<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Exploit prevention events from McAfee, WebAdvisor, BrowserHost.exe in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/exploit-prevention-events-from-mcafee-webadvisor-browserhost-exe/m-p/5272161#M8789</link>
    <description>&lt;P&gt;Yes - we were seeing it also. I opened a TAC case and the engineer advised whitelisting it by adding it as an executable exclusion.&lt;/P&gt;</description>
    <pubDate>Mon, 17 Mar 2025 18:26:26 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2025-03-17T18:26:26Z</dc:date>
    <item>
      <title>Exploit prevention events from McAfee, WebAdvisor, BrowserHost.exe</title>
      <link>https://community.cisco.com/t5/endpoint-security/exploit-prevention-events-from-mcafee-webadvisor-browserhost-exe/m-p/5272146#M8788</link>
      <description>&lt;P&gt;Recently I've been noticing a higher than usual Secure Endpoint exploit prevention events sourcing from&amp;nbsp;browserhost.exe which is part of McAfee WebAdvisor.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is anyone else seeing these exploit prevention events?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 17:34:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/exploit-prevention-events-from-mcafee-webadvisor-browserhost-exe/m-p/5272146#M8788</guid>
      <dc:creator>mski7861</dc:creator>
      <dc:date>2025-03-17T17:34:57Z</dc:date>
    </item>
    <item>
      <title>Re: Exploit prevention events from McAfee, WebAdvisor, BrowserHost.exe</title>
      <link>https://community.cisco.com/t5/endpoint-security/exploit-prevention-events-from-mcafee-webadvisor-browserhost-exe/m-p/5272161#M8789</link>
      <description>&lt;P&gt;Yes - we were seeing it also. I opened a TAC case and the engineer advised whitelisting it by adding it as an executable exclusion.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 18:26:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/exploit-prevention-events-from-mcafee-webadvisor-browserhost-exe/m-p/5272161#M8789</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-03-17T18:26:26Z</dc:date>
    </item>
    <item>
      <title>Re: Exploit prevention events from McAfee, WebAdvisor, BrowserHost.exe</title>
      <link>https://community.cisco.com/t5/endpoint-security/exploit-prevention-events-from-mcafee-webadvisor-browserhost-exe/m-p/5272228#M8790</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;thank you for sharing your insights and confirming this fp&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 22:16:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/exploit-prevention-events-from-mcafee-webadvisor-browserhost-exe/m-p/5272228#M8790</guid>
      <dc:creator>mski7861</dc:creator>
      <dc:date>2025-03-17T22:16:06Z</dc:date>
    </item>
  </channel>
</rss>

