<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Secure Endpoint - Exclusions - Epic in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/cisco-secure-endpoint-exclusions-epic/m-p/4735724#M7202</link>
    <description>&lt;P&gt;I haven't used this tool before as generally I used a powershell script I downloaded called "amphandlecount.ps1" which generates several files that breaks things down into a CSV by giving time, process, and path being looked at by AMP.&amp;nbsp; I tried using this tool but not getting very far as I'm running command as administrator and giving a permission denied message.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, really I'm just looking to gage someone that has had to troubleshoot setting up AMP exclusions with Epic seeing as how big of a program Epic is in the healthcare world.&amp;nbsp; I can't imagine I'm the first one to deal with this issue.&amp;nbsp; Epic has provided general exclusions for AV programs which we have implemented but still continue to see 100% CPU issue with our servers.&lt;/P&gt;</description>
    <pubDate>Fri, 09 Dec 2022 13:44:22 GMT</pubDate>
    <dc:creator>Carl Davis</dc:creator>
    <dc:date>2022-12-09T13:44:22Z</dc:date>
    <item>
      <title>Cisco Secure Endpoint - Exclusions - Epic</title>
      <link>https://community.cisco.com/t5/endpoint-security/cisco-secure-endpoint-exclusions-epic/m-p/4735259#M7200</link>
      <description>&lt;P&gt;I am currently running a project where we are updating Cisco Secure Endpoint on all over our servers from 7.3.15 to 7.5.5.&amp;nbsp; Since we first deployed what was originally known as Cisco AMP we have experienced 100% CPU issues with a fair amount of our Epic servers.&amp;nbsp; The exclusions we received from Epic have not completely resolve our issues.&amp;nbsp; When enabling debugging and capturing log files I'm not able to find anything that is specific to Epic to indicate what needs to be whitelisted.&amp;nbsp; The servers in question have the most issues when there is an update being installed and these servers have IIS setup for the Epic.&amp;nbsp; If anyone has any insight on what I exclusions we should be using I would greatly appreciate it.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 02:35:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/cisco-secure-endpoint-exclusions-epic/m-p/4735259#M7200</guid>
      <dc:creator>Carl Davis</dc:creator>
      <dc:date>2022-12-09T02:35:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Endpoint - Exclusions - Epic</title>
      <link>https://community.cisco.com/t5/endpoint-security/cisco-secure-endpoint-exclusions-epic/m-p/4735716#M7201</link>
      <description>&lt;P&gt;Carl,&lt;/P&gt;
&lt;P&gt;Without duplicating your setup or logs it is difficult to say what to exclude.&amp;nbsp; If you'd like someone to look at the logs for you I suggest opening a TAC case and attaching debug logs.&amp;nbsp; If you'd prefer to do the investigation yourself, I'd recommend using &lt;A href="https://github.com/CiscoSecurity/amp-05-windows-tune" target="_self"&gt;this tool&lt;/A&gt; from CiscoSecurity.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 13:20:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/cisco-secure-endpoint-exclusions-epic/m-p/4735716#M7201</guid>
      <dc:creator>Matthew Franks</dc:creator>
      <dc:date>2022-12-09T13:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Endpoint - Exclusions - Epic</title>
      <link>https://community.cisco.com/t5/endpoint-security/cisco-secure-endpoint-exclusions-epic/m-p/4735724#M7202</link>
      <description>&lt;P&gt;I haven't used this tool before as generally I used a powershell script I downloaded called "amphandlecount.ps1" which generates several files that breaks things down into a CSV by giving time, process, and path being looked at by AMP.&amp;nbsp; I tried using this tool but not getting very far as I'm running command as administrator and giving a permission denied message.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, really I'm just looking to gage someone that has had to troubleshoot setting up AMP exclusions with Epic seeing as how big of a program Epic is in the healthcare world.&amp;nbsp; I can't imagine I'm the first one to deal with this issue.&amp;nbsp; Epic has provided general exclusions for AV programs which we have implemented but still continue to see 100% CPU issue with our servers.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Dec 2022 13:44:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/cisco-secure-endpoint-exclusions-epic/m-p/4735724#M7202</guid>
      <dc:creator>Carl Davis</dc:creator>
      <dc:date>2022-12-09T13:44:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure Endpoint - Exclusions - Epic</title>
      <link>https://community.cisco.com/t5/endpoint-security/cisco-secure-endpoint-exclusions-epic/m-p/4736086#M7203</link>
      <description>&lt;P&gt;I will have to agreed with Matt on opening TAC case since you are not able to run the GitHub script, however you also mentioned that these machines are servers and you see the most issues during updates. Well the other thing that might be causing the issue besides exclusions in your case is certain engines that we usually recommend to exclude/disable for servers unless you verify that they are not causing any harm.&lt;/P&gt;
&lt;P&gt;I would like to point out in our &lt;STRONG&gt;Secure Endpoint Deployment Strategy Guide&lt;/STRONG&gt;: PAGE #21 - Server&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.amp.cisco.com/en/SecureEndpoint/Secure%20Endpoint%20Deployment%20Strategy.pdf" target="_blank"&gt;https://docs.amp.cisco.com/en/SecureEndpoint/Secure%20Endpoint%20Deployment%20Strategy.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="servers.png" style="width: 726px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/170429iBAE935167CA29112/image-size/large?v=v2&amp;amp;px=999" role="button" title="servers.png" alt="servers.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Also MAP could potentially hammer performance in certain scenarios, that’s why we are giving two examples for the customers to start with and work through. One for &lt;STRONG&gt;workstations&lt;/STRONG&gt; and one for &lt;STRONG&gt;servers&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_2117.png" style="width: 947px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/170431iB3B6BD25C77E1E43/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot_2117.png" alt="Screenshot_2117.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can test these settings as well and I would start with Network first. In very rare occasions we seen that network driver could impact performance as well. To completely disable the Network including the Driver you will have to install the secure endpoint with skip DFC flag for NETWORK engine to be fully disabled using command line switches&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Command Line Switches for Cisco Secure Endpoint Installer&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/sourcefire-fireamp-endpoints/118587-technote-fireamp-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/sourcefire-fireamp-endpoints/118587-technote-fireamp-00.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Please be aware that setting policy to AUDIT is essentially the same as running the policy in PROTECT&lt;/STRONG&gt; the only difference in AUDIT is that the AMP will not take any action such as removing threat or blocking, how ever the engine itself is still fully functional and it’s working, meaning scanning and placing handles on files and process is still in place and it will still cause high CPU.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Dec 2022 05:17:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/cisco-secure-endpoint-exclusions-epic/m-p/4736086#M7203</guid>
      <dc:creator>Roman Valenta</dc:creator>
      <dc:date>2022-12-10T05:17:36Z</dc:date>
    </item>
  </channel>
</rss>

