<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Firepower Malware signature in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-firepower-malware-signature/m-p/4608019#M1089944</link>
    <description>&lt;P&gt;Is your VDB is updated?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Integrating AMP for Network with AMP Threat&lt;BR /&gt;1- Files is downloaded through AMP for Network&lt;BR /&gt;2- AMP for Network calculates File hash (SHA256) and sends it to FMC for disposition lookup. Last packet is on hold by device till disposition is received.&lt;BR /&gt;3- FMC sends hash lookup to AMP CSI to identify hash disposition&lt;BR /&gt;4- CSI Cloud responds to the lookup with disposition “Unknown”&lt;BR /&gt;5- FMC records the disposition “Unknown” in File Trajectory&lt;BR /&gt;6- AMP for Network releases the last packet and submits a copy of the file to AMP Threat Grid for Dynamic Intelligence (Sandbox)&lt;BR /&gt;7- Threat Score (e.g. &amp;gt;=95) is calculated based on Behavioural Indicators and Threat Intelligence obtained by FMC polling&lt;BR /&gt;8- Subsequent downloads of the same file will be blocked by AMP for Network&lt;BR /&gt;9- AMP Solution also leverages CSI Cloud for Continuous Analysis and Retrospective Security.&lt;BR /&gt;10- Retrospective Call for a disposition change from Unknown to Malicious&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;however, to answer your question I do not think there is a database information avabilabe on firepower. all goes on cloud to check the SHA etc.&lt;/P&gt;</description>
    <pubDate>Wed, 11 May 2022 08:42:58 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2022-05-11T08:42:58Z</dc:date>
    <item>
      <title>Cisco Firepower Malware signature</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-malware-signature/m-p/4607986#M1089943</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Is Cisco Firepower have a Database for malware signature?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;When i check TECSEC-2599.pdf p77, the information is: FTD will first calculation the sha, and than send to FMC and FMC will check the Reputation from AMP Cloud.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;But i got another information by other SE, they said there is a database include Malware information on VDB.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After i check the VDB infomation :According the information on Cisco Vulnerability Database (VDB) Release Notes.&lt;/P&gt;&lt;P&gt;It include the&lt;/P&gt;&lt;P&gt;Application Protocol Detectors&lt;/P&gt;&lt;P&gt;Client Detectors&lt;/P&gt;&lt;P&gt;Web Application Detectors&lt;/P&gt;&lt;P&gt;FireSIGHT Detector Updates&lt;/P&gt;&lt;P&gt;Operating System Fingerprint Details&lt;/P&gt;&lt;P&gt;Operating System and Hardware Fingerprint Details&lt;/P&gt;&lt;P&gt;Vulnerability References&lt;/P&gt;&lt;P&gt;File Type Detectors&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Didn't see anything similar like malware database.&lt;/P&gt;&lt;P&gt;Is there any malware database information in VDB or anywhere on Firepower?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 11 May 2022 07:11:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-malware-signature/m-p/4607986#M1089943</guid>
      <dc:creator>RyanHsiao99746</dc:creator>
      <dc:date>2022-05-11T07:11:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Malware signature</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-malware-signature/m-p/4608019#M1089944</link>
      <description>&lt;P&gt;Is your VDB is updated?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Integrating AMP for Network with AMP Threat&lt;BR /&gt;1- Files is downloaded through AMP for Network&lt;BR /&gt;2- AMP for Network calculates File hash (SHA256) and sends it to FMC for disposition lookup. Last packet is on hold by device till disposition is received.&lt;BR /&gt;3- FMC sends hash lookup to AMP CSI to identify hash disposition&lt;BR /&gt;4- CSI Cloud responds to the lookup with disposition “Unknown”&lt;BR /&gt;5- FMC records the disposition “Unknown” in File Trajectory&lt;BR /&gt;6- AMP for Network releases the last packet and submits a copy of the file to AMP Threat Grid for Dynamic Intelligence (Sandbox)&lt;BR /&gt;7- Threat Score (e.g. &amp;gt;=95) is calculated based on Behavioural Indicators and Threat Intelligence obtained by FMC polling&lt;BR /&gt;8- Subsequent downloads of the same file will be blocked by AMP for Network&lt;BR /&gt;9- AMP Solution also leverages CSI Cloud for Continuous Analysis and Retrospective Security.&lt;BR /&gt;10- Retrospective Call for a disposition change from Unknown to Malicious&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;however, to answer your question I do not think there is a database information avabilabe on firepower. all goes on cloud to check the SHA etc.&lt;/P&gt;</description>
      <pubDate>Wed, 11 May 2022 08:42:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-malware-signature/m-p/4608019#M1089944</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-05-11T08:42:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Malware signature</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-malware-signature/m-p/4608203#M1089956</link>
      <description>&lt;P&gt;As &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/287680"&gt;@Sheraz.Salim&lt;/a&gt; said - there's not a local Malware database.&lt;/P&gt;
&lt;P&gt;The VDB is a separate database with the purpose of providing information about vulnerabilities to better inform IPS rule application and categorization of impact.&lt;/P&gt;</description>
      <pubDate>Wed, 11 May 2022 13:13:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-malware-signature/m-p/4608203#M1089956</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-05-11T13:13:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Malware signature</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-malware-signature/m-p/5073516#M1111433</link>
      <description>&lt;P&gt;Hi&lt;BR /&gt;Might be possible to update the signature for an offline device ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks by advance&lt;/P&gt;</description>
      <pubDate>Fri, 19 Apr 2024 07:40:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-malware-signature/m-p/5073516#M1111433</guid>
      <dc:creator>Anthael</dc:creator>
      <dc:date>2024-04-19T07:40:04Z</dc:date>
    </item>
  </channel>
</rss>

