<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS False positives on Malware signatures in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-false-positives-on-malware-signatures/m-p/4289178#M1078329</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I think you need to have some best practices in place to reduce the amount&lt;BR /&gt;of false positives.&lt;BR /&gt;&lt;BR /&gt;1. Make sure that you have a list of whitelisted URL that you don't need to&lt;BR /&gt;do any inspection on. This includes microsoft, apple, cisco, adobe, eset,&lt;BR /&gt;vmware, oracle, etc. These are trusted vendors and there is no point in&lt;BR /&gt;inspecting their traffic&lt;BR /&gt;2. Have a list of whitelisted SSL sites that don't need decryption (similar&lt;BR /&gt;to the one above).&lt;BR /&gt;3. Have a list of trusted apps basically a combination if high business&lt;BR /&gt;relevance with low risk&lt;BR /&gt;4. Ensure that you have IAB configured for better inspection performance.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;These relevant to your query. There are others related to each feature such&lt;BR /&gt;as File Policy, IPS, DNS, Identity, etc.&lt;BR /&gt;&lt;BR /&gt;****** please remember to rate useful posts&lt;BR /&gt;</description>
    <pubDate>Wed, 10 Feb 2021 06:02:29 GMT</pubDate>
    <dc:creator>Mohammed al Baqari</dc:creator>
    <dc:date>2021-02-10T06:02:29Z</dc:date>
    <item>
      <title>IPS False positives on Malware signatures</title>
      <link>https://community.cisco.com/t5/network-security/ips-false-positives-on-malware-signatures/m-p/4288832#M1078309</link>
      <description>&lt;P&gt;Dear community,&lt;/P&gt;&lt;P&gt;we have recently noticed several false positives on our IPS based on Firepower Managment Center, in particular signatures:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;MALWARE-OTHER Win.Trojan.FANCYBEAR variant binary download attempt (1:56933:1)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;MALWARE-OTHER Win.Malware.Ursu-9821797-0 download attempt (1:56912:1)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;both of them seems to have legit traffic to Adobe.com or Eset.com. Why are detected as malware? Is there some additional tuning to do on our side?&lt;/P&gt;&lt;P&gt;Any ideas are welcome. Thank you!&lt;/P&gt;&lt;P&gt;R&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2021 17:10:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-false-positives-on-malware-signatures/m-p/4288832#M1078309</guid>
      <dc:creator>rick11</dc:creator>
      <dc:date>2021-02-09T17:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: IPS False positives on Malware signatures</title>
      <link>https://community.cisco.com/t5/network-security/ips-false-positives-on-malware-signatures/m-p/4289178#M1078329</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I think you need to have some best practices in place to reduce the amount&lt;BR /&gt;of false positives.&lt;BR /&gt;&lt;BR /&gt;1. Make sure that you have a list of whitelisted URL that you don't need to&lt;BR /&gt;do any inspection on. This includes microsoft, apple, cisco, adobe, eset,&lt;BR /&gt;vmware, oracle, etc. These are trusted vendors and there is no point in&lt;BR /&gt;inspecting their traffic&lt;BR /&gt;2. Have a list of whitelisted SSL sites that don't need decryption (similar&lt;BR /&gt;to the one above).&lt;BR /&gt;3. Have a list of trusted apps basically a combination if high business&lt;BR /&gt;relevance with low risk&lt;BR /&gt;4. Ensure that you have IAB configured for better inspection performance.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;These relevant to your query. There are others related to each feature such&lt;BR /&gt;as File Policy, IPS, DNS, Identity, etc.&lt;BR /&gt;&lt;BR /&gt;****** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Wed, 10 Feb 2021 06:02:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-false-positives-on-malware-signatures/m-p/4289178#M1078329</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2021-02-10T06:02:29Z</dc:date>
    </item>
    <item>
      <title>Re: IPS False positives on Malware signatures</title>
      <link>https://community.cisco.com/t5/network-security/ips-false-positives-on-malware-signatures/m-p/4289418#M1078355</link>
      <description>&lt;P&gt;Hello Mohammed,&lt;/P&gt;&lt;P&gt;we don't have SSL ispection for legal reasons. The idea to create a whitelist make sense and we can try to implement. I guess this is part of the URL filtering in the policy.&lt;/P&gt;&lt;P&gt;R&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2021 14:17:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-false-positives-on-malware-signatures/m-p/4289418#M1078355</guid>
      <dc:creator>rick11</dc:creator>
      <dc:date>2021-02-10T14:17:30Z</dc:date>
    </item>
    <item>
      <title>Re: IPS False positives on Malware signatures</title>
      <link>https://community.cisco.com/t5/network-security/ips-false-positives-on-malware-signatures/m-p/4289431#M1078357</link>
      <description>Yes it is part of url filtering.&lt;BR /&gt;</description>
      <pubDate>Wed, 10 Feb 2021 14:53:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-false-positives-on-malware-signatures/m-p/4289431#M1078357</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2021-02-10T14:53:19Z</dc:date>
    </item>
  </channel>
</rss>

