<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CSA 5.2 &amp; rootkit detection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/csa-5-2-rootkit-detection/m-p/741976#M85857</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tom,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you very much. You're absolutely right. I trust those applications, so I will make an exclusion for them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards, Marko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 28 Aug 2007 12:20:45 GMT</pubDate>
    <dc:creator>m.vuckovic</dc:creator>
    <dc:date>2007-08-28T12:20:45Z</dc:date>
    <item>
      <title>CSA 5.2 &amp; rootkit detection</title>
      <link>https://community.cisco.com/t5/network-security/csa-5-2-rootkit-detection/m-p/741974#M85851</link>
      <description>&lt;P&gt;Hello !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On two of our PCs there is special SW installed (Winternals and VMWare. During boot CSA detects this SW as rootkits and puts the systems in untrusted state. What is disturbing is that both machines are then begining to work in TESTMODE. After I reset system state of both agents systems continue to work normal, meaning that CSA is not in test mode anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any clue, how can I avoid putting in test mode when systems start ?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 10:46:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csa-5-2-rootkit-detection/m-p/741974#M85851</guid>
      <dc:creator>m.vuckovic</dc:creator>
      <dc:date>2019-03-10T10:46:01Z</dc:date>
    </item>
    <item>
      <title>Re: CSA 5.2 &amp; rootkit detection</title>
      <link>https://community.cisco.com/t5/network-security/csa-5-2-rootkit-detection/m-p/741975#M85855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Marko, the Rootkit Lockdown Module is in testmode (by default) so anything triggered by the system state will also be in testmode.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't believe the systems are in testmode, just the alerts from this rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tom &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2007 05:24:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csa-5-2-rootkit-detection/m-p/741975#M85855</guid>
      <dc:creator>tsteger1</dc:creator>
      <dc:date>2007-08-28T05:24:39Z</dc:date>
    </item>
    <item>
      <title>Re: CSA 5.2 &amp; rootkit detection</title>
      <link>https://community.cisco.com/t5/network-security/csa-5-2-rootkit-detection/m-p/741976#M85857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tom,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you very much. You're absolutely right. I trust those applications, so I will make an exclusion for them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards, Marko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2007 12:20:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csa-5-2-rootkit-detection/m-p/741976#M85857</guid>
      <dc:creator>m.vuckovic</dc:creator>
      <dc:date>2007-08-28T12:20:45Z</dc:date>
    </item>
  </channel>
</rss>

