<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CSA 4.03 and WindowsUpdate in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/csa-4-03-and-windowsupdate/m-p/476880#M98063</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Add your WindowsUpdates app class exception to the Builtin Application class : Processes executing downloaded content.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are some other helpful posts on this subject here. Do a search for "windows updates"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 19 May 2005 18:49:03 GMT</pubDate>
    <dc:creator>tsteger1</dc:creator>
    <dc:date>2005-05-19T18:49:03Z</dc:date>
    <item>
      <title>CSA 4.03 and WindowsUpdate</title>
      <link>https://community.cisco.com/t5/network-security/csa-4-03-and-windowsupdate/m-p/476879#M98061</link>
      <description>&lt;P&gt;Can anyone offer some advise about how to keep the Trojan Detection Rule from preventing the execution of downloaded Windows updates? On the surface the solution seems straightforward. Create an Application Class that points to *.exe with a path under **\Windows\SoftwareDistribution\**&lt;/P&gt;&lt;P&gt;Then go into the TD rule and include that App Class in the box that excludes an App Class from  being considered as "Downloading and invoking executing files". Unfortunately, it doesn't work and no matter how I tweak, expand or modify various aspects... the rule still triggers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:27:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csa-4-03-and-windowsupdate/m-p/476879#M98061</guid>
      <dc:creator>donlon</dc:creator>
      <dc:date>2019-03-10T09:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: CSA 4.03 and WindowsUpdate</title>
      <link>https://community.cisco.com/t5/network-security/csa-4-03-and-windowsupdate/m-p/476880#M98063</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Add your WindowsUpdates app class exception to the Builtin Application class : Processes executing downloaded content.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are some other helpful posts on this subject here. Do a search for "windows updates"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 May 2005 18:49:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csa-4-03-and-windowsupdate/m-p/476880#M98063</guid>
      <dc:creator>tsteger1</dc:creator>
      <dc:date>2005-05-19T18:49:03Z</dc:date>
    </item>
  </channel>
</rss>

