07-15-2025 12:04 AM
Hi,
While exploring the Cisco Secure Endpoint (AMP) interface, I noticed there's a section related to ClamAV signatures.
I wanted to understand:
What is the ClamAV functionality used for in this context?
Does it enhance malware detection on Linux systems only, or does it also apply to Windows/macOS clients?
Is it used for custom detections, such as signature-based rules for internal threat hunting?
I found this document:
It describes how to create ClamAV custom signatures and use various command-line tools like sigtool, clamscan, etc.
My question is:
Where exactly should these commands be used in the context of Cisco Secure Endpoint?
Should I run these on a Linux endpoint, or is there a backend system where ClamAV operates within AMP?
Can these custom .ndb or .ldb signature files be uploaded or integrated into Cisco Secure Endpoint for real-time scanning?
Any clarification or guidance on how ClamAV is used within Cisco AMP would be greatly appreciated.
Thanks in advance!
07-15-2025 07:15 AM
07-16-2025 12:35 AM
Thanks a lot for the great additional information!
However, I have a question — let’s say I want to find files that contain specific content, for example:
files that include the word "password"
files that contain a specific text string
or Excel files with macros
My goal is just to detect these files, not to block or quarantine them.
Is there a way to achieve this using custom detections? How would that be possible?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide