I am now in the middle of implementing ThreatGrid and Private cloud. Only integrations with FMC,ESA,WSA are left. I have couple of question regarding available features of Integrators:
1)As far as I know in FMC when disposition is unknown and file is sent to analysis (In my case it would be TG) the first file will be downloaded by client. The FMC will start to implement action for that file after TG informed Private Cloud about threat score and PC the FMC in its turn. I wonder whether it is possible to tweak this process. In other NGFW vendors I had capability of sending like snapshot of file and informing that your file is pending analysis. In FMC I did not found any tab for editing this feature of it.
2)How TG will analysis the file with password? Does it have any most-used password database which will try them or something else?
3)In ESA, if esa received a mail with phishing URL but did not detected it as phishing, may i configure it so that it sends all mails to TG with URL which reputation is unknown.
Are you responsible for risk management, compliance management and auditing of a network?
If so, we’d like to speak with you to learn your current processes of enforcing compliance and managing risk to help us develop services that will ...
Once you've expanded Cisco Secure Endpoint connector deployment to about 50% of your licensed count (check out this article that shows you how to do that), it's time to put those connectors to action i.e. convert them to Protect from Audit mode for vari...
Hello! I’m Betsy, UX Researcher, on the Cisco+ Secure Connect Now team. Nice to meet you all .We have a short survey to learn about your Zero Trust Network Access (ZTNA) journey. Whether you have, plan to, or have not implemented a ...
A set of interface access rules can cause the Cisco Adaptive Security Appliance to permit or deny a designated host to access another particular host with a specific network application (service). When there is only one client, one host and one se...
How To: Cisco ISE Captive Portals with Aruba Wireless
Authors: Adam Hollifield, Brad Johnson
IntroductionPrerequisitesMinimum RequirementsComponents UsedConfigurationAruba Wireless ControllerWLAN CreationAuthentication ConfigurationRole & Policy Confi...