<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Source IP Address in AMP Device Trajectory to Assist Threat Hunting in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/source-ip-address-in-amp-device-trajectory-to-assist-threat/m-p/3957551#M90</link>
    <description>&lt;P&gt;This is the type of data I can see in a demo of Microsoft ATP, this is what I would like to see in AMP events or device trajectory.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ATP.png" style="width: 627px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/49281i1FDBCA5EA9886BDB/image-size/large?v=v2&amp;amp;px=999" role="button" title="ATP.png" alt="ATP.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Nov 2019 20:47:50 GMT</pubDate>
    <dc:creator>A.N.Jensen</dc:creator>
    <dc:date>2019-11-12T20:47:50Z</dc:date>
    <item>
      <title>Source IP Address in AMP Device Trajectory to Assist Threat Hunting</title>
      <link>https://community.cisco.com/t5/endpoint-security/source-ip-address-in-amp-device-trajectory-to-assist-threat/m-p/3943590#M35</link>
      <description>&lt;P&gt;Today I had 6 endpoints within 3 hours all quarantine the following file:&amp;nbsp; 8d4fdcb52b32afbcef4450ca88668def9b245a6f7ab2aa26ec3a4324a0b1f461&lt;/P&gt;&lt;P&gt;When I look what was happening with each endpoint in AMP's Device Trajectory I see this:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="AMPDT.PNG" style="width: 360px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/47339i8B0868082061804E/image-size/large?v=v2&amp;amp;px=999" role="button" title="AMPDT.PNG" alt="AMPDT.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The event only indicates that the file was "created by chrome.exe". Why doesn't it indicate the IP address that is the source of the malicious file so we can understand how we are being targeted by malware? That would be valuable.&lt;/P&gt;&lt;P&gt;Even when we open a Threat Response investigation enriched with all of Cisco's threat intelligence data and our Sourcefire and Umbrella environment data we get no additional insight as to the origin of the threat other than which 6 endpoints quarantined the file.&lt;/P&gt;&lt;P&gt;How are we supposed to find out the source of exposure to the malicious file if the only information provided is Chrome. That's basically saying "something on the Internet".&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:11:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/source-ip-address-in-amp-device-trajectory-to-assist-threat/m-p/3943590#M35</guid>
      <dc:creator>A.N.Jensen</dc:creator>
      <dc:date>2020-02-21T05:11:06Z</dc:date>
    </item>
    <item>
      <title>Re: Source IP Address in AMP Device Trajectory to Assist Threat Hunting</title>
      <link>https://community.cisco.com/t5/endpoint-security/source-ip-address-in-amp-device-trajectory-to-assist-threat/m-p/3943591#M51</link>
      <description>Have you enabled Cisco Threat Response yet?&lt;BR /&gt;&lt;BR /&gt;That's where all of their stuff gets tied together...&lt;BR /&gt;&lt;BR /&gt;Go to Visibility.amp.cisco.com to get started.&lt;BR /&gt;&lt;BR /&gt;Its free...&lt;BR /&gt;</description>
      <pubDate>Fri, 18 Oct 2019 21:56:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/source-ip-address-in-amp-device-trajectory-to-assist-threat/m-p/3943591#M51</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2019-10-18T21:56:44Z</dc:date>
    </item>
    <item>
      <title>Re: Source IP Address in AMP Device Trajectory to Assist Threat Hunting</title>
      <link>https://community.cisco.com/t5/endpoint-security/source-ip-address-in-amp-device-trajectory-to-assist-threat/m-p/3943979#M73</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/920263"&gt;@A.N.Jensen&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;the one and only answer for you is not really possible.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Insights into the AMP connector &lt;STRONG&gt;policy&lt;/STRONG&gt; would be interesting. To see if there is any setting which may have an impact on the data shown in DT. Note, an exclusion can have an impact on DT.&lt;/LI&gt;
&lt;LI&gt;DT should show at least &lt;STRONG&gt;TCP connections&lt;/STRONG&gt; for your chrome. AMP does &lt;STRONG&gt;not monitor any TCP&lt;/STRONG&gt; connection of any process. This would be too much information and would generated an unmanageable overhead. There are other approaches/products/sensor/intelligences available to cover much more data.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Without having a complete look&lt;/STRONG&gt; into your data shown in DT it is nearly impossible to give you the appropriate answer you are looking for. Maybe there are command line arguments from completely other processes which may trigger chrome.exe.&lt;/LI&gt;
&lt;LI&gt;DT &lt;STRONG&gt;helps you to understand&lt;/STRONG&gt; an Attack/Malicious Szenario. It shows information which helps you getting more insights. This insights can help you to get better insights what is going on. Like every tool, it is important to "understand" the outcome in DT to generate understanding.&lt;/LI&gt;
&lt;LI&gt;It would also be interesting if &lt;STRONG&gt;AMP generated IOCs&lt;/STRONG&gt; for the endpoints.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Optional:&lt;/STRONG&gt; If our e-mail solution is available, it could be integrated into Threat Response, which would give you insights if the file arrived by e-mail.
&lt;UL&gt;
&lt;LI&gt;You may also take a look in DT, if your e-mail client stored a file in the disk.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;If the enduser has directly opened some attachment, it would be shown in the command line of the appropriate process in DT.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;It would also be interesting to see if the endpoints are showing new unknown files, if there is other activity and so on. Also, take a look if there are any Retrospective alerts in AMP console.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;As you see, there are many aspects we cannot directly figure out from a single Screenshot. So it will make sense opening a TAC Case to go through the Event and Monitoring Data in your environment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings,&lt;/P&gt;
&lt;P&gt;Thorsten&lt;/P&gt;</description>
      <pubDate>Sun, 20 Oct 2019 09:39:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/source-ip-address-in-amp-device-trajectory-to-assist-threat/m-p/3943979#M73</guid>
      <dc:creator>Troja007</dc:creator>
      <dc:date>2019-10-20T09:39:05Z</dc:date>
    </item>
    <item>
      <title>Re: Source IP Address in AMP Device Trajectory to Assist Threat Hunting</title>
      <link>https://community.cisco.com/t5/endpoint-security/source-ip-address-in-amp-device-trajectory-to-assist-threat/m-p/3957551#M90</link>
      <description>&lt;P&gt;This is the type of data I can see in a demo of Microsoft ATP, this is what I would like to see in AMP events or device trajectory.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ATP.png" style="width: 627px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/49281i1FDBCA5EA9886BDB/image-size/large?v=v2&amp;amp;px=999" role="button" title="ATP.png" alt="ATP.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Nov 2019 20:47:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/source-ip-address-in-amp-device-trajectory-to-assist-threat/m-p/3957551#M90</guid>
      <dc:creator>A.N.Jensen</dc:creator>
      <dc:date>2019-11-12T20:47:50Z</dc:date>
    </item>
  </channel>
</rss>

