08-02-2022 01:23 PM - edited 08-02-2022 01:34 PM
I've searched and read documentation and cannot get a clear answer.
I see these exclusions in Cisco Secure Endpoint:
When creating exclusions (see above type of exclusions):
Thank you in advance.
08-16-2022 03:21 AM
Hello,
Just to help you understand better, An exclusion set is a list of directories, file extensions, or threat names that you do not want the Secure Endpoint Connector to scan or convict. Exclusions are a necessity to ensure a balance of performance and security on a machine when endpoint protection such as Secure Endpoint is enabled.
Example : Lets say you are using Secure Endpoint and some Antivirus in your environment. Since you trust the antivirus Software, you can exclude that software to be scanned by cisco endpoint. So for this you can exlcude the directory where that software is located.
To create exclusions, you can use wildcards, directory etc.
Some reference documents for you : https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/215418-configure-and-manage-exclusions-in-cisco.html
https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/213681-best-practices-for-amp-for-endpoint-excl.html
I hope these links help.
You can also learn more about Endpoint Security through our live Ask the Experts (ATXs) session. Check out Cisco Endpoint Security ATXs Resources [https://community.cisco.com/t5/security-knowledge-base/cisco-endpoint-security-ask-the-experts-resources/ta-p/4394492] to view the latest schedule for upcoming sessions, as well as the useful references, e.g. online guides, FAQs.”
Please feel free to reach out to me if you have any sort of uncertainties.
08-16-2022 05:30 AM - edited 08-16-2022 05:31 AM
Hello @ACISAC ,
let´s explain step by step. First, you might take a look at the File Scanning Sequence explained here. For any execute and write, Secure Endpoint does the whole Scanning Sequence.
Finally, i would recommend to use exclusions only if necessary, just to provide as much as possible telemetry info for the backend engines and having us much as possible file/process information availble in the "Event Stream" for the Behavioral Protection Engine on the endpoint.
Greetings, Thorsten
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide