<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Secure Endpoint Scan with Detections / Detections summary?? in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/secure-endpoint-scan-with-detections-detections-summary/m-p/4840920#M7556</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Hoping this is just an oversight on my part.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Situation:&amp;nbsp; An alert is triggered, so I begin by running a scan.&amp;nbsp; The scan returns with detections. (Or returns with 2 Hidden Files).&lt;/P&gt;&lt;P&gt;Question:&amp;nbsp; How do I view these detections?&amp;nbsp; How do I view the hidden files?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lastly, if the scan was returned with Hidden Files (perhaps a root kit), how can I obtain evidence of this to proceed to a next step.&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;-Eric&lt;/P&gt;</description>
    <pubDate>Tue, 23 May 2023 14:45:05 GMT</pubDate>
    <dc:creator>ESchmitz</dc:creator>
    <dc:date>2023-05-23T14:45:05Z</dc:date>
    <item>
      <title>Secure Endpoint Scan with Detections / Detections summary??</title>
      <link>https://community.cisco.com/t5/endpoint-security/secure-endpoint-scan-with-detections-detections-summary/m-p/4840920#M7556</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Hoping this is just an oversight on my part.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Situation:&amp;nbsp; An alert is triggered, so I begin by running a scan.&amp;nbsp; The scan returns with detections. (Or returns with 2 Hidden Files).&lt;/P&gt;&lt;P&gt;Question:&amp;nbsp; How do I view these detections?&amp;nbsp; How do I view the hidden files?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lastly, if the scan was returned with Hidden Files (perhaps a root kit), how can I obtain evidence of this to proceed to a next step.&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;-Eric&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 14:45:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/secure-endpoint-scan-with-detections-detections-summary/m-p/4840920#M7556</guid>
      <dc:creator>ESchmitz</dc:creator>
      <dc:date>2023-05-23T14:45:05Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Endpoint Scan with Detections / Detections summary??</title>
      <link>https://community.cisco.com/t5/endpoint-security/secure-endpoint-scan-with-detections-detections-summary/m-p/4851755#M7590</link>
      <description>&lt;P data-unlink="true"&gt;Hello ESchmitz&lt;/P&gt;
&lt;P data-unlink="true"&gt;Here is the answer,&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-unlink="true"&gt;&lt;STRONG&gt;How do I view these detections?&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Log in to your Secure Endpoint Console.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Go to Analysis &amp;gt; Events&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Under Events you can view all these detection. To help you better, you can utilize the filters available and get specific &amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; event details according to your need.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;How do I view the hidden files?&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; For better help on this, can you please elaborate where you want to see the files, on Endpoint Device,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; Secure Endpoint Console or during Scan or anywhere else?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; However, For now adding a little detail that might help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Expanding any of the events you can see the endpoint, File Name and also the File Path.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On the endpoint, you can follow the path which is shown in Secure Endpoint Event and view the file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; To view the hidden files on an Endpoint Device follow the links :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Windows: &lt;A href="https://support.microsoft.com/en-us/windows/show-hidden-files-0320fe58-0117-fd59-6851-9b7f9840fdb2" target="_blank"&gt;https://support.microsoft.com/en-us/windows/show-hidden-files-0320fe58-0117-fd59-6851-9b7f9840fdb2&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mac: &lt;A href="https://www.macworld.com/article/671158/how-to-show-hidden-files-on-a-mac.html" target="_blank"&gt;https://www.macworld.com/article/671158/how-to-show-hidden-files-on-a-mac.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Linux: &lt;A href="https://askubuntu.com/questions/232649/how-to-show-or-hide-a-hidden-file" target="_blank"&gt;https://askubuntu.com/questions/232649/how-to-show-or-hide-a-hidden-file&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;How can I obtain evidence?&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; From the Events shown on Secure Endpoint Console, You can view the Device Trajectory and the File Trajectory. &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; You can use Device Trajectory to Obtain evidence of any event as such.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I Hope this helps you. &lt;SPAN class="test-id__field-value slds-form-element__static slds-grow word-break-ie11"&gt;If you find my reply solved your question or issue, kindly click the 'Accept as Solution' button and vote it as helpful.&lt;BR /&gt;&lt;BR /&gt;You can also learn more about Secure Endpoint through our live Ask the Experts (ATXs) session. Check out Cisco Endpoint Security ATXs Resources [&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-endpoint-security-ask-the-experts-resources/ta-p/4394492" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-endpoint-security-ask-the-experts-resources/ta-p/4394492&lt;/A&gt;] to view the latest schedule for upcoming sessions, as well as the useful references, e.g. online guides, FAQs.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow word-break-ie11"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow word-break-ie11"&gt;Stuti Kandpal&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 07:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/secure-endpoint-scan-with-detections-detections-summary/m-p/4851755#M7590</guid>
      <dc:creator>stkandpa</dc:creator>
      <dc:date>2023-06-09T07:09:55Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Endpoint Scan with Detections / Detections summary??</title>
      <link>https://community.cisco.com/t5/endpoint-security/secure-endpoint-scan-with-detections-detections-summary/m-p/4851773#M7591</link>
      <description>&lt;P&gt;Hello ESchmitz&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is the answer,&lt;/P&gt;
&lt;UL&gt;
 &lt;LI&gt;&lt;STRONG&gt;How do I view these detections?&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Log in to your Secure Endpoint Console.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Go to Analysis &amp;gt; Events&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Under Events you can view all these detection. To help you better, you can utilize the filters available and get specific event details according to your need.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
 &lt;LI&gt;&lt;STRONG&gt;How do I view the hidden files?&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; For better help on this, can you please elaborate where you want to see the files, on Endpoint Device,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; Secure Endpoint Console or during Scan or anywhere else?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; However, For now adding a little detail that might help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Expanding any of the events you can see the endpoint, File Name and also the File Path.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On the endpoint, you can follow the path which is shown in Secure Endpoint Event and view the file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; To view the hidden files on an Endpoint Device follow the links :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Windows: &lt;A href="https://support.microsoft.com/en-us/windows/show-hidden-files-0320fe58-0117-fd59-6851-9b7f9840fdb2" target="_blank"&gt;https://support.microsoft.com/en-us/windows/show-hidden-files-0320fe58-0117-fd59-6851-9b7f9840fdb2&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mac: &lt;A href="https://www.macworld.com/article/671158/how-to-show-hidden-files-on-a-mac.html" target="_blank"&gt;https://www.macworld.com/article/671158/how-to-show-hidden-files-on-a-mac.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Linux: &lt;A href="https://askubuntu.com/questions/232649/how-to-show-or-hide-a-hidden-file" target="_blank"&gt;https://askubuntu.com/questions/232649/how-to-show-or-hide-a-hidden-file&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
 &lt;LI&gt;&lt;STRONG&gt;How can I obtain evidence?&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; From the Events shown on Secure Endpoint Console, You can view the Device Trajectory and the File Trajectory.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; You can use Device Trajectory to Obtain evidence of any event as such.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I Hope this helps you. If you find my reply solved your question or issue, kindly click the 'Accept as Solution' button and vote it as helpful.&lt;BR /&gt;&lt;BR /&gt;You can also learn more about Secure Endpoint through our live Ask the Experts (ATXs) session. Check out Cisco Endpoint Security ATXs Resources [&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-endpoint-security-ask-the-experts-resources/ta-p/4394492" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-endpoint-security-ask-the-experts-resources/ta-p/4394492&lt;/A&gt;] to view the latest schedule for upcoming sessions, as well as the useful references, e.g. online guides, FAQs.&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Stuti Kandpal&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 07:40:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/secure-endpoint-scan-with-detections-detections-summary/m-p/4851773#M7591</guid>
      <dc:creator>stkandpa</dc:creator>
      <dc:date>2023-06-09T07:40:49Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Endpoint Scan with Detections / Detections summary??</title>
      <link>https://community.cisco.com/t5/endpoint-security/secure-endpoint-scan-with-detections-detections-summary/m-p/4855694#M7612</link>
      <description>&lt;P&gt;Thank you for your response.&amp;nbsp; I utilize the events function quite often.&amp;nbsp; To elaborate on my inquiry, i perform the following:&lt;/P&gt;&lt;P&gt;1.) I am alerted of a high severity event.&lt;/P&gt;&lt;P&gt;2.) I select events and see the "quarantine failure" event.&lt;/P&gt;&lt;P&gt;3.) I run either an endpoint ioc "flash" scan or a "full" scan&lt;/P&gt;&lt;P&gt;4.) The scan returns not as "clean" but with "Scan with Detections"&lt;/P&gt;&lt;P&gt;Q.) How do I view these detections from the scan.&amp;nbsp; The drop down carrot does not reveal any additional details concerning the "detections from the scan".&amp;nbsp; I am simply told "Scan with Detections" and no further info.&lt;/P&gt;&lt;P&gt;Therein lies my question.&amp;nbsp; How do I view these detections?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance for assistance, and&amp;nbsp; for the existing help you have provided.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 19:23:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/secure-endpoint-scan-with-detections-detections-summary/m-p/4855694#M7612</guid>
      <dc:creator>ESchmitz</dc:creator>
      <dc:date>2023-06-15T19:23:27Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Endpoint Scan with Detections / Detections summary??</title>
      <link>https://community.cisco.com/t5/endpoint-security/secure-endpoint-scan-with-detections-detections-summary/m-p/4857153#M7618</link>
      <description>&lt;P&gt;Hello ESchmitz,&lt;BR /&gt;&lt;BR /&gt;Understanding your concern better, I suggest you to do some troubleshooting, as ideally these detections should be displayed.&lt;BR /&gt;-&amp;gt; Try Using a different browser.&lt;BR /&gt;-&amp;gt; If still not shown, try logging in to your account from some other device.&amp;nbsp;&lt;BR /&gt;-&amp;gt; If the issue persists, Cisco TAC case is needed to be opened.&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Here I am attaching the steps to open one,&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp; Four ways:&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;1.&amp;nbsp; Go to the &lt;A href="http://www.cisco.com/go/tac" target="_blank" rel="noopener"&gt;TAC website&lt;/A&gt; and go to the "Contacts and Support Cases" tab and you will find an option to create a TAC Case;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;2.&amp;nbsp; Send an email to &lt;A href="mailto:tac@cisco.com" target="_blank" rel="noopener"&gt;tac@cisco.com&lt;/A&gt; and make sure you include your CCO login;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;3.&amp;nbsp; Call &lt;A href="http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html#telephone" target="_blank" rel="noopener"&gt;them&lt;/A&gt;.&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;4. &amp;nbsp;In the "Action" (upper right-hand corner), there's an option to Create a TAC Case.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Hope this will help.&amp;nbsp;&lt;BR /&gt;Please consider marking this thread as "Answered'.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Regards&lt;/P&gt;
&lt;P&gt;Stuti Kandpal&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2023 04:13:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/secure-endpoint-scan-with-detections-detections-summary/m-p/4857153#M7618</guid>
      <dc:creator>stkandpa</dc:creator>
      <dc:date>2023-06-19T04:13:12Z</dc:date>
    </item>
  </channel>
</rss>

