<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Chrome.exe exploit prevention events in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4846501#M7571</link>
    <description>&lt;P&gt;Thanks for the update. I think that is expected as it will take some time to populate across the cloud, but in general it should gradually start slowing down and you should see less and less as the day progress. Either way please keep an eye on that and let us know in your TAC case on the progress.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 31 May 2023 14:24:45 GMT</pubDate>
    <dc:creator>Roman Valenta</dc:creator>
    <dc:date>2023-05-31T14:24:45Z</dc:date>
    <item>
      <title>Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4829289#M7525</link>
      <description>&lt;P&gt;I have over 500 alerts for chrome.exe exploit prevention alerts on all different devices in Secure Endpoint the past couple of days.&lt;/P&gt;&lt;P&gt;All the same hash&lt;/P&gt;&lt;P&gt;55c3f36080f2ddbf4c47d6685fa42333ee0172866a31c0f29c1797dc2954ab29&lt;/P&gt;&lt;P&gt;I have added that hash to the allow list and it still blowing up.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="benwe_0-1683293197558.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/183893i5442ADA0C2159CBE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="benwe_0-1683293197558.png" alt="benwe_0-1683293197558.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2023 13:29:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4829289#M7525</guid>
      <dc:creator>benwe</dc:creator>
      <dc:date>2023-05-05T13:29:52Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4829298#M7526</link>
      <description>&lt;P&gt;is your chrome web browsers in network updated? make sure every browser is in new version. because this seems like some bot trying to exploit chrome's one of vulnerability. even though it is blocked, make sure every one updated.&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2023 13:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4829298#M7526</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2023-05-05T13:41:11Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4832129#M7532</link>
      <description>&lt;P&gt;Running into the same issue with a bunch of my endpoints, the first instances starting on 03MAY23. Looking through SCCM, all of the machines with this popping up are running Google Chrome version 113.0.5672.63, which isn't very far off from the current Chrome release of 113.0.5672.93. The threat detection doesn't seem to have any usable information on what the exploit was or if it originated from Chrome itself or from something accessing Chrome (unless I'm just reading it wrong).&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2023 19:08:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4832129#M7532</guid>
      <dc:creator>vendeville_lj</dc:creator>
      <dc:date>2023-05-09T19:08:32Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4832630#M7533</link>
      <description>&lt;P&gt;We are currently looking in to this issue as it seems that this is all related to the latest Chrome 113 update and possible FP event. That update based on this article &lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.securityweek.com/chrome-113-released-with-15-security-patches/" target="_blank"&gt;https://www.securityweek.com/chrome-113-released-with-15-security-patches/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;was patched with 15 security updates that might have something to do with this. Me personally I try to replicate this issue in my lab on several machines with old Chrome Install and in my case it never triggered. We have so far few cases open and gathering much need it logs to figured out why this is happening in those environments and not the others. I highly encourage everyone with this issue to get with TAC and provide those logs. In cases like that we really looking to:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P style="-qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;Reproduce&lt;BR /&gt;Diag bundle in Debug&lt;/P&gt;
&lt;P style="-qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;Procmon logs&lt;BR /&gt;&lt;BR /&gt;In case Procmon is supplied time stamps are crucial to navigate in the enormous amount of data that Procmon contains.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2023 14:15:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4832630#M7533</guid>
      <dc:creator>Roman Valenta</dc:creator>
      <dc:date>2023-05-10T14:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4832882#M7534</link>
      <description>&lt;P&gt;Has there been any updates on this issue?&amp;nbsp; I am also getting exploit prevention alerts for chrome.exe on several endpoints, although the hash I'm seeing is different than OP's:&lt;/P&gt;&lt;P&gt;50763c43fdf58584ab5010696609e032fb1a6723b4ae163b9bc30aa1c2d960e8&lt;/P&gt;&lt;P&gt;In my environment I've noticed that Chrome, and in some cases Edge, are disappearing from workstations' 'installed programs' lists even though the executables are still present and functional.&amp;nbsp; I'm still testing, but I've found that installing the latest version of those programs over top of the existing configuration restores the program to the 'installed programs' list without wiping out any settings.&lt;/P&gt;&lt;P&gt;Opening a case with TAC is not going to be beneficial for me at this point as the damage is already done, but I would be interested in knowing if the issue with the programs can be pinned to this Secure Endpoint exploit prevention trigger as I'll need to deliver a report on what happened in the environment.&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2023 21:22:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4832882#M7534</guid>
      <dc:creator>Trin</dc:creator>
      <dc:date>2023-05-10T21:22:36Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4833419#M7535</link>
      <description>&lt;P&gt;As we gathering more data on this we are learning that this is not affecting only CHROME. Chrome issue with rundll32.exe seem to be affecting any application that has a Chromium based browser integration. We have report now that application called Justice Works got affected as well and it was confirmed that this application uses a Chromium based browser inside the software. Talking to others it seems the issue is also appearing in Quicken software which uses an integrated browser for login, also in Spottily that also have chromium based browser. And knowing that Edge is built on Chromium as well I'm not surprised that you ran in to the same issue. &lt;BR /&gt;&lt;BR /&gt;We are still in process to understanding what is happening as it seem to only happen under certain circumstances and we still only have handful cases to work with. I will keep you guys informed once I have more details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 14:39:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4833419#M7535</guid>
      <dc:creator>Roman Valenta</dc:creator>
      <dc:date>2023-05-11T14:39:11Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4833599#M7536</link>
      <description>&lt;P&gt;We're also getting lots of these alerts for the past few days.&amp;nbsp; The chrome.exe hashes listed in the alerts vary, which tells me that it doesn't seem to be related a to a version of Chrome in particular.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Two days ago we got the notification below.&amp;nbsp; Not sure if it has anything to do with these events:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN class=""&gt;Cisco&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;Secure&lt;/SPAN&gt;&amp;nbsp;Endpoint Announcement - Scheduled Policy&amp;nbsp;&lt;SPAN class=""&gt;Updates&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN class=""&gt;Secure&lt;/SPAN&gt;&amp;nbsp;Endpoint Windows policies will be&amp;nbsp;&lt;SPAN class=""&gt;updated&lt;/SPAN&gt;&amp;nbsp;to discontinue use of a legacy application injection prevention technique in the Exploit Prevention engine. This addresses false positives that could interfere with endpoint management tools that perform Windows&amp;nbsp;&lt;SPAN class=""&gt;updates&lt;/SPAN&gt;. Removal of this technique is mitigated by other features that can detect related attacks at an earlier stage.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;This&amp;nbsp;&lt;SPAN class=""&gt;update&lt;/SPAN&gt;&amp;nbsp;will increase the policy serial numbers and trigger a policy&amp;nbsp;&lt;SPAN class=""&gt;update&lt;/SPAN&gt;&amp;nbsp;for computers in groups that use these policies on May 10. No action is required on your part.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 17:27:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4833599#M7536</guid>
      <dc:creator>Lorenzo H.</dc:creator>
      <dc:date>2023-05-11T17:27:01Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4833622#M7537</link>
      <description>&lt;P&gt;Unfortunately not this was for something else that was tuned in Exploit Prevention Engine and after testing applied globally. We actually took extra week for testing just to make sure . It just happened to fall close with this new discovery so it might look like its related but again its not.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 18:10:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4833622#M7537</guid>
      <dc:creator>Roman Valenta</dc:creator>
      <dc:date>2023-05-11T18:10:43Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4834315#M7538</link>
      <description>&lt;P&gt;Got this answer from TAC yesterday:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;This seems to be related to a known issue that is currently being investigated. A global change was applied yesterday to all customers, I would advice that you Sync your policies on affected devices and test for the behavior. If it persists, I will require a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/216035-collect-debug-logs-file-in-amp-for-endpo.html" target="_blank" rel="noopener"&gt;diagnostic bundle&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;while reproducing the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2023 12:08:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4834315#M7538</guid>
      <dc:creator>Lorenzo H.</dc:creator>
      <dc:date>2023-05-12T12:08:48Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4834387#M7540</link>
      <description>&lt;P&gt;We are seeing these same Exploit Prevention alerts in our environment as well. Just as you mention, they seem to coincide with the policy update made by Cisco on May 10 but also only appear on clients running Chrome v115.&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2023 14:30:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4834387#M7540</guid>
      <dc:creator>jeremy.peace-hall</dc:creator>
      <dc:date>2023-05-12T14:30:35Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4834388#M7541</link>
      <description>&lt;P&gt;Sorry, meant to type Chrome 113 not 115&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2023 14:32:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4834388#M7541</guid>
      <dc:creator>jeremy.peace-hall</dc:creator>
      <dc:date>2023-05-12T14:32:09Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4834476#M7542</link>
      <description>&lt;P&gt;I don't want to get this on wrong track but again. The change that was implemented couple days ago was for completely different issue. &lt;BR /&gt;&lt;BR /&gt;What we see now is new issue that was triggered with Chrome 113 update. We got new more complete logs collected this morning and they will be submitted today along with our internal case. More info will come once I get some updates.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2023 16:23:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4834476#M7542</guid>
      <dc:creator>Roman Valenta</dc:creator>
      <dc:date>2023-05-12T16:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4834563#M7544</link>
      <description>&lt;P&gt;Quick Update, it was brought to our attention another scenario by our internal employees where trying to start any streaming application (Netflix/Hulu/etc..) caused events and crashes as well. Not until Chrome&amp;nbsp; was updated to the latest 113.0.5672.93 version. which suddenly fixed the issue. Can anyone verify the same?&lt;BR /&gt;&lt;BR /&gt;As far for Chrome Update&lt;BR /&gt;&lt;A href="https://chromereleases.googleblog.com/" target="_blank"&gt;https://chromereleases.googleblog.com/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;There is possibility that our engine was triggered based on these two fixes:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;DIV&gt;&lt;SPAN&gt;&lt;A class="in-cell-link" href="https://crbug.com/1429201" target="_blank" rel="noopener"&gt;1429201&lt;/A&gt;&amp;nbsp;High&amp;nbsp;CVE-2023-2134&amp;nbsp;Out of bounds memory access in Service Worker API&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN data-sheets-formula="=HYPERLINK(&amp;quot;https://crbug.com/1429197&amp;quot;,1429197)" data-sheets-hyperlink="https://crbug.com/1429197" data-sheets-value="{&amp;quot;1&amp;quot;:3,&amp;quot;3&amp;quot;:1429197}"&gt;&lt;A class="in-cell-link" href="https://crbug.com/1429197" target="_blank" rel="noopener"&gt;1429197&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;High&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;CVE-2023-2133 Out&lt;/SPAN&gt;&lt;SPAN&gt; of bounds memory access in Service Worker API&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2023 20:37:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4834563#M7544</guid>
      <dc:creator>Roman Valenta</dc:creator>
      <dc:date>2023-05-12T20:37:10Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4837756#M7545</link>
      <description>&lt;P&gt;That is what I have been seeing and hearing from users running v113. Anyone trying to start streaming applications, Disney+, Amazon Prime, even music streaming such as Spotify.&amp;nbsp; I haven't had a chance to gather any logs at this point unfortunately, but I just wanted to chime in that it is certainly the same symptom.&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 16:09:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4837756#M7545</guid>
      <dc:creator>James M.</dc:creator>
      <dc:date>2023-05-17T16:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4840244#M7553</link>
      <description>&lt;P&gt;Good Morning everyone,&lt;/P&gt;
&lt;P&gt;Just another quick update since we start receiving the much need it logs for the open TAC cases. What we know for sure is that this issue is definitely related to the Chrome 113 Update assuming any version of 113 update is still generating these events. What we also know is that this is not connector specific&amp;nbsp; We seen this behavior in cases running connector release 8.1.5, 8.1.7 but also legacy versions such as 7.5.1. The other thing that was so far reported is that there is no impact except the excessive amount of false positive events in the console. In other words so far we didn't got any reports that this is causing crashes&amp;nbsp; unless this community experiencing something else then I would love to hear your feedback so I can add that to what we already know.&lt;BR /&gt;&lt;BR /&gt;This issue has been escalated with our engineering team and interested party responsible for Exploit Prevention engine so hopefully we will get some new updates soon so I can keep you posted on this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Roman&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 13:43:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4840244#M7553</guid>
      <dc:creator>Roman Valenta</dc:creator>
      <dc:date>2023-05-22T13:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4840255#M7554</link>
      <description>&lt;P&gt;Thank you for the update Roman&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 14:01:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4840255#M7554</guid>
      <dc:creator>benwe</dc:creator>
      <dc:date>2023-05-22T14:01:36Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4846479#M7567</link>
      <description>&lt;P&gt;Another quick update for you guys. As of right now there should be NO MORE EXPREV CHROME FALSE POSITIVES alerts showing in the portal. Please verify the same and let us know in case you have open TAC case as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2023 13:48:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4846479#M7567</guid>
      <dc:creator>Roman Valenta</dc:creator>
      <dc:date>2023-05-31T13:48:32Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4846485#M7568</link>
      <description>&lt;P&gt;i still had some as of 857AM CST this morning&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="benwe_0-1685541604077.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/186138iF75240EAC731A0DB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="benwe_0-1685541604077.png" alt="benwe_0-1685541604077.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will continue to look out for them an update my TAC case accordingly. Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2023 14:01:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4846485#M7568</guid>
      <dc:creator>benwe</dc:creator>
      <dc:date>2023-05-31T14:01:07Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4846501#M7571</link>
      <description>&lt;P&gt;Thanks for the update. I think that is expected as it will take some time to populate across the cloud, but in general it should gradually start slowing down and you should see less and less as the day progress. Either way please keep an eye on that and let us know in your TAC case on the progress.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2023 14:24:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4846501#M7571</guid>
      <dc:creator>Roman Valenta</dc:creator>
      <dc:date>2023-05-31T14:24:45Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome.exe exploit prevention events</title>
      <link>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4848914#M7578</link>
      <description>&lt;P&gt;I also have the same issue. Now another exploit prevention alert from Cisco Secure endpoint is userinit.exe. I guess ti is FP too. I realize that the exploit prevention happens more when we update connector to 8.1.7&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 02:37:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/chrome-exe-exploit-prevention-events/m-p/4848914#M7578</guid>
      <dc:creator>nupagazi</dc:creator>
      <dc:date>2023-06-06T02:37:10Z</dc:date>
    </item>
  </channel>
</rss>

