<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower File Dynamic Analysis in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-file-dynamic-analysis/m-p/3763930#M1037722</link>
    <description>&lt;P&gt;SHA value goes to SPERO, ETHOS engine&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Spero Analysis for MSEXE&lt;/P&gt;&lt;P&gt;Dynamic Analysis: This option sends files that match the rule to the "sandbox" for further analysis. This produces a file&amp;nbsp; threat score and a file report (usually within 20 minutes).&lt;/P&gt;&lt;P&gt;&amp;nbsp;Reset Connection&lt;/P&gt;&lt;P&gt;Store Files (By Disposition) Malware, Unknown, Clean, or Custom&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="Emph"&gt;Malware Cloud Lookup:&lt;/SPAN&gt; Allows you to log the malware disposition of files that are traversing your network based on a cloud lookup, while still allowing their transmission&lt;/P&gt;&lt;P&gt;&lt;SPAN class="Emph"&gt;Block Malware:&lt;/SPAN&gt; Allows you to calculate the &lt;SPAN class="tooltip-position"&gt;&lt;SPAN class="tooltip"&gt;SHA-256&lt;/SPAN&gt;&lt;/SPAN&gt; hash value of specific file types, then use a cloud lookup process to first determine if files that are traversing your network contain malware, and then block files that represent threats&lt;/P&gt;</description>
    <pubDate>Fri, 14 Dec 2018 18:12:19 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2018-12-14T18:12:19Z</dc:date>
    <item>
      <title>Firepower File Dynamic Analysis</title>
      <link>https://community.cisco.com/t5/network-security/firepower-file-dynamic-analysis/m-p/3763864#M1037701</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone please confirm if Dynamic Analysis with either Block Malware or Malware Cloud Lookup sends the full file to the AMP cloud or only the SHA value? If it sends the full file, does the AMP cloud delete the file after analysis? Are there generally any concerns with sending full file to AMP for analysis? I have a customer that has queried this and is concerned about sensitive files from being sent&amp;nbsp;out of the network&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 14:10:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-file-dynamic-analysis/m-p/3763864#M1037701</guid>
      <dc:creator>dm2020</dc:creator>
      <dc:date>2019-03-12T14:10:35Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower File Dynamic Analysis</title>
      <link>https://community.cisco.com/t5/network-security/firepower-file-dynamic-analysis/m-p/3763930#M1037722</link>
      <description>&lt;P&gt;SHA value goes to SPERO, ETHOS engine&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Spero Analysis for MSEXE&lt;/P&gt;&lt;P&gt;Dynamic Analysis: This option sends files that match the rule to the "sandbox" for further analysis. This produces a file&amp;nbsp; threat score and a file report (usually within 20 minutes).&lt;/P&gt;&lt;P&gt;&amp;nbsp;Reset Connection&lt;/P&gt;&lt;P&gt;Store Files (By Disposition) Malware, Unknown, Clean, or Custom&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="Emph"&gt;Malware Cloud Lookup:&lt;/SPAN&gt; Allows you to log the malware disposition of files that are traversing your network based on a cloud lookup, while still allowing their transmission&lt;/P&gt;&lt;P&gt;&lt;SPAN class="Emph"&gt;Block Malware:&lt;/SPAN&gt; Allows you to calculate the &lt;SPAN class="tooltip-position"&gt;&lt;SPAN class="tooltip"&gt;SHA-256&lt;/SPAN&gt;&lt;/SPAN&gt; hash value of specific file types, then use a cloud lookup process to first determine if files that are traversing your network contain malware, and then block files that represent threats&lt;/P&gt;</description>
      <pubDate>Fri, 14 Dec 2018 18:12:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-file-dynamic-analysis/m-p/3763930#M1037722</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2018-12-14T18:12:19Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower File Dynamic Analysis</title>
      <link>https://community.cisco.com/t5/network-security/firepower-file-dynamic-analysis/m-p/3763978#M1037741</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the response. What happens if the file/SHA value is unknown, is the complete file then sent to the sand box for further analysis?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Dec 2018 18:19:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-file-dynamic-analysis/m-p/3763978#M1037741</guid>
      <dc:creator>dm2020</dc:creator>
      <dc:date>2018-12-14T18:19:58Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower File Dynamic Analysis</title>
      <link>https://community.cisco.com/t5/network-security/firepower-file-dynamic-analysis/m-p/3764001#M1037753</link>
      <description>&lt;P&gt;see the attachment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;after reading the document it seem it send whole file for sand boxing.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Dec 2018 18:36:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-file-dynamic-analysis/m-p/3764001#M1037753</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2018-12-14T18:36:49Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower File Dynamic Analysis</title>
      <link>https://community.cisco.com/t5/network-security/firepower-file-dynamic-analysis/m-p/3764546#M1037767</link>
      <description>&lt;P&gt;For customers with a high degree of sensitivity you can run AMP Private Cloud and ThreatGrid all on-premises. In that scenario no customer file ever leaves the environment.&lt;/P&gt;</description>
      <pubDate>Sun, 16 Dec 2018 13:28:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-file-dynamic-analysis/m-p/3764546#M1037767</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-12-16T13:28:16Z</dc:date>
    </item>
  </channel>
</rss>

