03-05-2016 04:49 AM - edited 02-20-2020 09:00 PM
Looking for AMP for Network best practices notes:
best practice for Tuning File and Malware Inspection Performance and Storage
best practice for file type inspection for malware check such as portable file, docx etc.
Solved! Go to Solution.
03-05-2016 06:08 AM
I don't think that we have a "best practise" for this.
I usually make a rule which action is to "Detect files" and choose all file types possible. Then I make a "Block Malware" rule, with all the bells and whistles, to store malware files, and choose:
Office Documents
Archive
Executables
PDF files
System files
Local Malware Analysis Capable
Dynamic Analysis Capable
On a sidenote Cisco states this in the manual about file inspection:
File Policy Notes and Limitations
File Rule Configuration Notes and Limitations
File Detection Notes and Limitations
If an end-of-file marker is not detected for a file, regardless of transfer protocol, the file will not be blocked by a Block Malware rule or the custom detection list. The system waits to block the file until the entire file has been received, as indicated by the end-of-file marker, and blocks the file after the marker is detected.
File Blocking Notes and Limitations
03-05-2016 06:08 AM
I don't think that we have a "best practise" for this.
I usually make a rule which action is to "Detect files" and choose all file types possible. Then I make a "Block Malware" rule, with all the bells and whistles, to store malware files, and choose:
Office Documents
Archive
Executables
PDF files
System files
Local Malware Analysis Capable
Dynamic Analysis Capable
On a sidenote Cisco states this in the manual about file inspection:
File Policy Notes and Limitations
File Rule Configuration Notes and Limitations
File Detection Notes and Limitations
If an end-of-file marker is not detected for a file, regardless of transfer protocol, the file will not be blocked by a Block Malware rule or the custom detection list. The system waits to block the file until the entire file has been received, as indicated by the end-of-file marker, and blocks the file after the marker is detected.
File Blocking Notes and Limitations
03-05-2016 09:03 AM
Thanks for your prompt response, how about the Tuning File and Malware Inspection Performance and Storage as mentioned on below link. Any customized settings that we have experienced for any customer. Or shall we go with the default settings, An example, lets say if we increase the file size settings that can be stored into storage and further submit for dynamic analysis. I am suspecting if we change such settings will result decrease in performance.
03-05-2016 09:11 AM
I have not had the need to tune those settings. You should tune them if you do not use a default 1500 MTU size.
01-28-2021 10:50 PM
I noticed that if i downloads excel file from internet ,i can see the connection build up and rules are configured for to Detect the file.
But when i try to check analyses>file>file event
i could see anything after editing search with my IP address, Why is that ?
01-29-2021 06:15 AM
@atanawade how are you downloading? If it's within an https or other encrypted session AMP for Networks won't generally see the file transfer (unless there's also an SSL decryption policy in effect that applies to that connection).
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide