<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Signature Update S749 Alert in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/signature-update-s749-alert/m-p/2349987#M53296</link>
    <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After releasing signature update S749, we discovered a defect that significantly impacted the performance of the AnalysisEngine application running on the sensor. This defect is documented in &lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCul00198" target="_blank"&gt;CSCul00198&lt;/A&gt;. Having identified the root cause of the problem, we have provided a fix in signature update S750 and enhanced our test suite to detect this condition in future signature updates.&amp;nbsp; In order to avoid this issue &lt;STRONG&gt;do not upgrade to S749&lt;/STRONG&gt; (it is no longer available for download), instead, &lt;STRONG&gt;upgrade directly to S750&lt;/STRONG&gt;. We apologize for any inconveniences this may have caused.&amp;nbsp; &lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 13:04:41 GMT</pubDate>
    <dc:creator>wsulym</dc:creator>
    <dc:date>2019-03-10T13:04:41Z</dc:date>
    <item>
      <title>Signature Update S749 Alert</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s749-alert/m-p/2349987#M53296</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After releasing signature update S749, we discovered a defect that significantly impacted the performance of the AnalysisEngine application running on the sensor. This defect is documented in &lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCul00198" target="_blank"&gt;CSCul00198&lt;/A&gt;. Having identified the root cause of the problem, we have provided a fix in signature update S750 and enhanced our test suite to detect this condition in future signature updates.&amp;nbsp; In order to avoid this issue &lt;STRONG&gt;do not upgrade to S749&lt;/STRONG&gt; (it is no longer available for download), instead, &lt;STRONG&gt;upgrade directly to S750&lt;/STRONG&gt;. We apologize for any inconveniences this may have caused.&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:04:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s749-alert/m-p/2349987#M53296</guid>
      <dc:creator>wsulym</dc:creator>
      <dc:date>2019-03-10T13:04:41Z</dc:date>
    </item>
    <item>
      <title>Signature Update S749 Alert</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s749-alert/m-p/2349988#M53297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;* Upgrade to S750 &lt;STRONG&gt;or later&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Oct 2013 12:43:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s749-alert/m-p/2349988#M53297</guid>
      <dc:creator>wsulym</dc:creator>
      <dc:date>2013-10-31T12:43:44Z</dc:date>
    </item>
    <item>
      <title>Signature Update S749 Alert</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s749-alert/m-p/2349989#M53300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,we were hit with the bug in Signature 749. It brought our ASA-5525 IPS down. I spent 2 hours with support tryign to figure out the problem and then downgrading the signatures to fix the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Signature auto update is turned off currently and we are sitting at Signature Version 748. If I turn auto update back on will the IPS get the latest signature? Or is their a better way to get Signature Version 750 than letting auto update do it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Nov 2013 14:02:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s749-alert/m-p/2349989#M53300</guid>
      <dc:creator>mhanson2004</dc:creator>
      <dc:date>2013-11-01T14:02:05Z</dc:date>
    </item>
    <item>
      <title>Signature Update S749 Alert</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s749-alert/m-p/2349990#M53302</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How auto-update works is doc'd here:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps2113/products_tech_note09186a0080bd008f.shtml"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2113/products_tech_note09186a0080bd008f.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IPS sig updates are cumulative, so if you were to turn auto-update back "on", the most current sig update pack should be selected from the servers for use - which is at the moment s751.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But you might want hands on control over the update so...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sounds like you only have 1-2 devices to update... what you could do is grab the s750 or s751 update from here, install that manually via CLI or IDM, and *then* turn auto-update back "on":&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://software.cisco.com/download/navigator.html?mdfid=268439591&amp;amp;catid=268438162"&gt;http://software.cisco.com/download/navigator.html?mdfid=268439591&amp;amp;catid=268438162&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is direct to the current s751 update&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://software.cisco.com/download/release.html?mdfid=283674966&amp;amp;flowid=24482&amp;amp;softwareid=282549755&amp;amp;release=S751&amp;amp;relind=AVAILABLE&amp;amp;rellifecycle=&amp;amp;reltype=latest"&gt;http://software.cisco.com/download/release.html?mdfid=283674966&amp;amp;flowid=24482&amp;amp;softwareid=282549755&amp;amp;release=S751&amp;amp;relind=AVAILABLE&amp;amp;rellifecycle=&amp;amp;reltype=latest&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Nov 2013 18:24:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s749-alert/m-p/2349990#M53302</guid>
      <dc:creator>wsulym</dc:creator>
      <dc:date>2013-11-01T18:24:36Z</dc:date>
    </item>
    <item>
      <title>Signature Update S749 Alert</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s749-alert/m-p/2349991#M53303</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Nov 2013 20:29:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s749-alert/m-p/2349991#M53303</guid>
      <dc:creator>mhanson2004</dc:creator>
      <dc:date>2013-11-01T20:29:07Z</dc:date>
    </item>
  </channel>
</rss>

