<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How Cisco AMP Endpoint take action? in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/how-cisco-amp-endpoint-take-action/m-p/5264405#M8755</link>
    <description>&lt;P&gt;Hi Ken, I think Cisco Secure Endpoint "TDM" refers to the &lt;STRONG&gt;threat detection and management&lt;/STRONG&gt; capabilities within the Cisco Secure Endpoint platform. Don't like acronyms either they change all the time&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 24 Feb 2025 20:08:33 GMT</pubDate>
    <dc:creator>Roman Valenta</dc:creator>
    <dc:date>2025-02-24T20:08:33Z</dc:date>
    <item>
      <title>How Cisco AMP Endpoint take action?</title>
      <link>https://community.cisco.com/t5/endpoint-security/how-cisco-amp-endpoint-take-action/m-p/4437011#M6238</link>
      <description>&lt;P&gt;Hi All;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i want to know how Cisco AMP Endpoint take action when it detect a Malware on the PC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards;&lt;/P&gt;&lt;P&gt;Rober&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jul 2021 23:48:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/how-cisco-amp-endpoint-take-action/m-p/4437011#M6238</guid>
      <dc:creator>RoberSamir00332</dc:creator>
      <dc:date>2021-07-21T23:48:52Z</dc:date>
    </item>
    <item>
      <title>Re: How Cisco AMP Endpoint take action?</title>
      <link>https://community.cisco.com/t5/endpoint-security/how-cisco-amp-endpoint-take-action/m-p/4437336#M6241</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1059532"&gt;@RoberSamir00332&lt;/a&gt;,&lt;BR /&gt;there many different ways Cisco Secure Endpoint takes action on Malware.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Starting with traditional File scanning, File scanning for Scripts (AMSI integration), Malware Grouping, Machine Learning, where the Endpoint quarantines a file and also stops a running process.&lt;/LI&gt;
&lt;LI&gt;There are other engines, which are protecting the memory like ExPloit Prevention and System Process Protection. These engines protect against memory based attacks.&lt;/LI&gt;
&lt;LI&gt;Behavioral Protection Engine is the newes enhancement on the endpoint. It detects and blocks complex malicious behavior on the endpoint. The engines uses am expressive event pattern matching language designed&amp;#11;by Cisco.&lt;/LI&gt;
&lt;LI&gt;Cloud IOCs: The endpoint sends file, network, process and command line activity to the backend. This data is processed back for 7 days. The result is a Cloud IOC or a retrospective detection.&lt;/LI&gt;
&lt;LI&gt;Based on Cloud IOCs, there are automated Post Infection Tasks available, like isolating the endpoint from the network.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Maybe useful, the screenshot compares the difference between a Cloud IOC from the Backend and a Behavioral Protecton Event.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CloudIOC vs BPE Detection.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/125842iC3DBDA66BB075CD0/image-size/large?v=v2&amp;amp;px=999" role="button" title="CloudIOC vs BPE Detection.png" alt="CloudIOC vs BPE Detection.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings,&lt;BR /&gt;Thorsten&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jul 2021 14:23:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/how-cisco-amp-endpoint-take-action/m-p/4437336#M6241</guid>
      <dc:creator>Troja007</dc:creator>
      <dc:date>2021-07-22T14:23:47Z</dc:date>
    </item>
    <item>
      <title>Re: How Cisco AMP Endpoint take action?</title>
      <link>https://community.cisco.com/t5/endpoint-security/how-cisco-amp-endpoint-take-action/m-p/4437628#M6245</link>
      <description>&lt;H3&gt;&lt;SPAN&gt;A very interesting answer. thanks&lt;span class="lia-unicode-emoji" title=":woman_dancing:"&gt;💃&lt;/span&gt;&lt;/SPAN&gt;&lt;/H3&gt;</description>
      <pubDate>Fri, 23 Jul 2021 05:00:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/how-cisco-amp-endpoint-take-action/m-p/4437628#M6245</guid>
      <dc:creator>bezik</dc:creator>
      <dc:date>2021-07-23T05:00:26Z</dc:date>
    </item>
    <item>
      <title>Re: How Cisco AMP Endpoint take action?</title>
      <link>https://community.cisco.com/t5/endpoint-security/how-cisco-amp-endpoint-take-action/m-p/4438452#M6251</link>
      <description>&lt;H3&gt;&lt;SPAN&gt;&lt;span class="lia-unicode-emoji" title=":woman_dancing:"&gt;💃&lt;/span&gt;&lt;/SPAN&gt;&lt;/H3&gt;</description>
      <pubDate>Sun, 25 Jul 2021 16:22:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/how-cisco-amp-endpoint-take-action/m-p/4438452#M6251</guid>
      <dc:creator>maciek_smolak</dc:creator>
      <dc:date>2021-07-25T16:22:06Z</dc:date>
    </item>
    <item>
      <title>Re: How Cisco AMP Endpoint take action?</title>
      <link>https://community.cisco.com/t5/endpoint-security/how-cisco-amp-endpoint-take-action/m-p/5264384#M8753</link>
      <description>&lt;P&gt;Hello all, the new TDM includes the drawing above and much more... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 19:24:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/how-cisco-amp-endpoint-take-action/m-p/5264384#M8753</guid>
      <dc:creator>Troja007</dc:creator>
      <dc:date>2025-02-24T19:24:05Z</dc:date>
    </item>
    <item>
      <title>Re: How Cisco AMP Endpoint take action?</title>
      <link>https://community.cisco.com/t5/endpoint-security/how-cisco-amp-endpoint-take-action/m-p/5264389#M8754</link>
      <description>&lt;P&gt;TDM ???&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 19:26:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/how-cisco-amp-endpoint-take-action/m-p/5264389#M8754</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2025-02-24T19:26:56Z</dc:date>
    </item>
    <item>
      <title>Re: How Cisco AMP Endpoint take action?</title>
      <link>https://community.cisco.com/t5/endpoint-security/how-cisco-amp-endpoint-take-action/m-p/5264405#M8755</link>
      <description>&lt;P&gt;Hi Ken, I think Cisco Secure Endpoint "TDM" refers to the &lt;STRONG&gt;threat detection and management&lt;/STRONG&gt; capabilities within the Cisco Secure Endpoint platform. Don't like acronyms either they change all the time&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 20:08:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/how-cisco-amp-endpoint-take-action/m-p/5264405#M8755</guid>
      <dc:creator>Roman Valenta</dc:creator>
      <dc:date>2025-02-24T20:08:33Z</dc:date>
    </item>
    <item>
      <title>Re: How Cisco AMP Endpoint take action?</title>
      <link>https://community.cisco.com/t5/endpoint-security/how-cisco-amp-endpoint-take-action/m-p/5267963#M8777</link>
      <description>&lt;P&gt;Hello Ken,&lt;BR /&gt;TDM = Technical Decision Maker Presentation.&lt;BR /&gt;Cheers,&lt;BR /&gt;Thorsten&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Troja007_0-1741207589023.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/241150iAF76F35D7DA1990E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Troja007_0-1741207589023.png" alt="Troja007_0-1741207589023.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2025 20:46:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/how-cisco-amp-endpoint-take-action/m-p/5267963#M8777</guid>
      <dc:creator>Troja007</dc:creator>
      <dc:date>2025-03-05T20:46:56Z</dc:date>
    </item>
  </channel>
</rss>

