Hello all,please may somebody advice me regarding ASA licensing?I have 2 ASA with base licenses and firepower module and I want to install licenses for Threat protection, URL Filter, Email Spam Protection, malware protection, botnet prevention. I hav...
-
AMP for Email
(13) -
AMP for Endpoints
(818) -
AMP for Web
(19) -
Buying Recommendation
(4) -
Cisco AMP
(1) -
Cisco Bugs
(1) -
Cisco Cafe
(1) -
Cisco Vulnerability Management
(7) -
Collaboration Endpoints
(1) -
Community Feedback Forum
(1) -
Community Ideas
(1) -
Endpoint Security
(543) -
Event Analysis
(1) -
Firewalls
(1) -
General
(1) -
Identity Services Engine (ISE)
(2) -
Integrations
(1) -
NGFW Firewalls
(1) -
NGIPS
(1) -
Orbital Advanced Search
(25) -
Other AMP Topics
(155) -
Other NAC
(1) -
Other Network Security Topics
(1) -
Other Security Topics
(1) -
Policy and Access
(1) -
Prioritization
(1) -
Room Endpoints
(1) -
Secure Endpoint
(1) -
Vulnerability Management
(8) -
Wireless
(1)
- « Previous « Previous
- Next » Next »
Forum Posts
Hi guys,I m confused whether we can configure 2 Cisco AMP PC 3000 applince in HA. Since there is no document i could find on the internet. Can someone help me in this or any document which claims from cisco.
Hi, For some reason, if I download the app from the Play Store and try to register it using the activation code created from our dashboard does not work. We got the following error: "The code you provided appears to be invalid. Try again or contact s...
Hi, Is there any way to avoid unmanaged endpoints to continue consuming licenses? Kind of blacklisting the device or similar?Former employees' laptops no longer managed by my organization still connecting to the cloud and consuming licenses. Regards.
Does the macOS Connector only operate in an Offline mode? Device Trajectory has very minimal to almost no information compared to a Windows Connector. Also, scans executed by the AMP Console don't seem to actually occur and local scans never appear i...
Today I had 6 endpoints within 3 hours all quarantine the following file: 8d4fdcb52b32afbcef4450ca88668def9b245a6f7ab2aa26ec3a4324a0b1f461When I look what was happening with each endpoint in AMP's Device Trajectory I see this:The event only indicate...
I do some light sysadmin stuff for my wife's school and they had a BE4000 installed last year. The people who configured it didn't talk to the network people and configured it with static IP information. Well, our firewall changed and now it can't re...
Hi Cisco Community,I want ask you if is possible cipher the file policy.xml or hidden from system when the user is administrator of own machine.File: C:\Program Files\Cisco\AMP\policy.xml This file have important exception like 'process':(an example ...
I was recently trying upgrade one of our machines from AMP version 6.0.9 to 6.2.3. AMP quarantined the setup file and detected it as W32.Generic.Malware. So I uninstalled the old version, restarted and installed the new version. As soon as I did that...
Hi all, Using AMP, I need to produce a report that lists all endpoints against the known software vulnerabilities on those endpoints so they can be upgraded/patched. I need to include the group that the endpoint belongs to (there are many endpoints...
Resolved! AMP Update error
When I try to select a product version in product updates in any policy, I receive this information:Start Update Window is required.End Update Window is required.Product Update is invalidI already update my windows but I always get that information
First off a nod to ChiefSec-SF & Orlith for their contributions.Objective: Use PowerShell to create a new Event Stream. Define Authentication Credentials$Credentials = GET-CREDENTIAL –Credential (Get-Credential) $RESTAPIUser = $Credentials.UserName $...
Hi I am trying to create an customer adoption plan for AMP4E for CX, the question I have here is:1-How do I take customers on a feature adoption journey, how should they proceed strategically in terms of utilizing what AMP has to offer?2- What shoul...
Hi Team, AMP for Endpoint in Windows Connector has the Scanning Settings - Scan Email. With these feature the Connector can scan the email attachment. But this feature is not on Mac Connectors. Is it possible to configure these feature using Poli...
400 endpoint deployment. It is finding and quarantining like it should. The malicious activity is staying in quarantine. Does A4E remove the Malware or does it rely on an additional component to actually remove it?