SCOR Chapter11 EndPointSecurity
SCOR Chapter11 EndPointSecurity
Introduction
Chapter 11.
Endpoint AMP for Endpoints
Protection and
Detection
Threat Response
1
6/17/2024
Endpoint
Detection and
Response (EDR)
2
6/17/2024
ETDR
& EDR
Reduce
Prevent Detect Risk
• Antivirus • Static analysis • Vulnerable software
• Fileless malware detection • Sandboxing • Low prevalence
• Cloud lookups (1:1, • Malicious Activity • Proxy log analysis
1:many) Protection
• Client Indicators of • Machine learning
Compromise
• Device flow correlation
• Cloud Indicators of
Compromise
3
6/17/2024
4
6/17/2024
Talos
Talos AMP Cloud Threat Grid
Endpoint
Continuous Monitoring
What happened?
Where did the malware come from?
What is it doing?
10
5
6/17/2024
OUTBREAK CONTROL
11
OUTBREAK CONTROL
When a custom detection defined,
any AMP for Endpoints agents seen
the files before can also quarantine
the files through retrospection/cloud
recall.
Simple custom detection allows
you to add file signatures.
The advanced custom detections
are more like traditional antivirus
signatures.
12
6
6/17/2024
OUTBREAK CONTROL
Creating a simple custom
detection is similar to adding
new entries to a blacklist.
You define one/more files to
quarantine by building a list of
SHA-256 hashes.
If you already have the SHA-
256 of a file, you can paste that
directly into the UI.
You can upload files directly,
allow the cloud to create the
SHA-256 hash.
13
OUTBREAK CONTROL
Offer many more signature types
to the detection, based on ClamAV
signatures:
14
7
6/17/2024
OUTBREAK CONTROL
• Use Android custom detections for two main functions:
outbreak control & application control.
• You don’t have to use these detections just for malware, also
use them to stop applications that you don’t want installed on
devices. (“application control”)
15
• Outbreak control IP lists used in conjunction with device flow correlation (DFC) detections.
• Policies used to specify the behavior of AMP when a suspicious connection detected.
• To specify whether the connector should use addresses in the Cisco intelligence feed/ the custom IP lists
you create yourself, or Both.
16
8
6/17/2024
IP Blacklists -
Whitelists
17
18
9
6/17/2024
19
• Blocking list with an existing application hash shown at the bottom of the right-hand
column, while another file being uploaded for hash calculation.
20
10
6/17/2024
Exclusion Sets
21
22
11
6/17/2024
Selecting the OS for the New AMP for Endpoints Exclusion Set
23
24
12
6/17/2024
AMP for
Endpoints
Connectors
25
26
13
6/17/2024
27
28
14
6/17/2024
29
30
15
6/17/2024
31
AMP for Endpoints Events dashboard, displaying the most recent events in your AMP for Endpoints deployment.
32
16
6/17/2024
33
Suspicious File
Analysis Report
AMP for Endpoints Threat Grid
34
17
6/17/2024
THREAT RESPONSE
• “One-pane-of-glass” console that automates integrations
across Cisco security products & threat intelligence sources.
• Integrates with:
• AMP
• AMP for Endpoints
• Threat Grid
• Umbrella
• Email Security
• NGFW
• NGIPS
35
18