This document outlines compatibility details and product update information of AMP for Endpoints regarding the Microsoft Security Updates and Knowledge Base articles (KB4072699, KB4056892) released on January 3, 2018 to address the Meltdown and Spectre vulnerabilities (CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754). This information is applicable to AMP for Endpoints Windows Connectors deployed on the public AMP Cloud and AMP Private Cloud environments.
This Microsoft Security Update comes with changes that may break compatibility with antivirus software. Microsoft has instituted a new requirement that security vendors validate compatibility with the security update before accepting the security update for installation.
With the complexity of the issue and number of vendors involved in the response, Cisco is providing the following guidance for customers to decide how to apply and upgrade their Cisco AMP for Endpoints software and underlying operating system. Customers must also review the applicability of any required hardware patches, which is not covered by this document.
The Cisco AMP for Endpoints engineering team has tested and verified compatibility with the following versions of the AMP for Endpoints software on the supported Microsoft operating systems.
Table 1 – Verified AMP for Endpoints Connector Versions
AMP Private Cloud
Cisco AMP for Endpoints v5.1.11
Public AMP Cloud
Cisco AMP for Endpoints v4.4.4
Cisco AMP for Endpoints v5.0.7
Cisco AMP for Endpoints v5.0.9
Cisco AMP for Endpoints v5.1.1
Cisco AMP for Endpoints v5.1.3
Cisco AMP for Endpoints v5.1.5
Cisco AMP for Endpoints v5.1.7
Cisco AMP for Endpoints v5.1.9
Cisco AMP for Endpoints v5.1.11
Cisco AMP for Endpoints v5.1.13
Cisco AMP for Endpoints v6.0.5
Table 2 – Verified Operating Systems
Microsoft Windows 7 SP1
Microsoft Windows 8.1
Microsoft Windows 10
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Note: Versions not listed are either no longer supported by the AMP for Endpoints Connector and/or not supported by Microsoft and the released Security Updates.
Complete resolution of the vulnerabilities may require hardware patches provided by each vendor. Cisco Engineering has validated on hardware from multiple hardware vendors, but you must validate for the specific hardware deployed within your environment.
Customers are required to upgrade to a version of the Cisco AMP for Endpoints Connector that has been tested and verified to be compatible with the Microsoft Security Update (see Table 1, Table 2). In addition, customers will need to manually set the required compatibility registry key detailed in Microsoft KB4056892 after verifying all third-party endpoint security software installed on the endpoint is compatible.
Once the compatibility registry key is set, the underlying operating system will allow the installation of the released Microsoft Security Updates.
Ensure the deployed Cisco AMP for Endpoints Windows Connectors are a compatible and verified version (see Table 1, Table 2)
Validate compatibility of all third-party endpoint security software installed on the endpoint
Set the required compatibility registry key to allow the Microsoft Security Update to be applied (KB4056892)
Thoroughly test the deployment on staging systems prior to deployment in production environments.
Research and test any patches required by your hardware vendor.
It is highly recommended customers validate and test in a staging environment with all endpoint security software deployed prior to setting the compatibility registry key in a production environment. Inadvertently setting the compatibility registry key on devices with third-party endpoint security software incompatible with the Microsoft Security Update may result in a Blue Screen of Death (BSOD).
Caveats and Considerations
Customers should be aware of the following:
Customers must validate compatibility of all endpoint security software installed in your environment prior to setting the compatibility registry key.
The registry key is not specific to Cisco AMP for Endpoints. Setting the compatibility registry key will allow the Microsoft Security Update to be applied without validation of additional third-party endpoint security software running on the device.
Devices may experience a BSOD if the registry key is set when incompatible third-party endpoint security software is deployed.
Full resolution of the vulnerabilities may require hardware patches released by each vendor. Testing in your environment should include software and hardware patches.
I am wanting to make sure I log all users who connect to anyconnect and send the data to a syslog server. What I need to do is capture the IP of the user, login credentials (user), with a date and time stamp.What is the easiest method for doing this?...
I am a web developer trying to have an issue resolved that I believe is either hardware or networking issue, but all sides of communication indicate they have checked what they need to, yet it still has not been resolved. We have a connection setup u...
Hello, I have in environment ISE 2.2 patch 14 on SNS3495. We tried to migrate from ACS, but during window maintenance, Cisco ISE show errors with message: "Reached TACACS+ maximum client limit".Debuggind prrt-server.log, we can see the message:...
Good day,I am a security analyst trying to tame the log traffic from our firewall (2 FTD 4140 + FMC). I have had a CCNA in the past but primarily worked in systems so I am familiar with networking protocols and concepts but inexperienced at troubleshootin...
I have 2 new FPR-1010 According to the documentation, on the first boot, I should get a EULA prompt and then a "Manage the device locally? (yes/no) [yes]: no"https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp1010/firepower-1010-g...