01-11-2018 12:41 AM - edited 03-08-2019 05:46 PM
Hi Guys,
What setting should be there for the connectors to get auto updated.
My computer is on version 5.1.13 and we have below setting :
Product Version - none
So do we manually update all workstations? Since i see 6.0.5 is the latest and we are still on old
thanks in advance!!
Regards
Vaibhav
01-11-2018 01:54 AM
You don't have to manually update them (although you can). The regular way is to edit the policy in the dashboard, choose the desired version under Product Updates and set the Update window when this should happen. After saving your policy all clients with this policy will receive the new settings and update to the chosen version.
06-08-2018 08:21 AM
Thats not strictly true is it! Though they will upgrade they will require a reboot of the client and the Endpoint will be unprotected until a reboot is taken. Fine if you have 2 Endpoints to take care of. Slightly more of a pain when you have 2000+!
Also there seems to be no way to upgrade using SCCM and when you do manage to get it to work there is no way of suppressing a reboot notification!
Cisco again acquire a product, re-brand it, sell it and have no clue about it! The reason I say this is because multiple times I have asked about the upgrade process and multiple times been told a reboot is not required!
07-11-2018 01:54 AM
This is an issue we're encountering as well. Right pain.
07-11-2018 02:17 AM
We do it using SCCM . Its easy that way.
the only pain is it requires the endpoint to get rebooted , so we liaise it with Monthly patches .
07-11-2018 02:19 AM - edited 07-11-2018 02:30 AM
Yea, we're using SCCM also.
It's just a pain that we loose visability untill the reboot.
10-11-2019 06:06 AM
Can't you just select "force reboot" and make the updates for times your users aren't in the office? Users may not like the forced reboot but I bet most won't even notice.
10-16-2019 04:39 AM
Helloi @Infrastructure9,
you are right, an unprotected client state after an upgrade is a security risk!!
Development is aware of this, therefore, with new versions of AMP connector 7.x we will introduce Upgrades without Reboot.
Take a look to the upcoming Release notes for new connector versions.
Greetings,
Thorsten
10-16-2019 05:34 AM - edited 10-16-2019 05:35 AM
AMP for Endpoints Windows Connector 7.0.5
New
• Endpoint Isolation is a feature that lets you block incoming and outgoing network
activity on a Windows computer to prevent threats such as data exfiltration and
malware propagation.
• System Process Protection notifications
• are less verbose. (CSCvn41948)
• are no longer sent when the process in question is excluded by process
exclusions. (CSCvo90440)
BugFixes/Enhancements:
• A failing System Process Protection rule no longer prevents the Self Protect
driver from starting.
• Endpoint indication of compromise (IOC) driver stops gracefully when
uninstalling Windows Connector.
• Upgraded curl version to fix an integer overflow vulnerability in NTLM password
authentication (CVE-2018-14618).
• Memory leak fixes and other stability improvements in the Self-Protect driver.
• Malicious Activity Protection engine no longer incorrectly detects Google
Chrome.
• Windows Connector gathers the BIOS serial number more reliably when it is
needed to detect hardware changes for registration with AMP Cloud.
• Windows Connector Crash is now handled by the Cisco Security Connector
Monitoring Service (CSCMS) Server.
• Fixed an issue where currently running rootkit scans continued to run after the
Connector service was stopped.
• Fixed incompatibility with Kaspersky Real-Time Engine.
• Improved stability of the Exploit Prevention engine.
• New certificate for the Early Launch Antimalware (ELAM) driver.
• Reduced false positives with the Malicious Activity Protection engine.
• Fixed issue where the support tool would sometimes fail to include all necessary
files.
• Fixed a crash on shutdown issue.
• Windows Connector support package is now a ZIP file instead of 7zip so that
Windows can natively unpack the support package.
No mention. When can we expect this so I can call off the security dogs? This is affecting us so much I am now pursing other an enterprise grade AV/Endpoint protection as AMP4E is still very immature
10-17-2019 04:48 AM
Hello @Infrastructure9,
in the Beta phase we already tested the no reboot feature with connector version 7.0.3.
For an official answer, the best way is to ask your Cisco representative. There will be no official statements here in the community. ;-)
Greetings,
Thorsten
01-06-2020 05:56 AM
Seems the latest version still requires the endpoint to be rebooted when upgrading from any previous.
01-06-2020 06:30 AM
If you're upgrading from 7.0.5 to 7.1.1, you should not need a reboot. If it is from anything further back, a reboot will still be required. There may be some edge cases where 7.0.5 to 7.1.1 will require a reboot and if you happen to hit one of those, please open a TAC case and provide a diagnostic so we can attempt to remedy those in the future.
Thanks,
Matt
01-07-2020 12:10 AM
Hi Matthew,
Thanks for the reply!! If i upgrade from 6.3 to 7.1.5 , i would still need a reboot?
01-06-2020 05:16 AM
Hello Everyone,
So i have tried and used cisco AMP for some time now. it works fine on workstations and we do work with normal patch upgrade cycle so the reboot needed ( which is a pain) works ok with SCCM team update AMP with the patch upgrades.
Issue lies on server side where we still work on patch upgrades but we do have business complaining about high cpu etc. We have tried putting on exclusions but with thousands of applications and their upgrades, we are still not comfortable using it on our Server estate
01-07-2020 12:07 AM
Hi, We upgraded from 6 to 7.0.5 and needed reboot.
If we go from here to the latest, it should not ask for reboot? If yes, i will try it and and let people know.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide