<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello John in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firesight-block-wireshark-exe/m-p/2919255#M1038234</link>
    <description>&lt;P&gt;Hello John&lt;/P&gt;
&lt;P&gt;If you have malware license using file policy under policies 》 access control 》 File Policy , you can block the .exe extension.Do you want block only for wireshark.exe or all other .exe extension files ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rate if post helps you&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Jetsy&lt;/P&gt;</description>
    <pubDate>Tue, 12 Jul 2016 05:34:43 GMT</pubDate>
    <dc:creator>Jetsy Mathew</dc:creator>
    <dc:date>2016-07-12T05:34:43Z</dc:date>
    <item>
      <title>Firesight | block wireshark .exe</title>
      <link>https://community.cisco.com/t5/network-security/firesight-block-wireshark-exe/m-p/2919254#M1038228</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;We would like to know how to block wireshark .exe in firesight.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:04:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-block-wireshark-exe/m-p/2919254#M1038228</guid>
      <dc:creator>John</dc:creator>
      <dc:date>2019-03-12T13:04:15Z</dc:date>
    </item>
    <item>
      <title>Hello John</title>
      <link>https://community.cisco.com/t5/network-security/firesight-block-wireshark-exe/m-p/2919255#M1038234</link>
      <description>&lt;P&gt;Hello John&lt;/P&gt;
&lt;P&gt;If you have malware license using file policy under policies 》 access control 》 File Policy , you can block the .exe extension.Do you want block only for wireshark.exe or all other .exe extension files ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rate if post helps you&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Jetsy&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2016 05:34:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-block-wireshark-exe/m-p/2919255#M1038234</guid>
      <dc:creator>Jetsy Mathew</dc:creator>
      <dc:date>2016-07-12T05:34:43Z</dc:date>
    </item>
    <item>
      <title>Hello Jetsy,</title>
      <link>https://community.cisco.com/t5/network-security/firesight-block-wireshark-exe/m-p/2919256#M1038237</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;Hello Jetsy,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier, monospace;"&gt;We want to block all installer of sniffing tool, like wireshark.exe.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2016 06:55:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-block-wireshark-exe/m-p/2919256#M1038237</guid>
      <dc:creator>John</dc:creator>
      <dc:date>2016-07-12T06:55:18Z</dc:date>
    </item>
    <item>
      <title>Hello John, </title>
      <link>https://community.cisco.com/t5/network-security/firesight-block-wireshark-exe/m-p/2919257#M1038242</link>
      <description>&lt;P&gt;Hello John,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;When the ASA FirePOWER module / Firepower devices detects an eligible file, the ASA FirePOWER module / Firepower devices then performs a&lt;EM class="cEmphasis"&gt;malware cloud lookup&lt;/EM&gt;&lt;A name="marker-2146255"&gt;&lt;/A&gt;using the file’s SHA-256 hash value. Based on these results, the Cisco cloud returns a file disposition to the ASA FirePOWER module.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-2013121"&gt;&lt;/A&gt;If a file has a disposition in the cloud that you know to be incorrect, you can add the file’s SHA-256 value to a file list:&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="pBu1_Bullet1"&gt;&lt;A name="pgfId-1965483"&gt;&lt;/A&gt;To treat a file as if the cloud assigned a clean disposition, add the file to the &lt;EM class="cEmphasis"&gt;clean list&lt;/EM&gt;&lt;A name="marker-2014362"&gt;&lt;/A&gt;.&lt;/LI&gt;
&lt;LI class="pBu1_Bullet1"&gt;&lt;A name="pgfId-1965614"&gt;&lt;/A&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;To treat a file as if the cloud assigned a malware disposition, add the file to the &lt;EM class="cEmphasis"&gt;custom detection list.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;A name="marker-2014367"&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1965684"&gt;&lt;/A&gt;If the system detects a file’s SHA-256 value on a file list, it takes the appropriate action without performing a malware lookup or checking the file disposition.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;STRONG&gt;In order to block wireshark and other similar tools, please browse to&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;STRONG&gt;FMC &amp;gt;&amp;gt; Objects &amp;gt;&amp;gt; Objects Management &amp;gt;&amp;gt; File List &amp;gt;&amp;gt; Custom Detection List &amp;nbsp;&amp;gt;&amp;gt; "Edit using the pencil icon" &amp;gt;&amp;gt; "Choose Calculate SHA in drop-down" &amp;gt;&amp;gt; Browse and Select file types for this list (For example, Wireshark EXEs, DMGs, etc)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;STRONG&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/screen_shot_2016-07-12_at_9.35.35_am.png" class="migrated-markup-image" /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;Hope this helps.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;Regards,&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;Pujita&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;Rate if this helps.&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2016 16:39:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-block-wireshark-exe/m-p/2919257#M1038242</guid>
      <dc:creator>Pujita Patni</dc:creator>
      <dc:date>2016-07-12T16:39:02Z</dc:date>
    </item>
    <item>
      <title>You may need to list all</title>
      <link>https://community.cisco.com/t5/network-security/firesight-block-wireshark-exe/m-p/2919258#M1038246</link>
      <description>&lt;P&gt;You may need to list all types of sniffing tools files and create their malware detection signature, including wireshark, nmap, and other types and add them to the malware detection policy. &amp;nbsp;Cisco TAC can assist or you can load your own. Happy tunning.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jul 2016 19:21:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firesight-block-wireshark-exe/m-p/2919258#M1038246</guid>
      <dc:creator>Ed Padilla Jr</dc:creator>
      <dc:date>2016-07-15T19:21:06Z</dc:date>
    </item>
  </channel>
</rss>

