Hello,
I have a client that has been infected with malware. They use Cisco Umbrella and also have Cisco Firepower (no AMP license).
It appears that the malware originated from a third party partner / contractor connection to my clients internal network with their laptop.
It has taken almost a week for my client to go through all their logs on all their different systems and they are still on their knees.
How would we mitigate this in future with Cisco solutions? I thought that Umbrella would have blocked this, but this was not the case. y
It appears that my client AlienVault is showing multiple connections from private IP addresses in subnets that do not exist on the network out to public IP addresses.
Would licensing the clients firepower for AMP help out here? Any suggestion on Cisco products that can mitigate this sort of issues would be great.
Many thanks
Nick