<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic That was an excellent in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-management-center-indication-of-compromise-url-block/m-p/3048582#M1007389</link>
    <description>&lt;P&gt;That was an excellent explanation.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
    <pubDate>Tue, 14 Mar 2017 14:07:26 GMT</pubDate>
    <dc:creator>Lee Dress</dc:creator>
    <dc:date>2017-03-14T14:07:26Z</dc:date>
    <item>
      <title>Firepower Management Center: Indication of Compromise / URL Block</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-center-indication-of-compromise-url-block/m-p/3048580#M1007387</link>
      <description>&lt;P&gt;I frequently see devices listed in "Indications of Compromise by Host"&lt;/P&gt;
&lt;P&gt;When i drill down to see what the issue is, it's usually "The host may connect to a phishing URL" or "Malware Site"&lt;/P&gt;
&lt;P&gt;When i drill down further to the events that triggered the IOC, the Action and reason is always "Block" or "URL Block"&amp;nbsp; or "File Block"&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;this confuses me. was the computer compromised, or was the event blocked?&lt;/P&gt;
&lt;P&gt;and if the event was blocked, why did it trigger IOC?&lt;/P&gt;
&lt;P&gt;do i need to reconfigure something?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your help.&lt;/P&gt;
&lt;P&gt;Lee&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:02:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-center-indication-of-compromise-url-block/m-p/3048580#M1007387</guid>
      <dc:creator>Lee Dress</dc:creator>
      <dc:date>2020-02-21T14:02:13Z</dc:date>
    </item>
    <item>
      <title>Say an on-premises user logs</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-center-indication-of-compromise-url-block/m-p/3048581#M1007388</link>
      <description>&lt;P&gt;Say an on-premises user logs into his or her cloud-based personal email account and clicks a link in a phishing email. (Assuming here your corporate email is already protected by an ESA and no phishing email ever arrive there.) &amp;nbsp;The target domain is found to be on the blacklist or having a very poor reputation (part of the Cisco Security Intelligence feed) at the sensor and the connection is blocked.&lt;/P&gt;
&lt;P&gt;So there was an IOC (user clicked a link) but the sensor worked as designed and blocked it.&lt;/P&gt;
&lt;P&gt;No further action is required there. If the same user shows up in the top 10 day after day, a visit to their desk may be in order.&lt;/P&gt;
&lt;P&gt;There is a less likely possibility that the computer itself may be compromised by malware and is trying to send local user data back to a phishing server.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2017 15:14:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-center-indication-of-compromise-url-block/m-p/3048581#M1007388</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-13T15:14:25Z</dc:date>
    </item>
    <item>
      <title>That was an excellent</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-center-indication-of-compromise-url-block/m-p/3048582#M1007389</link>
      <description>&lt;P&gt;That was an excellent explanation.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Mar 2017 14:07:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-center-indication-of-compromise-url-block/m-p/3048582#M1007389</guid>
      <dc:creator>Lee Dress</dc:creator>
      <dc:date>2017-03-14T14:07:26Z</dc:date>
    </item>
    <item>
      <title>Re: Say an on-premises user logs</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-center-indication-of-compromise-url-block/m-p/4058980#M1068734</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Say an on-premises user logs into his or her cloud-based personal email account and clicks a link in a phishing email. (Assuming here your corporate email is already protected by an ESA and no phishing email ever arrive there.) &amp;nbsp;The target domain is found to be on the blacklist or having a very poor reputation (part of the Cisco Security Intelligence feed) at the sensor and the connection is blocked.&lt;/P&gt;&lt;P&gt;So there was an IOC (user clicked a link) but the sensor worked as designed and blocked it.&lt;/P&gt;&lt;P&gt;No further action is required there. If the same user shows up in the top 10 day after day, a visit to their desk may be in order.&lt;/P&gt;&lt;P&gt;There is a less likely possibility that the computer itself may be compromised by malware and is trying to send local user data back to a phishing server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Is there any way to find the URL that caused the flag when this happens?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2020 11:28:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-center-indication-of-compromise-url-block/m-p/4058980#M1068734</guid>
      <dc:creator>kguillory@nocp.org</dc:creator>
      <dc:date>2020-04-04T11:28:00Z</dc:date>
    </item>
    <item>
      <title>Re: Say an on-premises user logs</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-center-indication-of-compromise-url-block/m-p/4059009#M1068739</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/574443"&gt;kguillory@nocp.org&lt;/a&gt; look under:&lt;/P&gt;
&lt;P&gt;Analysis &amp;gt; Security Intelligence Events &amp;gt; Table View of Events. Filter on the IP address of the endpoint in question.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2020 14:27:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-center-indication-of-compromise-url-block/m-p/4059009#M1068739</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-04-04T14:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: Say an on-premises user logs</title>
      <link>https://community.cisco.com/t5/network-security/firepower-management-center-indication-of-compromise-url-block/m-p/4059015#M1068741</link>
      <description>&lt;P&gt;Thanks for your prompt response. Stay safe.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2020 14:38:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-management-center-indication-of-compromise-url-block/m-p/4059015#M1068741</guid>
      <dc:creator>kguillory@nocp.org</dc:creator>
      <dc:date>2020-04-04T14:38:09Z</dc:date>
    </item>
  </channel>
</rss>

