cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1543
Views
5
Helpful
2
Replies

Sourcefire File Malware Lookup Bypass

mvollersf
Level 1
Level 1

I am currently looking for a way to exlude IP's from the Malware File lookup on a perimeter 3D sensor but am not having much luck.

 

For example, there are Windows patches and other trusted file deployment events that go through the sensor to multiple systems and it is causing a large number of file lookup events (from the malware protection license functionality). I have tried adding a rule in the Access Control policy that is src the patch server and dst any allow with either a blank file lookup policy defined in the rule, or it set to "none". However the systems are still generating large numbers of file lookup events.

 

Anyone had any luck with this?

1 Accepted Solution

Accepted Solutions

atatistc
Cisco Employee
Cisco Employee

Access Control Policy is the way to do it.  What you described should work, there is likely some issue with the rules  - either the rule criteria or the rule order - that is causing this.

View solution in original post

2 Replies 2

atatistc
Cisco Employee
Cisco Employee

Access Control Policy is the way to do it.  What you described should work, there is likely some issue with the rules  - either the rule criteria or the rule order - that is causing this.

Thanks atatistc, I was silly and put the location being downloaded from as src in the AC rule, but connection events showed its a pull function initiated from the clients, after correcting that it seems to be working as expected.

Review Cisco Networking products for a $25 gift card