inbox</title>
      <link>https://community.cisco.com/t5/endpoint-security/indication-of-compromise-alerts-flooding-my-outlook-inbox/m-p/4575275#M6765</link>
      <description>&lt;P&gt;Deleted - mistaken dates&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2022 17:20:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/indication-of-compromise-alerts-flooding-my-outlook-inbox/m-p/4575275#M6765</guid>
      <dc:creator>keitha</dc:creator>
      <dc:date>2022-03-21T17:20:53Z</dc:date>
    </item>
    <item>
      <title>Re: Indication of Compromise Alerts Flooding my Outlook Inbox</title>
      <link>https://community.cisco.com/t5/endpoint-security/indication-of-compromise-alerts-flooding-my-outlook-inbox/m-p/4576214#M6766</link>
      <description>&lt;P&gt;At the moment there is no way to create exclusions for Cloud IOC events. As mentioned by others the only thing you can do is create a TAC Case and provide them with as much information about the event as possible, e.g. filename, SHA-256 value, command line arguments etc. so they can reach out the development team to tune the events which happen globally... Yes, you heard correct. Cisco is unable to provide any kind of tuning or exclusion specifically for your organization, whatever they do back-end affects all Secure Endpoint customers globally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a customer that develops powershell scripts that are run on their servers with Secure Endpoint installed. Almost any type of script is triggering a new Cloud IOC even though it's relatively harmless, one of the scripts would collect health information from the server.. I think we're on TAC Case number three for having Cisco tune these Cloud IOCs which seems pointless as they keep triggering a new event every time they create a new script. It typically takes Cisco weeks to do and all the cases we have opened always receive an initial response from the engineer saying exclusions are not possible. Not sure if they just can't be bothered and think they can get the case closed faster or maybe they simply don't now..&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Mar 2022 17:03:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/indication-of-compromise-alerts-flooding-my-outlook-inbox/m-p/4576214#M6766</guid>
      <dc:creator>Nicolai Borchorst</dc:creator>
      <dc:date>2022-03-22T17:03:23Z</dc:date>
    </item>
    <item>
      <title>Re: Indication of Compromise Alerts Flooding my Outlook Inbox</title>
      <link>https://community.cisco.com/t5/endpoint-security/indication-of-compromise-alerts-flooding-my-outlook-inbox/m-p/4577811#M6768</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/121627"&gt;@Nicolai Borchorst&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;we are already working on this feature. Today I do not have an ETA for you to share here. You may ping your Cisco representative for details.&lt;/P&gt;
&lt;P&gt;Greetings, Thorsten&lt;/P&gt;</description>
      <pubDate>Thu, 24 Mar 2022 13:24:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/indication-of-compromise-alerts-flooding-my-outlook-inbox/m-p/4577811#M6768</guid>
      <dc:creator>Troja007</dc:creator>
      <dc:date>2022-03-24T13:24:32Z</dc:date>
    </item>
  </channel>
</rss>

