<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Managing Cloud IOC and Generic IOC Events - AMP for Endpoints in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/managing-cloud-ioc-and-generic-ioc-events-amp-for-endpoints/m-p/4826258#M7520</link>
    <description>&lt;P&gt;Facing the same issue. These are getting triggered weekly and I have been looking for a way to allow them. Stumbled upon this thread and I see that I am not alone.&lt;/P&gt;</description>
    <pubDate>Tue, 02 May 2023 06:15:44 GMT</pubDate>
    <dc:creator>joljol</dc:creator>
    <dc:date>2023-05-02T06:15:44Z</dc:date>
    <item>
      <title>Managing Cloud IOC and Generic IOC Events - AMP for Endpoints</title>
      <link>https://community.cisco.com/t5/endpoint-security/managing-cloud-ioc-and-generic-ioc-events-amp-for-endpoints/m-p/3756987#M1087</link>
      <description>&lt;P&gt;I was wondering how those in in the Amp for Endpoints Community deal with Generic IOC and Cloud IOC events.&amp;nbsp; The vast majority of events I get are a result of RMM tools (Kaseya, N-Able, Connectwise, etc.) used by MSPs to manage the workstations.&amp;nbsp; These tools are triggering Generic IOC or Cloud IOC regularly.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Generic IOC:&amp;nbsp; We see these triggered regularly by known good copies of powershell executing a valid, non-harmful, command that is spawned by the RMM tool.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cloud IOC: We see this triggered mostly when the RMM tool (or GPO?) issues a netsh command to disable Windows Firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We don't want to lose the functionality of these IOCs, but how can we whitelist certain behavior as being expected and OK?&amp;nbsp; The underlying executables are already GREEN, and I can "HIde" these alerts in the Inbox and Dashboard, although they still show on the report as "Compromised Devices", causing the client to be worried that a significant portion of their machines are "compromised".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm just wondering how you all manage this?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:07:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/managing-cloud-ioc-and-generic-ioc-events-amp-for-endpoints/m-p/3756987#M1087</guid>
      <dc:creator>kgriffen</dc:creator>
      <dc:date>2020-02-21T05:07:09Z</dc:date>
    </item>
    <item>
      <title>Re: Managing Cloud IOC and Generic IOC Events - AMP for Endpoints</title>
      <link>https://community.cisco.com/t5/endpoint-security/managing-cloud-ioc-and-generic-ioc-events-amp-for-endpoints/m-p/3776036#M1100</link>
      <description>&lt;P&gt;Hi, did you find a way to whitelist planned or known powershell usage?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a very similiar issue where some of the Wintel engineers use powershell or wmic to perform scheduled updates. I would like thses whitelisted and obviously any other powershell or wmic activity flagged.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jan 2019 13:26:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/managing-cloud-ioc-and-generic-ioc-events-amp-for-endpoints/m-p/3776036#M1100</guid>
      <dc:creator>doylepaul</dc:creator>
      <dc:date>2019-01-09T13:26:48Z</dc:date>
    </item>
    <item>
      <title>Re: Managing Cloud IOC and Generic IOC Events - AMP for Endpoints</title>
      <link>https://community.cisco.com/t5/endpoint-security/managing-cloud-ioc-and-generic-ioc-events-amp-for-endpoints/m-p/4258953#M5877</link>
      <description>&lt;P&gt;Over 3000 views and many users reporting the same problem.. You can whitelist powershell for certain workstations (those that should be running it) but those exclusions do NOT work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No solution provided from Cisco. This is unacceptable.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Dec 2020 18:36:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/managing-cloud-ioc-and-generic-ioc-events-amp-for-endpoints/m-p/4258953#M5877</guid>
      <dc:creator>Shinku</dc:creator>
      <dc:date>2020-12-15T18:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: Managing Cloud IOC and Generic IOC Events - AMP for Endpoints</title>
      <link>https://community.cisco.com/t5/endpoint-security/managing-cloud-ioc-and-generic-ioc-events-amp-for-endpoints/m-p/4516070#M6544</link>
      <description>&lt;P&gt;I'm looking for an answer to the same question:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Generic IOC:&amp;nbsp; We see these triggered regularly by known good copies of powershell executing a valid, non-harmful, command that is spawned by the RMM tool.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Would be nice to read a topic/post that is 3 years old and find a solution. Please provide a steps to remedy Cisco.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Dec 2021 15:35:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/managing-cloud-ioc-and-generic-ioc-events-amp-for-endpoints/m-p/4516070#M6544</guid>
      <dc:creator>John.Pitner</dc:creator>
      <dc:date>2021-12-09T15:35:19Z</dc:date>
    </item>
    <item>
      <title>Re: Managing Cloud IOC and Generic IOC Events - AMP for Endpoints</title>
      <link>https://community.cisco.com/t5/endpoint-security/managing-cloud-ioc-and-generic-ioc-events-amp-for-endpoints/m-p/4724745#M7170</link>
      <description>&lt;P&gt;Has anyone found a solution to mute these Cloud IOC PowerShell events? I get so many of these alerts and I do not want to become desensitized.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2022 05:11:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/managing-cloud-ioc-and-generic-ioc-events-amp-for-endpoints/m-p/4724745#M7170</guid>
      <dc:creator>orbT</dc:creator>
      <dc:date>2022-11-21T05:11:09Z</dc:date>
    </item>
    <item>
      <title>Re: Managing Cloud IOC and Generic IOC Events - AMP for Endpoints</title>
      <link>https://community.cisco.com/t5/endpoint-security/managing-cloud-ioc-and-generic-ioc-events-amp-for-endpoints/m-p/4826258#M7520</link>
      <description>&lt;P&gt;Facing the same issue. These are getting triggered weekly and I have been looking for a way to allow them. Stumbled upon this thread and I see that I am not alone.&lt;/P&gt;</description>
      <pubDate>Tue, 02 May 2023 06:15:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/managing-cloud-ioc-and-generic-ioc-events-amp-for-endpoints/m-p/4826258#M7520</guid>
      <dc:creator>joljol</dc:creator>
      <dc:date>2023-05-02T06:15:44Z</dc:date>
    </item>
    <item>
      <title>Re: Managing Cloud IOC and Generic IOC Events - AMP for Endpoints</title>
      <link>https://community.cisco.com/t5/endpoint-security/managing-cloud-ioc-and-generic-ioc-events-amp-for-endpoints/m-p/4834376#M7539</link>
      <description>&lt;P&gt;Cloud-IOC's can now be defined as exclusions and applied to specific policies/groups you define. &amp;nbsp;More information in user guide.&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2023 14:06:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/managing-cloud-ioc-and-generic-ioc-events-amp-for-endpoints/m-p/4834376#M7539</guid>
      <dc:creator>dallong</dc:creator>
      <dc:date>2023-05-12T14:06:23Z</dc:date>
    </item>
  </channel>
</rss>

