<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Malware Test Files in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/malware-test-files/m-p/5247484#M8704</link>
    <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I'm doing a demonstration soon for some stakeholders at my org as a way to showcase Cisco Secure Endpoint's automated isolation functionality and adopt this measure across the org. I was wondering if anyone here has ever tested this function through the usage of things like eciar.org's malware test file to generate alerts and isolation events.&lt;/P&gt;&lt;P&gt;I've tested this EICAR file and it typically generates a Medium severity event in Secure Endpoint, but I'm primarily looking for a way to trigger a High or Critical event reliably. Has anyone here ever tested this or know of a method to designate certain files to trigger events at a certain severity?&lt;/P&gt;</description>
    <pubDate>Wed, 15 Jan 2025 13:31:13 GMT</pubDate>
    <dc:creator>Josh M</dc:creator>
    <dc:date>2025-01-15T13:31:13Z</dc:date>
    <item>
      <title>Malware Test Files</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-test-files/m-p/5247484#M8704</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I'm doing a demonstration soon for some stakeholders at my org as a way to showcase Cisco Secure Endpoint's automated isolation functionality and adopt this measure across the org. I was wondering if anyone here has ever tested this function through the usage of things like eciar.org's malware test file to generate alerts and isolation events.&lt;/P&gt;&lt;P&gt;I've tested this EICAR file and it typically generates a Medium severity event in Secure Endpoint, but I'm primarily looking for a way to trigger a High or Critical event reliably. Has anyone here ever tested this or know of a method to designate certain files to trigger events at a certain severity?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2025 13:31:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-test-files/m-p/5247484#M8704</guid>
      <dc:creator>Josh M</dc:creator>
      <dc:date>2025-01-15T13:31:13Z</dc:date>
    </item>
    <item>
      <title>Re: Malware Test Files</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-test-files/m-p/5247629#M8707</link>
      <description>&lt;P&gt;It depends what you like to see but in general and also easy to replicate &lt;STRONG&gt;HIGH&lt;/STRONG&gt; event is setup DFC by going to &lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Outbreak Control -- &amp;gt; IP Block &amp;amp; Allow List -- &amp;gt; Block IP List&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_3595.png" style="width: 873px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237658i29648D59EBEDC72E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot_3595.png" alt="Screenshot_3595.png" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In fact you can use the same IP its just random IP from Internet. Then make sure you apply this list&amp;nbsp; in the policy under:&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Outbreak Control&amp;nbsp; -- &amp;gt; Network - IP Block &amp;amp; Allow Lists&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_3596.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237659iFE46A923239337BA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot_3596.png" alt="Screenshot_3596.png" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Then go to the endpoint open CLI and try SSH to that IP:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ssh 45.85.235.39&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;You should get High event in your console like the on bellow.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_3597.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237660i1DC5959F473DA295/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot_3597.png" alt="Screenshot_3597.png" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Hope this helped&lt;BR /&gt;&lt;BR /&gt;PS: This is of course not a Malware for those you would probably have to be creative perhaps try search GitHub for some script that will fake attack like this &lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2025 17:12:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-test-files/m-p/5247629#M8707</guid>
      <dc:creator>Roman Valenta</dc:creator>
      <dc:date>2025-01-15T17:12:16Z</dc:date>
    </item>
    <item>
      <title>Re: Malware Test Files</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-test-files/m-p/5247680#M8708</link>
      <description>&lt;P&gt;That's very helpful! Thanks for the suggestion- I'll do some testing with that.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2025 18:01:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-test-files/m-p/5247680#M8708</guid>
      <dc:creator>Josh M</dc:creator>
      <dc:date>2025-01-15T18:01:07Z</dc:date>
    </item>
  </channel>
</rss>

