<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic False Positive Communications in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/false-positive-communications/m-p/4617561#M6897</link>
    <description>&lt;P&gt;Early on 5\21\2022, Cisco Endpoint Protection trapped this event:&amp;nbsp; 'detected a Cloud IOC: Executed Malware IOC'. It was classed as 'AMADEY' Malware.&amp;nbsp; Because it was classified as a HIGH threat, and we have automated actions enabled, the affected computers were all ISOLATED from the network.&amp;nbsp; That got attention.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By 4 PM the same day, the conviction was overturned and the computers with the detections attempted a RETROSPECTIVE RESTORE FROM QUARANTINE.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That is it.&amp;nbsp; No explanation, no post anywhere that I can locate and reference in my RCA to close out the event.&lt;/P&gt;&lt;P&gt;Some person or process made a decision to reverse this conviction.&amp;nbsp; The detail of the rationale and subsequent actions should be communicated.&amp;nbsp; Possibly update the File Analysis details for the specific file(hash)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Filename Magic&amp;nbsp;Type File TypeSHA256SHA1MD5&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class=""&gt;chrome.exe&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PE32+ executable (GUI) x86-64, for MS Windows&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;exe&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;SPAN class=""&gt;f342af2b1e3dd9ba90c10f643ec1f50459efbb5912496e8ac553682c2b7a9f6e&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;SPAN class=""&gt;6a2a2427cf1d888cb40a18527478c84dedf1db61&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;SPAN class=""&gt;7f916511a313837efcde9e4112a64e5b&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
    <pubDate>Wed, 25 May 2022 12:27:26 GMT</pubDate>
    <dc:creator>ScottHolland26866</dc:creator>
    <dc:date>2022-05-25T12:27:26Z</dc:date>
    <item>
      <title>False Positive Communications</title>
      <link>https://community.cisco.com/t5/endpoint-security/false-positive-communications/m-p/4617561#M6897</link>
      <description>&lt;P&gt;Early on 5\21\2022, Cisco Endpoint Protection trapped this event:&amp;nbsp; 'detected a Cloud IOC: Executed Malware IOC'. It was classed as 'AMADEY' Malware.&amp;nbsp; Because it was classified as a HIGH threat, and we have automated actions enabled, the affected computers were all ISOLATED from the network.&amp;nbsp; That got attention.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By 4 PM the same day, the conviction was overturned and the computers with the detections attempted a RETROSPECTIVE RESTORE FROM QUARANTINE.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That is it.&amp;nbsp; No explanation, no post anywhere that I can locate and reference in my RCA to close out the event.&lt;/P&gt;&lt;P&gt;Some person or process made a decision to reverse this conviction.&amp;nbsp; The detail of the rationale and subsequent actions should be communicated.&amp;nbsp; Possibly update the File Analysis details for the specific file(hash)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Filename Magic&amp;nbsp;Type File TypeSHA256SHA1MD5&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class=""&gt;chrome.exe&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PE32+ executable (GUI) x86-64, for MS Windows&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;exe&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;SPAN class=""&gt;f342af2b1e3dd9ba90c10f643ec1f50459efbb5912496e8ac553682c2b7a9f6e&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;SPAN class=""&gt;6a2a2427cf1d888cb40a18527478c84dedf1db61&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;SPAN class=""&gt;7f916511a313837efcde9e4112a64e5b&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Wed, 25 May 2022 12:27:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/false-positive-communications/m-p/4617561#M6897</guid>
      <dc:creator>ScottHolland26866</dc:creator>
      <dc:date>2022-05-25T12:27:26Z</dc:date>
    </item>
    <item>
      <title>Re: False Positive Communications</title>
      <link>https://community.cisco.com/t5/endpoint-security/false-positive-communications/m-p/4618550#M6898</link>
      <description>&lt;P&gt;Oh boy, do I feel silly.&amp;nbsp; I just found this in one of my sorted email folders.&amp;nbsp; It arrived on Saturday 5/21, in a very timely manner.&amp;nbsp; It was my fault for not handling those notifications correctly.&amp;nbsp; Anyone know where to send apologies to Cisco?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hello Scott Holland,&lt;/P&gt;&lt;P&gt;Cisco Secure Endpoint Announcement - "Chrome.exe" False Positive:&lt;/P&gt;&lt;P&gt;Cisco is aware of the false positive detection related to chrome.exe. The single SHA256 involved is f342af2b1e3dd9ba90c10f643ec1f50459efbb5912496e8ac553682c2b7a9f6e. The file disposition has been updated, and Cisco is investigating root cause. We apologize for the inconvenience caused.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You are receiving this email because you have subscribed to Secure Endpoint Announcements. If you feel you have received this email in error or need assistance, go &lt;A href="https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmycase.cloudapps.cisco.com%2F&amp;amp;data=05%7C01%7CSHolland%40courts.state.nh.us%7C433cdbc3cbdf4a02b36b08da3b4f8d9d%7C4b263663fabf4b6db730af1c06efff28%7C0%7C0%7C637887510119325426%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;amp;sdata=BoivLKGQLpt321CPFVzHTuw1PnkR%2FNHRAO7U1eBqV%2Bk%3D&amp;amp;reserved=0" target="_blank"&gt;here&lt;/A&gt; to open a support case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Cisco Secure Endpoint&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2022 12:09:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/false-positive-communications/m-p/4618550#M6898</guid>
      <dc:creator>ScottHolland26866</dc:creator>
      <dc:date>2022-05-26T12:09:37Z</dc:date>
    </item>
  </channel>
</rss>

