Suppose I want to configure a policy that will allow a user to download and execute .exe and .msi files. Of course, I cannot list all of the files that should be allowed to execute since installer executables can have a variety of filenames.
The only way I can see this being done is by allowing *all* .exe and .msi files to be downloaded and allowed to execute.
If I do implement such a policy, and a user accidentally downloads a virus, will my policy significantly cripple the protection offered by CSA?
Of course, if the virus is a known signature to CSA, it will be stopped. And I'm sure there are other virus-like behavior that CSA will protect against.
So, in summary, if I configure the above policy, am I opening the door too much and significantly decreasing the effectiveness of CSA?
If this is the case, does anyone have any suggested alternatives to the above policy that will accomplish my objectives? One final note - prompting the user as to whether or not this should be allowed (default policy) is not an acceptable option for me, as CSA must be completely transparent to the end-user.
The problem with what you suggest is you lose "Day zero protection"...that is, if you have a list of known virus .exe files, and a new one comes out, your list will not have it and a user could potentially download it before you find out about the threat. However, it is the best thing I can think of...you would just have a policy that would allow all applications but except all suspected virus applications or whatever.
I also agree about the query idea...the end user will say yes because they do not realize they are downloading and running a virus app until after the fact.
With the enhancements in ISE 3.0 for integrating with Azure AD via SAML IdP, it is now possible to leverage Microsoft Single Sign-On for multiple ISE Portals (for example Sponsor and Guest/BYOD Portals).
At the time of this writing, ISE cann...
With the enhancements in ISE 3.0 for integrating with Azure AD via SAML IdP, it is now possible to create a BYOD Flow to provide Wireless network access using an employee’s Azure AD credentials.
The table below shows the whole Cisco Security solutions + Splunk integrations add-ons. Kindly let me know if I have missed some add-ons or if there are any new updates. Thank you!
Hope this will be helpful for everyone who is looking for Splunk in...
A python based script to generate report if there are disabled rules under an Access Control Policy and an option to delete those rules in bulk.
Step 1 Download the script on PCStep 2 Make sure python3 is installed on PC and have reach...
A python based script to generate report if there are double logging on FMC ACP (logging at beginning and end), having rule action "Allow" or "Trust". (Option1 )
Also, the logging at the begging will be disabled if logging is detected for both beginning ...