<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FDM - setting up Variable Set and File Policies in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fdm-setting-up-variable-set-and-file-policies/m-p/5345781#M1123443</link>
    <description>&lt;P&gt;If you need an easy way to configure the items that you mentioned then using the centralized manager (FMC) is the way to go. For your 2nd question: If you want to have malware protection and analysis in an air-gapped environment, then you will need to consider private cloud appliance/s for Advanced Malware Protection and/or Malware Analytics.&lt;/P&gt;
&lt;DIV id="bodyDisplay_3" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Mon, 10 Nov 2025 11:58:57 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2025-11-10T11:58:57Z</dc:date>
    <item>
      <title>FDM - setting up Variable Set and File Policies</title>
      <link>https://community.cisco.com/t5/network-security/fdm-setting-up-variable-set-and-file-policies/m-p/5343472#M1123339</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;We have a set of FTDs and using FDM for management.&amp;nbsp; Found some answer about the Variable Set being the feature not available in FDM.&amp;nbsp; However, I am hoping that someone can recommend a smoother workaround to create it there besides the FlexConfig method. ---- We also would like to create a File Policy via the FDM that we can use for our ACPs as needed. &amp;nbsp;&amp;nbsp;&amp;nbsp; We do have the required licenses enabled (IPS and Malware Defense), so are the essentials.&amp;nbsp; However, we cannot seem to find a way to create a custom policy that will allow us to define it the way we are able to via and FMC that we also have for a different set of FTD.&amp;nbsp;&amp;nbsp; For example, select the type of files we would like to include (e.g. PDF, TXT).&amp;nbsp; Speaking of the licenses, if we don't have internet access in the environment, does enabling the Malware License make any difference at all?&amp;nbsp; Based on what we had read, it uses AMP cloud for file checks/dispositions, etc. Hence, it will not reach the AMP cloud to perform the task.&amp;nbsp;&amp;nbsp; How does the Malware License tie with the AMP Cloud in general?&amp;nbsp;&amp;nbsp; If&amp;nbsp; it is enabled but there is no internet access, does FDM has a built in database that it can use for file checking, etc.&amp;nbsp; If yes, how is it updated?&amp;nbsp; At the moment, the only File policies available to us is "None", "Block Malware All", and "Malware Cloud Lookup - No Block".&amp;nbsp;&amp;nbsp;&amp;nbsp; Looking forward to your recommendations and suggestions, and thank you so very much in advance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 17:39:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fdm-setting-up-variable-set-and-file-policies/m-p/5343472#M1123339</guid>
      <dc:creator>ArielAR</dc:creator>
      <dc:date>2025-10-30T17:39:10Z</dc:date>
    </item>
    <item>
      <title>Re: FDM - setting up Variable Set and File Policies</title>
      <link>https://community.cisco.com/t5/network-security/fdm-setting-up-variable-set-and-file-policies/m-p/5345781#M1123443</link>
      <description>&lt;P&gt;If you need an easy way to configure the items that you mentioned then using the centralized manager (FMC) is the way to go. For your 2nd question: If you want to have malware protection and analysis in an air-gapped environment, then you will need to consider private cloud appliance/s for Advanced Malware Protection and/or Malware Analytics.&lt;/P&gt;
&lt;DIV id="bodyDisplay_3" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 10 Nov 2025 11:58:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fdm-setting-up-variable-set-and-file-policies/m-p/5345781#M1123443</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2025-11-10T11:58:57Z</dc:date>
    </item>
    <item>
      <title>Re: FDM - setting up Variable Set and File Policies</title>
      <link>https://community.cisco.com/t5/network-security/fdm-setting-up-variable-set-and-file-policies/m-p/5345970#M1123454</link>
      <description>&lt;P&gt;Thank you for your reply, nspasov,&lt;BR /&gt;Understood on the answer for the first question.&amp;nbsp;&amp;nbsp; Following on the second question, about enabling of the Malware License, if we are in an air-gapped environment, does it make a a difference if we enable or or not?&amp;nbsp; If enabled, what does it do, what feature does it enable, if anything at all?&amp;nbsp; If we set it to "Block Malware All" and Malware License is enabled, does it mean it will evaluate and block any file that goes thru the traffic?&amp;nbsp; What will it check against by default?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Nov 2025 23:17:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fdm-setting-up-variable-set-and-file-policies/m-p/5345970#M1123454</guid>
      <dc:creator>ArielAR</dc:creator>
      <dc:date>2025-11-10T23:17:36Z</dc:date>
    </item>
    <item>
      <title>Re: FDM - setting up Variable Set and File Policies</title>
      <link>https://community.cisco.com/t5/network-security/fdm-setting-up-variable-set-and-file-policies/m-p/5345985#M1123455</link>
      <description>&lt;P&gt;By default, Malware file analysis uses the Cisco cloud-based service. If you have an air-gapped environment, the service would not be available and the license (with associated file policy) would not be usable.&lt;/P&gt;
&lt;P&gt;There is an option to run "AMP Private Cloud" on premises and integrate it into an FMC-managed deployment. However that is a separately licensed and deployed product. When used, it provides a subset of the cloud-based services.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2025 02:47:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fdm-setting-up-variable-set-and-file-policies/m-p/5345985#M1123455</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-11-11T02:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: FDM - setting up Variable Set and File Policies</title>
      <link>https://community.cisco.com/t5/network-security/fdm-setting-up-variable-set-and-file-policies/m-p/5346164#M1123461</link>
      <description>&lt;P&gt;A few things to add to&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;excellent answer:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;The File Policy can be used to detect and control files transmission, which is independent from malware analysis and protection. E.g., Block PDFs&lt;/LI&gt;
&lt;LI&gt;"Local Malware Analysis" does not require internet connectivity but as a result, its capabilities are limited.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;These and more information is well captured in the configuration guide:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/770/management-center-device-config-77/network-malware-protection.html#concept_9CE3D1F1572541C695CE5C7682780311" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/770/management-center-device-config-77/network-malware-protection.html#concept_9CE3D1F1572541C695CE5C7682780311&lt;/A&gt;&lt;/P&gt;
&lt;DIV id="bodyDisplay_3" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2025 15:47:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fdm-setting-up-variable-set-and-file-policies/m-p/5346164#M1123461</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2025-11-11T15:47:19Z</dc:date>
    </item>
  </channel>
</rss>

