<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: another FP on MPAVDTLA.VDM from Windows Defender in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/another-fp-on-mpavdtla-vdm-from-windows-defender/m-p/4821837#M7503</link>
    <description>&lt;P&gt;Team,&amp;nbsp; what was the fix.&amp;nbsp; These only showed up today for us.&lt;/P&gt;</description>
    <pubDate>Wed, 26 Apr 2023 05:18:22 GMT</pubDate>
    <dc:creator>cisco2020</dc:creator>
    <dc:date>2023-04-26T05:18:22Z</dc:date>
    <item>
      <title>another FP on MPAVDTLA.VDM from Windows Defender</title>
      <link>https://community.cisco.com/t5/endpoint-security/another-fp-on-mpavdtla-vdm-from-windows-defender/m-p/4813931#M7458</link>
      <description>&lt;P&gt;Talos reputation ticket created...&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And resolved before I finished this post...&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Detection: W32.1C27878DDF.RET.SBX.TG&lt;BR /&gt;File: mpavdlta.vdm&lt;BR /&gt;File path: \\?\C:\Windows\Temp\D3A7A9B3-EF42-4962-BED8-953AD7FE65811330.1d96d3272ec45c5\mpavdlta.vdm&lt;BR /&gt;Detection SHA-256: 1c27878ddf28aa426f8daac8def7e897d85f8bd026af0d2873fada2497c86ae4&lt;/P&gt;
&lt;P&gt;Detection: W32.224742194C.RET.SBX.TG&lt;BR /&gt;File: mpavdlta.vdm&lt;BR /&gt;File path: \\?\C:\Windows\Temp\A56C8674-9F74-46B2-8134-2B0D2AAD350D888.1d96d8e153f0f3d\mpavdlta.vdm&lt;BR /&gt;Detection SHA-256: 224742194cda7d4157636f514c069da910ed53c32aa5bf324586f6d486a716fd&lt;/P&gt;
&lt;P&gt;Detection: W32.63002A1C7C.RET.SBX.TG&lt;BR /&gt;File: mpavdlta.vdm&lt;BR /&gt;File path: \\?\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{55774125-9101-4640-8BEF-F8435CF0A64A}\mpavdlta.vdm&lt;BR /&gt;Detection SHA-256: 63002a1c7c87736270f2cea1b03a0b6d58f226eeb8ff8b73c9fc59fbd2d302c5&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2023 16:46:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/another-fp-on-mpavdtla-vdm-from-windows-defender/m-p/4813931#M7458</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2023-04-13T16:46:26Z</dc:date>
    </item>
    <item>
      <title>Re: another FP on MPAVDTLA.VDM from Windows Defender</title>
      <link>https://community.cisco.com/t5/endpoint-security/another-fp-on-mpavdtla-vdm-from-windows-defender/m-p/4814037#M7464</link>
      <description>&lt;P&gt;Nothing from Cisco official on this potential FP yet? 100's of notifications and isolated machines today on this one.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Glad this post was here so I could see we weren't the only one, TAC response to a potential FP does not move at the speed of incident response.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2023 20:06:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/another-fp-on-mpavdtla-vdm-from-windows-defender/m-p/4814037#M7464</guid>
      <dc:creator>lucky1378</dc:creator>
      <dc:date>2023-04-13T20:06:14Z</dc:date>
    </item>
    <item>
      <title>Re: another FP on MPAVDTLA.VDM from Windows Defender</title>
      <link>https://community.cisco.com/t5/endpoint-security/another-fp-on-mpavdtla-vdm-from-windows-defender/m-p/4821837#M7503</link>
      <description>&lt;P&gt;Team,&amp;nbsp; what was the fix.&amp;nbsp; These only showed up today for us.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Apr 2023 05:18:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/another-fp-on-mpavdtla-vdm-from-windows-defender/m-p/4821837#M7503</guid>
      <dc:creator>cisco2020</dc:creator>
      <dc:date>2023-04-26T05:18:22Z</dc:date>
    </item>
    <item>
      <title>Re: another FP on MPAVDTLA.VDM from Windows Defender</title>
      <link>https://community.cisco.com/t5/endpoint-security/another-fp-on-mpavdtla-vdm-from-windows-defender/m-p/4822112#M7506</link>
      <description>I opened a file reputation ticket with TalosIntelligence.com and at some point they cleared it.&lt;BR /&gt;Looking it up now on Talos, it still shows that its not malicious, so I'm not sure what's going on in your tenant...&lt;BR /&gt;You can add it to your whitelist for the moment...  but you may want to open a TAC case.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 26 Apr 2023 11:37:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/another-fp-on-mpavdtla-vdm-from-windows-defender/m-p/4822112#M7506</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2023-04-26T11:37:05Z</dc:date>
    </item>
    <item>
      <title>Re: another FP on MPAVDTLA.VDM from Windows Defender</title>
      <link>https://community.cisco.com/t5/endpoint-security/another-fp-on-mpavdtla-vdm-from-windows-defender/m-p/4824281#M7517</link>
      <description>&lt;P&gt;We had this false positive as well. I opened a TALOS reputation ticket, it is marked resolved but still in AMP we have hundreds of "compromised" machines.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2023 15:34:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/another-fp-on-mpavdtla-vdm-from-windows-defender/m-p/4824281#M7517</guid>
      <dc:creator>Josh Meischner</dc:creator>
      <dc:date>2023-04-28T15:34:00Z</dc:date>
    </item>
    <item>
      <title>Re: another FP on MPAVDTLA.VDM from Windows Defender</title>
      <link>https://community.cisco.com/t5/endpoint-security/another-fp-on-mpavdtla-vdm-from-windows-defender/m-p/4824304#M7518</link>
      <description>You have to clear that yourself.&lt;BR /&gt;The hash is now marked "not bad", if you click in, you'll see that under the "related compromise events".&lt;BR /&gt;But it doesn't clear the inbox, you have to mark those as resolved and move the machines to their old group if you have an automated action enabled to move them to Triage.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 28 Apr 2023 16:11:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/another-fp-on-mpavdtla-vdm-from-windows-defender/m-p/4824304#M7518</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2023-04-28T16:11:39Z</dc:date>
    </item>
    <item>
      <title>Re: another FP on MPAVDTLA.VDM from Windows Defender</title>
      <link>https://community.cisco.com/t5/endpoint-security/another-fp-on-mpavdtla-vdm-from-windows-defender/m-p/4824306#M7519</link>
      <description>&lt;P&gt;Thank you Ken, appreciate your direction.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2023 16:13:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/another-fp-on-mpavdtla-vdm-from-windows-defender/m-p/4824306#M7519</guid>
      <dc:creator>Josh Meischner</dc:creator>
      <dc:date>2023-04-28T16:13:17Z</dc:date>
    </item>
  </channel>
</rss>

