Secure Endpoint User Guide
Secure Endpoint User Guide
Note: The organization switcher is a great feature of Secure Endpoint that allows
a user belong to multiple organizations and switch between them. However, there
can be some unexpected behavior related to this. When you first log in to Cisco
XDR, Secure Client Cloud Management, or Orbital, you are assigned a session
for the Secure Endpoint organization that you are logged in to. If you switch organ-
izations in Secure Endpoint, the organization is NOT switched in Orbital or Secure
Client Cloud Management. To switch organizations in Cisco XDR, Orbital or
Secure Client Cloud Management, you must log out of those systems, then log in
again and select the organization you want to use.
Threat Severity
Threat severity is represented by color-coded tags that appear in the interface on pages such as the
Dashboard Tab, Inbox, and Events to provide quick insight into the most important compromises.
Threat severity levels assigned to individual event types are evaluated by Cisco’s threat research
team and may vary depending on how threats appear in combination with each other.
Dashboard Tab
The Dashboard tab offers a view of threat activity in your organization over the past 14 days, as well
as the percentage of compromised computers and the status of items in your Inbox. You can create,
edit, or reset any Filters for the Dashboard and Inbox tab views. The Time Period selection applies to
all the data in the Dashboard tab.
You can click the Refresh All button to load the most current data on the page or set an interval for the
data to reload automatically by clicking the Auto-Refresh button. Select a time interval of 5, 10, or 15
minutes for the data to be loaded. When the Auto-Refresh is active, a check mark will be present on
the button. To stop the page from refreshing, click the check mark to clear it.
In addition to heat map views for Compromised Computers, Quarantined Detections, and Vul-
nerabilities, you can also find a summary of other information including:
l Automated submissions and retroactive threat detections through Secure Malware Analytics
(formerly Threat Grid), if you have configured Automatic Analysis of Low Prevalence Execut-
ables.
l Statistics on the number of files scanned and network connections logged by your Secure End-
point connectors.
Each of these filters may be applied alone or as a combination of filters. Compromise observables and
compromise event type filters apply only to compromise-related information. Any of the page filters
applied here will also apply to the Inbox tab.
Select groups, observables, event types and the time period you want to see then click New Filter to
create a custom filter. You can assign a name to the filter, select whether to receive immediate, hourly,
daily, or weekly email alerts, and set the filter as the default view of your Dashboard and Inbox tabs.
Once you have saved a custom filter you can select it from the drop down, edit the selected filter, or
reset the view to the default with no filters applied.
Use the edit button next to the filter name to modify or delete the selected filter.
Compromises
By definition, compromises represent potentially malicious activity that has been detected by Secure
Endpoint that has not been quarantined but that may require action on your part. Compromises are dis-
played through a heat map showing groups with compromised computers and a time graph showing
the number of compromises for each day or hour over the past 14 days. Click the Inbox link to view the
compromises on the Inbox and take steps to resolve them.
Click on a group in the heat map to drill down into that group and show child groups. You can also drill
down by date/time, compromise observable, and/or compromise event type. Drilling down will also
change the view of the rest of the items on the Dashboard tab, including the Quarantined Detections
and Vulnerabilities heat maps. Click on one of the bars in the time graph to filter the dashboard view to
the specific day that the selected compromises occurred. Note that selecting a custom time period by
doing this “grays out” and disables the Auto-Refresh button. Click the Reset button or select a time
period from the drop down menu to re-enable the Auto-Refresh button.
The resulting view will exclude data for all other observables in the % compromised, Compromises,
and Compromise Event Types.
As long as an observable is selected, only that observable will be applied to the page. You can
deselect the selected observable by clicking on the blue X on the upper right-hand side of the Sig-
nificant Compromise Observables box.
You can mute an observable type by clicking the bell icon so that the Dashboard or Inbox won’t show
data associated with it.
You can also manage the muted observables by clicking on the cog icon.
Unmute the observable by clicking on the bell icon. Unless the global checkbox is filled, muting of
observables will only affect the user account for which the change was made. You can mute the
observable for all user accounts by filling the global checkbox. You can add an explanation for globally
muting the event after filling the checkbox.
Once you mute an observable, it will not appear in the Significant Compromise Observables list. It will
also not be included in the compromise-related data that appears on the Dashboard or the Inbox. If
you mute an observable, it will remain muted until you unmute it using the cog icon. Muting will carry
over to subsequent visits to the Dashboard or Inbox.
You can also quickly view information and access commonly used functions in a popup by clicking dir-
ectly on an observable in the second column (such as IP address, URL, or file SHA-256). The type of
observable selected determines the information displayed in the popup.
Tip: Popups aren’t limited to the Dashboard tab. You can click observables any-
where in the Console interface to display a popup.
You can mute an event type by clicking the bell icon so the Dashboard or Inbox won’t show data asso-
ciated with it.
You can also view the event types that are muted by clicking the cog icon.
Unmute the event type by clicking the bell icon. Unless the global checkbox is filled, muting of events
will only affect the user account for which the change was made. You can mute the event for all user
accounts by filling the global checkbox. You can add an explanation for globally muting the event after
filling the checkbox.
Once you mute an event, it will not appear in the Compromise Event Types list. It will also not be
included in the compromises data that appears on the Dashboard or the Inbox. If you mute an event, it
will remain muted until you unmute it using the cog icon. Muting will carry over to subsequent visits to
the Dashboard or Inbox.
You can view information about a detected event type by clicking on the event type name. Selecting a
compromise event type will exclude data for all other event types in % compromised, Compromises,
and Compromise Observables while that event type is selected.
As long as a compromise event type is selected, only that event type will be applied to the page. You
can deselect the selected event type by clicking on the blue X on the upper right-hand side of the Com-
promise Event Types box.
If the event type is an indication of compromise the description of the IOC will be displayed along with
the tactics and techniques associated with it. Click the Indicators link to see a filtered view of the Indic-
ators page.
Quarantined Detections
Quarantined detections are potential compromises or malicious events that were detected and suc-
cessfully quarantined so do not require any additional attention. They are depicted through a heat map
showing groups with computers on which malicious activity was detected, as well as a time graph
showing the number of quarantines during the selected period.
Click on a group in the heat map to drill down into that group and show child groups. Drilling down will
filter the data that appears on the Dashboard tab - including the Compromises and Vulnerabilities heat
maps - to show the selected groups or child groups.
Clicking the bars in the time graph will filter the dashboard view to the specific date and time (from 14-
day to two-minute increments) on which the selected quarantines occurred. You can also click the
Quarantine Events link to see a filtered view of the Events showing all quarantines. From there you
can restore any files that you feel were quarantined by mistake.
Note: Files remain in quarantine for 30 days or when the quarantine folder
reaches 100 MB and the oldest files are purged. Quarantined files can no longer
be restored after they are purged.
Vulnerabilities
Vulnerabilities are displayed through a heat map that shows groups that include computers with
known vulnerable applications installed.
Click on a group in the heat map to drill down into that group and show child groups. Drilling down will
also filter the data that appears on the Dashboard tab - including the Compromises and Quarantined
Detections heat maps - to show the selected groups or child groups. Click the View button to go to the
Vulnerabilities page.
Inbox
The Inbox is a tool that allows you see compromised computers in your organization and track the
status of compromises that require manual intervention to resolve. Compromises represent potentially
malicious activity detected by Secure Endpoint that has not been quarantined and may require action
on your part.
Note: Items in your Inbox are retained for 30 days. You will not be able to see any
compromises older than 30 days regardless of their status.
Filters
Use the filter bar to select a specific time range or group to display on the Inbox page.
1. Select one of the predefined time ranges or specify a custom range.
l Select the start date and time and end date and time if you select Custom.
2. Select the group you want to focus on. Leave this field blank to show all groups.
3. Select Only isolated to display the computers that are currently isolated.
4. Select Saved filters and click Save applied filters to save frequently used filters for future use.
Click Manage saved filters to edit or delete any of your saved filters.
Click Reset all to remove applied filters and return to the default view.
The rest of the page is divided into the Summary section and the table with a list of Compromised Com-
puters.
l Compromised Groups
You can click on any element in these charts to filter the view of the page to view details and more
granular information about a compromise. The Filters will change to reflect your current view as you
click different elements. You can save the current view as a saved filter or click Reset all to return the
page to the default view.
Compromises Over Time
Compromises are displayed on a time graph that shows the number of compromises for each day or
hour from the last 30 days. Each bar in the graph represents one or more compromises.
Click a bar in the graph to filter the view to a 24 hour period around the bar. Click the bar again to filter
the view to a 60 minute period around the bar. The other charts and the compromised computer table
on the page will also change to filtered views matching the bars you click.
Compromised Groups
Compromised groups displays groups with compromised computers and the number of computers in
each group with compromises.
Click on a group to view details about the group and filter the page to show only the compromised com-
puters in that group.
Compromise Event Types
Compromise event types describe events that Secure Endpoint has detected. Event types include file,
network, and connector activity. The table shows the severity, event type, and number of computers
affected for each. Click the Severity header to change the order the list is sorted.
You can also click the bell icon to mute an event type. Muted events will no longer be displayed in the
Dashboard or Inbox. Click the View muted link to show a list of muted events. Click the bell icon to
unmute the event type. Muting events will only affect the user account for which the change was made
unless the Global checkbox is filled. You can add an explanation for globally muting the event after
filling the checkbox.
Once you mute an event, it will not appear in the Compromise Event Types list, other sections of the
Inbox, or the compromises data that appears on the Dashboard. If you mute an event, it will remain
muted until you unmute it using the cog icon. Muting will carry over to subsequent visits to the Dash-
board or Inbox.
Click a row to show detailed information on the event type and filter the page view to only show activity
related to the event.
Click the Actions button to take action on the event type. You can change the status of all instances of
the event type, mute the event type, or navigate to the events page to view all instances of the event
type in your organization.
Significant Compromise Observables
Compromise observables are files, IP addresses, or URLs associated with compromises in the spe-
cified time period. The top 100 most significant compromise observables are listed in order of pre-
valence.
Click on a compromise observable to filter the Inbox view by the selected observable. The resulting
view will exclude data for all other observables in the % compromised, Compromises, and Com-
promise Event Types. As long as an observable is selected, only that observable will be applied to the
page.
You can also click the bell icon to mute an event type. Muted events will no longer be displayed in the
Dashboard or Inbox. Click the View muted link to show a list of muted events. Click the bell icon to
unmute the event type. Muting events will only affect the user account for which the change was made
unless the Global checkbox is filled. You can add an explanation for globally muting the event after
filling the checkbox.
Once you mute an event, it will not appear in the Compromise Event Types list, other sections of the
Inbox, or the compromises data that appears on the Dashboard. If you mute an event, it will remain
muted until you unmute it using the cog icon. Muting will carry over to subsequent visits to the Dash-
board or Inbox.
Click an event to view a menu of actions to take. The menu varies by the observable type to allow you
to investigate further and take additional actions.
Compromised Computers
Click a card to filter the compromised computer table to show only the computers with that status. The
table can also be sorted by compromise event Threat Severity or latest activity.
The most severe compromise event and then the volume of events determines the order when sorting
by severity. For example, when sorting by severity a computer with one critical severity event will be
shown before a computer with ten high severity events.
Click the cog in the top right corner of the table to show or hide table columns.
Bulk Actions
Select one or more computers using the checkboxes at the far left of each row. Use the checkbox in
the heading row to select all computers in the list. You can move the computers to different Groups or
change the Inbox status of the computers.
Computer Actions
Click the contextual menu icon at the far right of a row to show the computer actions menu. Note that
some actions are only available if features have been enabled in Policies
Compromise Details
Click on a computer name to open the compromise details drawer. This includes:
l Computer details.
l Connector information.
l Antivirus status.
l Chronological list of compromise events. Click an event to open the Device Trajectory with the
l Network Threats links to Dashboard Tab (filtered by Device Flow Correlation Threat Detected,
Click any of the blue items in each of the sections to navigate directly to the relevant page in the con-
sole.
You can hover the mouse cursor over stacked bar graphs to display a more detailed view of the data.
You can also filter the displayed data by selecting from the Groups drop-down menu in the top-right
corner of the page. You can click the Refresh All button to load the most current data on the page or
set an interval for the data to reload automatically by clicking the Auto-Refresh button. Click the drop-
down menu attached to the button to select a time interval of 5, 10, or 15 minutes for the data to be
loaded. When the Auto-Refresh is active, a check mark will be present on the button. To stop the page
from refreshing, click the check mark to clear it.
Note: You can view muted event types in the Compromise section of the Over-
view tab by clicking the cog button which appears when there are muted events.
Events
The Events page initially shows the most recent events in your Secure Endpoint deployment. Nav-
igating to the page by clicking on a threat, IP address, or computer name in the Dashboard will provide
different filtered views.
Filters and Subscriptions
Filters are shown at the top of the Events tab. You can select a previously saved filter from the drop-
down on the right side or add event types, groups, or specific filters from existing events. To remove a
filter criteria, click the x next to the item you want to remove. You can also sort the Events list in
ascending or descending order based on criteria from the drop-down list. Click the Reset button to
remove all filter criteria or click the Save Filter As button to save the current filtered view.
Note: The Time Range filter is set to one week by default if you have fewer than
10,000 connectors deployed. If you have more than 10,000 connectors deployed it
will be set to one day.
When viewing a saved filter, you can update the filter and click Save New to save the changes as a
new filter or click Update to overwrite the existing filter.
To subscribe to a filter view click the Not Subscribed button to show a menu with subscription timing
options. You can subscribe to events with immediate, hourly, daily, weekly, or monthly notifications.
There are options to receive immediate alerts as one email per event, or a single email digest con-
taining approximately 5 minutes of events.
Once you have selected the notification frequency click Update to save your settings. If you no longer
want to receive notifications for a filter view, switch the notification frequency to Not Subscribed and
click Update.
SHA-256 File Info Context Menu
Clicking on a SHA-256 in the Secure Endpoint console will display a context menu that allows you to
see additional information and perform several actions. The context menu displays the current dis-
position of the SHA-256 as well as the specific filename associated with it. You can also see how
many vendors detect the file according to VirusTotal. The longest common name used for the file on
VirusTotal is also displayed.
Note: When Casebook is enabled, the SHA-256 File Info Context Menu is
replaced by the Pivot Menu.
You can copy or view the full SHA-256 value or perform a search for that SHA-256 to see where else it
was seen in your organization. You can also launch File Trajectory for the SHA-256 or submit it for File
Analysis.
The Outbreak Control sub-menu also allows you to quickly add the SHA-256 to one of your outbreak
control lists. Options are available here to add the SHA-256 to new or existing Custom Detections -
Simple, Application Control - Blocked Applications, or Application Control - Allowed Applications.
Investigate Observable will take you to the investigate tab of Cisco XDR with a view focused on the
specific observable.
Note: Unprivileged users will not have access to all items on the context menu.
Event List
The event list shows the name of the computer that had a detection, the name of the detection, the
most recent action taken, and the time and date of the event. If there were any command line argu-
ments associated with the even they will also be displayed. Click on an event to view more detailed
information on the detection, connector info, and any comments about the event. In the detailed view,
you can access context menus through the information icon. The context menu for a computer entry
allows you to launch the Device Trajectory for that computer or open the Computer Management
page. The context menu for a file entry is the same as the SHA-256 File Info Context Menu. Click the
Analyze button to retrieve the file and send it for File Analysis. File Repository must be enabled to
retrieve the file. If a file was quarantined, you can choose to restore the file for that computer or for all
computers that quarantined it. Files remain in quarantine for 30 days and after that cannot be restored.
Note: If the Analyze button is not available, it may be that the file has already been
submitted, the File Repository is not enabled, or the current user is not an admin-
istrator.
Click an entry with a filter icon to filter the list view by entries with matching fields. You can also use the
Export to CSV button to request events in CSV files. You will receive an email with a link to download
an archive file containing the CSV files when it is generated. You can also use the API with an applic-
ation like Splunk to create an event stream for large numbers of events.
Note: You will get the option to cancel and restart the request if you click the
Export to CSV button again while a previously requested CSV file is still being gen-
erated.
Note: All dates and times in the exported CSV file will be in UTC regardless of
your Time Zone Settings.
Observables
Any files, hosts, and IP addresses involved in the event will be listed. You can initiate a request to
upload any observed files to the File Repository for analysis. There are also links to File Trajectory and
Device Trajectory wherever applicable.
Observed Activity
This provides a summary of all the activity that was part of the detected attack. It includes file, process,
registry, and network events around the detection that you can use as part of your incident response
analysis.
Action
Actions (if any) performed by the connector on components of the event and the outcome of the action
are listed. Actions include file quarantines, ending processes, and uploading files for analysis. Actions
will only be taken if Behavioral Protection is in Protect mode.
iOS Clarity Tab
Navigate to the Dashboard and select the iOS Clarity tab. If you have already linked your Meraki SM
or other Mobile Device Manager (MDM) this tab displays a summary of activity, a list of the most
recently observed applications on your managed iOS devices, and a list of devices that have not repor-
ted back in more than 7 days.
Content Alerts
Content Alerts provides a brief overview of malicious and blocked sites that were observed in the last
7 days. These alerts are generated whether the Conviction Modes on the device is set to Audit, Block,
or Active Block. You can click the Events link to see a filtered view of the Events showing only these
events.
The Apps tab shows the top five apps on your devices were observed connecting to malicious IPs or
addresses from Network - IP Block & Allow Lists and how many times each app attempted a con-
nection in the last 7 days. You can click the name of any app to view a context menu showing the app
name and publisher along with other options, including a link to the Mobile App Trajectory for that app.
The Devices tabs shows the top five devices that attempted to connect to malicious IPs or addresses
from Network - IP Block & Allow Lists and how many times each device attempted a connection in the
last 7 days. There are also icons that will take you to a filtered view of the Events for that device and
the Device Trajectory.
The IPs tab shows the top five malicious or blocked IP addresses that your devices attempted to con-
nect to in the last 7 days. You can click an IP address to view details including Virus Total results or
you can investigate the file in Cisco XDR.
Recently Observed Apps
The Recently Observed Apps list displays the name of the app, number of devices it was observed on,
the bundle ID, and a link to view the app in the Mobile App Trajectory. You can also switch views
between Real Data from your organization and Demo Data.
Click the bundle ID to activate a menu that displays the app name, package name, and publisher
name. You can also copy the package name or search your Secure Endpoint data for other apps with
matching activity. You can click any bundle ID displayed in the Secure Endpoint Console to show this
menu.
Unseen Devices
Unseen Devices shows iOS devices that have not reported back in 7 days or more. If more than 10
devices are in the list they will be summarized by group. Click a group name to see a filtered view of
the Computers page showing a list of devices that have not reported in more than 7 days.
Outbreak Control
Secure Endpoint offers a variety of lists, referred to as Outbreak Control, that allow you to customize it
to your needs. The main lists are: Simple Custom Detections, Blocked Applications, Allowed Applic-
ations, Advanced Custom Detections, and IP Blocked and Allowed Lists. These will be discussed in
the sections that follow.
Custom Detections - Simple
A Simple Custom Detection list is similar to a blocked list. These are files that you want to detect and
quarantine. Not only will an entry in a Simple Custom Detection list quarantine future files, but through
Retrospective it will quarantine instances of the file on any endpoints in your organization that the ser-
vice has already seen it on.
To create a Simple Custom Detection list, go to Outbreak Control > Simple. Click Create to create a
new Simple Custom Detection, give it a name, and click Save.
After you save the Simple Custom Detection, click Edit and you will see three ways to add values to
this list.
You can add a single SHA-256 and create a note about the file. You can upload a file (up to 20 MB)
and the SHA-256 will be taken from the file and you can add a note. You can also upload a set of SHA-
256s. When uploading a set of SHA-256s, they must be contained in a text file with one SHA-256 per
line. The SHA-256s and notes can be seen if you click the Files included link on the bottom right. If
you added a SHA-256 that you did not intend to, you can click Remove. You can also edit the name of
the list and click Update Name to rename it.
Note that when you add a Simple Custom Detection, it is subject to caching as specified under the
Cache tab in your Policies. The default length of time a file is cached depends on its disposition, as fol-
lows:
l Clean files: 7 days
Note: You cannot add any file that is on our global allowed list or is signed by a cer-
tificate that we have not revoked. If you have found a file that you think is incor-
rectly classified, or is signed and want us to revoke the signer, please contact
Support.
Click the View All Changes link to see the Audit Log with all records filtered to show only Simple Cus-
tom Detection entries. Click View Changes next to a single Simple Custom Detection list to view the
Audit Log with all records filtered to show only the records for that specific detection list.
Custom Detections - Advanced
Advanced Custom Detections are like traditional antivirus signatures, but they are written by the user.
These signatures can inspect various aspects of a file and have different signature formats. Some of
the available signature formats are:
l MD5 signatures
l Logical signatures
l Icon signatures
After you create the Advanced Custom Detection set, click Edit and you will see the Add Signature
link. Enter the name of your signature and click Create.
After all of your signatures are listed, select Build a Database from Signature Set. If you accidentally
add a signature you did not want, you can delete it by clicking Remove.
Note: Any time you add or remove a signature you MUST click Build a Database
from Signature Set.
Note that when you create an advanced custom detection for a file, it is subject to caching for an hour.
If a file is added to an advanced custom detection set, the cache time must expire before the detection
will take effect. For example, if you add an advanced custom detection for an unknown file 5 minutes
after it was cached, the detection will not take effect for another 55 minutes.
To create an Android Custom Detection list, go to Outbreak Control > Android. Click Create to create
a new Android Custom Detection, give it a name, and click Save.
After you save the custom detection, click Edit and you can add an app by uploading its APK file. Once
you have finished adding apps to the list, click Save.
Click the View All Changes link to see the Audit Log with all records filtered to show only Android Cus-
tom Detection entries. Click View Changes next to a single Android Custom Detection list to view the
Audit Log with all records filtered to show only the records for that specific detection list.
Application Control - Blocked Applications
A blocked applications list is composed of files that you do not want to allow users to execute but do
not want to quarantine. You may want to use this for files you are not sure are malware, unauthorized
applications, or you may want to use this to stop applications with vulnerabilities from executing until a
patch has been released.
Note: Any SHA-256 value can be added to an blocked applications list, but only
executable type files will be prevented from opening.
In order to create an blocked applications list, go to Outbreak Control > Blocked Applications. Click
Create to create a new blocked applications list, give it a name, and click Save.
After you save the blocked applications list, click Edit and you will see three ways to add values to this
list.
You can add a single SHA-256 and create a note about the file. You can upload a file (up to 20MB)
and the SHA-256 will be taken from the file and you can add a note, or you can upload a set of SHA-
256s. When uploading a set of SHA-256s they must be contained in a text file with one SHA-256 per
line. The SHA-256s and notes can be seen if you click the Files included link on the bottom right. If
you accidentally added a SHA-256 that you did not want to, click Remove. You can also edit the name
of the list and click Update Name to rename it.
Note that when you add a file to a blocked applications list that it is subject to caching. If the file is not
in your local cache and you have On Execute Mode set to Passive in your policy it is possible that the
first time the file is executed after being placed in your blocked application list it will be allowed to run.
On Execute Mode can run in two different modes: Active or Passive. In Active mode, files and scripts
are blocked from being executed until a determination of whether or not it is malicious or a timeout is
reached. In Passive mode, files and scripts are allowed to be executed and in parallel the file is looked
up to determine whether or not it is malicious. in your policy will prevent this from occurring.
If the file is already in your local cache you will have to wait until the cache expires before application
blocking takes effect. The length of time a file is cached for depends on its disposition and the length of
time specified under the Cache tab in your Policies. The default values are as follows:
l Clean files: 7 days
If a file is added to an blocked applications list, the cache time must expire before the detection will
take effect. For example, if you add an unknown file to a list 5 minutes after it was cached, the detec-
tion will not take effect for another 55 minutes.
Click the View All Changes link to see the Audit Log with all records filtered to show only blocked
application entries. Click View Changes next to a single blocked application list to view the Audit Log
with all records filtered to show only the records for that specific blocked list.
Application Control - Allowed Applications
Allowed applications lists are for files you never want to convict. Some examples are a custom applic-
ation that is detected by a generic engine or a standard image that you use throughout the company.
To create an allowed applications list, go to Outbreak Control > Allowed Applications. Next click
Create to create a new allowed applications list, give it a name, and click Save.
After you save the allowed applications list, click Edit and you will see three ways to add values to this
list.
You can add a single SHA-256 and create a note about the file. You can upload a file (up to 20 MB)
and the SHA-256 will be taken from the file and you can add a note, or you can upload a set of SHA-
256s. When uploading a set of SHA-256s, they must be contained in a text file with one SHA-256 per
line. You can see the SHA-256s and notes by clicking on the Files included link on the bottom right. If
you added a SHA-256 that you did not want to, click Remove. You can also edit the name of the list
and click Update Name to rename it.
Click the View All Changes link to see the Audit Log with all records filtered to show only allowed
applications list entries. Click View Changes next to a single allowed applications list to view the Audit
Log with all records filtered to show only the records for that specific allowed list.
Network - IP Block & Allow Lists
IP block and allow lists are used with device flow correlation to define custom IP address detections.
After you have created your lists you can then define in policy to use them in addition to the Cisco Intel-
ligence Feed or on their own.
The lists can be defined using individual IP addresses, CIDR blocks, or IP address and port com-
binations. When you submit a list redundant addresses are combined on the back end.
Note: IP block and allow lists can contain a maximum of 60,000 items, where each
item can be a unique address or CIDR block.
To add a port to a block or allow list regardless of IP address, you can add two entries to the appro-
priate list where XX is the port number you want to block:
0.0.0.1/1:XX
128.0.0.1/1:XX
The Host Firewall provides network blocking capabilities similar to IP Block & Allow Lists but rules are
stored at the endpoint instead of the Secure Endpoint Cloud. This overcomes key IP Block and Allow
Lists disadvantages including:
l All network flows at the endpoint are considered, instead of only some flows during the lifetime
of a process.
l Network connections that should be blocked are blocked immediately upon attempt to connect
Cloud.
IP Block Lists
An IP block list allows you to specify IP addresses you want to detect any time one of your computers
connects to them. You can choose to add single IP addresses, entire CIDR blocks, or specify IP
addresses with port numbers. When a computer makes a connection to an IP address in your list the
action taken depends on what you have specified in the The Network tab contains settings to for the
network flow capabilities of your connectors, such as device flow correlation settings. section of your
policy.
IP Allow Lists
An IP allow list enables you to specify IP addresses you never want to detect. Entries in your IP
allowed list will override your IP blocked list as well as the Cisco Intelligence Feed. You can choose to
add single IP addresses, entire CIDR blocks, or specify IP addresses with port numbers.
IP Isolation Allow Lists
An IP isolation allow list lets you specify IP addresses that the Secure Endpoint Windows and Mac con-
nectors will not block when an endpoint is isolated. This allows the endpoint to communicate with trus-
ted locations within your network for further investigation during an active Endpoint Isolation session.
You can add up to 200 IPV4 addresses to this list. IP isolation allow lists do not support port numbers.
Note: By default, all Secure Endpoint Cloud addresses are included in the allow
list so the connector can receive policy updates, perform cloud lookups, and
update the isolation status.
Create IP Block and Allow Lists
Note: IP block and allow lists can contain a maximum of 60,000 unique
IP addresses.
To create an IP list:
1. Navigate to Outbreak Control > IP Block & Allow Lists.
2. Click Create IP List... This displays the New IP List page.
3. Enter the name and description for the new list.
4. Select Allow, Block, or Isolation Allow from the List Type drop-down list.
5. Enter one IP address or CIDR block per row.
6. Click Add Row to add a single row.
Click Add Multiple Rows... to add multiple IP addresses and CIDR blocks. You can enter or paste a list
of IP addresses and CIDR blocks into the dialog then click Add Rows when you are done.
You can also upload a CSV file containing IP addresses and CIDR blocks separated by newline char-
acters. To upload the file:
1. Click Upload...
2. Click Browse to select your CSV file.
3. Click Upload.
Edit IP Block and Allow Lists
Note: IP block and allow lists can contain a maximum of 60,000 items, where each
item can be a unique address or CIDR block.
To edit an IP list:
1. Navigate to Outbreak Control > IP Block & Allow Lists.
2. Click the + next to the IP list you want to edit to expand the view.
3. Click Edit.
Note: If there are fewer than 500 items on the list, you will see the default list
editor to edit, add, and remove rows. If there are 500 or more items on the list, you
will see the long list editor that allows you to navigate and edit large lists, but does
not include live input validation.
Click Save when you are finished. If you are using the long list editor, any invalid items will appear in
the IPs / CIDR Blocks with Errors list where you can edit the items before attempting to save the list
again.
Note: You can click Revert Changes at any time to restore the IP list to its uned-
ited state.
To upload and replace an existing list, expand the view of the IP list you want to upload, then click
Replace... Click Browse to select the file containing the list, then click Replace.
Device Control
Available for:
l Secure Endpoint Windows connector 8.1.3 and later.
Note: WPD support is available for 8.2.1 and later. The Windows connector does
not currently support Device Control on ARM architecture.
Device Control lets you view and have control over the usage of USB devices, including Windows Port-
able Devices (WPD) across your organization. With visibility, you can see the devices connected to
endpoints. For instance, when investigating a compromise in device trajectory, you can see device
control events like blocked devices. Such events can also be filtered and visualized within the events
page.
With granular control, you can create rules so that only approved USB devices are used in your envir-
onments. As organizations have their own preferences on how to manage USB devices, Secure End-
point offers granular rules that can support a variety of configurations and use cases.
For instance, you can define general policies (e.g. block read/write/execute), while creating granular
rules that allow certain types of devices based on device properties. Rules can be re-ordered to adjust
for the desired order of enforcement, and are assigned to policies, allowing for a balance between
ease of management (with shared rule sets across policies) or granular control (with different rule sets
for each policy and group).
Only administrators can create a new Device Control configuration. Unprivileged users can manage
configurations they have been given permission to in Access Control. They are able to add, update,
delete, and reorder rules in a configuration and add configurations to policies they can access.
Device Control configurations and rules
Device Control rules are part of a configuration. A Device Control configuration is added to a policy so
they will be processed by endpoints in the groups that use that policy.
There is no audit mode for Device Configuration. A configuration for Device Control can be created to
only collect USB mass storage devices and WPDs that are attached and do not restrict access to the
device. Create a configuration with a Base Rule of Read, Write and Execute. All USB mass storage
devices and WPDs will be allowed and events visible on the Events page and in Device Trajectory.
Note: There is no option for Read, Write, and Execute for WPD because execute
is currently unsupported.
Create a Device Control configuration
Only administrators can create new Device Control configurations.
8. Click Save.
A configuration without any rules will affect all devices of the configuration type. Add rules to your con-
figuration for additional granularity to allow or block specific USB mass storage devices. For example,
you could create a configuration that blocks all USB mass storage devices but allows read and write
access to devices from a specific vendor.
Add a rule to the configuration
You can add up to 1000 rules to a single configuration. You will need at least one of the following iden-
tifiers to create a rule:
Identifier
Criteria Description
Vendor
Also known as the manufacturer name.
name
Product
Also known as the friendly name or device name.
name
Note: Serial numbers are not used as criteria because they are an optional field
for USB manufacturers and therefore unreliable.
You can add a rule to a configuration from the Device Control page, from a Device Control event on
the Event List, or from a Device Control event in Device Trajectory.
Permission Description
Block Do not allow the endpoint to access the device in any way.
Only allow the endpoint to read files from the device. Note
Read Only that users can still manually copy a file from the device onto
the endpoint and write to or execute it.
Allow the endpoint to read and write files on the device. Note
Read and
that users can still manually copy a file from the device onto
Write Only
the endpoint and execute it.
Allow the endpoint full access to the device. Not available for
Read, Write,
WPD because this version does not currently support
and Execute
execute.
Add a Configuration to a Policy
A configuration must be assigned to a policy for it to be processed by your endpoints. You can add the
configuration to a policy in one of two ways.
1. Go to Management -> Policies. Edit the desired policy and navigate to the Windows Connector:
Device Control tab. Select the configuration from the pulldown and save the policy.
2. From the Device Management page select the configuration you want to add to a policy. Click
Assign to Policies and select one or more policies to assign the configuration to.
Note: You can assign multiple configurations to a policy, but only one per con-
figuration type.
Known Issues and Limitations
l Device Control is currently limited to USB mass storage devices and Windows Portable
Devices connected via USB.
l Device Control may require reboots when upgrading/uninstalling the connector under certain
conditions. If Device Control has been enabled on the endpoint at least once, this will install the
Device Control driver on the endpoint and one or more of the following scenarios occurs:
l (Upgrades) When there are pre-existing external devices while upgrading to version
8.2.1, you may need to reboot for WPD support to work as expected.
l (Uninstalling) When the driver cannot cleanly detach from external devices that are cur-
Host Firewall is available with Secure Endpoint Advantage and Premier packages.
Supported connector versions:
l Secure Endpoint Windows connector 8.4.2 and later
Note: The Windows connector does not currently support Host Firewall on ARM
architecture.
Note: Secure Endpoint Host Firewall registers with Windows Security Center but
will not disable Windows Firewall rules and the macOS firewall cannot be dis-
abled. If either firewall has a block rule in place it will be enforced.
l Assess - Firewall configurations are assigned to endpoints at the policy level. Ensure policies
and groups are structured accordingly based on the need for different configurations.
l Identify - Document or gather existing documentation to identify the traffic you intend to block or
allow. This may include reviewing existing 3rd party firewall policies to copy into Secure End-
point.
l Plan - Map out which rules should be in which configuration or policy and in what order. Con-
sider whether configurations should have a default block or default allow.
l Test - Set firewall rules to Audit mode to test them. This will not take any action on the traffic but
it will create log entries so you can review how the rules would have been applied to real traffic
once they are enforced.
l Document - Document the reasons rules are created or changed. Use the Secure Endpoint
audit log or add notes to firewall rules to assist with this.
l Deploy - Ensure rules are set to Enforce and the configuration is Enabled within a policy to
enforce a configuration.
Create Host Firewall Configurations then Host Firewall Rules once you are satisfied with your pre-
parations. You will need to enable Host Firewall under the Host Firewall tab in a policy.
See Host Firewall Logs for information on how to view and interpret the log files.
Host Firewall Configurations
Host Firewall configurations are made up of one or more rules. Configurations are assigned in Policy.
Host firewall configurations and rules can be viewed by all users but can only be created by admin-
istrators. Administrators and users who have been assigned permissions can edit the configuration.
l Default Action - Whether the configuration will block or allow traffic by default if not specified by
a rule.
l Rules - The number of rules assigned to the configuration.
l Policies - The number of policies to which the configuration has been assigned. You can click
the number to view the names of the policies and groups using the configuration.
l Groups - The number of groups that use the policies to which the configuration has been
assigned. You can click the number to view the names of the policies and groups using the con-
figuration.
l Computers - The number of computers in the groups using the configuration.
l Last Modified - The time stamp when the configuration was last modified.
Click the cog in the top right corner of the table to show or hide table columns.
Click the contextual menu icon at the far right of a row to show the configuration actions menu.
Create a Configuration
1. Navigate to Management -> Host Firewall.
2. Click New configuration.
3. Enter a unique Name to help you identify the configuration.
4. Enter a Description for the configuration (optional).
5. Select Allow or Block as the default rule action for the configuration. The default action will
apply to any network traffic not explicitly handled by any of the rules in your configuration. Allow
will let endpoints communicate with any IP address except for the ones you specifically block in
rules. Block will prevent endpoints from communicating with all IP addresses except for the
ones you specifically allow in rules.
6. Click Save.
7. Create Host Firewall Rules for your configuration.
8. Add the configuration to your policy in the Host Firewall tab.
Host Firewall Rules
You can add up to 500 rules to Host Firewall Configurations.
l Mode - Shows if the rule is in Audit or Block. Audit will create log entries when the rule matches
any network traffic on the endpoint but no Action will be applied. Enforce will create log entries
when the rule matches network traffic and will enforce the specified Action.
l Action - Whether the rule will Allow or Block matching traffic.
l Direction - Whether the traffic is coming in to the endpoint, out from the endpoint, or any.
l Local IP - Local IP addresses, ranges, or CIDR blocks associated with the rule.
l Remote IP - Remote IP addresses, ranges, or CIDR blocks associated with the rule.
Click the cog in the top right corner of the table to show or hide table columns.
Click the contextual menu icon at the far right of a row to show the rules actions menu.
Search Rules
You can search the rules in the current configuration by:
l Rule name - Exact and partial matches.
l IP address - Exact and partial matches for IPv4 and IPv6 addresses.
l Partial IP address searches will return rules with IP addresses and CIDR blocks that
Note: Leading zeroes in IPv6 addresses are omitted when they are saved so you
should omit leading zeroes when searching for a partial IPv6 address.
Create and Edit Rules
1. Click Add rule to create a new rule for the configuration.
2. Enter a unique Rule name to identify the rule.
3. Assign a Position to the rule. Rules are applied from the top down and processing will stop
when the first match is reached.
l Top will insert the new rule at the top of the list.
l After will insert the new rule after the existing rule you specify.
l Before will insert the new rule before the existing rule you specify.
Note: Audit is helpful to test new rules. You can see which action
would have been taken if the rule was set to Enforce.
l Enforce will create log entries when the rule matches network traffic and will enforce the
specified Action.
5. Select the Action for the new rule. Any network traffic that matches the Direction, Protocol,
Local IP/CIDR, Local ports, Remote IP/CIDR, and Remote ports specified in the rule will be
allowed or blocked depending on the Action you specify.
6. The Direction specifies if the rule will apply to:
l Traffic from your endpoints (Out).
l TCP.
l UDP.
Note: macOS does not provide local IP address and local port inform-
ation for UDP flows. Rules for the UDP protocol you intend to apply
to configurations applied to Mac policies should not contain local
address or local port criteria. The UDP traffic will appear as having
0.0.0.0 for the local IP address and 0 for the port. Rules with specific
local addresses or local ports will fail to match the rule intended and
instead be handled by the default action.
7. IP family allows you to select if the addresses in the rule will be IPv4, IPv6, or both. Your selec-
tion determines which local and remote IP/CIDR fields are shown for steps 8 and 10.
8. Local IPv4/CIDR can be a single IP address, CIDR block, or range of addresses (IPv4 only). If
you leave this field blank the rule will apply to any remote IP address. Maximum of 50 entries
per rule where one entry is a single IP address, a CIDR block, or a range. Maximum of 50
entries per rule where one entry is a single IP address, a CIDR block, or a range.
Local IPv6/CIDR can be a single IP address or a CIDR block. If you leave this field blank the
rule will apply to any local IP address. Maximum of 50 entries per rule where one entry is a
single IP address or CIDR block.
9. Local ports allows you to specify that the rule should only apply to traffic in or out from a certain
port on your endpoints (maximum 200 characters). It will apply to any port if you leave this field
blank. You can specify:
l A single port.
10. Remote IPv4/CIDR can be a single IP address, CIDR block, or range of addresses (IPv4 only).
If you leave this field blank the rule will apply to any remote IP address. Maximum of 50 entries
per rule where one entry is a single IP address, a CIDR block, or a range. Maximum of 50
entries per rule where one entry is a single IP address, a CIDR block, or a range.
Remote IPv6/CIDR can be a single IP address or a CIDR block. You can also specify a range of
addresses (IPv4 only). If you leave this field blank the rule will apply to any remote IP address.
Maximum of 50 entries per rule where one entry is a single IP address or CIDR block.
11. Remote ports allows you to specify that the rule should only apply to traffic in or out from a cer-
tain port on remote computers (maximum 200 characters). It will apply to any port if you leave
this field blank. You can specify:
l A single port.
12. Application paths let you specify if the rule will apply to specific Windows or Mac applications.
You can enter one Mac or Windows application per line. Wildcards are supported:
l * character in a path will match only to the next specified character.
l * character at the end of a path will match to the next specified character but not in sub-
directories.
l ** at the end of a path will match all subdirectories. You cannot use ** in the middle of a
path.
Note: Windows application paths must start with a drive letter, such as C:\,
and include the full name of the application with a .exe extension unless
you use wildcards. Mac application paths must start with the / character.
Paths cannot start with a wildcard.
13. You can enter any Comments about the rule or leave the field blank.
14. Click Save to save the rule to the configuration.
Note: Edited rules will be applied to the endpoint as soon as you save them.
You can click the three dots to the right of the rule if you want to edit or delete it.
Move a rule to a higher position in the list to increase the precedence of the rule.
Note: There is no way to undo the action after you release a rule into a new pos-
ition. You must manually move the rule back to its original position if you do not
want to change the order.
Host Firewall Logs
Host Firewall logs are stored on the endpoint in FirewallLog.csv. This is a comma-separated file that is
rotated when it reaches a file size of 25 MB. The current log file and nine previous log files are kept in:
l <install directory>\Cisco\AMP\<Connector version>\FirewallLog.csv on Windows.
l /Library/Logs/Cisco/FirewallLog.csv on macOS.
Host Firewall logs are included in Computer Management: Connector Diagnostics files that can be
retrieved from the File Repository.
Note: Events are retrieved from Windows and macOS system logs. The number
of events stored is dependent on the operating system log retention settings.
Host Firewall interacts in different ways with the Windows Security Firewall, macOS Firewall, and
Secure Endpoint Network settings. The Host Firewall log result may differ from the actual action on the
endpoint in certain cases.
macOS Firewall
This table describes the outcomes of Host Firewall and macOS Firewall both enabled on an endpoint.
If both Host Firewall and IP Block and Allow lists are used, Host Firewall judges independently from IP
Block and Allow Lists. IP addresses with unknown disposition (regardless of Firewall judgment) are
queried for disposition; when query dispositions identify malicious IPs, existing and future connections
to the malicious IP will be dropped and reported to the Secure Endpoint Console.
UDP Flows
macOS does not provide local IP address and local port information for UDP flows. Rules for the UDP
protocol should not contain local address or local port criteria. The UDP traffic will appear as having
0.0.0.0 for the local IP address and 0 for the port. Rules with specific local addresses or local ports will
fail to match the rule intended and instead be handled by the default action.
TCP Flows
When a TCP connection is initiated, the local IP address and local port information may not be avail-
able from macOS. When the endpoint is not in isolation and the connections are not known malicious,
Host Firewall allows these TCP connections to finish initializing (without allowing data transfer) such
that macOS can retrieve the required information for Host Firewall to judge the flow.
Since the connection will only be written to the Host Firewall log file after it has made a judgement, if
the required information for Host Firewall to judge a flow was not available and the connection failed to
complete, no log entry will appear in the Host Firewall log.
Note: Any files located in a directory that has been added to an exclusion list will
not be subjected to application blocking, simple custom detections, or advanced
custom detection lists.
See Best practices for Secure Endpoint Exclusions for further information on creating exclusions.
Configuring Compatibility for Antivirus Products
To prevent conflicts between the connectors and antivirus or other security software, you must create
exclusions so that the connector doesn’t scan your antivirus directory and your antivirus doesn’t scan
the connector directory. This can create problems if antivirus signatures contain strings that the con-
nector sees as malicious or issues with quarantined files.
Click any exclusion set to expand its details. You can click View Changes in this view to see changes
made to just that particular set.
Note: You may not be able to see certain groups or policies depending on the per-
missions you have to them.
You can also choose to edit or delete the exclusion set from here.
Note: You can only delete exclusion sets that are not in use by a policy. The
Delete button will be greyed-out (disabled) if the exclusion set is in use by at least
one policy.
To create a custom exclusion set, click New Exclusion Set. This will display a dialog from which you
can select whether the exclusions will be for Secure Endpoint Windows, Secure Endpoint Mac, or
Secure Endpoint Linux connectors. Click Create.
The new exclusion set is pre-filled with default exclusions. Enter the name for the new exclusion set in
the provided field.
Select the exclusion type you would like to add by clicking the empty drop-down menu. (See Exclusion
Types)
After selecting the exclusion type, enter the path, threat name, file extension, process, or wild cards for
file names, extensions, or paths. Click Add Exclusion if you want to add more exclusions to the set, or
if you are finished, click Save. Click Revert Changes any time you want to revert to the last saved ver-
sion of the exclusion set.
You can also quickly add multiple exclusions at a time by clicking Add Multiple Exclusions... You can
then enter or paste a list of exclusions into the following dialog, then click Add Exclusions when you
are done. Exclusion types will be automatically detected when possible and added to the exclusion
set. Any exclusions that aren’t detected will be added to the set with a blank exclusion type. For these,
you must manually select the exclusion type from the drop-down menu.
Note: You can use wild cards when adding multiple exclusions.
After saving, the exclusion set is displayed for review. From here, you can click Edit to make further
changes to the set, click View Changes to review the changes made to the exclusion set, or click
Delete to remove the set. You can also click to navigate to any of the groups or policies that are
assigned to the exclusion set.
Exclusion Types
You can create exclusions based on a threat name, the path to a file, by file extension, by process, or
by executable name. Wildcard exclusions are path or file extension exclusions that allow you to use
wildcard characters as part of the exclusion.
Threat Exclusions
Threat exclusions let you exclude a particular threat name from being quarantined. You should only
ever use a Threat exclusion if you are certain that the events are the result of a false-positive detec-
tion. In that case, use the exact threat name from the event as your Threat exclusion. Be aware that if
you use this type of exclusion even a true-positive detection of the threat name will not be detected
and quarantined or generate an event.
Path Exclusions
Path exclusions are the most frequently used, as application conflicts usually involve excluding a dir-
ectory. You can create a path exclusion using an absolute path or the CSIDL. For example, if you
wanted to exclude an antivirus application in the Program Files directory, you could enter the exclu-
sion path as:
C:\Program Files\MyAntivirusAppDirectory
Note: You do not need to escape “space” characters in a path. For some non-Eng-
lish languages, different characters may represent path separators. The con-
nectors will only recognize '\' characters as valid path separators for exclusions to
take effect.
If some computers in your organization have the Program Files directory on a different drive or path,
you can use a KNOWNFOLDERID instead. The above exclusion path would instead be:
Note: Path exclusions will prevent the Secure Endpoint connector from scanning
all files and subdirectories in the directory specified.
Note: The KNOWNFOLDERID values are case sensitive. For example, you must
use FOLDERID_ProgramFiles and not FolderID_programfiles.
MDB
Wildcard Exclusions
Wildcard exclusions are the same as path or extension exclusions except that you can use an asterisk
character as a wild card within the path (including CSIDL paths) or extension. For example, if you
wanted to exclude your virtual machines on a Mac from being scanned you might enter this path exclu-
sion:
/Users/johndoe/Documents/Virtual Machines/
However, this exclusion will only work for one user, so instead replace the username in the path with
an asterisk and create a wild card exclusion instead to exclude this directory for all users:
You can also choose Apply to all drive letters for Windows wildcard exclusions. This will apply the
exclusion to all mounted drives.
Note: If the file size of the process is greater than the Maximum Scan File Size lim-
its the size of files that are scanned by the connector. Any file larger than the
threshold set will not be scanned. set in your policy, then the SHA-256 of the pro-
cess will not be computed and the exclusion will not work. Use a path-based pro-
cess exclusion for files larger than the maximum scan file size.
For connector versions 7.5.3 and later you can exclude processes by specifying Wildcard Exclusions
for the process executable path. The wildcard can be used to represent any number of characters in a
single directory. You should only use the wildcard to cover the minimum number of characters
required to provide the needed exclusion. The wildcard can also be used alongside characters within
a directory to narrow down the exclusion even further.
You can also use a double wildcard to exclude subfolders in a path. This can only be used at the end
of a process exclusion.
l * character at the end of a path will match to the next specified character but not in sub-
directories.
l ** at the end of a path will match all subdirectories. You cannot use ** in the middle of a path.
Child processes created by an excluded process are not excluded by default. For example, if you cre-
ated a process exclusion for MS Word, by default any additional processes created by Word would still
be scanned and appear in the Device Trajectory along with any network traffic from the application.
This could be useful if you don’t want to see every time MS Word runs in the Trajectory, but you want
to see if a malicious Word document launches another application like a command shell. However, if
you do not want any child processes to be scanned or appear in Device Trajectory along with their net-
work traffic, you can fill the checkbox Apply for child processes.
You can check the list of Protected Processes and exclude any from protection by specifying its
executable name in the application exclusion field. Executable exclusions must match the executable
name exactly in the format name.exe. Wildcards are not supported.
Note: Any executables you exclude from exploit prevention will need to be restar-
ted after the exclusion is applied to the connector.
IOC Exclusions
IOC exclusions allow you to exclude Cloud Indications of Compromise. This can be useful if you have
a custom or internal application that may not be signed and causes certain IOCs to trigger frequently.
Select IOC from the exclusion type pulldown then select the name of the IOC you would like to
exclude. You can also search the list by partial strings.
Note: If you exclude a high or critical severity IOC you will lose visibility into it and
could leave your organization at risk. You should only exclude these IOCs if you
experience a large number of false-positive detections for it.
You can exclude processes by specifying the full (absolute) path to the process executable and the
user name of the process. If you specify both the path and the user for a process exclusion, then both
conditions must be met for the process to be excluded. If you leave the user field blank then the exclu-
sion will apply to any process running the specified program.
For connector versions 1.15.2 and later you can exclude processes by specifying Wildcard Exclusions
for the process executable path. The wildcard can be used to represent any number of characters in a
single directory. For example, if you wanted to exclude all versions of Java from being scanned you
could enter this path exclusion:
You should only use the wildcard to cover the minimum number of characters required to provide the
needed exclusion. The wildcard can also be used alongside characters within a directory to narrow
down the exclusion even further. For example, if you wanted to exclude only a certain version of java
from being scanned you could enter this path exclusion:
Child processes created by an excluded process are not excluded by default. For example, if you cre-
ated a process exclusion for Java, by default any additional processes created by Java would still be
scanned and appear in the Device Trajectory along with any network traffic generated from the pro-
cesses. This could be useful if you don’t want to see every time Java runs in the Trajectory, but you
want to see if a malicious Java app launches another application like a shell. However, if you do not
want any child processes to be scanned or appear in Device Trajectory along with their network traffic,
you can fill the checkbox Apply for child processes.
You can also use a double wildcard to exclude subfolders in a path on Linux connector 1.24.4 and
later and Mac connector 1.24.0 and later. This can only be used at the end of a process exclusion.
l * character at the end of a path will match to the next specified character but not in sub-
directories.
l ** at the end of a path will match all subdirectories. You cannot use ** in the middle of a path.
Each row displays the operating system, exclusion set name, the number of exclusions, the number of
groups using the exclusion set, and the number of computers using the exclusion set. You can use the
search bar to find exclusion sets by name, path, extension, threat name, or SHA-256. You can also fil-
ter the list by operating system by clicking on the respective tabs.
Antivirus Compatibility Using Exclusions
To prevent conflicts between the connector and antivirus or other security software, you must create
exclusions so that the connector doesn’t scan your antivirus directory and your antivirus doesn’t scan
the connector directory. This can create problems if antivirus signatures contain strings that the con-
nector sees as malicious or issues with quarantined files. You can add appropriate Cisco-Maintained
Exclusions to your Policies or create your own Custom Exclusions.
See Best practices for Secure Endpoint Exclusions for further information on creating exclusions.
Creating Exclusions in Antivirus Software
In addition to creating exclusions for antivirus products in the connector, you must also create exclu-
sions for the connector in antivirus products running on your endpoints. Consult your antivirus soft-
ware documentation for instructions on excluding files, directories, and processes from being
scanned.
See the Secure Endpoint Troubleshooting TechNotes for additional instructions on creating exclu-
sions for the connector in various antivirus software.
Note: This is the default install directory. If you have specified a custom install dir-
ectory, that directory must be excluded.
For antivirus products that require a full path to the executable file for exclusions, you should exclude
all binary files in the C:\Program Files\Cisco\AMP\[connector version]\ directory.
For example:
l C: \ Pr ogr am Fi l es \ Ci s c o\ AMP\ [ c onnec t or v er s i on] \ Connec t i v i t y Tool . ex e
l C: \ Pr ogr am Fi l es \ Ci s c o\ AMP\ [ c onnec t or v er s i on] \ c r epor t . ex e
l C: \ Pr ogr am Fi l es \ Ci s c o\ AMP\ [ c onnec t or v er s i on] \ i ps uppor t t ool . ex e
l C: \ Pr ogr am Fi l es \ Ci s c o\ AMP\ [ c onnec t or v er s i on] \ i pt r ay . ex e
l C: \ Pr ogr am Fi l es \ Ci s c o\ AMP\ [ c onnec t or v er s i on] \ s f c . ex e
l C: \ Pr ogr am Fi l es \ Ci s c o\ AMP\ [ c onnec t or v er s i on] \ uni ns t al l . ex e
l C: \ Pr ogr am Fi l es \ Ci s c o\ AMP\ [ c onnec t or v er s i on] \ updat er . ex e
l C: \ Pr ogr am Fi l es \ Ci s c o\ AMP\ c l amav \ [ c l am v er s i on] \ f r es hc l am. ex e
l C: \ Pr ogr am Fi l es \ Ci s c o\ AMP\ c l amav \ [ c l am v er s i on] \ f r es hc l amwr ap. ex e
Where [connector version] is in the most recently installed version number of the connector and [clam
version] is the most recent version of the ClamAV engine.
If your antivirus product requires a full path to executable files, you should exclude all binary files in /op-
t/cisco/amp/bin/ including:
l / opt / c i s c o/ amp/ bi n/ ampdaemon
View Changes will take you to a filtered view of the Audit Log showing all the changes for that specific
policy. You can also use View All Changes at the top of the page to show changes to all policies.
Click Edit or the policy name to modify an existing policy or click Duplicate if you want to create a new
policy with the same settings.
You can also download the XML file, which contains the specific policy for the connector using the
Download XML button. The connector installer contains the policy by default and this should only be
used in specific troubleshooting scenarios.
Click New Policy... to create a new policy. Next, choose whether you want to create a policy for:
l Secure Endpoint Windows
Note: You cannot access the Outbreak Control, Product Updates, and Advanced
Settings pages for the new policy before completing these configuration pages.
Conviction Modes
Conviction Modes specify how the connector responds to suspicious files, network activity, and pro-
cesses. Setting Files to Audit will stop the Secure Endpoint connector from quarantining any files. This
setting only applies to version 3.1.0 and higher of the Secure Endpoint connector.
Note: When File Conviction Mode is set to Audit, any malicious files on your end-
points will remain accessible and be allowed to execute. Application blocking lists
will also not be enforced. You should only use this setting for testing purposes with
proprietary software.
The Malicious Activity Protection engine defends your endpoints from ransomware attacks by identi-
fying malicious actions of processes when they execute and stops them from encrypting your data.
Audit logs the event but will not take action on the detected process. Quarantine mode quarantines the
detected process, and Block stops the process from executing. You can also set the engine to Monitor
Network Drives. See Engines for details.
System Process Protection protects critical Windows system processes from being compromised
through memory injection attacks by other processes. Protect blocks attacks on critical Windows sys-
tem processes.
Script Protection will block malicious script files from executing when in Quarantine mode. Audit mode
will create an event when a malicious script is executed but will not prevent it from executing.
The Exploit Prevention engine defends your endpoints from memory injection attacks commonly used
by malware and other zero-day attacks on unpatched software vulnerabilities. Audit mode is available
in connector version 7.3.1 and later. Earlier versions of the connector will treat Audit mode the same
as Block mode. You can also set Exploit Prevention to use a standard or aggressive profile under the
Engines tab in Advanced Settings.
Note: If you disable Exploit Prevention you will have to restart any of the protected
processes. See Protected Processes for the list of protected processes.
Script Control prevents certain DLLs from being loaded by some applications and their child pro-
cesses. In Block mode, the engine will kill a process if it or one of its child processes attempts to load
certain DLLs. Audit mode will create events when the activity is detected but won’t kill any processes.
Behavioral Protection helps prevent malicious activity that matches a set of behavioral signatures by
alerting on activity, quarantining files, and ending processes in Protect mode. Audit mode will create
events when matching activity is detected but will not take any actions.
Enable Event Tracing for Windows will improve the detection of malicious activity on your endpoints
when Behavioral Protection is enabled. When the setting is active your Secure Endpoint Windowscon-
nectors will make the following changes to the Windows Audit Policy on each endpoint:
l Audit User Account Management Success - enabled
The connector will enforce these settings on every Heartbeat Interval to ensure continued monitoring.
This setting only applies to Secure Endpoint Windowsconnector 7.3.5 and later running on Windows
10 or Windows Server 2019 and later.
Note: The Windows Audit Policy settings need to be reset on each endpoint if you
disable event tracing.
Detection Engines
You can enable additional detection engines to protect the endpoint from malware without connecting
to the Cisco Cloud to query each file.
TETRA is a full antivirus replacement and should never be enabled if another antivirus engine is
installed. TETRA can also consume significant bandwidth when downloading definition updates, so
caution should be exercised before enabling it in a large environment. More TETRA settings are avail-
able in Advanced Settings > TETRA.
Exclusions
You can select exclusion sets to apply to the policy here. All new Windows policies include Cisco-Main-
tained Exclusions for certain components of the Windows operating system. This set of exclusions
cannot be removed. You can choose other Cisco-Maintained Exclusions to add to the policy depend-
ing on the applications present in the policy group and add your Custom Exclusions to the policy.
Click the drop-down menu for either the Cisco-maintained exclusions or your custom exclusions and
fill the checkboxes to select exclusion sets. See Exclusions for more information.
Proxy
Complete your proxy configuration on this page.
Proxy Type is the type of proxy you are connecting to. The connector will support http_proxy, socks4,
socks4a, socks5, and socks5_hostname.
Proxy Host Name is the name or the IP address of the proxy server. Only IPv4 addresses are sup-
ported.
PAC URL allows you to specify a location for the connector to retrieve the proxy auto-config (PAC) file.
Note: The URL must specify HTTP or HTTPS when defined through policy and
only ECMAScript-based PAC files with a .pac extension are supported. If the PAC
file is hosted on a Web server, the proper MIME type of application/x-javascript-
config must be specified.
Use Proxy Server for DNS Resolution (Windows only) lets you specify whether all connector DNS
queries should be performed on the proxy server.
Proxy Authentication is the type of authentication used by your proxy server. Basic and NTLM authen-
tication are supported.
Proxy User Name is used for authenticated proxies. This is the user name you use to connect.
Note: If NTLM is selected as the proxy authentication type, this field must be in
domain\username format.
Proxy Password is used for authenticated proxies. This is the password you use with the Proxy User-
name.
Host Firewall
Host Firewall allows you to monitor, control, and secure IPv4 and IPv6 network traffic across your
environment from a single place, operating as a critical function within Secure Endpoint to enhance
the overall security of your organization.
Host Firewall is available with Secure Endpoint Advantage and Premier packages.
Supported connector versions:
l Secure Endpoint Windows connector 8.4.2 and later
Note: The Windows connector does not currently support endpoint isolation on
ARM architecture.
You can enable or disable Host Firewall for connectors that use the policy. You must select a Host
Firewall Configuration when you enable it for the policy. The configuration will be applied to con-
nectors as soon as you save the policy.
The configuration will be removed from connectors as soon as you disable the setting and save the
policy.
Note: Network - IP Blocked & Allowed Lists will only work if you set Network to
Block or Audit in Conviction Modes.
If there are IP allow or block lists available, you can click Select Lists to choose the ones you want to
add to the policy. Fill the check boxes of all the lists you want to add from the drop-down menu. You
can add multiple IP lists to a single policy; however, IP allowed list entries will override IP blocked list
entries.
The aggregate count of items added to a policy through combined lists cannot exceed 60,000 unique
items, where each item is a unique IP address or CIDR block. For example, you can add one IP list
with 20,000 unique items and a second list with 40,000 unique items but you cannot add one list with
50,000 unique items and a second list with 20,000 unique items. Duplicate addresses will be removed
during processing.
Windows Connector: Device Control
Add any Device Control configurations to your policy. Select the configuration from the drop-down to
add it. You can only add one configuration per policy.
Windows Connector: Product Updates
When a product update is available, you can choose whether or not to update your endpoints on a per-
policy basis. You will see an entry in the Product Version drop-down menu showing which version you
are going to and it will populate the Update Server so you can see where the files will be pulled from.
There will also be information to show how many connectors in groups that use the policy will require a
reboot after updating. There will be an option to update Orbital only if you have enabled Orbital and
selected With Connector under the Update Schedule.
You can then define the window in which updates are allowed to occur by choosing a Date Range. In
Date Range, click Start to select a date and time for your start window and End to select a date and
time for your end window. You can also select This Month to set the date range from the current day to
the end of the current month, Next 7 Days to set the range to the next 7 days, or Next 30 Days to set
the range to the next 30 days. The Update Interval allows you to specify how long your connectors will
wait between checks for new product updates, including Orbital updates. This can be configured
between every 30 minutes to every 24 hours to reduce network traffic.
Between the times set in the Date Range, if a connector calls home to pick up a policy, it will pick up
the product update. Because the connector calls home at an interval dependent on the Heartbeat Inter-
val, you will want to plan your Update Window accordingly; that is, make sure the interval specified in
the Update Window is larger than the Heartbeat Interval.
If you are updating to version 4.3 or later of the Secure Endpoint Windows connector you will be
presented with different reboot options. As of version 4.3 some updates may not require a reboot to
take effect.
Check Block Update if Reboot Required to prevent the connector from updating if the update requires
a reboot. This is useful for servers or high-availability computers for which you would prefer to perform
the update manually if a reboot is required. Optionally, you can set a new update window for a period
where some downtime is acceptable. See this article for specific update reboot requirements.
Note: Starting with Secure Endpoint Windows connector 7.x.x, upgrading the con-
nector from 7.x.x to any newer version should no longer require a reboot to com-
plete. While most upgrades will not require a reboot, there may be occasional
instances where a reboot is still required. For a list of circumstances that require a
reboot, see Secure Endpoint Windows Connector Update Reboot Requirements.
Reboot presents the options Do not reboot, Ask for reboot from the user, or Force reboot after..., which
allows you to choose a Reboot Delay.
Send Filename and Path Info will send the filename and path information to Secure Endpoint so that
they are visible in the Events, Device Trajectory, and File Trajectory. Unchecking this setting will stop
this information from being sent.
As of Windows connector 8.1.1, policy updates happen immediately but if the connector is unable to
reach the Cisco cloud when an update occurs, it will default to the Heartbeat Interval to get updates.
The Heartbeat Interval is the frequency with which the connector calls home to see if there are any
files to restore via Retrospective or by the administrator.
Connector Log Level and Tray Log Level allow you to choose between default and debug (verbose)
logging levels. The default level should be set unless debug is requested by support during
troubleshooting.
Note: When Connector Log Level is set to Debug, it can cause log files to con-
sume an additional 550 MB of drive space.
Enable Connector Protection allows you to require a password to uninstall the connector or stop its ser-
vice.
Connector Protection Password is the password you supply to Connector Protection to stop the con-
nector service or uninstall it.
Note: If you include any special characters in the password, you must escape the
characters when entering the password in a command prompt or PowerShell on
the endpoint.
Automated Crash Dump Uploads allows you to choose whether to automatically upload connector
crash dump files to Cisco for analysis.
Command Line Capture (Secure Endpoint Windows connector 5.0 and higher) allows the connector to
capture command line arguments (including usernames, filenames, passwords, etc.) used during file
execution and send the information to Secure Endpoint. This information will be displayed in Device
Trajectory for administrators as long as they have single sign-on (such as Security Cloud sign-on) or
Two-Factor Authentication enabled.
Note: Command Line Capture may truncate exceptionally long command line
arguments. Contact Support if this is an issue.
If Command Line Capture is enabled and Connector Log Level is set to Debug, you can use Com-
mand Line Logging to log captured command line arguments to the local connector log file on the end-
point.
Note: If you change this setting, your connectors will have to be restarted before it
takes effect.
Cloud Notifications are balloon pop-ups that come from the Windows system tray when the connector
is successfully connected to the cloud. It displays the number of users and detections registered to the
cloud.
Hide Exclusions suppresses the display of configured exclusions from the connector user interface.
(Available on Secure Endpoint Windows connector versions 5.1.3 and higher)
Allow User to Update TETRA Definitions enables a button on the Secure Endpoint Windows con-
nector UI to update TETRA definitions on demand. (Available for Secure Endpoint Windows connector
versions 7.2.11 and higher)
Monitor File Copies and Moves is the ability for the connector to give real-time protection to files that
are copied or moved.
Monitor Process Execution is the ability for the connector to give real-time protection to files that are
executed.
Verbose History (Windows connector 5.1.9 or higher only) controls whether or not Secure Endpoint
Windows connectors will write verbose history information to the history.db file.
On Execute Mode can run in two different modes: Active or Passive. In Active mode, files and scripts
are blocked from being executed until a determination of whether or not it is malicious or a timeout is
reached. In Passive mode, files and scripts are allowed to be executed and in parallel the file is looked
up to determine whether or not it is malicious.
Although Active mode gives you better protection, it can cause performance issues. If the endpoint
already has an antivirus product installed it is best to leave this set to Passive.
Maximum Scan File Size limits the size of files that are scanned by the connector. Any file larger than
the threshold set will not be scanned.
Maximum Archive Scan File Size limits the size of archive files that are scanned by the connector. Any
archive file larger than the threshold set will not be scanned.
Cache
SHA-256 values are cached to reduce cloud lookup traffic. The amount of time a value is cached
depends on the disposition of the file the last time a cloud lookup was performed on its SHA-256.
While a file is cached, the connector will always consider its disposition to be what it was the last time
a cloud lookup was performed. For example, if a SHA-256 is in an application blocking list and the TTL
is 3600 seconds, that application will continue to be blocked from execution by the connector for the
next hour even if the administrator removes it from the application blocking list.
Malicious Cache TTL is the time for which a file with a malicious disposition will be cached before
another cloud lookup is performed when a connector sees that SHA-256 value. The default value is 1
hour.
Clean Cache TTL is the time for which a file with a clean disposition will be cached before another
cloud lookup is performed when a connector sees that SHA-256 value. The default value is 1 week.
Unknown Cache TTL is the time for which a file with an unknown disposition is cached before another
cloud lookup is performed when a connector sees that SHA-256 value. The default value is 1 hour.
Application Blocking TTL is the time for which a file that is in an Application Control - Blocked Applic-
ations list is cached before another cloud lookup is performed when a connector sees that SHA-256
value. The default value is 1 hour.
Note: If you add a SHA-256 with a clean disposition that was previously seen by a
connector to an application blocking list, you must stop the connector and delete
the cache.db file from the installation directory on that computer for the application
to be blocked from executing. Otherwise, you will have to wait until the TTL for the
clean file expires and another cloud lookup is performed by the connector before
the application is blocked from executing.
Endpoint Isolation
Endpoint Isolation lets you block incoming and outgoing network activity on a Windows computer to
prevent threats such as data exfiltration and malware propagation.
Note: The Windows connector does not currently support Endpoint Isolation on
ARM architecture.
Allow DNS allows the endpoint to perform DNS lookups while it is isolated. The connector will auto-
matically add the address of the DNS server configured in the endpoint’s network settings to the allow
list. You will need to add the addresses of your DNS servers to the allow list manually if you turn this
setting off.
Allow DHCP allows the endpoint to send and receive traffic on UDP ports 67 and 68 so it can obtain or
renew a DHCP lease. You can safely turn this off if you use static IP addresses. You will need to add
the addresses of your DHCP servers to the allow list manually if you turn this setting off.
Allow use with proxy is provided for advanced users with specific proxy configuration needs. This fea-
ture is useful if you have a proxy to manage internal/secure communication that is distinct from a more
generic internet proxy. However, if you choose to use a proxy you must ensure the Secure Endpoint
Cloud infrastructure is allowed to send and receive traffic through that proxy on connector versions
before 7.5.1.
Note: An isolated endpoint with Allow use with proxy turned on can still send and
receive network traffic through the proxy if the proxy is in the IP isolation allow list.
In most cases this negates the effects of isolation and leaves the endpoint
exposed. If the proxy is not specified on your IP isolation allow list, the endpoint
cannot communicate with the Secure Endpoint Cloud on connector versions
before 7.5.1, in which case you can only Stop a Windows Isolation Session From
the Command Line on the endpoint. Connector versions 7.5.1 and later retain the
ability to communicate with the Cisco cloud from behind the proxy when isolated.
We recommend careful network testing before rolling out isolation with a proxy
enabled.
You can specify the IP Allow Lists the connector will use during an isolation session. Use the Select
Lists drop-down to specify the IP Isolation Allow Lists to use with this policy.
Orbital
Note: Orbital is available for customers with Secure Endpoint advantage package
or higher.
Orbital allows you to query endpoints for detailed information wherever you have Orbital deployed. For
details on using Orbital, see the Orbital documentation at https://orbital.amp.cisco.com/help/.
Note: The Windows connector does not currently support Endpoint Isolation on
ARM architecture.
To enable Orbital in a policy, select the Enable Orbital Advanced Search check box, then click Save.
Orbital will be installed on any computers running Windows 10 1709 or later and Windows Server
2012, 2012 R2, 2016 and later that have not previously had the feature enabled. The connector will
send an event to the Secure Endpoint console once the installation has completed successfully. The
install interval for Orbital is the same as the Update Interval setting under Windows Connector:
Product Updates (default value: 1 hour).
The Update Schedule allows you to define if Orbital will be updated automatically whenever a new ver-
sion is available or scheduled under Windows Connector: Product Updates.
You can force an Orbital update in connector version 7.4.5 and higher using the following command
from the connector install directory using an account with administrator permission:
sfc.exe -forceOrbitalUpdate
This command will remove any cached versions that failed and retry the current version.
Note: If you disable Orbital for a policy, it will disable the service but it will not unin-
stall Orbital from your endpoints. Enabling it again will restart the service.
Engines
Monitor Network Drives allows you to set the Malicious Activity Protection engine to detect malicious
activity from the local computer affecting network drives. Note that this setting may cause slowness
when monitoring network drives over a VPN. Consider putting users who regularly access network
drives over a VPN into a group that uses a policy with this setting disabled. This setting only applies to
Secure Endpoint Windows connector version 6.3.1 and later.
Note: If the Malicious Activity Protection engine detects activity on a network drive
it will be able to block and quarantine the local process but it will not quarantine
the file from the network drive.
Script Control sets the Script Protection behavior. Default ties the Script Control setting to the same
setting as Exploit Prevention under the Modes and Engines tab. You can use the block, audit, and dis-
abled settings to keep Script Control behavior separate from the Exploit Prevention behavior.
Note: Exploit Prevention must be enabled to use this feature. These settings only
apply to Secure Endpoint Windows connector 7.3.5 and later. Earlier versions will
use the same setting as Exploit Prevention.
ETHOS and SPERO are both considered generic engines. Because of this, the user has the ability to
control how false positive-prone an ETHOS or SPERO hash is.
ETHOS
ETHOS is the Cisco file grouping engine. It allows us to group families of files together so if we see
variants of a malware, we mark the ETHOS hash as malicious and whole families of malware are
instantly detected.
ETHOS can be resource intensive so it is limited to scanning files up to 5MB on version 6.2.1 and
higher of the Secure Endpoint Windows connector. When ETHOS does On Copy/Move scanning, the
connector allows the copy or move to complete and then queues another thread to calculate the
ETHOS for a file to try and reduce the slow down.
Detection Threshold per ETHOS Hash means that a single ETHOS hash can convict a single SHA of
unknown disposition a maximum number of times. The default is 10, meaning that ETHOS will not con-
vict any SHA-256 that is seen 10 times in 24 hours by the entire community. If you encounter a situ-
ation where the detection threshold has been reached but feel that the detection is not a false-positive
and want to keep convicting the particular SHA, you should add it to a Custom Detections - Simple or
Custom Detections - Advanced list.
SPERO
SPERO is the Cisco machine-based learning system. We use hundreds of features of a file, which we
call a SPERO fingerprint. This is sent to the cloud and SPERO trees determine whether a file is mali-
cious.
Detection Threshold per SPERO Tree means that a single SPERO tree can convict a single SHA of
unknown disposition a maximum number of times. The default is 10, meaning that SPERO will not con-
vict any SHA-256 that is seen 10 times in 24 hours by the entire community. If you encounter a situ-
ation where the detection threshold has been reached but feel that the detection is not a false-positive
and want to keep convicting the particular SHA, you should add it to a Custom Detections - Simple or
Custom Detections - Advanced list.
Step-Up Enabled is the ability to turn on additional SPERO trees if you are considered “massively
infected”. These SPERO trees are more false positive-prone, but do a better job of detecting malware.
“Massively infected” is based on the step-up threshold.
The Step-Up Threshold is used to determine whether or not a connector is “massively infected”. The
default is 5, meaning that if 5 SHA one-to-one detections are found in 30 seconds, you are considered
“massively infected” and additional SPERO trees will be enabled for the next 30 seconds.
default setting.
l Aggressive - Includes additional detections that may increase the rate of false-positive detec-
TETRA
TETRA performs offline scanning, rootkit scanning, and other things that a traditional antivirus product
does. It is signature-based and will take up more disk space on the local computers. TETRA will check
for updated signatures hourly and download them if new signatures are available. Its major drawback
is compatibility with other antivirus products and it should never be enabled if another antivirus product
is installed on the computer. This policy configuration option is only available when TETRA has been
selected in this tab or in the Modes and Engines tab.
Note: The Windows connector does not currently support TETRA rootkit scans on
ARM architecture.
Scan Archives determines whether or not the connector will open compressed files and scan their con-
tents. The default limitation is not to look inside any compressed files over 50 MB.
Scan Packed determines whether the connector will open packed files and scan their contents.
Deep Scan Files determines whether the connector scans the contents of product install and CHM
files.
Detect Expanded Threat Types detects archive bombs and applications that could be used mali-
ciously.
Automatic Signature Updates allows the connector to automatically update its TETRA signatures.
TETRA signature updates can consume significant bandwidth, so caution should be exercised before
enabling automatic signature updates in a large environment.
Content Update Interval lets you specify how often your connectors should check for new TETRA con-
tent such as signatures. Longer update intervals will help to reduce network traffic caused by TETRA
updates while shorter update intervals can consume significant bandwidth and is not recommended
for large deployments. You can view the version of TETRA definitions and update status for a com-
puter from the Computer Management page.
Local Secure Endpoint Update Server should only be enabled if you have set up a Secure Endpoint
Update Server for your connectors to retrieve TETRA definitions. Click the Secure Endpoint Update
Server Configuration link to download the server. It may take an hour or longer for the Secure End-
point Update Server to download initial content from the Cisco Cloud.
Note: Only Secure Endpoint Windows connector 5.1.13 and later can use a local
Secure Endpoint Update Server.
The Secure Endpoint Update Server setting has to specify the host name or IP address of the local
Secure Endpoint Update Server. Do not include HTTP:// or HTTPS:// in this field.
Use HTTPS for TETRA Definition Updates requires a local Secure Endpoint Update Server. The
Secure Endpoint Update Server running in self-hosted mode can only support the HTTP protocol on
port 80. If the HTTPS protocol is desired, an HTTPS-enabled Web server, such as Apache, or Nginx
has to be utilized, along with valid SSL certificates.
Network
The Network tab contains settings to for the network flow capabilities of your connectors, such as
device flow correlation settings.
Enable Device Flow Correlation allows you to monitor network activity and determine which action the
connector should take when connections to malicious hosts are detected.
Detection Action allows you to select whether the connector will block network connections to mali-
cious hosts or simply log them.
Terminate and quarantine will allow the connector to terminate the parent process of any connection
to a malicious host if the process originated from a file with an unknown disposition. This option is only
available if you have selected Blocking as the detection action.
Before enabling this feature, make sure you have added any applications allowed in your environment
to an allowed list, particularly any proprietary or custom software.
Blocked List Data Source enables you to select the IP blocked lists your connectors use. If you select
Custom, your connectors will only use the IP blocked lists you have added to the policy. Choose Cisco
to have your connectors only use the Cisco Intelligence Feed to define malicious sites. The Cisco Intel-
ligence Feed represents IP addresses determined by Talos to have a poor reputation. All the IP
addresses in this list are flushed every 24 hours. If Talos continues to observe poor behavior related to
an address it will be added back to the list. The Custom and Cisco option will allow you to use both the
IP blocked lists you have added to the policy and the Cisco Intelligence Feed.
Scheduled Scans
Scheduled scans are not necessary for the operation of the connector because files are being
reviewed as they are copied, moved, and executed. Files are also reviewed again for 7 days using Ret-
rospective. This allows companies to reduce their energy footprint by eliminating the need for sched-
uled scans. However, some companies may require scheduled scans due to policy so this can be
enabled via policy when necessary.
When you click +New under Schedule, an overlay will come up to allow you to choose the scan inter-
val, scan time, and scan type.
Scan Interval allows you to set how often the should run. The options are Weekly or Monthly.
Scan Time allows you to set the time of day you want the scan to commence.
Scan Type allows you to set the type of scan. A Flash scan will scan the processes running and the
files and registry entries used by those processes. A Full scan will scan the processes running, the
registry entries, and all the files on disk. This scan is very resource-intensive and should not be per-
formed on a regular basis. A Custom scan will scan a particular path that you give it.
Identity Persistence
Note: This policy setting is only available when enabled by Support. If you feel you
need this feature, contact Support to enable it.
Identity Persistence allows you to maintain a consistent event log in virtual environments or when com-
puters are re-imaged. You can bind a connector to a MAC address or host name so that a new event
log is not created every time a new virtual session is started or a computer is re-imaged. You can
choose to apply this setting with granularity across different policies, or across your entire organ-
ization, as follows.
None: connector logs are not synchronized with new connector installs under any circumstance.
By MAC Address across Organization: New connectors look for the most recent connector that has
the same MAC address to synchronize with across all policies in the organization that have Identity
Synchronization set to a value other than None.
By MAC Address across Policy: New connectors look for the most recent connector that has the same
MAC address to synchronize with within the same policy.
By Host name across Organization: New connectors look for the most recent connector that has the
same host name to synchronize with across all policies in the organization that have Identity Syn-
chronization set to a value other than None.
By Host name across Policy: New connectors look for the most recent connector that has the same
hostname to synchronize with within the same policy.
Note: In some cases a cloned virtual machine may be placed in the Default Group
rather than the group from which it was cloned. If this occurs, move the virtual
machine into the correct group in the Secure Endpoint console.
Secure Endpoint Mac Connector
After you have defined groups, policies, and a deployment strategy, the connector can be installed on
the endpoints. This section will go through the manual install process and highlight some of the key
features of the connector user interface. See Connector Engines and Features for the connector cap-
abilities.
Mac Connector: Required Policy Settings
Clicking New Policy will take you to the first of a series of configuration pages that you must complete
before you can save your new policy. Fill in the settings and click Next to advance through the pages.
The settings on these pages are described below.
Note: You cannot access the Outbreak Control, Product Updates, and Advanced
Settings pages for the new policy before completing these configuration pages.
This section describes the policy options that are available for Secure Endpoint Mac connectors.
Conviction Modes
Conviction Modes specify how the connector responds to suspicious files and network activity. Setting
Files to Audit will stop the Secure Endpoint connector from quarantining any files. This setting only
applies to version 3.1.0 and higher of the Secure Endpoint connector.
Note: When File Conviction Mode is set to Audit, any malicious files on your end-
points will remain accessible and be allowed to execute. Application blocking lists
will also not be enforced. You should only use this setting for testing purposes with
proprietary software.
Behavioral Protection helps prevent malicious activity that matches a set of behavioral signatures by
alerting on activity, quarantining files, and ending processes in Protect mode. Audit mode will create
events when matching activity is detected but will not take any actions.
Detection Engines
Windows, Mac, and Linux connectors have the option of enabling offline detection engines (TETRA for
Windows and ClamAV for Mac and Linux) to protect the endpoint from malware without connecting to
the Cisco Cloud to query each file.
ClamAV is a full antivirus replacement and should never be enabled if another antivirus engine is
installed. ClamAV can also consume significant bandwidth when downloading definition updates, so
caution should be exercised before enabling it in a large environment. More ClamAV settings are avail-
able in Advanced Settings.
Exclusions
You can select exclusion sets to apply to the policy here. All new Mac policies include Cisco-Main-
tained Exclusions for certain components of MacOS. This exclusion set cannot be removed. You can
choose other Cisco-Maintained Exclusions to add to the policy depending on the applications present
in the policy group and add your Custom Exclusions to the policy.
Click the drop-down menu for either the Cisco-maintained exclusions or your custom exclusions and
fill the check boxes to select exclusion sets. See Exclusions for more information.
Proxy
Complete your proxy configuration on this page.
Proxy Type is the type of proxy you are connecting to. The connector will support http_proxy, socks4,
socks4a, socks5, socks5_hostname, and mac_system_pac.
Note: The mac_system_pac proxy type requires connector version 1.22.0 and
later. The connector uses the Automatic Proxy Configuration URL in the macOS
network system preferences to configure the proxy. A proxy won't be used unless
this URL is specified. See Secure Endpoint Mac Proxy Automatic Configuration
(PAC) Setup Guide for more information.
Proxy Host Name is the name or the IP address of the proxy server. Only IPv4 addresses are sup-
ported.
Proxy Authentication is the type of authentication used by your proxy server. Basic and NTLM authen-
tication are supported.
Proxy User Name is used for authenticated proxies. This is the user name you use to connect.
Note: If NTLM is selected as the proxy authentication type, this field must be in
domain\username format.
Proxy Password is used for authenticated proxies. This is the password you use with the Proxy User-
name.
Host Firewall
Host Firewall allows you to monitor, control, and secure IPv4 and IPv6 network traffic across your
environment from a single place, operating as a critical function within Secure Endpoint to enhance
the overall security of your organization.
Host Firewall is available with Secure Endpoint Advantage and Premier packages.
Supported connector versions:
l Secure Endpoint Mac connector 1.24.2 and later
You can enable or disable Host Firewall for connectors that use the policy. You must select a Host
Firewall Configuration when you enable it for the policy. The configuration will be applied to con-
nectors as soon as you save the policy.
The configuration will be removed from connectors as soon as you disable the setting and save the
policy.
Note: Network - IP Blocked & Allowed Lists will only work if you set Network to
Block or Audit in Conviction Modes.
If there are IP allow or block lists available, you can click Select Lists to choose the ones you want to
add to the policy. Fill the check boxes of all the lists you want to add from the drop-down menu. You
can add multiple IP lists to a single policy; however, IP allowed list entries will override IP blocked list
entries.
The aggregate count of items added to a policy through combined lists cannot exceed 60,000 unique
items, where each item is a unique IP address or CIDR block. For example, you can add one IP list
with 20,000 unique items and a second list with 40,000 unique items but you cannot add one list with
50,000 unique items and a second list with 20,000 unique items. Duplicate addresses will be removed
during processing.
Mac Connector: Product Updates
When a product update is available, you can choose whether or not to update your endpoints on a per-
policy basis. You will see an entry in the Product Version drop-down menu showing which version you
are going to and it will populate the Update Server so you can see where the files will be pulled from.
There will be an option to update Orbital only if you have enabled Orbital and selected With Connector
under the Update Schedule.
You can then define the window in which updates are allowed to occur by choosing a Date Range. In
Date Range, click Start to select a date and time for your start window and End to select a date and
time for your end window. You can also select This Month to set the date range from the current day to
the end of the current month, Next 7 Days to set the range to the next 7 days, or Next 30 Days to set
the range to the next 30 days. Between the times set in the Date Range, if a connector calls home to
pick up a policy, it will pick up the product update. Because the connector calls home at an interval
dependent on the Heartbeat Interval, you will want to plan your Update Window accordingly; that is,
make sure the interval specified in the Update Window is larger than the Heartbeat Interval.
Mac Connector: Advanced Settings
Administrative Features
Send User Name in Events will send the actual user name for which the process is executed, copied,
or moved as if known. This is useful for tracking down who is seeing malware. If this is not enabled,
you will see a “u” for malware executed, copied, or moved as a user and an “a” for something that has
been executed copied or moved as an administrator.
Send Filename and Path Info will send the filename and path information to Secure Endpoint so that
they are visible in the Events, Device Trajectory, and File Trajectory. Unchecking this setting will stop
this information from being sent.
As of Mac connector 1.22.3, policy updates happen immediately but if the connector is unable to reach
the Cisco cloud when an update occurs, it will default to the Heartbeat Interval to get updates.
The Heartbeat Interval is the frequency with which the connector calls home to see if there are any
files to restore via Retrospective or by the administrator.
connector Log Level and Tray Log Level allow you to choose between default and debug (verbose)
logging levels. The default level should be set unless debug is requested by support during
troubleshooting.
When connector Log Level is set to Debug, it can cause log files to consume an additional 550MB of
drive space.
Automated Crash Dump Uploads allows you to choose whether to automatically upload connector
crash dump files to Cisco for analysis.
Command Line Capture (Secure Endpoint Mac 1.5.0 and higher) allows the connector to capture com-
mand line arguments (including usernames, filenames, passwords, etc.) used during file execution
and send the information to Secure Endpoint. This information will be displayed in Device Trajectory
for administrators as long as they have single sign-on (such as Security Cloud sign-on) or Two-Factor
Authentication enabled.
If Command Line Capture is enabled and connector Log Level is set to Debug, you can use Command
Line Logging to log captured command line arguments to the local connector log file on the endpoint.
Start Client User Interface allows you to specify whether or not to completely hide the connector user
interface.
Note: If you change this setting, your connectors will have to be restarted before it
takes effect.
Cloud Notifications are balloon pop-ups that come from the menu bar when the connector is suc-
cessfully connected to the cloud. It displays the number of users and detections registered to the
cloud.
Hide File Notifications suppresses notifications from being displayed to the user when a malicious file
is convicted or quarantined by the connector.
Hide Network Notifications suppresses notifications from being displayed to the user when a malicious
network connection is detected or blocked by the connector.
Hide Exclusions will suppress the display of configured exclusions from the connector user interface.
Monitor File Copies and Moves is the ability for the connector to give real-time protection to files that
are copied or moved.
Monitor Process Execution is the ability for the connector to give real-time protection to files that are
executed.
On Execute Mode can run in two different modes: Active or Passive. In Active mode, the file is blocked
from being executed until a determination of whether or not a file is malicious or a timeout is reached.
In Passive mode, the file is allowed to be executed and in parallel the file is looked up to determine
whether or not it is malicious.
Note: Although Active mode gives you better protection, it can cause performance
issues. If the endpoint already has an antivirus product installed it is best to leave
this set to Passive.
Maximum Scan File Size limits the size of files that are scanned by the connector. Any file larger than
the threshold set will not be scanned.
Maximum Archive Scan File Size limits the size of archive files that are scanned by the connector. Any
archive file larger than the threshold set will not be scanned.
Cache
SHA-256 values are cached to reduce cloud lookup traffic. The amount of time a value is cached
depends on the disposition of the file the last time a cloud lookup was performed on its SHA-256.
While a file is cached, the connector will always consider its disposition to be what it was the last time
a cloud lookup was performed. For example, if a SHA-256 is in an application blocking list and the TTL
is 3600 seconds, that application will continue to be blocked from execution by the connector for the
next hour even if the administrator removes it from the application blocking list.
Malicious Cache TTL is the time for which a file with a malicious disposition will be cached before
another cloud lookup is performed when a connector sees that SHA-256 value. The default value is 1
hour.
Clean Cache TTL is the time for which a file with a clean disposition will be cached before another
cloud lookup is performed when a connector sees that SHA-256 value. The default value is 1 week.
Unknown Cache TTL is the time for which a file with an unknown disposition is cached before another
cloud lookup is performed when a connector sees that SHA-256 value. The default value is 1 hour.
Application Blocking TTL is the time for which a file that is in an Application Control - Blocked Applic-
ations list is cached before another cloud lookup is performed when a connector sees that SHA-256
value. The default value is 1 hour.
Note: If you add a SHA-256 with a clean disposition that was previously seen by a
connector to an application blocking list, you must stop the connector and delete
the cache.db file from the installation directory on that computer for the application
to be blocked from executing. Otherwise, you will have to wait until the TTL for the
clean file expires and another cloud lookup is performed by the connector before
the application is blocked from executing.
Endpoint Isolation
Endpoint Isolation lets you block incoming and outgoing network activity on a Mac computer to pre-
vent threats such as data exfiltration and malware propagation.
Allow DNS allows the endpoint to perform DNS lookups while it is isolated. The connector will auto-
matically add the address of the DNS server configured in the endpoint’s network settings to the allow
list. You will need to add the addresses of your DNS servers to the allow list manually if you turn this
setting off.
Allow DHCP allows the endpoint to send and receive traffic on UDP ports 67 and 68 so it can obtain or
renew a DHCP lease. You can safely turn this off if you use static IP addresses. You will need to add
the addresses of your DHCP servers to the allow list manually if you turn this setting off.
You can specify the IP Allow Lists the connector will use during an isolation session. Use the Select
Lists pulldown to specify the IP Isolation Allow Lists to use with this policy.
Orbital
Note: Orbital is available for customers with Secure Endpoint advantage package
or higher.
Orbital allows you to query endpoints for detailed information wherever you have Orbital deployed. For
details on using Orbital, see the Orbital documentation at https://orbital.amp.cisco.com/help/.
To enable Orbital in a policy, select the Enable Orbital Advanced Search checkbox, then click Save.
Orbital will be installed on any computers running macOS 10.15 or later with an Intel processor or
macOS 12 or later with Apple silicon. Orbital is supported on Apple silicon with Secure Endpoint Mac
connector version 1.20 or later, and requires Orbital Node 1.21 or later. The connector will send an
event to the Secure Endpoint console once the installation has completed successfully. The Update
Schedule allows you to define if Orbital will be updated automatically whenever a new version is avail-
able or scheduled under Mac Connector: Product Updates.
Note: If you disable Orbital for a policy, it will stop and disable the service but it will
not uninstall Orbital from your endpoints. Enabling it again will restart the service
and re-enable Orbital updates.
ClamAV
As a full antivirus product, ClamAV allows us to perform offline scanning. It is signature-based and will
take up more disk space on the local computers. By default it will check for updated signatures every
24 hours and download them if new signatures are available. Its major draw back is compatibility with
other antivirus products and should never be enabled if another antivirus product is installed on the
computer.
Content Update Interval allows you to specify how often your connectors should check for new
ClamAV content such as signatures. Longer update intervals will help to reduce network traffic caused
by ClamAV updates, while shorter update intervals can consume significant bandwidth and is not
recommended for large deployments. You can view the version of ClamAV definitions and update
status for a computer from the Computer Management page.
Network
The Network tab contains settings to for the network flow capabilities of your connectors, such as
device flow correlation settings.
Enable Device Flow Correlation allows you to monitor network activity and determine which action the
connector should take when connections to malicious hosts are detected.
Detection Action allows you to select whether the connector will block network connections to mali-
cious hosts or simply log them.
Blocked List Data Source allows you to select the IP blocked lists your connectors use. If you select
Custom, your connectors will only use the IP blocked lists you have added to the policy. Choose Cisco
to have your connectors only use the Cisco Intelligence Feed to define malicious sites. The Cisco Intel-
ligence Feed represents IP addresses determined by Talos to have a poor reputation. All the IP
addresses in this list are flushed every 24 hours. If the Talos continues to observe poor behavior
related to an address it will be added back to the list. The Custom and Cisco option will allow you to
use both the IP blocked lists you have added to the policy and the Cisco Intelligence Feed.
Scheduled Scans
Scheduled scans are not necessary for the operation of the connector because files are being
reviewed as they are copied, moved, and executed. Files are also reviewed again for 7 days using Ret-
rospective. This allows companies to reduce their energy footprint by eliminating the need for sched-
uled scans. However, some companies may require scheduled scans due to policy so this can be
enabled via policy when necessary.
When you click +New under Schedule, an overlay will come up to allow you to choose the scan inter-
val, scan time, and scan type.
Scan Interval allows you to set how often the should run. The options are Weekly or Monthly.
Scan Time allows you to set the time of day you want the scan to commence.
Scan Type allows you to set the type of scan. A Flash Scan will scan the processes running and the
files and registry entries used by those processes. A Full scan will scan the processes running, the
registry entries, and all the files on disk. This scan is very resource-intensive and should not be per-
formed on a regular basis. A Custom scan will scan a particular path that you give it.
Secure Endpoint Linux Connector
After you have defined groups, policies, and a deployment strategy, the connector can be installed on
the endpoints. This section will go through the manual install process and highlight some of the key
features of the connector user interface.
Linux Connector: Required Policy Settings
Clicking New Policy will take you to the first of a series of configuration pages that you must complete
before you can save your new policy. Fill in the settings and click Next to advance through the pages.
The settings on these pages are described below.
Note: You cannot access the Outbreak Control, Product Updates, and Advanced
Settings pages for the new policy before completing these configuration pages.
This section describes the policy options that are available for Secure Endpoint Linux connectors.
Conviction Modes
Conviction Modes specify how the connector responds to suspicious files and network activity. Setting
Files to Audit will stop the Secure Endpoint connector from quarantining any files.
Note: When File Conviction Mode is set to Audit, any malicious files on your end-
points will remain accessible and be allowed to execute. Application blocking lists
will also not be enforced. You should only use this setting for testing purposes with
proprietary software.
Behavioral Protection helps prevent malicious activity that matches a set of behavioral signatures by
alerting on activity, quarantining files, and ending processes in Protect mode. Audit mode will create
events when matching activity is detected but will not take any actions.
Detection Engines
Linux connectors can enable the ClamAV offline detection engine to protect the endpoint from mal-
ware without connecting to the Cisco Cloud to query each file.
ClamAV is a full antivirus replacement and should never be enabled if another antivirus engine is
installed. ClamAV can also consume significant bandwidth when downloading definition updates, so
caution should be exercised before enabling it in a large environment. More ClamAV settings are avail-
able in Advanced Settings.
Exclusions
You can select exclusion sets to apply to the policy here.
Click the drop-down menu and fill the check boxes to select custom exclusion sets. See Exclusions for
more information.
Proxy
Complete your proxy configuration on this page.
Proxy Type is the type of proxy you are connecting to. The connector will support http_proxy, socks4,
socks4a, socks5, and socks5_hostname.
Proxy Host Name is the name or the IP address of the proxy server. Only IPv4 addresses are sup-
ported.
Proxy Authentication is the type of authentication used by your proxy server. Basic and NTLM authen-
tication are supported.
Proxy User Name is used for authenticated proxies. This is the user name you use to connect.
Note: If NTLM is selected as the proxy authentication type, this field must be in
domain\username format.
Proxy Password is used for authenticated proxies. This is the password you use with the Proxy User
Name.
Linux Connector: Outbreak Control
Select the outbreak control lists you want to assign to the policy. See Custom Detections - Simple,
Custom Detections - Advanced, Application Control - Allowed Applications, Application Control -
Blocked Applications, and Network - IP Block & Allow Lists for details on creating these lists. Note that
not all connectors support all list types.
Note: Network - IP Blocked & Allowed Lists will only work if you set Network to
Audit in Conviction Modes.
If there are IP allow or block lists available, you can click Select Lists to choose the ones you want to
add to the policy. Fill the check boxes of all the lists you want to add from the drop-down menu. You
can add multiple IP lists to a single policy; however, IP allowed list entries will override IP blocked list
entries.
The aggregate count of items added to a policy through combined lists cannot exceed 60,000 unique
items, where each item is a unique IP address or CIDR block. For example, you can add one IP list
with 20,000 unique items and a second list with 40,000 unique items but you cannot add one list with
50,000 unique items and a second list with 20,000 unique items. Duplicate addresses will be removed
during processing.
Linux Connector: Product Updates
When a product update is available, you can choose whether or not to update your endpoints on a per-
policy basis. You will see an entry in the Product Version drop-down menu showing which version you
are going to and it will populate the Update Server so you can see where the files will be pulled from.
There will be an option to update Orbital only if you have enabled Orbital and selected With Connector
under the Update Schedule. Certain updates will require a reboot to install properly. See this article for
specific update reboot requirements.
You can then define the window in which updates are allowed to occur by choosing a Date Range. In
Date Range, click Start to select a date and time for your start window and End to select a date and
time for your end window. You can also select This Month to set the date range from the current day to
the end of the current month, Next 7 Days to set the range to the next 7 days, or Next 30 Days to set
the range to the next 30 days.
Between the times set in the Date Range, if a connector calls home to pick up a policy, it will pick up
the product update. Because the connector calls home at an interval dependent on the Heartbeat Inter-
val, you will want to plan your Update Window accordingly; that is, make sure the interval specified in
the Update Window is larger than the Heartbeat Interval.
Linux Connector: Advanced Settings
Administrative Features
Send User Name in Events will send the actual user name for which the process is executed, copied,
or moved as if known. This is useful for tracking down who is seeing malware. If this is not enabled,
you will see a “u” for malware executed, copied, or moved as a user and an “a” for something that has
been executed copied or moved as an administrator.
Send Filename and Path Info will send the filename and path information to Secure Endpoint so that
they are visible in the Events, Device Trajectory, and File Trajectory. Unchecking this setting will stop
this information from being sent.
As of Linux connector 1.22.1, policy updates happen immediately but if the connector is unable to
reach the Cisco cloud when an update occurs, it will default to the Heartbeat Interval to get updates.
The Heartbeat Interval is the frequency with which the connector calls home to see if there are any
files to restore via Retrospective or by the administrator.
connector Log Level allows you to choose between default and debug (verbose) logging levels. The
default level should be set unless debug is requested by support during troubleshooting.
When connector Log Level is set to Debug, it can cause log files to consume an additional 550 MB of
drive space.
Automated Crash Dump Uploads allows you to choose whether to automatically upload connector
crash dump files to Cisco for analysis.
Command Line Capture (Secure Endpoint Linux connector 1.5.0 and higher) allows the connector to
capture command line arguments (including usernames, filenames, passwords, etc.) used during file
execution and send the information to Secure Endpoint. This information will be displayed in Device
Trajectory for administrators as long as they have single sign-on (such as Security Cloud sign-on) or
Two-Factor Authentication enabled.
If Command Line Capture is enabled and connector Log Level is set to Debug, you can use Command
Line Logging to log captured command line arguments to the local connector log file on the endpoint.
Start Client User Interface allows you to specify whether or not to completely hide the connector user
interface. Choosing Disabled, the connector runs as a service, but the user interface components will
not run. With Command Line Only and Privileged Command Line Only, the connector runs as a ser-
vice without the interface components, but allows user access via the terminal.
Note: If you change this setting, your connectors will have to be restarted before it
takes effect.
Hide File Notifications suppresses notifications from being displayed to the user when a malicious file
is convicted or quarantined by the connector.
Hide Network Notifications suppresses notifications from being displayed to the user when a malicious
network connection is detected or blocked by the connector.
Hide Exclusions will suppress the display of configured exclusions from the connector user interface.
Monitor File Copies and Moves is the ability for the connector to give real-time protection to files that
are copied or moved.
Monitor Process Execution is the ability for the connector to give real-time protection to files that are
executed.
On Execute Mode can only run in Passive mode on Linux. In Passive mode, the file is allowed to be
executed and in parallel the file is looked up to determine whether or not it is malicious.
Maximum Scan File Size limits the size of files that are scanned by the connector. Any file larger than
the threshold set will not be scanned.
Maximum Archive Scan File Size limits the size of archive files that are scanned by the connector. Any
archive file larger than the threshold set will not be scanned.
Cache
SHA-256 values are cached to reduce cloud lookup traffic. The amount of time a value is cached
depends on the disposition of the file the last time a cloud lookup was performed on its SHA-256.
While a file is cached, the connector will always consider its disposition to be what it was the last time
a cloud lookup was performed. For example, if a SHA-256 is in an application blocking list and the TTL
is 3600 seconds, that application will continue to be blocked from execution by the connector for the
next hour even if the administrator removes it from the application blocking list.
Malicious Cache TTL is the time for which a file with a malicious disposition will be cached before
another cloud lookup is performed when a connector sees that SHA-256 value. The default value is 1
hour.
Clean Cache TTL is the time for which a file with a clean disposition will be cached before another
cloud lookup is performed when a connector sees that SHA-256 value. The default value is 1 week.
Unknown Cache TTL is the time for which a file with an unknown disposition is cached before another
cloud lookup is performed when a connector sees that SHA-256 value. The default value is 1 hour.
Application Blocking TTL is the time for which a file that is in an Application Control - Blocked Applic-
ations list is cached before another cloud lookup is performed when a connector sees that SHA-256
value. The default value is 1 hour.
Note: If you add a SHA-256 with a clean disposition that was previously seen by a
connector to an application blocking list, you must stop the connector and delete
the cache.db file from the installation directory on that computer for the application
to be blocked from executing. Otherwise, you will have to wait until the TTL for the
clean file expires and another cloud lookup is performed by the connector before
the application is blocked from executing.
Orbital
Note: Orbital is available for customers with Secure Endpoint advantage package
or higher.
Orbital allows you to query endpoints for detailed information wherever you have Orbital deployed. For
details on using Orbital, see the Orbital documentation at https://orbital.amp.cisco.com/help/.
To enable Orbital in a policy, select the Enable Orbital Advanced Search check box, then click Save.
The connector will send an event to the Secure Endpoint console once the installation has completed
successfully. The Update Schedule allows you to define if Orbital will be updated automatically
whenever a new version is available or scheduled under Linux Connector: Product Updates.
If you disable Orbital for a policy, it will stop and disable the service but it will not uninstall Orbital from
your endpoints. Enabling it again will restart the service and re-enable Orbital updates.
ClamAV
As a full antivirus product, ClamAV allows us to perform offline scanning. It is signature-based and will
take up more disk space on the local computers. By default it will check for updated signatures every
24 hours and download them if new signatures are available. Its major draw back is compatibility with
other antivirus products and should never be enabled if another antivirus product is installed on the
computer.
ClamAV definitions contain signatures to detect malware that affects Linux, macOS, and Windows by
default. Use the AV Definitions setting to select whether you want to download the full set of ClamAV
definitions or a smaller subset of definitions that only contains signatures for Linux malware. Select the
definitions most appropriate for your environment, including the types of files you expect to be
scanned. See Secure Endpoint: ClamAV Virus Definition Options in Linux for more information.
Content Update Interval allows you to specify how often your connectors should check for new
ClamAV content such as signatures. Longer update intervals will help to reduce network traffic caused
by ClamAV updates, while shorter update intervals can consume significant bandwidth and is not
recommended for large deployments. You can view the version of ClamAV definitions and update
status for a computer from the Computer Management page.
Network
The Network tab contains settings to for the network flow capabilities of your connector, such as
device flow correlation settings. You can select to disable Device Flow Correlation or select Audit to
log network connections.
Blocked List Data Source enables you to select the IP blocked lists your connectors use. If you select
Custom, your connectors will only use the IP blocked lists you have added to the policy. Choose Cisco
to have your connectors only use the Cisco Intelligence Feed to define malicious sites. The Cisco Intel-
ligence Feed represents IP addresses determined by Talos to have a poor reputation. All the IP
addresses in this list are flushed every 24 hours. If Talos continues to observe poor behavior related to
an address it will be added back to the list. The Custom and Cisco option will allow you to use both the
IP blocked lists you have added to the policy and the Cisco Intelligence Feed.
Scheduled Scans
Scheduled scans are not necessary for the operation of the connector because files are being
reviewed as they are copied, moved, and executed. Files are also reviewed again for 7 days using Ret-
rospective. This allows companies to reduce their energy footprint by eliminating the need for sched-
uled scans. However, some companies may require scheduled scans due to policy so this can be
enabled via policy when necessary.
When you click +New under Schedule, an overlay will come up to allow you to choose the scan inter-
val, scan time, and scan type.
Scan Interval allows you to set how often the should run. The options are Weekly or Monthly.
Scan Time allows you to set the time of day you want the scan to commence.
Scan Type allows you to set the type of scan. A Flash Scan will scan the processes running and the
files and registry entries used by those processes. A Full scan will scan the processes running, the
registry entries, and all the files on disk. This scan is very resource-intensive and should not be per-
formed on a regular basis. A Custom scan will scan a particular path that you give it.
Secure Endpoint Android Connector Policy
This section describes the policy options that are available for Secure Endpoint Android connectors.
Android Connector: Required Policy Settings
Click New Policy to create a new Secure Endpoint Android policy. The settings on these pages are
described below. A policy for the Secure Endpoint Android connector contains fewer options due to
the nature of the device.
Outbreak Control
The Custom Detections - Android list type is described in the Outbreak Control section of this doc-
ument.
Advanced Settings
The Heartbeat Interval is the frequency with which the connector calls home to see if there are any
policies to pick up, new custom detections or any tasks to perform such as product updates.
Secure Endpoint iOS Connector Policy
This section describes the policy options that are available for Secure Endpoint iOS connectors with
Clarity.
iOS Connector: Required Policy Settings
Clicking New Policy will take you to the new Secure Endpoint iOS policy. The settings on these pages
are described below. A policy for the Secure Endpoint iOS connector contains fewer options due to
the nature of the device. Many settings for the connector are handled through the Mobile Device Man-
ager (MDM).
Conviction Modes
Conviction Modes specify how the Clarity module of the Secure Endpoint iOS connector responds to
suspicious network activity. There are three modes available:
l Active Block checks that the traffic is not destined to a malicious or blocked address before
allowing the connection. This provides the highest level of security but there will also be latency
with each network connection.
Note: Even in Active Block mode connections will eventually be allowed if the
device is unable to reach the Cisco cloud to check the disposition of the des-
tination address.
l Block allows network connections while simultaneously checking if the destination address is
malicious or blocked. The initial connection will be allowed but all subsequent connections to a
malicious or blocked site will be blocked.
l Audit will allow all connections but any connections to malicious or blocked sites will be logged.
iOS Connector: Other Policy Settings
Once you have filled out the required configuration pages you will be able to access pages for Out-
break Control and Advanced Settings. The following section will describe the settings.
Outbreak Control
If there are IP allowed or blocked lists available, you can click Select Lists to choose the ones you
want to add to the policy. Fill the checkboxes of all the lists you want to add from the drop-down menu.
You can add multiple IP lists to a single policy; however, IP allowed list entries will override IP blocked
list entries. See Network - IP Block & Allow Lists for details on creating these lists.
Advanced Settings
Connector Log Level allows you to choose between default and debug (verbose) logging levels. Cur-
rently, only Default logging is available.
Notifications displays notifications on the end user’s device about malicious connections and other
events.
Anonymize Host Names will assign an anonymized name to the device to remove any personally iden-
tifiable information that is sent to the Cisco Cloud.
Automated Crash Dump Uploads allows you to choose whether to automatically upload connector
crash dump files to Cisco for analysis.
Blocked List Data Source enables you to select the IP blocked lists that your connectors use. If you
select Custom, your connectors will only use the IP blocked lists you have added to the policy.
Choose Cisco to have your connectors only use the Cisco Intelligence Feed to define malicious sites.
The Cisco Intelligence Feed represents IP addresses determined by Talos to have a poor reputation.
All the IP addresses in this list are flushed every 24 hours. If Talos continues to observe poor behavior
related to an address it will be added back to the list. The Custom and Cisco option will allow you to
use both the IP blocked lists you have added to the policy and the Cisco Intelligence Feed.
Network Policy
The Network policy is visible if Cisco Defense Center is integrated with Secure Endpoint under Applic-
ations. For more information on Defense Center integration with Secure Endpoint, see your Defense
Center documentation.
Network Policy: Required Policy Settings
Clicking New Policy will take you to the new Secure Endpoint Network policy. The settings on these
pages are described below. A policy for the Secure Endpoint Network contains fewer options due to
the nature of the device.
Outbreak Control
Custom detections are explained in the Outbreak Control section of this user guide. Allowed lists are
explained in the Application Control - Allowed Applications section.
Groups
Groups allow the computers in an organization to be managed according to their function, location, or
other criteria that is determined by the administrator. To create a new group, click Create Group. You
can also edit or delete existing groups. Use View All Changes to see a filtered view of the Audit Log,
which shows all changes made to groups, or click View Changes on a specific group to see changes
made only to that particular group.
Configuring the Group
This section will take you through the steps to create and configure the group. Creating a new group
and editing an existing group follow the same procedure.
Name and Description
The name and description of the group are simply used to identify it. Groups can frequently reflect geo-
graphic locations, business units, user groups, and so on. Groups should be defined according to
policies that will be applied to each one.
Parent Group Menu
The parent group menu allows you to set a parent group for the group you are creating. If this is the
first group being created on this particular Secure Endpoint deployment the only options available are
no parent group (a blank entry) or the Default Group.
Policy Menus
The policy menus allow you to specify which policies to apply to the group you are creating. Default
policies will be applied to the new group unless a parent group has been selected. If a parent has been
selected, then the new group will inherit the policies of the parent.
Note: If the parent group is changed later on, then the group will inherit the policy
of its new parent group. If the parent group is deleted, then all child groups will be
moved to the default group and inherit that policy.
Child Groups
You can select individual groups, multiple groups, or all the groups to add or remove as child groups.
Note: If you remove a child group that inherits its policy from its parent, then that
group’s policy will revert to the organization default policy until you assign it to a
new parent group.
Add and Move Computers
To assign computers to the new group, click Save, then go to Management > Computers to add or
move computers. See Computer Management for details.
Note: You cannot move an iOS device to a new group from the Secure Endpoint
console. To move a single device you must use the Meraki Dashboard to re-tag
the device to the profile with the linked group. You can also re-deploy the device to
a new profile. On other MDMs you will have to uninstall the Secure Endpoint iOS
connector and install it again for the new Group.
Deploy Connectors
After you have created policies and assigned them to groups, you can begin deploying the connectors
to computers and devices in your organization. Navigate to Management > Download connector to
deploy the connector to Windows, Mac, Linux, or Android. To deploy the Secure Endpoint iOS con-
nector navigate to Management > Deploy Clarity for iOS.
Download Connectors
The Download Connector page allows you to download installer packages for each type of connector
or copy the URL from which they can be downloaded once you have selected a group. The installer
package can be placed on a network share or distributed via management software. The download
URL can be emailed to users to allow them to download and install it themselves, which can be con-
venient for remote users.
Secure Endpoint Windows Connector
To deploy the Secure Endpoint Windows connector, first select a group from the drop-down menu.
You will be able to see the connector version that will be downloaded as specified in the policy you
selected or the default for your organization, and which connectors in the group require an update to
the version of the connector you are downloading. It will also show how many of the computers will
require a reboot when they are updated to the current version of connector.
Choose whether to have the connector perform a flash scan during the install process. The flash scan
checks processes that are currently running in memory and should be performed on each install.
By default, you will download a redistributable installer. This is a 46 MB file that contains both the 32-
and 64-bit installers. To install the connector on multiple computers, you can place this file on a net-
work share or push it to all the computers in a group using a tool like System Center Configuration
Manager. The installer contains a policy.xml file that is used as a configuration file for the install.
You can also choose to download a small (~900 KB) bootstrapper file to install the Secure Endpoint
Windows connector. This executable downloads and installs the appropriate version of the Secure
Endpoint Windows connector. Note that since the bootstrapper has to retrieve the main installer, it will
not work from behind a proxy. You will have to use the redistributable installer instead.
Note: On Windows XP and Windows Server 2003, if you have migrated the
Secure Endpoint Windows connector to cisco.com addresses for connectivity, the
bootstrapper will not work. You must download the redistributable installer for
those operating system versions.
Secure Client
You can download the Cisco Secure Client full installer if you have enabled Cisco XDR or Secure Cli-
ent Cloud Management Integration. Secure Client allows you to deploy the Secure Endpoint Windows
connector and Secure Client VPN from a single package. If you select a group that has not already
been configured in Cisco XDR or Secure Client Cloud Management the Secure Client installer will
only contain the Secure Endpoint connector with the default Cloud Management settings. You can go
to the Cisco XDR or Secure Client Cloud Management console after to configure additional settings
and add the AnyConnect VPN module. See https://docs.xdr.security.cisco.com/Content/Client-Man-
agement/client-management.htm for more information on configuring Secure Client.
Secure Endpoint Mac Connector
To deploy the Secure Endpoint Mac connector, first select a group from the drop-down menu. Choose
whether to have the connector perform a flash scan during the install process. The flash scan checks
processes currently running in memory and should be performed on each install.
You can then download the PKG or DMG file to install the Secure Endpoint Mac connector or copy the
download link. The installer can be placed on a network share. The file also contains a policy.xml file
that is used as a configuration file for the install.
Secure Endpoint Linux Connector
To deploy the Secure Endpoint Linux connector first select a group from the drop down menu. Choose
whether to have the connector perform a flash scan during the install process. The flash scan checks
processes currently running in memory and should be performed on each install.
Use the Distribution pulldown to select the proper connector version for your distribution. See Cisco
Secure Endpoint Linux Connector OS Compatibility for supported distributions.
You can then Download the rpm or deb file to install the Secure Endpoint Linux connector or copy the
download link. The installer can be placed on a network share. The file contains a policy.xml file that is
used as a configuration file for the install. You should also copy or download the GPG Public Key
linked on the download page. This will be required for Linux Connector: Product Updates via policy.
See this article for more details.
Secure Endpoint Android Connector
The Secure Endpoint Android connector can be deployed by downloading the app from the Secure
Endpoint Console, emailing a link to the app download, or through the Google Play Store.
Select a group on the Download Connector page. You can click Show URL to copy a link to the APK
that can be emailed to users or click Download to download the APK to distribute through a Mobile
Device Manager (MDM).
Check Install from Google Play if your users will download and install the app themselves. Click Show
Activation URL to display the activation link that will be emailed to users. This link is also used for the
amp_provisioning_url value if you deploy using the EMM API to deploy via a Managed Configuration.
Users will have to click the activation link from the device with the Secure Endpoint Android connector
installed on it to receive a policy and enable the connector. Users who install the app through Google
Play will receive connector updates depending on the Play Store app Auto-update apps setting.
Note: The Secure Endpoint Android connector will not have a policy or protect the
device if users install it from Google Play without clicking the activation link from
their device.
Managed Configuration
You can also deploy the Secure Endpoint Android connector in a managed configuration through any
Mobile Device Manager (MDM) or Enterprise Mobility Manager (EMM).
The managed configuration schema is embedded within the app and can be retrieved using the
Google EMM API.
The connector also supports automatic device name assignment if the amp_device_name field is
empty and the amp_auto_assign_device_name field is selected. The amp_device_name field takes
priority over amp_auto_assign_device_name if it is not blank.
Deploy Clarity for iOS
Deployment steps for the Secure Endpoint iOS connector with Clarity are dependent on the Mobile
Device Manager (MDM) you are using. Before you can deploy the Secure Endpoint iOS connector you
have to set up your MDM Integration.
Deploy via Meraki
Navigate to Management > Deploy Clarity for iOS to make changes to your Meraki deployment. You
can apply your Secure Endpoint groups to your Meraki SM profiles. Only one group and its associated
policy can be applied to each profile.
1. Select the Secure Endpoint Group you want to apply or update on your Meraki SM.
2. Select the Organization from your Meraki SM you want to apply it to.
3. Select the Network in the Organization.
4. Select one or more Profiles that you want to apply Clarity to. For more information on creating
profiles see Configuration Profiles.
Note: While you can deploy more than one profile to an iOS device, if you try to
deploy more than one profile with Clarity applied an error will occur and the
second profile will not be applied. You can safely deploy a second profile with only
Clarity applied to a device that has an existing profile that only has Umbrella
applied.
Once you have deployed the Secure Endpoint iOS connector you will need to use the Meraki Dash-
board to deploy the app to devices using the instructions in the document Using Apple’s Volume
Purchase Program (VPP) with Systems Manager.
If you want to configure notifications,
1. Go to System Manager > Settings.
2. Click Add Profile.
3. Select Device profile (default) and click Continue.
4. Name the profile and enter a description.
5. Select appropriate Target Scope and Device Tags.
6. Click Add settings.
7. Search for “Notification” in the search bar.
8. Click iOS App Notifications.
9. In the App drop-down menu, choose Cisco Security Connector (com.cisco.ciscosecurity.app).
10. Fill all the checkboxes and select Banner for Alert type.
11. Click Save.
Deploy via Workspace ONE
To deploy from Workspace ONE you will first need to download a Mobileconfig file from the Secure
Endpoint Console:
1. Go to Management > Deploy Clarity for iOS.
2. Select the Secure Endpoint Group you assigned your iOS policy to previously.
3. Click Copy to Clipboard.
Note: If you want to exclude domains from being sent to the Cisco Cloud see
steps 2 and 3 under Clarity Domain Exclusions for Workspace ONE before con-
tinuing.
You will now have to add the Mobileconfig file from your Workspace ONE Dashboard:
1. Navigate to Devices > Profiles & Resources > Profiles.
2. Click Add > Add Profile.
3. Click iOS.
4. Under General:
1. Assign a Name and Description.
2. Set Deployment to Managed.
3. Set Assignment Type to Auto.
4. Set Allow Removal to Always.
5. Add the Group you previously created to Assigned Groups.
5. Paste the contents of your clipboard into the Custom Settings text box.
6. Click Notifications.
7. Click Configure.
8. Click Select App.
9. In the Select App field, choose Cisco Security Connector (com.cisco.ciscosecurity.app).
10. Fill all the check boxes and select Banner for Alert Style when unlocked.
11. Click Save.
12. Click Save & Publish.
13. Under View Device Assignment you should see the devices in the Group.
14. Click Publish.
Note: If you want to exclude domains from being sent to the Cisco Cloud see
steps 2 and 3 under Clarity Domain Exclusions for MobileIron before continuing.
Now, you have to add the Mobileconfig file from your MobileIron Dashboard:
1. Navigate to Policies & Configs > Configurations.
2. Click Add New > iOS and OS X > Configuration Profile.
1. Assign a Name and Description to the Configuration Profile.
2. Click Browse and navigate to the Mobileconfig file you downloaded from the Secure End-
point Console.
3. Click Save.
3. Select the Configuration Profile you just created.
4. Click Actions > Apply to Label.
1. Select the Label you created earlier.
2. Click Apply.
5. Click Ok on the dialog.
You can now upload the Mobileconfig file to your MDM through the MDM’s console to complete deploy-
ment.
Deployment Summary
The Deployment Summary page gives you a list of the successful and failed connector installs, as well
as those currently in progress.
You can view the name of the computer, its IP address, its MAC address, and the date and time of the
install attempt, as well as the operating system version and the connector version. In some cases, the
install may have failed completely and a reason will be given for that, but in others there may not have
been any further communication with the cloud after the install started.
Computer Management
Go to Management > Computers to view endpoints with connectors installed. The top of the page
shows a summary of connectors in your organization that includes:
l Computers - number of endpoints in your organization with a connector installed.
l Not Seen in Over 7 Days - number of endpoints that have not checked in with the Secure End-
l Need Connector Update - number of endpoints with a connector version lower than the Default
l Cisco Security Risk Score High - number of endpoints with a Cisco Security Risk Score that is
considered high.
View All Changes will take you to a filtered view of the Audit Log that shows all changes made to com-
puters.
You can apply filters to the list or navigate through the pages to view more computers.
Use the check boxes to select either all computers or specific computers in order to move them to
another group, a new group, or to delete them.
Select one or more computers and click Export to CSV to receive an email with a download link for a
list of computers including:
l Connector GUID.
l Hostname.
l Operating system.
l Connector version.
l Group.
Note: All dates and times in the exported CSV file will be in UTC regardless of
your Time Zone Settings.
Click on a computer in the list to expand the details panel for that computer. Click the + or - buttons to
expand or collapse the details panel for every computer on the current page.
Note: ARM processors display zeroes in the Processor ID field.
The details panel includes informational content about each endpoint and several actions you can
take:
l Antivirus and Behavioral Protection definition versions.
l Links to Event List, Device Trajectory, and the Audit Log filtered to the selected endpoint.
Note: Deleting a computer will only remove it from appearing in the Com-
puter Management page listing. Unless you uninstall the connector from the
computer you will still see events generated by a deleted computer and it
will still use one of your available licenses.
The Last Seen time is accurate within approximately 15 minutes. You can also delete the computer
from the list, and flag or unflag the computer in the list. View Changes will take you to a filtered view of
the Audit Log, which shows all changes for the specific computer.
Note: Clicking the Last Seen time will display a popup with details, options to copy
the time to the clipboard in ISO-8601 Date and UNIX Timestamp formats, and a
link to change the time zone.
If you click Scan, a dialog will be displayed that allows you to select a file scan or Scan by Computer,
and whether to run a full or flash scan.
A full Endpoint IOC scan is time-consuming and resource intensive. A full scan can take multiple days
to run on endpoints with a large number of files. You should only schedule full scans during periods of
inactivity, such as at night or on weekends. The first time you run a full scan on a connector, the sys-
tem will be cataloged, which will take longer than a regular full scan.
Cisco Security Risk Score
The Cisco Security Risk Score is represented on a scale from 0-100. It quantifies the risk of a vul-
nerability by looking at the technical severity and how real-world attackers are leveraging the vul-
nerability in the wild. A variety of vulnerability and threat variables are considered when calculating
this score, including predictive modeling to forecast the weaponization of vulnerabilities, the avail-
ability of recorded exploits or exploit kits, the presence of near real-time exploitation, and other vari-
ables.
To assess and score vulnerabilities in Secure Endpoint, Cisco Vulnerability Intelligence maps soft-
ware running in your environment (i.e. OS vendor, name, version, etc.) to NIST’s National Vul-
nerability Database (NVD) and other knowledge bases to identify related CVEs. A unique Risk Score
is calculated for each of those CVEs using data science-based algorithms and vulnerability intel-
ligence. CVEs with a Risk Score of 33 or higher are analyzed for validation.
You can filter the Computers list by Risk Score and sort the list by ascending or descending score.
Click Risk Score to view the list of CVEs associated with the computer. Each CVE includes:
l The Risk Score.
The Fix Available button will show a list of links to fixes for the vulnerability if one exists.
l Windows 10 and higher; Windows Server 2016 and higher. Windows 10 IoT is not currently sup-
ported
l RedHat Enterprise Linux (and compatible distributions) 7.2 or later
l Ubuntu 18.04 or later
l Oracle Linux (UEK) 7 or later
l Amazon Linux
l SUSE Linux Enterprise
l OpenSUSE
l Debian 10 or later
Supported applications:
l Adobe Acrobat
l Adobe Acrobat DC
Note: Orbital must be enabled on the Linux connector to calculate a Cisco Secur-
ity Risk Score.
Note: Enable Orbital on Windows endpoints for accurate Cisco Security Risk
Score. Orbital runs the "Cisco Vulnerability Management" query daily to determine
which security updates are installed on the endpoint. The Risk Score will not take
into account any installed KBs without Orbital.
Save and Manage Filters
It can be useful to save filters to quickly recall for future use. To save a filter, click Apply and Save
after selecting the filter parameters. Enter a name for the filter in the following Save Filter dialog and
click Save.
You can apply saved filters by selecting from the drop-down list on the Computers page. Save any
changes to the current filter by clicking Update.
You can rename the current filter by clicking on the filter’s name in the top left of the filters interface.
You can also remove the filter by clicking Delete.
Computer Management: Connector Diagnostics
You can remotely trigger diagnostics of a computer by clicking the Diagnose... button in the expanded
computer details view in the Device Trajectory or Computer Management page. You can use this if
you believe your connector is not functioning correctly and either attach the diagnostic file to a support
ticket or perform your own analysis.
Computers require the following minimum versions of the connector to remotely collect diagnostics
with this feature:
l Windows: 6.2.1
l Mac: 1.9.0
l Linux: 1.9.0
l iOS: 1.2.0
Note: Diagnostics can still be gathered locally from earlier versions of the con-
nector.
This generates a diagnostic file containing debug logs that you can download and view from the File
Repository.
Note: Because this feature requires access to the File Repository, the user trig-
gering connector diagnostics must have Two-Factor Authentication enabled on
their account and have privileges to fetch files from the File Repository. (See
Users can access their account settings on this page by clicking My Account.)
You can select the length of the debug session from the drop-down menu and choose options for the
diagnostics.
Note: The options available vary depending on the operating system of the
device.
Filling the Historical Data checkbox for Windows computers collects log files that existed prior to the
request. On Linux and Mac computers, enabling this option prevents log rotation for the duration of the
debug session.
Filling the Kernel Log checkbox for Windows computers collects extra log files generated from kernel
drivers. On Linux and Mac computers, enabling this option enables verbose logging for kernel mod-
ules.
Filling the Include cache database checkbox for iOS devices collects data from web service requests.
Filling the Include Umbrella Logs checkbox for iOS devices collects all Umbrella component logs.
Once you have selected the desired options, click Create. If you have chosen to receive announce-
ments by email (see Users), you will receive an email when the diagnostic file is ready to download
from the File Repository.
To access diagnostic files, you can click Diagnostics, which takes you directly to the File Repository
page filtered by connector diagnostics.
Computer Management: Secure Endpoint iOS Con-
nector
Click the name of an iOS device to view its details.
From the details you can click to view all Events associated with the connector, the Device Trajectory,
and the Audit Log for that device. You can also delete the device. The Move button is disabled
because you cannot move an iOS device using the Secure Endpoint Console. To move a single
device you must use the Meraki Dashboard to re-tag the device to the profile with the linked group.
You can also re-deploy the device to a new profile.
View Changes will take you to a filtered view of the Audit Log, which shows all changes for the specific
computer. You can also click the Events link to open a filtered Events view for the selected computer.
Note: You cannot move an iOS device to a new group from the Secure Endpoint
Console. To move a single device you must use the Meraki Dashboard to re-tag
the device to the profile with the linked group. You can also re-deploy the device to
a new profile. On other MDMs you will have to uninstall the Secure Endpoint iOS
and install it again for the new Group.
Windows System Requirements
These are the minimum system requirements for the Secure Endpoint Windows connector for desktop
computers and servers. The Secure Endpoint Windows connector supports 64-bit versions of these
operating systems on x86 processors. Additional disk space may be required when enabling certain
connector features. These are the Secure Endpoint Windows connector requirements, and do not
take into account Windows system requirements:
l 2 GB RAM.
For more information about software support for Secure Endpoint connector, see Secure Endpoint
Connector Support Policy.
Secure Endpoint Windows Connector Version 8.x (64-bit and ARM only)
Operating System Compatibility
Cisco Secure Endpoint Windows connector 8.0.1 and later requires 64-bit versions of Windows. Win-
dows 11 on ARM requires version 8.4.1 and later. 32-bit versions of the operating system must use
Cisco Secure Endpoint Windows connector 7.x versions. See also Incompatible Windows Software
and Configurations.
Windows 11 All
Windows 11 on ARM All
Windows 10 22H2
21H2
21H1
20H2
2004
Connector Version and Release
Date
1909
1903 or
earlier
IoT
Windows 10 LTSC 2021
2019
Windows 10 LTSB 2016
2015
Windows Server
2022
(Desktop UI and Core)
2019
2016
Legend
Supported operating system and version.
Compatible - connector is functional but OS or connector is out of sup-
port.
Not supported.
2024-08-06 2023-11-27
Windows 11 All
Windows 11 on ARM All
Windows 10 22H2
21H2
21H1
20H2
2004
1909
1903 or
earlier
IoT
Windows 10 LTSC 2021
2019
Windows 10 LTSB 2016
2015
Windows 8 8.1
Legend
Supported operating system and version.
Compatible - connector is functional but OS or connector is out of sup-
port.
Not supported.
WPD
Malicious Activity
Yes No Yes
Protection
7.3.5
Exploit Prevention Yes No
and later
Incompatible Windows Software and Configurations
The Secure Endpoint Windows connector is currently not compatible with:
l ZoneAlarm by Check Point
l Carbon Black (only incompatible with connector versions 6.3.5 and earlier)
The Secure Endpoint Windows connector does not currently support these proxy configurations:
l Websense NTLM credential caching. The currently supported workaround for Secure Endpoint
is either to disable NTLM credential caching in Websense or allow the connector to bypass
proxy authentication through the use of authentication exceptions.
l HTTPS content inspection. The currently supported workaround is either to disable HTTPS con-
or NTLM authentication.
The malicious activity protection engine is not compatible with Hyper-V clusters.
The Secure Endpoint Windows connector does not support these configurations on Windows 10 IoT
Enterprise:
l HORM and UWF are not supported.
l Rootkit scans launched from the connector UI are not compatible with desktop or file vir-
tulization software.
The Secure Endpoint Windows connector does not support these engines and features on
ARM architecture:
l Endpoint Isolation
l Device Control
l Exploit Prevention
l Cloud IOCs
Windows Connector Firewall Exceptions
Firewall exceptions for proper operation of the Secure Endpoint Windows connector can be found in
Connector Firewall Exceptions.
Windows Proxy Autodetection
The connector is able to use multiple mechanisms to support anonymous proxy servers. A specific
proxy server or path to a proxy auto-config (PAC) file can be defined in Policies, or the connector can
discover the endpoint proxy settings from the Windows registry.
The connector can be set to discover endpoint proxy settings automatically. Once the connector
detects proxy setting information, it attempts to connect to the Secure Endpoint Management Server
to confirm that the proxy server settings are correct.
The connector will first use the proxy settings specified in the policy. If the connector is unable to estab-
lish a connection to the Secure Endpoint Management Server it will attempt to retrieve proxy settings
from the Windows registry on the endpoint. The connector will attempt to retrieve the settings only
from system-wide settings and not per-user settings.
If the connector is unable to retrieve proxy settings from the Windows registry, it attempts to locate the
proxy auto-configuration (PAC) file. This can be specified in policy settings or determined using Web
Proxy Auto-Discovery protocol (WPAD). If the PAC file location is specified in policy, it has to begin
with http or https. Note that PAC files supported are only ECMAScript-based and must have a .pac file
extension. If the PAC file is hosted on a Web server, the proper MIME type of application/x-javascript-
config must be specified. Since all connector communications are already encrypted, https proxy is
not supported. For version 3.0.6 of the connector, a socks proxy setting cannot be specified using a
PAC file.
The connector will attempt to rediscover proxy settings after a certain number of cloud lookups fail.
This is to ensure that when laptops are outside of the enterprise network, the connector is able to con-
nect when network proxy settings are changed.
Windows Installer
The installer can be run in either interactive mode or using a series of command line parameters.
Note: If you are running other security products in your environment, there is a
possibility that they will detect the Secure Endpoint connector installer as a threat.
In order to successfully install the connector, add it to an allowed list/exclude it in
the other security products and try again.
Windows Interactive Installer
When installing via the bootstrapper, either as a downloaded file or via email, interaction is required on
the endpoint unless the administrator has used the Windows Installer Command Line Switches to per-
form a silent install and specify options.
If Windows User Access Control (UAC) is enabled, the user is presented with a prompt and should
select Yes to continue.
At this point the Download Manager fetches the appropriate version of the installer package if
installing through the bootstrapper. If the redistributable installer is used then this step is skipped.
1. The install location dialog appears. In most cases, the default location is the best choice. Links
to the connector End User License Agreement and Privacy Policy are also presented. Click
Install to continue.
2. When the install is complete, click Next to continue.
3. Leave the box checked to have an icon for the connector created on the desktop. Click the
Close button to complete the install.
4. If the option to run a flash scan on install was selected, that scan executes. The Windows Sys-
tem Tray icon indicates you are now connected to the Cisco Cloud if you selected Cloud Noti-
fications in the policy applied to the connector.
5. When the scan has completed, click Close to complete all install steps. The connector is now
running on the endpoint.
Windows Installer Command Line Switches
Administrators who have their own deployment software can use command line switches to automate
the deployment. Here is a list of available switches:
l /R - For all connector versions 5.1.13 and higher this must be the first switch used.
l /S - Used to put the installer into silent mode. This must be specified as the first parameter or
l /remove 0 - Uninstalls the connector but leaves files behind useful for reinstalling later.
when you have Enable Connector Protection allows you to require a password to uninstall the
connector or stop its service. enabled in your policy. You must supply the connector Protection
password with this switch.
l /skipdfc 1 - Skip installation of the device flow correlation driver. Any connectors installed using
this flag must be in a group with a policy that has Modes and Engines > Network set to Dis-
abled.
l /skiptetra 1 - Skip installation of the TETRA driver. Any connectors installed using this flag must
be in a group with a policy that has Modes and Engines > TETRA unchecked.
l /D=[PATH] - Used to specify which directory to perform the install. For example, /D=C:\tmp will
Note: Starting with Secure Endpoint Windows connector version 6.3.1, if using
any installer switch that contains a path argument (e.g. /temppath, /D switches)
that contains a single quote character ('), you will need to enclose the entire path
in double quotes ("). If not, the installer will incorrectly parse the argument and
install the connector in a different location than expected.
Running the command line installer without specifying any switches is equivalent to /desktopicon 0
/startmenu 1 /contextmenu 1 /skipdfc 0 /skiptetra 0.
There is a command line switch in Secure Endpoint Windows connector 5.1.3 and higher to enable
users to opt in/out of migrating the install directory from “Sourcefire” to “Cisco” when upgrading from
versions prior to 5.1.1 to versions 5.1.3 and higher. These are as follows:
l /renameinstalldir 1 will change the install directory from Sourcefire to Cisco.
Secure Endpoint Windows connector 6.0.5 and higher has a command line switch to skip the check for
Microsoft Security Advisory 3033929.
l /skipexprevprereqcheck 1 - Skip the check for Microsoft Windows KB3033929.
Note: If you use this switch and do not have this KB installed, or other Windows
Updates that enable SHA-2 code signing support for Windows 7 and Windows
Server 2008 R2, you will encounter issues connecting to the Cisco Cloud.
Secure Endpoint Windows connector 6.0.7 and higher has a command line switch to set the registry
key necessary to receive the Windows Security Update for KB 4072699.
l /kb4072699 1 - Set the registry key value.
Note: The registry key value can only be set using this command line switch. If
you do not set this key either using the switch or manually, you will not receive the
patch. See Cisco Secure Endpoint Compatibility with Windows Security Update
KB4056892 for a list of compatible versions.
Secure Endpoint Windows connector 7.0.5 and higher should no longer require a reboot to complete
any upgrade to a later version. However, there may be instances where this can happen unex-
pectedly, so the installer has a choice to either move forward and complete the upgrade (but will
require a reboot), or fail the upgrade and roll back everything to its previous state/version.
l /overrideupgradefailure 0 - If the upgrade encounters an issue where it isn't able to continue
without rebooting, the upgrade will rollback all changes and send an upgrade failed event.
l /overrideupgradefailure 1 - If the upgrade encounters an issue where it isn't able to continue
without rebooting, the upgrade will continue and a reboot will be required to complete the
upgrade.
Windows Installer Exit Codes
Installer exit codes and descriptions can be found in this TechNote.
Cisco Security Monitoring Service
With versions of Secure Endpoint Windows connector lower than 6.3.1, the connector registers itself
with Windows Security Center (WSC) when the TETRA engine is enabled and its definitions are up to
date. Once it is successfully registered, Windows Defender will be disabled and Secure Endpoint will
be designated as the active Virus and Threat Protection provider.
Starting with Secure Endpoint Windows connector 6.3.1, the Cisco security monitoring service will
now be responsible for registering with WSC. As an anti-malware protected process light (AM-PPL)
service, it will be able to communicate with WSC to enable or disable Windows Defender according to
TETRA’s status.
The user interface supports up to eight concurrent users on the endpoint (connector version 8.1.3 and
later). If a ninth concurrent user attempts to open the client user interface, it will launch but appear to
be disabled. The connector will still be running and providing protection for all users.
From the connector main screen you can choose to launch a scan and view the connector settings.
The connector status is also shown, indicating whether it is connected to the network or if the service
is stopped, when the last scan was performed, and the policy currently applied to the connector.
These entries can be useful in diagnosing connector issues. The log file can be found in %Program
Files%\Cisco\AMP\[version number]\sfc.exe.log.
Scans
Select a scan type from the drop-down and click Start to initiate a scan.
scan is cloud-based and will require a network connection. The flash scan is relatively quick to
perform.
l Custom Scan: Allows the user to define specific files or directories to scan. Selecting Custom
Scan will open a dialog allowing the user to specify what should be scanned.
l Full Scan: Scans the entire computer including all attached storage devices (such as USB
drives). This scan can be time-consuming and resource-intensive, so should only be performed
once when the connector is first installed.
l Rootkit Scan: This scans the computer for signs of installed rootkits. TETRA must be enabled in
Policy to perform a rootkit scan, otherwise the Rootkit Scan button will be hidden.
Note: Rootkit scans are not compatible with desktop or file virtualization software.
Rootkit scans are not currently supported on ARM architecture.
Settings
Click the cog icon to view the settings screen that is divided into Statistics, Update, and Advanced
tabs. The Diagnostics button should only be used at the request of support as part of troubleshooting
connector issues.
The Statistics tab provides information about the connector, including the policy name and serial num-
ber, TETRA engine information, and proxy settings. This can be useful for troubleshooting and support
sessions.
The Update tab lets you initiate a check for and install updates to policy, software, and detection
engine signatures.
The Advanced tab lets you start Debug Logging and view the Event History. Debug logging should
only be used at the request of support as part of troubleshooting connector issues as it can consume
system resources. The Event History button will launch the Windows Event Viewer to show inform-
ational and error events generated by the connector. This includes detection and quarantine events.
Note: Information for the AnyConnect VPN module will also be displayed in Set-
tings when Secure Client is installed.
Windows Connector Command Line Interface
You can also use and manage aspects of the connector from the command line interface. The execut-
able is located at <install path>\<version>\sfc.exe where the install path is the path you specified dur-
ing install and version is the version number of the connector. For example, the default path for
version 8.0.1 of the connector would be:
%Program Files%\Cisco\AMP\8.0.1.21160\sfc.exe
Note: You must specify the full path when using the command line interface.
l sfc.exe -k <password> - stop the connector service where <password> is the Connector Pro-
tection Password is the password you supply to Connector Protection to stop the connector ser-
vice or uninstall it. password.
l sfc.exe -l start - start local debug logging. Debug logging does not persist across restarts of the
Note: You must have administrator privileges to run the connector CLI com-
mands.
Windows Connector Support Tools
The Secure Endpoint Windows connector includes tools to assist in troubleshooting connector issues.
Windows Support Diagnostic Tool
The support diagnostic tool can be found in the Windows Start menu under the Cisco AMP for End-
points Connector folder. Running the support diagnostic will create a snapshot and save it to the
desktop as CiscoAMP_Support_Tool_[datetime].zip where [datetime] is the date and time the tool was
run. You should only need to run this tool at the request of Cisco support.
Windows Timed Diagnostic Tool
The timed diagnostic tool can be found in the Windows Start menu under the Cisco AMP for Endpoints
Connector folder. Running timed diagnostic will log activity for 30 minutes and save it to the desktop
as CiscoAMP_Support_Tool_[datetime].zip where [datetime] is the date and time the tool was run.
You should only need to run this tool at the request of Cisco support.
Windows Connectivity Test Tool
You can use the connectivity test tool to assist troubleshooting if any of your connectors have difficulty
reaching the Cisco cloud. It is available for version 5.1.1 and later of the Secure Endpoint Windows
connector.
Open a command prompt using Run as administrator and navigate to the tool install folder. The tool is
located in
%ProgramFiles%\Cisco\AMP\[Version]\ConnectivityTool.exe
where [Version] is the version number of the connector, such as 5.1.1. You can run the tool with the /?
switch to view a list of command line switches and what they do.
Switches include:
If you run the tool without specifying any switches it runs with all switches enabled.
Each time you run the tool it will create a log file in the same directory with the file name Con-
nectivityTool.exe.log.
Uninstall the Windows Connector
Remote Uninstall should be used as the primary method to uninstall a connector. If the Remote Unin-
stall button is not available for a connector - it may be isolated, not have an internet connection, or was
installed via Secure Client - then it must be uninstalled locally:
You will be presented with a prompt asking if you want to delete all the connector history and quar-
antine files. Reboot the computer to complete the uninstall process if prompted. If you are uninstalling
connector versions 7.0.5 and later the computer should not require a reboot under most conditions.
Note: On Windows 8 and higher, if Fast Startup mode is enabled and you are
prompted to reboot, you should reboot the computer after uninstall is complete
rather than using the Windows shutdown option. This will ensure that the final
cleanup steps to remove the connector drivers complete properly.
Cisco Secure Client
Cisco Secure Client allows you to deploy the Secure Endpoint Windows connector and other sup-
ported Cisco Secure modules to endpoints as a single package managed by a cloud management
module.
You will have to enable Cisco XDR or Secure Client Cloud Management Integration to use Secure Cli-
ent. Once the integration has been activated, you will be able to download the full Secure Client
installer from the Download Connector page in the Secure Endpoint console or from the Cisco XDR or
Secure Client Cloud Management console. See Client Management in Cisco XDR or Client Man-
agement in Secure Client Cloud Management for more information on configuring additional Secure
Client settings and adding the AnyConnect VPN module.
Note: When you enable Secure Client in Cisco XDR or Secure Client Cloud Man-
agement, read/write API Credentials are created in your Secure Endpoint organ-
ization so an install token can be created.
The Secure Client user interface is the same as the Windows Connector User Interface with the addi-
tion of AnyConnect VPN module settings.
The Secure Endpoint part of the user interface supports up to eight concurrent users on the endpoint
(connector version 8.1.3 and later). If a ninth concurrent user attempts to open the client user inter-
face, it will launch but appear to be disabled. The connector will still be running and providing pro-
tection for all users. The other Secure Client module user interfaces do not currently support
concurrent users.
Secure Client Installer Command Line Switches
Administrators who have their own deployment software can use command line switches to automate
the deployment. Here is a list of available switches:
l -c or --cleanup - Enable removal of the temp directory on exit. Use -c=false to preserve the temp
l -q or --quiet - Run the installer silently. This option will also need to be used to install Secure Cli-
15
14
13
12
11.3 to 11.7
11.2 and older
Legend
Compatible.
Compatible - connector is functional but OS or connector is out of sup-
port.
Not supported.
Incompatible macOS Software and Configurations
The Secure Endpoint Mac connector does not currently support the following proxy configurations:
l Websense NTLM credential caching: The currently supported workaround for Secure Endpoint
is either to disable NTLM credential caching in Websense or allow the connector to bypass
proxy authentication through the use of authentication exceptions.
l HTTPS content inspection: The currently supported workaround is either to disable HTTPS con-
or NTLM authentication.
Mac Connector Firewall Exceptions
Firewall exceptions for proper operation of the Secure Endpoint Mac connector can be found in Con-
nector Firewall Exceptions.
Mac Connector Proxy Autodetection
The connector is able to use multiple mechanisms to support anonymous proxy servers. A specific
proxy server can be defined in Policies or the connector can discover endpoint proxy settings defined
in a proxy auto config (PAC) file. The location (URL) of this file is set in macOS network adapter set-
tings.
When the proxy type is set in policy to Automatic Proxy Configuration, and Automatic Proxy Con-
figuration is enabled on the endpoint with a URL to a valid pac file, the connector can discover these
endpoint proxy settings automatically. Once the connector detects proxy setting information, it
attempts to connect to the Secure Endpoint Management Server to confirm that the proxy server set-
tings are correct. The connector will attempt to retrieve the settings only from system-wide settings
and not per-user settings.
Note that PAC files supported are only ECMAScript-based and must have a .pac file extension. If the
PAC file is hosted on a Web server, the proper MIME type of application/xjavascript-config must be
specified. Since all connector communications are already encrypted, https proxy is not supported.
The connector will attempt to rediscover proxy settings every 30 minutes or after a certain number of
cloud lookups fail. This is to ensure that when laptops are outside of the enterprise network, the con-
nector is able to connect when network proxy settings are changed.
See Secure Endpoint Mac Proxy Automatic Configuration (PAC) Setup Guide for more information.
Install the Secure Endpoint Mac Connector
The Secure Endpoint Mac connector is distributed in two formats:
l macOS install package (.pkg)
To install the Mac connector that is distributed as a .pkg file, double-click the file to start the installation
process.
To install the Mac connector that is distributed as a .dmg file, double-click the file to open the disk
image and follow the on-screen instructions.
You can also install the pkg file from the terminal using the installer command. For more information,
type man installer from the terminal.
Note: Starting with connector version 1.10.0, file scan operations are performed
using an unprivileged process. During connector installation, a user and group
named cisco-amp-scan-svc are created on the system. If this user or group
already exists but is configured differently, then the installer will attempt to delete
and then re-create them with the necessary configuration. The installer will fail if
the user and group could not be created with the necessary configuration.
Note: If you are running other security products in your environment, there is a
possibility that they will detect the Secure Endpoint connector installer as a threat.
In order to successfully install the connector, add it to an allowed list/exclude it in
the other security products and try again.
Install the Secure Endpoint Mac Connector through Auto-
mation
To install the connector using a script or other automation, use a workflow similar to the following
steps:
1. Download amp_<groupname>.dmg from the Secure Endpoint Console.
2. Push amp_<groupname>.dmg to your endpoints.
3. Mount the .dmg file.
l $ hdiutil attach amp_<groupname>.dmg
Note: The user will have to accept the MDM profile on Macs running macOS
10.13.4 and later if they are not in the Device Enrollment Program (DEP).
Note: The user will have to accept the MDM profile on Macs running macOS
10.13.4 and later if they are not in the Device Enrollment Program (DEP).
Endpoints that have not granted access to the protected paths will send an event that is visible in the
Secure Endpoint Console. You can determine which connectors may be operating in a degraded state
by reviewing the devices generating this event type.
Secure Endpoint Mac Connector UI
You can determine the Mac connector’s status from the icon’s appearance on your Mac’s menu bar.
Operational: The connector is connected to the Cisco cloud and the system is protected.
Alert: The connector has encountered an error and is not operating correctly. Protection is off and
action is required.
Offline: The connector is disconnected from the Cisco cloud. Protection is limited to the offline engine.
Click on the icon to display the menulet. This provides information such as when the last scan was per-
formed, the current status, and the policy the connector is using. You can also start, pause, and cancel
scans from the menulet.
The menulet may also notify you of action that needs to be taken and connector faults.
Note: The Secure Endpoint Mac connector uses a command line interface in addi-
tion to a graphical user interface on endpoints. The connector command line inter-
face can be found at /opt/cisco/amp/ampcli. It can be run in interactive mode or
execute a single command then exit. Use ./ampcli --help to see a full list of options
and commands available.
Action Required
The connector icon in the menu bar will flash when the connector requires action to be taken to return
to a operational state. When you click on a required action in the menulet, you will be guided on-
screen through the process of performing the action.
Settings
The Settings interface allows the individual user to see how the policy administrator has chosen to con-
figure all aspects of the policy applied to the particular connector. In a managed install, all the entries
in the settings are read-only and provided solely for informational and diagnostic purposes.
Sync Policy
Sync Policy will check to make sure your connector is running the most recent version of the policy. If
not, it will download the latest version.
Mail.app
Email messages containing malware will not be quarantined by the Secure Endpoint Macconnector to
prevent corruption of the local mail database. Email messages will still be scanned and a detection
event will be generated for any malware allowing the administrator to remove the malicious email dir-
ectly from the mail server but a quarantine failed event will also appear. If Mail.app is configured to
automatically download attachments, any malicious attachments will be quarantined as expected.
The Mac connectivity test tool is integrated into the connector command line interface, which can be
found at /opt/cisco/amp/ampcli. It can be run in interactive mode or execute a single command then
exit. Use /ampcli connectivity-test help to see a full list of commands available for the Mac connectivity
test tool.
The command line tool will be blocked while a test is in progress. The results of the test will be printed
to the command line interface and logged to the support path under /op-
t/cisco/amp/etc/connectivitytool. Logs will be named by their test type followed by a timestamp. For
example, Janus_Event_Intake_Test_2023-12-08-22:26:32.log. The log files will be removed after 24
hours.
Uninstall the Mac Connector
Remote Uninstall should be used as the primary method to uninstall a connector. If the Remote Unin-
stall button is not available for a connector - it may be isolated or not have an internet connection -
then it must be uninstalled locally:
Navigate to the installation folder Applications > Cisco Secure Endpoint and double-click the Uninstall
Secure Endpoint Connector.pkg file. Follow the steps in the wizard to uninstall the application. Orbital
will be automatically removed as part of the uninstall process if it was enabled.
Because the uninstaller does not remove the cisco-amp-scan-svc user and group, run the following
two commands to delete the user and group:
The Secure Endpoint Mac connector will have to be manually removed if for any reason the uninstaller
is not successful. For manual uninstallation, see this TechZone article.
Linux System Requirements
The Secure Endpoint Linux connector system requirements are:
l Only 64-bit operating systems are supported.
The Secure Endpoint Linux connector requirements do not take into account Linux system require-
ments or other applications and services.
With Linux-only ClamAV Definitions
Minimum Recommended
Cores 2 4 or more
Memory 1 GB 2 GB
Minimum Recommended
Cores 2 4 or more
Memory 3 GB 4 GB
The Secure Endpoint Linux connector is not supported on low-resource AWS burstable instances
smaller than medium. For example, nano, micro, and small instances are not supported even if they
otherwise meet the minimum system requirements. Ensure any instance the connector is deployed on
meets the minimum system requirements and has sufficient baseline performance to maintain con-
sistent system monitoring. The AWS t3.medium and t4g.medium instances and higher provide suf-
ficient resources for consistent system monitoring under most loads.
Note: The Secure Endpoint Linux connector may not install or run properly on cus-
tom and unsupported kernels. If you have a custom kernel, contact Support before
attempting to install. If you have an unsupported kernel, you may be able to build
kernel modules for that version. See Building Cisco Secure Endpoint Linux Con-
nector Kernel Modules for more information.
l Debian-Based
RPM-Based
Enterprise Linux (x86 and ARM architecture)
Enterprise Linux includes:
l Rocky Linux
l Alma Linux
l CentOS Linux
5.14.0-427
(x86_64
9.4
and
aarch64)
5.14.0-362
(aarch64)
9.3
5.14.0-362
EL9 (x86_64)
5.14.0-284
9.2
(x86_64)
5.14.0-162
9.1
(x86_64)
5.14.0-70
9.0
(x86_64)
4.18.0-553
8.10
(x86_64)
4.18.0-513
8.9
EL8 (x86_64)
4.18.0-477
8.8
(x86_64)
8.7 4.18.0-425
Connector Version and Release
Minimum Date
Supported
Distribution Version 1.25.x 1.24.x 1.23.x 1.20.x
Kernel Ver-
sion 2024- 2024- 2023- 2022-
09-17 01-24 10-02 07-11
(x86_64)
4.18.0-372
8.6
(x86_64)
4.18.0-348
8.5
(x86_64)
4.18.0-305
8.4
(x86_64)
4.18.0-240
8.3
(x86_64)
4.18.0-193
8.2
(x86_64)
4.18.0-147
8.1
(x86_64)
3.10.0-
7.9 1160 (x86_
64)
3.10.0-
7.8 1127 (x86_
64)
3.10.0-
7.7 1062 (x86_
64)
EL7 3.10.0-957
7.6
(x86_64)
3.10.0-862
7.5
(x86_64)
3.10.0.693
7.4
(x86_64)
3.10.0-514
7.3
(x86_64)
7.2 3.10.0-327
Connector Version and Release
Minimum Date
Supported
Distribution Version 1.25.x 1.24.x 1.23.x 1.20.x
Kernel Ver-
sion 2024- 2024- 2023- 2022-
09-17 01-24 10-02 07-11
(x86_64)
2.6.32-754
6.10
(x86_64)
2.6.32-696
6.9
(x86_64)
2.6.32-573
6.7
(x86_64)
EL6
2.6.32-504
6.6
(x86_64)
2.6.32-504
6.5
(x86_64)
2.6.32-358
6.4
(x86_64)
Legend
Compatible.
Compatible - connector is functional but OS or connector is out of sup-
port.
Not supported.
5.15.0-205 (x86_
9.4
64 and aarch64)
5.15.0-200
(aarch64)
9.3
5.15.0-200 (x86_
Oracle Linux 64)
9 (UEK) 5.15.0-101 (x86_
9.2
64)
5.15.0-3 (x86_64)
9.1
5.15.0-0 (x86_64)
9.0
5.15.0-206 (x86_
8.10
64)
5.15.0-200 (x86_
8.9
64)
5.15.0-101 (x86_
8.8
64)
5.15.0-3 (x86_64)
8.7
Oracle Linux
5.4.17-2136
8 (UEK) 8.6
(x86_64)
5.4.17-2136
8.5
(x86_64)
5.4.17-2102
8.4
(x86_64)
5.4.17-2011
8.3
(x86_64)
8.2 5.4.17-2011
Connector Version and
Release Date
Minimum Sup- 1.25.x
Distribution Version ported Kernel 1.24.x 1.23.x
Version
2024- 2024- 2023-
09-17 01-24 10-02
(x86_64)
5.4.17-2011
7.9
(x86_64)
Oracle Linux 4.14.35-1902
7.8
7 (UEK) (x86_64)
4.14.35-1902
7.7
(x86_64)
Legend
Compatible.
Compatible - connector is functional but OS or connector is out of sup-
port.
Not supported.
Amazon Linux
6.1 (x86_64 and aarch64)
2023
5.10 (aarch64)
5.10 (x86_64)
Amazon Linux
5.4 (x86_64)
2
4.18 (x86_64)
4.14 (x86_64)
Legend
Compatible.
Compatible - connector is functional but OS or connector is out of sup-
port.
Not supported.
Upgrade the Amazon Linux 2 (x86) kernel to the latest version to receive security patches and take
advantage of the latest Secure Endpoint Linux connector features.See this article for kernel upgrade
guidance.
Note: The 4.14 kernel version uses kernel modules for system event monitoring
on the endpoint instead of eBPF. Newer Linux connector features can require
eBPF. We recommend that you upgrade to an Amazon Linux Extras kernel ver-
sion for compatibility with the newest connector features. See this article for kernel
upgrade guidance.
246.539 (2023-09-11)
4.14.291-218.527 (2022-09-06) to 4.14.322-
1.22.1
244.536 (2023-08-17)
4.14.285-215.501 (2022-08-07) to 4.14.318-
1.22.0
241.531 (2023-06-28)
15 SP6 /
6.4.0 (x86_64)
15.6
Legend
Compatible.
Compatible - connector is functional but OS or connector is out of sup-
port.
Not supported.
Debian-Based
Ubuntu LTS (x86 and ARM)
Only Long Term Support (LTS) versions of Ubuntu are supported.
6.8.0-41-generic
24.04.1 (amd64 and
Ubuntu 24 arm64)
LTS 6.8.0-11-generic
24.04.0 (amd64 and
arm64)
6.5.0-18-generic
22.04.4 (amd64 and
arm64)
6.2.0-26-generic
(arm64)
22.04.3
6.2.0-26-generic
Ubuntu 22 (amd64)
LTS
5.19.0-32-generic
22.04.2
(amd64)
5.15.0-43-generic
22.04.1
(amd64)
5.15.0-25-generic
22.04.0
(amd64)
5.15.0-67-generic
20.04.6
(amd64)
5.15.0-46-generic
Ubuntu 20 20.04.5
(amd64)
LTS
5.13.0-30-generic
20.04.4
(amd64)
20.04.3 5.11.0-37-generic
Connector Version and
Release Date
Minimum Sup-
Distribution Version ported Kernel 1.25.x 1.24.x 1.23.x
Version
2024- 2024- 2023-
09-17 01-24 10-02
(amd64)
5.4.0-66-generic
20.04.2
(amd64)
5.4.0-42-generic
20.04.1
(amd64)
5.4.0-26-generic
20.04.0
(amd64)
5.4.0-84-generic
18.04.6
(amd64)
5.4.0-42-generic
18.04.5
(amd64)
Ubuntu 18 5.3.0-28-generic
18.04.4
LTS (amd64)
5.0.0-23-generic
18.04.3
(amd64)
4.18.0-15-generic
18.04.2
(amd64)
Legend
Compatible.
6.1.0-15 (arm64)
Debian 12
6.1.0-15 (amd64)
Debian 11 5.10.0-26 (amd64)
Legend
Compatible.
Compatible - connector is functional but OS or connector is out of sup-
port.
Not supported.
1.25.x 6.9
1.24.x 6.8
1.23.x 6.3
1.20.7 5.19
Incompatible Linux Software and Configurations
The Secure Endpoint Linux connector may cause unmount failures with removable media or tem-
porary file systems mounted in non-standard locations in CentOS and Red Hat Enterprise Linux ver-
sions 6.x. In accordance with the File System Hierarchy Standard, removable media such as USB
storage, DVDs, and CD-ROMs should be mounted to /media/ while temporarily mounted file systems
such as NFS file system mounts should be mounted to /mnt/. Mounting removable media or tem-
porary file systems to other directories can cause a conflict where unmount fails due to device busy.
Upon encountering an unmount failure, the user must stop the cisco-amp service, retry the unmount
operation, then restart cisco-amp.
The Secure Endpoint Linux connector does not support UEFI Secure Boot on the following operating
system versions:
l CentOS 6
l CentOS 7
l Amazon Linux 2
l Oracle Linux 6
Execute the following command to install the connector on other supported distributions:
sudo yum localinstall [rpm package] -y
where [rpm package] is the name of the file, for example amp_Audit.rpm.
Note: There is a possibility that other security products in your environment will
detect the Secure Endpoint connector installer as a threat. Add it to an allowed
list/exclude it in the other security products and try again if this occurs.
Note: File scan operations are performed using an unprivileged process. A user
and group named cisco-amp-scan-svc are created on the system during install-
ation. The installer will attempt to delete and then re-create this user or group with
the necessary configuration if they already exist but are configured differently. The
installer will fail if the user and group could not be created with the necessary con-
figuration.
Linux Connector Updates
For connectors in a private cloud environment and connector versions prior to 1.17.0 in a public cloud
environment, the Cisco GPG Public Key must be manually imported on the machine after the con-
nector is installed to support updates via policy. You can also copy the GPG Public Key from the Down-
load Connectors page to verify the signing of the RPM or DEB. The connector can be installed without
the GPG key, but if you plan on pushing connector updates via policy you will need to import the GPG
key into your RPM DB on rpm-based Linux or your debsig keychain on Debian-based systems.
Follow the steps outlined for Debian-based distributions under the Verifying the Linux Connector Pack-
age section of this article to import the GPG key.
The Updater is run by the system's init daemon and when an update is available, automatically trig-
gers the RPM upgrade process. Some SELinux configurations forbid this behavior and will cause the
Updater to fail. If you suspect this is happening, examine the system's audit log (e.g., /var/-
log/audit/audit.log) and search for denial events related to ampupdater. You may need to adjust
SELinux rules to allow Updater to function.
Secure Endpoint Linux Connector
The Secure Endpoint Linux connector uses a command line interface that can be found at /op-
t/cisco/amp/bin/ampcli. It can be run in interactive mode or execute a single command then exit. Use
./ampcli --help to see a full list of options and commands available. All log files generated by the con-
nector can be found in /var/log/cisco.
The Linux connectivity test tool is integrated into the connector command line interface, which can be
found at /opt/cisco/amp/ampcli. It can be run in interactive mode or execute a single command then
exit. Use /ampcli connectivity-test help to see a full list of commands available for the Linux con-
nectivity test tool.
The command line tool will be blocked while a test is in progress. The results of the test will be printed
to the command line interface and logged to the support path under /op-
t/cisco/amp/etc/connectivitytool. Logs will be named by their test type followed by a timestamp. For
example, Janus_Event_Intake_Test_2023-12-08-22:26:32.log. The log files will be removed after 24
hours.
Uninstall the Linux Connector
Remote Uninstall should be used as the primary method to uninstall a connector. If the Remote Unin-
stall button is not available for a connector - it may be isolated or not have an internet connection -
then it must be uninstalled locally:
Execute the following command to uninstall the Secure Endpoint Linux connector on Debian-based
systems:
s udo apt - get r emov e c i s c oampc onnec t or - y
Execute the following command to uninstall the Secure Endpoint Linux connector on SUSE:
s udo z y pper r emov e - y c i s c oampc onnec t or
Execute the following command to uninstall the connector on other supported distributions:
s udo y um r emov e c i s c oampc onnec t or - y
This will leave behind local data including history, quarantined files, and the cisco-amp-scan-svc user
and group. Run the following script if you do not plan on reinstalling the connector and want to remove
the remaining files:
/ opt / c i s c o/ amp/ bi n/ pur ge_amp_l oc al _dat a
Note: This will check for Orbital as it is a child dependency and remove it if
needed.
If you prefer to use dpkg, specify Orbital to make sure Orbital is removed when needed:
s udo dpk g - - r emov e c i s c o- or bi t al c i s c oampc onnec t or
Run the following script if you do not plan on reinstalling the connector and want to remove Orbital:
s udo apt - get pur ge c i s c oampc onnec t or - y
Note: This will check for Orbital as it is a child dependency and purge if needed.
If you prefer to use dpkg, also specify Orbital to make sure Orbital is purged when needed:
s udo dpk g - - pur ge c i s c o- or bi t al c i s c oampc onnec t or
Note: You can use the Ubuntu Software Center to uninstall the connector but it will
not remove local data and configuration. You will still need to run the script above
to remove those files.
Secure Endpoint iOS Connector
The Secure Endpoint iOS connector provides unprecedented visibility by monitoring app use and net-
work activity on supervised iOS devices with a module named Clarity. Clarity is managed within the
Secure Endpoint console and is a single location for investigating incidents and device activity across
your entire Secure Endpoint iOS deployment. Before you can deploy the Secure Endpoint iOS con-
nector you have to set up your MDM Integration.
For information on installing and configuring Umbrella see the Secure Endpoint iOS Umbrella Setup
Guide.
iOS System Requirements
l The following are the minimum system requirements for the Secure Endpoint iOS connector:
l The device must be running in supervised mode and managed using a Mobile Device Manager
(MDM). See your MDM documentation for further requirements around device settings and con-
figuration.
l 5 MB free space.
You will also have to set up MDM Integration between the Secure Endpoint Console and one of the fol-
lowing Mobile Device Managers:
l Meraki System Manager (SM)
l MobileIron
l IBM MaaS360
l Jamf Pro
l MobiConnect
l Workspace ONE
l Microsoft Intune
17
16
15
Legend
Supported operating system and version.
Compatible - connector is functional but OS or connector is out of sup-
port.
Not supported.
iOS Connector Known Issues
l Deleting a device in the Secure Endpoint console will not de-provision it in your MDM (either
remove the app configuration or the app itself). The workaround is to remove the Secure End-
point iOS app from devices via the MDM and they will continue to appear in the Secure End-
point console until manually deleted.
l If installing the Secure Endpoint iOS connector using Apple Configurator, there is a known
issue where the serial number is not being populated correctly.
l Devices with some emoji names may not register. Most emoji are handled.
l The Secure Endpoint console is not notified when the app is uninstalled from a device. This
means that when the Secure Endpoint iOS connector is uninstalled and reinstalled there will be
duplicate entries for that device in the console.
l Identity sync (if enabled) may cause duplicate Secure Endpoint iOS connectors to appear in the
console if a device is wiped and the connector is installed again.
l Clarity does not have visibility for per-app VPN or App tunneling traffic, therefore the Secure
Endpoint console is not able to display the traffic on Device Trajectory.
l When deploying two profiles to the same device, if both profiles contain the same module (Clar-
ity or Umbrella), then an error is thrown in your MDM and the second profile is not deployed. For
example, if profile1 containing only Clarity is deployed first, profile2 containing Clarity and
Umbrella won't be deployed, and the app has only Clarity configured in profile1 running. If two
profiles do not have any common module, both profiles are deployed. For example, profile1 con-
taining only Clarity is deployed first, then profile2 containing only Umbrella will be deployed as
well, and the app has both Clarity and Umbrella running.
l Cisco Security connector 1.2.0 and lower does not have visibility for TOR traffic in Active Block
mode and is unable to block the traffic.
l Cisco Security connector version 1.3.0 and higher has visibility into TOR traffic in all modes and
is able to block the traffic, but its ability to do so is limited to browsers that disclose IP inform-
ation.
iOS Connector Firewall Connectivity
The Secure Endpoint iOS connector needs access to certain servers over specific ports if your
devices are used on wifi networks behind a firewall. Firewall exceptions for proper operation of the
Secure Endpoint iOS connector can be found in Connector Firewall Exceptions.
Clarity Domain Exclusions
A domain exclusion list allows you to specify domains that Clarity will ignore. Any network activity to
domains on this list will not be reported to the Cisco cloud and will not appear in Mobile App Trajectory
or Device Trajectory. The exclusion list is specified through your Mobile Device Manager dashboard.
Clarity supports exclusions via exact hostname matching or sub-domains using wild cards. For
example, you can exclude the exact hostname www.cisco.com or you can exclude the sub-domain
*.cisco.com, which will exclude www.cisco.com, cisco.com, and any other sub-domains in the cisco.-
com primary domain.
Meraki Domain Exclusions
On your Meraki dashboard open a profile with the Secure Endpoint iOS connector and select Clarity
Content Filter.
Add a key domain_exclusions_list and select List from the Type drop-down. Add hostnames or sub-
domains in the Value field and save your changes. You can add multiple hostnames and sub-domains
to the list.
On an iOS device open the Secure Endpoint iOS connector and go to Clarity status. Select Domain
Exclusions to verify the list you added.
Note: If you modify a Clarity profile through your Meraki dashboard to add domain
exclusions, these changes will be overwritten any time you make a change to the
Clarity policy through your Secure Endpoint console.
Workspace ONE Domain Exclusions
To add domain exclusions in Workspace ONE you will have to download and edit a new Mobileconfig
file.
1. Download the Deploy via Workspace ONE Mobileconfig file for the group you want to add exclu-
sions to.
2. Open the Mobileconfig file in a text editor.
3. Add your domain exclusion list within the block shown in the example below. Save the file.
<key>VendorConfig</key>
<dict>
<key>affiliate_guid</key>
<string>7e9d7d2a-b554-50f4-3ebb-d275f6f9aa30</string>
<key>cloud_asn1_server_host</key>
<string>cloud-ios-asn.amp.cisco.com</string>
...
<key>domain_exclusions_list</key>
<array>
<string>www.google.com</string>
<string>*.cisco.com</string>
<string>www.reddit.com</string>
<string>*.office.opendns.com</string>
</array>
</dict>
4. To update an existing profile go to Devices > Profiles & Resources > Profiles on your Work-
space ONE dashboard.
5. Open the Clarity profile and click Add Version.
6. Add the modified Mobileconfig section under Custom Settings.
MobileIron Domain Exclusions
To add domain exclusions in MobileIron you will have to download and edit a new Mobileconfig file.
1. Download the Deploy via MobileIron Mobileconfig file for the group you want to add exclusions
to.
2. Open the Mobileconfig file in a text editor.
3. Add your domain exclusion list within the block shown in the example below. Save the file.
<key>VendorConfig</key>
<dict>
<key>affiliate_guid</key>
<string>7e9d7d2a-b554-50f4-3ebb-d275f6f9aa30</string>
<key>cloud_asn1_server_host</key>
<string>cloud-ios-asn.amp.cisco.com</string>
...
<key>domain_exclusions_list</key>
<array>
<string>www.google.com</string>
<string>*.cisco.com</string>
<string>www.reddit.com</string>
<string>*.office.opendns.com</string>
</array>
</dict>
4. Existing profiles in MobileIron cannot be edited so you will have to replace the existing profile
with the edited Mobileconfig using the same procedure to create a Deploy via MobileIron profile.
Upgrade the Secure Endpoint iOS Connector
When an updated version of the Secure Endpoint iOS connector is available it will be pushed to the
App Store and updated from there.
Uninstall the Secure Endpoint iOS Connector
See the documentation for your MDM for instructions on removing apps from managed devices.
Prevent Secure Endpoint iOS Connector Being Disabled
Over Cellular Data
The iOS Settings app allows users to configure the ability to enable and disable cellular data usage on
the device as a whole and for each app. If cellular data usage is disabled for the Secure Endpoint iOS
connector it is unable to provide any protection when the device is using a cellular network for data
instead of wifi.
Administrators can disable access to cellular data settings through the MDM dashboard. This will pre-
vent the user from turning off cellular data usage for the Secure Endpoint iOS connector.
Note: Making these changes will prevent the user from turning off cellular data
usage for all apps on the device.
Meraki
1. Navigate to Profiles & Settings in the Meraki dashboard.
2. Add Restrictions if they have not already been added.
3. Uncheck Allow changes to cellular data usage for apps (iOS 7+) under iOS restrictions (super-
vised).
MobileIron
For MobileIron you must use the Apple Configurator 2 app to modify the Clarity mobileconfig file down-
loaded from the Secure Endpoint or Umbrella console.
1. Open the mobileconfig file in Apple Configurator.
2. Select Restrictions in the left pane.
3. Uncheck Allow modifying cellular data pp settings (supervised only).
4. Save the mobileconfig file and import it into your MobileIron MDM.
Workspace ONE
1. Navigate to Devices > Profiles & Resources > Profiles in the Workspace ONE dashboard.
2. Locate your Clarity or Umbrella profile and open it.
3. Click Add Version.
4. Uncheck Allow changes to cellular data usage for apps under Restrictions.
2. On the main screen, tap Status. A green check mark icon shows next to each component that is
running.
3. Tap Protected by Clarity to see the Clarity status details. You can find the connector GUID on
this screen for troubleshooting.
Problem Report
Users can send problem reports from the app. The email address to send reports to is specified on the
MDM Integration page.
Note: If integrated with Umbrella, the email address for problem reports is spe-
cified in the Umbrella portal.
You can download the app from the Google Play Store or directly from the Secure Endpoint console.
If you download the APK from the Console, it is recommended that you use a Mobile Device Manager
(MDM) to push the app to the devices in your organization through a Managed Configuration.
Note: Users who install the app through Google Play will receive connector
updates depending on the Play Store app Auto-update apps setting.
14
13
12
11
10
9
8
Legend
Supported operating system and version.
Not supported.
Android Connector Firewall Exceptions
To allow the connector to communicate with Cisco systems when on wifi, the firewall must allow the cli-
ents to connect to certain servers over specific ports. Firewall exceptions for proper operation of the
Secure Endpoint Android connector can be found in Connector Firewall Exceptions.
Android Installer
You may be prompted to review the permissions required before installation begins.
Note: If you installed the app from Google Play you must use the activation link on
your device before opening the app. Users should tap the link from email or a
browser window. Do not paste the URL into the browser address bar.
3. Enter a name for the device as it should be displayed in the Secure Endpoint console and tap
Proceed.
4. The Secure Endpoint Android connector will then attempt to establish a connection to the Cisco
Cloud.
Note: On a new connector install on Android 12 and higher you will need to set the
connector app to open the Secure Endpoint console URLs by default. To do this,
make sure to open the app after it is installed and follow the instructions in the dia-
log.
5. The application will begin an initial scan of the device for any malicious or non-compliant apps.
After the scan is complete, tap the Summary button to view a summary of clean and malicious
apps as well as any that were on the Custom Detections - Android list associated with the con-
nector policy.
6. You can check the Status page to verify the connector is properly provisioned, registered, and
connected to the Cisco cloud.
Battery Optimization
Android devices may set Battery Optimization for certain apps running in the background. If the device
has enabled Battery Optimization for the CiscoSecure Endpoint app, the operating system will prevent
the application from running in the background after a period of time. This will prevent real-time scan-
ning when new apps are installed. To make sure all apps are scanned, you must disable optimization
for the CiscoSecure Endpoint app in your device settings. See the documentation for your version of
Android for steps to disable the setting.
Android Connector User Interface
Tap the Secure Endpoint Android connector icon to launch the app.
Note: On a new connector install on Android 12 and higher, the first time you
launch the app you will be asked to set the connector app to open the Secure End-
point console URLs by default. Follow the instructions in the dialog to continue.
Removing Threats
If at any time a threat or non-compliant app is detected on the device, the user must take steps to
remediate it. When a threat is detected, a notification will appear in the status bar. Further information
can be viewed by expanding the notification center or opening the Secure Endpoint Android app.
After a scan is completed, tap the Summary button to view a chart with how many apps were scanned,
how many of those apps were clean, the number that were malicious, and the number matching an
entry in a Custom Detections - Android list.
Tap on the Clean tab to view a list of apps installed on the device that were clean. Tap on the Mali-
cious tab to see the list of apps that were detected as malware. You can also use the Custom tab to
see the apps from any Custom Detections - Android lists that were detected on the device. On the Mali-
cious and Custom tabs you can also use the Uninstall button to remove the apps.
Under the tabs for clean, malicious, and custom app detections you can search for an app by name.
Retrospective detections
In cases where an app was previously thought to be clean and is later marked as malicious, a ret-
rospective detection can be sent to the connector to move the app from the clean to malicious tab. A
false-positive detection can also be moved from the malicious tab to the clean tab.
Note: Apps can only be moved from malicious to clean if they have not already
been uninstalled manually by the user.
Report a Problem
Report a problem allows the user to upload crash logs to the File Repository. If a support case needs
to be opened, you can provide Cisco support with the file for troubleshooting.
Connector Engines and Features
Each connector uses multiple engines and features to provide detection and response capabilities
against malware, exploits, and ransomware. Settings for these are controlled through settings in
Policies. Some engines and features are only available in certain versions of the connectors and will
be noted.
TETRA
Available for:
l Secure Endpoint Windows connector.
Note: The Windows connector does not currently support TETRA rootkit scans on
ARM architecture.
TETRA is a full antivirus replacement and should never be enabled if another antivirus engine is
installed. TETRA can also consume significant bandwidth when downloading definition updates, so
caution should be exercised before enabling it in a large environment.
To enable TETRA and adjust settings go to Advanced Settings > TETRA in your policy.
ClamAV is a full antivirus replacement and should never be enabled if another antivirus engine is
installed. ClamAV can also consume significant bandwidth when downloading definition updates, so
caution should be exercised before enabling it in a large environment.
To enable ClamAV and adjust settings go to Advanced Settings > ClamAV in your Mac or Linux
policy.
Exploit Prevention
Available for:
l Secure Endpoint Windows connector 6.0.5 and later.
Note: The Windows connector does not currently support Exploit Prevention on
ARM architecture.
The exploit prevention engine defends your endpoints from memory injection attacks commonly used
by malware and other zero-day attacks on unpatched software vulnerabilities. When it detects an
attack against a protected process it will be blocked and generate an event but there will not be a quar-
antine. You can use Device Trajectory to help determine the vector of the attack and add it to a Cus-
tom Detections - Simple list.
To enable the exploit prevention engine, go to Modes and Engines in your policy and select audit or
block mode. Audit mode is only available on Secure Endpoint Windows connector 7.3.1 and later.
Earlier versions of the connector will treat audit mode the same as block mode.
Note: On Windows 7 and Windows Server 2008 R2 you must apply the patch for
Microsoft Security Advisory 3033929 before installing the connector.
Protected Processes
The exploit prevention engine protects the following 32-bit and 64-bit (Secure Endpoint Windows con-
nector version 6.2.1 and higher) processes and their child processes:
l Microsoft Excel Application
l TeamViewer Application
l Zoom
l Slack
l Microsoft Teams
You can exclude any applications from exploit prevention protection by adding Executable Exclusions
for Exploit Prevention.
Note: If you disable exploit prevention you will have to restart any of the protected
processes listed above that were running.
Exploit prevention protects processes it does not normally protect from injection attempts by any
applications launched from those directories.
Excluded Processes
The following processes are excluded from exploit prevention monitoring because of compatibility
issues:
l McAfee DLP Service
Note: The Windows connector does not currently support Exploit Prevention ver-
sion 5 on ARM architecture.
Secure Endpoint Windows connector 7.5.1 includes a significant update to exploit prevention. New
features in this version include:
l Protect network drives - Automatically protects processes running from network drives against
computers using a domain authenticated user (admin). The protection includes only processes
created with one of these tokens: Kerberos, NtLmSsp or Schannel (e.g. psexec). Processes in
the exclusion list are also excluded from remote execution protection.
l AppControl bypass through rundll32 - Stops specially crafted rundll32 command lines that allow
These features are all enabled by default when exploit prevention is enabled in policy.
Note: Activities will only be blocked if exploit prevention is set to Block mode in the
policy. There will only be a detection event if it is set to Audit mode.
Exploit Prevention version 8
Available for:
l Secure Endpoint Windows connector 8.4.0 and later.
Note: The Windows connector does not currently support Exploit Prevention ver-
sion 8 on ARM architecture.
Secure Endpoint Windows connector 8.4.0 and later includes exploit prevention features that provide
new protection capabilities for your endpoints. New features in this version include:
l Mimikatz DC Sync Protection - Block attacks that attempt to retrieve Active Directory pass-
words.
l Mimikatz RDC Protection - Blocks attacks that try to extract clear text credentials from RDP run-
ning sessions.
l PsExec Protection - Blocks attempts to launch psexec.
l AMSI Bypass Protection - Blocks techniques to bypass the anti-malware scan interface (AMSI)
l MBR Protection - Protects against attempts to overwrite the master boot record (MBR).
These features are all enabled by default when exploit prevention is enabled in policy.
Note: Activities will only be blocked if exploit prevention is set to Block mode in the
policy. There will only be a detection event if it is set to Audit mode.
Script Control
Available for:
l Secure Endpoint Windows connector 7.3.1 and later.
Note: The Windows connector does not currently support script control on ARM
architecture.
Script control allows the exploit prevention engine to prevent certain DLLs from being loaded by some
applications and their child processes. The engine will kill a process if it or one of its child processes lis-
ted below attempts to load one of the blocked DLLs.
Child Pro-
Processes Blocked DLLs
cesses
cscript.exe
wscript.exe
power-
winword.exe shell.exe wbemdisp.dll
excel.exe mshta.exe Sys-
powerpnt.ex- cmd.exe tem.Management.Automation.dll
e rundll32.exe Sys-
outlook.exe regsvr32.exe tem.Management.Automation.ni.dll
autoit3.exe
cmstp.exe
node.exe
cscript.exe
wscript.exe
power-
shell.exe
mshta.exe
regsvr32.exe cmd.exe scrobj.dll
rundll32.exe
regsvr32.exe
autoit3.exe
cmstp.exe
node.exe
Incompatible Software
The exploit prevention engine is incompatible with the following software:
l Malwarebytes
l F-Secure DeepGuard
l ByteFence
Note: See this Secure Endpoint TechNote for instructions how to manage EMET
compatibility.
There is also a known issue with Sophos Endpoint Protection that causes MS Word 2016 to fail to exit
properly when you close the application.
System Process Protection
Available for:
l Secure Endpoint Windows connector 6.0.5 and later on x86 and x64.
The system process protection engine protects critical Windows system processes from being com-
promised through memory injection attacks by other processes.
To enable system process protection, go to Modes and Engines in your policy and choose protect or
audit from the system process protection conviction mode.
Note: The Windows connector does not currently support the malicious activity
protection engine on ARM architecture.
The malicious activity protection engine defends your endpoints from ransomware attacks by identi-
fying malicious actions of processes when they execute and stops them from encrypting your data.
Because the malicious activity protection engine detects threats by observing the behavior of running
processes, it can determine if a system is under attack by a new variant of ransomware that may have
eluded other security products and detection technology.
To enable the malicious activity protection engine, go to Modes and Engines in your policy and choose
audit, block, or quarantine from malicious activity protection conviction mode. The malicious activity
protection engine is not currently compatible with Hyper-V clusters.
Note: While the connector will be able to detect and prevent ransomware from
completely compromising your data, some files will be encrypted by the attack
before the connector can determine that the process meets its criteria for being
labeled as ransomware. Unfortunately, it may be impossible to decrypt these files.
However, the connector will report the first 5 files that were modified by the offend-
ing process so that you can easily restore them from backups if necessary.
However, please note that it is possible for more files to be encrypted in the time
from when the connector detects the process as being malicious and when it is
able to successfully block/quarantine the process.
Endpoint Isolation
Available for:
l Secure Endpoint Windows connector 7.0.5 and later.
Note: The Windows connector does not currently support endpoint isolation on
ARM architecture.
Endpoint isolation is a feature that lets you block incoming and outgoing network activity on a Win-
dows computer to prevent threats such as data exfiltration and malware propagation. It is available on
64-bit versions of Windows that support version 7.0.5 and later of the connector.
Endpoint isolation sessions do not affect communication between the Windows connector and the
Cisco cloud. There is the same level of protection and visibility on your endpoints as before the ses-
sion. You can configure IP Isolation Allow Lists of addresses that the connector will not block during an
active endpoint isolation session.
Start an Endpoint Isolation Session
Isolating an endpoint blocks all network traffic except for communication to the Cisco cloud and any
other IP addresses configured in your IP isolation allow list.
The connector user interface will indicate that the endpoint is isolated.
Note: For Secure Endpoint Mac connector only - any cached browser content will
be available but browser connections will be halted. Note that the Mac connector
can also be uninstalled during an isolation session.
Stop an Endpoint Isolation Session
Stopping an isolation session restores all network traffic to an endpoint.
Note: If you enter the unlock code incorrectly 5 times you will not be able to make
another unlock attempt for 30 minutes.
The connector user interface will indicate that the endpoint isolation session has ended.
Note: If you enter the unlock code incorrectly 5 times you will not be able to make
another unlock attempt for 30 minutes.
The connector user interface will indicate that the endpoint isolation session has ended.
Note: Orbital is available for customers with Secure Endpoint advantage package
or higher.
Available for:
l Secure Endpoint Windows connector 7.1.5 and later.
Note: The Windows and Linux connectors do not currently support Orbital on
ARM architecture.
Orbital is a Cisco service that can be deployed on your endpoints then used by Secure Endpoint to
query endpoints for detailed information. Orbital can execute queries immediately, or you can sched-
ule them using the Orbital jobs feature.
Note: The Windows connector does not currently support Orbital on ARM archi-
tecture.
Known Issue/Limitation
The Orbital process is not protected by the connector even when the connector protection feature is
enabled. This means that users with suitable permissions can stop or uninstall the Orbital service. The
Windows connector will reinstall Orbital the next time the update interval is reached.
Orbital macOS Requirements
Orbital requires macOS 10.15 and later. It is available for Secure Endpoint Mac connector version
1.16.0 and later on Intel processors, or 1.20.0 and later on Apple silicon (requires Orbital Node 1.21.0
or later).
If you’re using a Mobile Device Management (MDM) solution (e.g. Cisco Meraki) for deployment and
management, full disk access can be granted using the Privacy Preferences Policy Control Payload in
an MDM profile. This removes the need for action by the end-user. For Secure Endpoint Mac con-
nector 1.14.0 and later see Advisory for Secure Endpoint Mac Connector on macOS 11 (Big Sur),
macOS 10.15 (Catalina, and macOS10.14 (Mojave).
The user will have to accept the MDM profile on Macs running macOS 10.13.4 and later if they are not
in the Device Enrollment Program (DEP).
You can force an Orbital update in Secure Endpoint Windows connector version 7.4.5 and higher
using the following command from the connector install directory using an account with administrator
permission:
sfc.exe -forceOrbitalUpdate
This command will remove any cached versions that failed and retry the current version.
Access Orbital from the Secure Endpoint console
You can access Orbital from the Secure Endpoint console in a couple of ways. Select Analysis >
Orbital Advanced Search to go directly to the Orbital console.
To access Orbital for a specific computer, go to Management > Computers and locate the computer
you want to search. Click the Orbital Advanced Search link for the computer.
This takes you to the Orbital console where you can run queries on the computer. The computer’s
GUID is automatically populated in the Endpoints field in the Orbital console.
For information on running queries in Orbital, see the Quick Start section of the Orbital documentation
at https://orbital.amp.cisco.com/help/quick-start/.
Forensic Snapshot
You can use Orbital to take a forensic snapshot of a computer. A forensic snapshot is a pre-configured
set of queries that gathers forensically relevant information about the current state of the endpoint,
including running processes, loaded modules, autorun executables, and so on.
To access the forensic snapshot feature, go to Management > Computers and locate the computer
you want to search. Click the Take Forensic Snapshot button.
The request is sent to the endpoint. Once the snapshot is complete, click View Snapshot to see the
results.
You can also access the forensic snapshot results from the computer’s device trajectory page.
Script Protection
Available for:
l Secure Endpoint Windows connector 7.2.1 and later on x86 and x64.
The script protection feature provides visibility into scripts executing on your endpoints and helps pro-
tect against script-based attacks commonly used by malware. Script protection provides additional vis-
ibility into the execution chain of scripts in Device Trajectory so that you can observe which
applications are attempting to execute scripts on your endpoints. Script protection requires Windows
10 version 1709 and later or Windows Server 2016 version 1709 and later.
To enable script protection, go to modes and engines in your policy and choose audit or quarantine
from the script protection conviction mode. Script protection is not dependent on TETRA but if TETRA
is enabled script protection will use it to provide additional protection.
Note: When running in quarantine mode script protection has the potential to
impact user applications such as Word, Excel, and Powerpoint. If these applic-
ations attempt to execute a malicious VBA script, the application will be stopped.
l JavaScript (non-browser)
l VBScript
Note: Script protection does not provide visibility nor protection from non-
Microsoft script interpreters such as Python, Perl, PHP, or Ruby.
Script protection provides protection from fileless malware by leveraging the same analysis engine as
behavioral protection (connector version 7.5.1 and later). It analyzes parts of scripts that are executing
(buffers) and comparing them to malicious script signatures that are updated regularly. Scripts with
malicious content detected will be blocked from executing.
Behavioral Protection
Available for:
l Secure Endpoint Windows connector 7.3.1 and later on x86 and x64.
The behavioral protection engine enhances the ability to detect and stop threats behaviorally. It deep-
ens the ability to detect "living-off-the-land" attacks and provides faster response to changes in the
threat landscape through signature updates.
The engine can take the following actions when malicious activity is detected:
l End processes.
l Quarantine files.
l Trigger a Forensic Snapshot for certain detections when Orbital is also enabled.
l Registry events.
l Network events.
Note: Behavioral protection cannot monitor network events if network is set to dis-
abled in Modes and Engines or the connector was installed using the /skipdfc
switch.
Note: Some virtualization technologies, including Hyper-V and VMware, have set-
tings that can mask SSSE3 capabilities in the virtual machine even if the host CPU
supports them. See your virtual machine documentation to ensure these settings
are disabled to use behavioral protection.
Oracle 3.10.0-940
RHEL/CentOS 3.10.0-940
AlmaLinux/Rocky
4.18.0
Linux
SUSE 4.18.0
Debian 4.18.0
Ubuntu 4.18.0
URL Blocking Engine
Available for:
l Secure Endpoint Windows connector 8.2.1 and later.
The URL Blocking Engine scans URLs extracted from HTTP flows and server names from HTTPS
flows where that field is not encrypted. The engine can improve network protection but it has lim-
itations - it does not support proxy configurations, IP allow lists, or audit mode. The performance and
network latency overhead can also be significant. This engine is not recommended for new deploy-
ments. Customers who currently use the URL Blocking Engine are encouraged to consider the Cisco
Umbrella Secure Web Gateway because it can decrypt and inspect all HTTPS web traffic.
This engine is only available when enabled by Support. If you feel you need this feature, contact Sup-
port to enable it. Go to Advanced Settings > Network in your policy settings to enable or disable the
engine.
Remote Uninstall
Available for:
l Secure Endpoint Windows connector.
Note: The Windows connector on ARM architecture and Cisco Secure Client
deployed through Cloud Management on Cisco XDR or Secure Client Cloud Man-
agement are not currently supported.
Note: Isolated connectors and connectors with a proxy enabled through the con-
nector policy cannot be uninstalled remotely. The Uninstall button will be unavail-
able for isolated endpoints. End the isolation session then the uninstall button will
be available.
Secure Endpoint administrators can uninstall connectors from endpoints with this feature.
1. Navigate to Management -> Computers and locate the endpoint you want to uninstall.
2. Expand the computer pane and click Uninstall Connector.
The endpoint will be removed from the Computers list and an audit log entry and event will be created.
This is a full uninstall and will delete the connector history and any files in quarantine.
Note: Remote uninstall does not support Windows connectors with Identity Per-
sistence enabled. Remote uninstall will disable the feature and if the connector is
reinstalled it will be handled as a new connector.
The user will not need to enter a password to uninstall the Secure Endpoint Windows connector if Con-
nector Protection is enabled under Administrative Features in the policy. A reboot is not required on
Windows unless you plan to re-install a connector on the endpoint. No reboot is required for Mac or
Linux.
The user will be prompted to enter an administrator password to uninstall the Secure Endpoint Mac
connector on unmanaged versions of macOS prior to version 12.0. The uninstall will fail if the user
does not enter the administrator password. See Configure Permissions for Secure Endpoint Mac Con-
nector and Orbital with MDM: Full Disk Access, System Extensions for further details.
Endpoint IOC Scanner
The Endpoint IOC (indication of compromise) feature is a powerful incident response tool for scanning
of post-compromise indicators across multiple computers. Endpoint IOCs are imported through the
console from open IOC-based files that are written to trigger on file properties, such as name, size,
hash, and other attributes, and system properties, such as process information, running services, and
Windows Registry entries.
The IOC syntax can be used by incident responders to find specific observables or to use logic to cre-
ate sophisticated, correlated detections for families of malware. Endpoint IOCs have the advantage of
being portable to share within your organization or in industry vertical forums and mailing lists.
The Endpoint IOC scanner is available in Secure Endpoint Windows connector versions 4 and higher.
Running Endpoint IOC scans may require up to 1 GB of free drive space.
For a list of IOC attributes that are supported by the IOC Scanner and links to sample Endpoint IOC
documents see the Cisco Endpoint IOC Attributes guide.
Installed Endpoint IOCs
The Installed Endpoint IOCs page lists all the Endpoint IOCs you have uploaded and allows you to
manage them. From this page, you can upload new Endpoint IOCs, delete existing ones, activate and
deactivate them, or view and edit them. You can also click View All Changes to see a filtered view of
the Audit Log containing only entries for installed Endpoint IOCs.
Uploading Endpoint IOCs
Endpoint IOCs have to be uploaded to the Secure Endpoint console before you can initiate scans.
When you navigate to the Installed Endpoint IOCs page use the Upload button to transfer your End-
point IOCs. You can upload a single XML file or a zip archive containing multiple Endpoint IOC doc-
uments.
If you upload an archive containing multiple Endpoint IOCs you will receive an email when all the files
have been extracted and verified. Invalid XML files will be uploaded but cannot be activated for scans.
Each Endpoint IOC entry has a View Changes link to take you to the Audit Log with a view filtered to
only show entries for that specific Endpoint IOC. This allows you to see who uploaded, edited, activ-
ated, deactivated, or otherwise modified the IOC.
View and Edit
The View and Edit pages allow you to view and modify individual Endpoint IOCs.
The Short Description and Description are initially pulled from the XML of the Endpoint IOC document.
You can change these fields without affecting the IOC itself.
You can assign Categories, Endpoint IOC Groups, and Keywords to each Endpoint IOC to allow you
to filter them from the main list. This can be useful if you want to enable or disable all Endpoint IOCs of
a certain type. Once you have finished modifying your Endpoint IOC you can Save the changes.
From the Edit page you can Download the IOC or Replace it. This can be used to edit the indicators
and Indicator Items in your Endpoint IOC. Using Replace instead of uploading the edited Endpoint
IOC will also preserve your assigned Categories, Endpoint IOC Groups, and Keywords.
Note: If you upload an Endpoint IOC document with attributes that are not sup-
ported by the Secure Endpoint connector they will be ignored. For a list of sup-
ported IOC attributes see the Cisco Endpoint IOC Attributes guide.
Activate Endpoint IOCs
By default, all new Endpoint IOCs that you upload will be active if they are valid. You can activate or
deactivate individual Endpoint IOCs by clicking the Active check box next to each one on the Installed
Endpoint IOCs page. Click the Activate All check box to activate all the Endpoint IOCs in the current
view.
You can also use the Categories, Groups, and Keywords filters to display certain Endpoint IOCs then
use Activate All to either activate or deactivate them. You can also use the All, Active, Inactive, Valid,
and Invalid buttons to quickly change your view of the listed IOC documents. This is useful to sort
through large sets of Endpoint IOCs and only scan for certain ones.
Initiate Scan
You can scan individual computers for matching Endpoint IOCs or all computers in groups that utilize
the same policy.
Scan by Policy
To scan by policy, navigate to Outbreak Control > Endpoint IOC - Initiate Scan. Select the Policy you
want to add the scan to. Every computer in every group that uses the policy you select will perform the
same Endpoint IOC scan.
Run Scan On is the date and time the scan should begin. The time corresponds to the local time on
the computer the Secure Endpoint connector is running on.
You can select to run a Flash Scan or a Full Scan. While both scan a similar subset, Full Scan is more
comprehensive. As a result, some IOCs may not trigger on Flash Scan if they look for matches in loc-
ations that the Flash Scan does not check.
Both Flash Scan and Full Scan check the following information:
l Running processes
l Loaded DLLs
l Services
l Drivers
l Task Scheduler
l System information
Running a full scan is time consuming and resource intensive. On endpoints with a large number of
files a full scan can take multiple days to run. You should only schedule full scans during periods of
inactivity like at night or on weekends. The first time you run a full scan on a connector the system will
be cataloged, which will take longer than a regular full scan.
If you select a full scan, you can also choose whether to do a full catalog before the scan, catalog only
the changes since the last scan (only available on Secure Endpoint Windows connector 4.4 and
higher), or run the scan without cataloging. A full catalog will take the most time to complete, and run-
ning the scan without a catalog will take the least amount of time. If you choose to only catalog
changes, then only changes to the file system since the last full catalog will be cataloged. The amount
of time this scan takes will vary based on the number of changes to catalog.
Note: If you have not performed a full catalog on a computer yet and choose not to
catalog before the scan then nothing will be scanned.
Scan by Computer
You can run an Endpoint IOC scan on a single computer by navigating to Management > Computers.
Select the computer you want to scan, then click the Scan button.
From the dialog, select the Endpoint IOC scan engine, then choose whether to perform a flash scan or
a full scan. As with policy scans, you can also re-catalog the computer when performing a full scan.
When you click Start Scan, the connector will begin the Endpoint IOC scan on its next Heartbeat Inter-
val.
Scan Summary
The Scan Summary page lists all the Endpoint IOC scans that have been scheduled in your Secure
Endpoint deployment. Both scheduled scans by policy and scans for individual computers are listed.
You can use the View All Changes link to see a filtered view of the Audit Log, which shows only End-
point IOC scans, or click View Changes next to a specific scan to see the records only for that specific
scan.
For policy scans, the name of the policy is displayed along with the scheduled date and time. For com-
puter scans, the name of the computer is displayed along with the date and time the scan was ini-
tiated. You can stop a scan by clicking the Terminate button.
Note: Terminating a scan is done by sending the connector a policy update. The
connector will only terminate a scan when it receives the updated policy on its next
Heartbeat Interval.
Click the New Scan button to schedule another scan by policy. This will take you to the Initiate Scan
page.
The results of any Endpoint IOC scans along with matching IOC triggers for each computer scanned
will be displayed in the Events of the Secure Endpoint Dashboard.
Automated Actions
The Automated Actions page lets you set actions that automatically trigger when a specified event
occurs on a computer. You can access the page from Outbreak Control > Automated Actions on the
main menu.
Note: Automated Actions can only run actions on connectors which support the
action. For connectors or operating systems that do not meet the minimum require-
ments, or for which the desired features are not enabled in policy, the automated
action will not be triggered.
Automated Actions Tab
The Automated Actions tab allows you to adjust the settings on each action and set them to active or
inactive.
Automated actions do not occur in a set order. Some automated actions may execute before others
even if a trigger event satisfies the conditions on multiple actions. For example, a computer that was
isolated cannot be moved to a different group while it is isolated.
Forensic Snapshot Automated Action
Note: The Forensic Snapshot Automated Action is available for customers with
Secure Endpoint Advantage. Orbital Advanced Search must be enabled on your
endpoint to take a Forensic Snapshot. See the Orbital Windows Requirements
and Orbital macOS Requirements.
You can set an Automated Action to take a Forensic Snapshot of a computer when a compromise
occurs.
To enable the Automated Action, first select the severity of compromise. Events that are the selected
severity or higher will trigger the automated action. Next, set the group(s) you want the action to apply
to, then click Save. Once an action has been created, set it to Active or Inactive.
Endpoint Isolation Automated Action
Available for:
l Secure Endpoint Windowsconnector 7.0.5 and later.
Note: The Windows connector does not currently support endpoint isolation on
ARM architecture.
You can set an Automated Action to isolate computers when a compromise occurs.
To enable the Automated Action, first select the severity of compromise. Events that are the selected
severity or higher will trigger the automated action. Next, set the group(s) you want the action to apply
to, and set a Rate Limit for the number of computers you want to allow to be isolated (the maximum is
1000). Click Save to create your action. Once an action has been created, set it to Active or Inactive.
The Rate Limit protects you against false positive detections. The Rate Limit feature looks at the total
number of isolations in a 24 hour rolling window. If the number of isolations is greater than the limit, no
further isolations are triggered. Computers will be isolated again once the number of compromise
events falls to fewer than the limit in the 24 hour rolling window or you stop isolation on computers that
were automatically isolated.
To enable the Automated Action, first select the severity of detection. Events that are the selected
severity or higher will trigger the automated action. Next, set the group(s) you want the action to apply
to. Click Save to create your action. Once an action has been created, set it to Active or Inactive.
Files will not be sent for analysis through the automated action if there is a corresponding quarantine
event, the event was marked as resolved on the Inbox, or is determined to be a false positive. Files
that have already been submitted for analysis by your organization will not be submitted again. If there
is a currently open compromise (ie. the computer has not been marked as resolved on the Inbox), sub-
sequent detections that satisfy the conditions of the automated action will be requested, even if the
event has a corresponding quarantine success.
The number of files that can be submitted for analysis is governed by your Daily submissions for Auto-
matic Analysis setting under Secure Malware Analytics API in your Organization Settings. The files
will be analyzed using the operating system specified in VM image for analysis.
l Supported file types are .exe, .dll, .jar, .pdf, .rtf, .doc(x), .xls(x), .ppt(x), .zip, .vbn, .sep, and .swf.
Note: If the file was quarantined by another AV product on the computer it cannot
be submitted for analysis through Automated Actions. You will need to retrieve the
file from the AV product’s quarantine location and submit the file manually through
the File Analysis Landing Page.
Once the file analysis is complete, the analysis report will be available on the File Analysis Landing
Page. You will need to have single sign-on (such as Security Cloud sign-on) or Two-Factor Authentic-
ation enabled to view the analysis.
Move to Group Automated Action
The Move to Group action will move computers from their current groups to another group when the
action is triggered. This allows you to move compromised computers to a group with a policy that has
more aggressive scanning and engine settings to remediate the compromise.
To enable the Automated Action, first select the severity of compromise. Events that are the selected
severity or higher will trigger the automated action. Next, set the group(s) you want the action to apply
to and the destination group, and set a Rate Limit for the number of computers you want to allow to be
moved (the maximum is 1000). Click Save to create your action. Once an action has been created, set
it to Active or Inactive.
Note: Make sure if you move computers that are included in other actions that the
destination group has other features like Endpoint Isolation enabled and the group
is included in your other actions.
The Rate Limit protects you against false positive detections. The Rate Limit feature looks at the total
number of group moves in a 24 hour rolling window. If the number of moves is greater than the limit, no
further moves are triggered. Computers will be moved again once the number of compromise events
falls to fewer than the limit in the 24 hour rolling window.
The Action Logs tab includes a button to Stop All Isolations. You may want to use this if there was a
false positive or all incidents have been resolved. When you click the button, Secure Endpoint
attempts to stop isolation on all connectors that have been isolated through Automated Actions or that
are pending isolation through Automated Actions. You may need to temporarily adjust or disable the
Endpoint Isolation Automated Action to prevent it from triggering again if the issues that originally
triggered it have not been resolved.
Search
Search allows you to find information from your Secure Endpoint deployment. You can search by
terms like file, hostname, URL, IP address, device name, user name, policy name and other terms.
The searches will return results from File Trajectory, Device Trajectory, File Analysis and other
sources. To access Search, you can navigate through Analysis > Search or right-click various ele-
ments in the Secure Endpoint console like a SHA-256 or file name and select Search from the context
menu.
Tip: You can also access the search function from the menu bar on any page.
Hash Search
You can enter a file’s SHA-256 value to find any devices that observed the file. You can also drag a file
to the Search box and its SHA-256 value will be computed for you. If you only have a file’s MD5 or
SHA-1 value, Search will attempt to match it to a corresponding SHA-256, then search for that SHA-
256.
The results can include links to File Analysis, File Trajectory and the Device Trajectory of any con-
nectors that observed the file.
String Search
You can search by entering a string to see matches from various sources. String searches can
include:
l File names
l File paths
l Detection names
l Program names
l Program versions
l File versions
Searches by exact file extension like .exe and .pdf can also be performed to find all files observed with
those extensions.
Enter an exact email address or user name to find any matching users in your Secure Endpoint deploy-
ment.
Network Activity Searches
Searches for IP addresses, host names, and URLs can also be performed.
IP address searches must be exact and use the full 32 bits in dot-decimal notation. IP address search
results can include devices that have contacted that address or that have observed that IP.
Host name and URL searches can be performed by exact host name or a sub-domain. These
searches will return any files that your connectors downloaded from those hosts and any connectors
that contacted that host.
User Name Search
You can search by user name to retrieve a list of endpoints with activity initiated by that user. If you
search for ‘username’ then the search will include results for all users in your organization with a
matching name. However, if you search for ‘username@domain’ then only endpoints with exact
matches will be returned.
You can click on the name of a computer in the search results to view the Device Trajectory for that
computer and any events that are associated with the user name.
Note: You must have Send User Name in Events and Command Line Capture
enabled in your Policies to be able to search by user name.
File Analysis
File Analysis allows a Secure Endpoint user to upload an executable into a sandbox environment
where it is placed in a queue to be executed and analyzed automatically. The File Analysis page also
allows you to search for the SHA-256 of an executable to find out if the file has been analyzed already.
If the file has been analyzed already, then the analysis report is available and can be viewed by the
user. This functionality is provided by Cisco Secure Malware Analytics (formerly Threat Grid).
Note: See Privacy and Sample Visibility for Secure Malware Analytics.
To navigate to the File Analysis page click on Analysis > File Analysis.
File Analysis Landing Page
When you navigate to File Analysis you will be taken to a listing of files you have submitted for ana-
lysis. If you have not submitted any files, you will be taken to the Global Files tab, which shows files
that Secure Malware Analytics users have submitted. From this page you can submit a file for ana-
lysis, search for a file by SHA-256 or filename, or view the list of submitted files. When you search for a
file, the Global Files tab will show all of your files plus others submitted to Secure Malware Analytics;
the Your Files tab will only show results from your files that were submitted for analysis. Click on the
file name or the Report button to view the results of the analysis.
Note: File Analysis reports are best viewed in Microsoft Internet Explorer 11+,
Mozilla Firefox 14+, Apple Safari 6+, or Google Chrome 20+.
If the file you are looking for has not been analyzed already, you can choose to upload the file (up to 20
MB) to be analyzed. To do this, click Submit File, select the file you want to upload using the Browse
button, select the virtual machine operating system image to run it in, then click the Upload button.
After the file has been uploaded it takes approximately 30 to 60 minutes for the analysis to be avail-
able, depending on system load.
Note: There are limits to how many files you can submit for analysis per day. By
default, you can submit 100 files per day unless you have entered a custom Cisco
Secure Malware Analytics API key on the Organization Settings page. The num-
ber of submissions you have available will be displayed on the Submission dialog.
If you want to submit a file for analysis that has already been quarantined by your antivirus product,
you will need to restore the file before you can submit it. For some antivirus products, there may be
specific tools or steps required to restore the file into a usable format since they are often encrypted
when quarantined. See your antivirus software vendor’s documentation for specific information.
l Supported file types are .exe, .dll, .jar, .pdf, .rtf, .doc(x), .xls(x), .ppt(x), .zip, .vbn, .sep, and .swf.
Once a file has been analyzed you can expand the entry to see the Threat Score and score for the
Behavioral Indicators.
Threat Analysis
The analysis of a specific file is broken up into several sections. Some sections may not be available
for all file types. You can also download the original sample (executable) that was executed in the
sandbox. This is useful if you want to perform a deep analysis on the executable and it can also be
used to create Custom Detections - Simple and Custom Detections - Advanced lists to control and
remove outbreaks in a network.
Files downloaded from the File Analysis are often live malware and should be treated with extreme
caution.
When analyzing malware, a video of the execution is also captured. The video can be used to observe
the visual impact that the malware has on the desktop of a victim. The video can be used in user edu-
cation campaigns; for example, in the case of an outbreak, the security analyst can send screenshots
of behavior of this threat to network users and warn them of symptoms. It can also be used to warn
about convincing social engineering attacks like phishing; for example, the fake antivirus alerts com-
mon with malicious fake antivirus or scareware.
You can also download the entire network capture that was collected while analyzing the binary by
clicking Download PCAP. This network capture is in PCAP format and can be opened with network
traffic analysis tools such as Wireshark. The availability of this network capture file means that a secur-
ity analyst can create a robust IDS signature to detect or block activity that is associated with this
threat.
If the malware creates any other files during execution, they will be listed under Artifacts. You can
download each artifact and run a separate analysis on them.
Metadata
Basic information pertaining to the analysis is displayed at the top of the Analysis Report. This
includes basic characteristics of the submission, as shown below.
l ID: A unique identifier that is assigned to each sample when it is submitted for analysis.
l OS: The operating system image used when the sample was analyzed.
l Started: The date and time when the analysis started.
l Ended: The date and time when the analysis ended.
l Duration: The amount of time it took for the analysis to complete.
l Sandbox: Identifies the sandbox used during the analysis.
l Filename: The name of the sample file that was submitted for analysis, or the file name that was
entered when a URL sample was submitted.
l Magic Type: This field indicates the actual file type detected by the Secure Malware Analytics
analysis.
l Analyzed As: Indicates whether the sample was analyzed as a URL or as a file (by specifying
the file type).
l SHA256: The SHA-256 cryptographic hash function output.
l SHA1: The SHA1 cryptographic hash function output.
l MD5: The MD5 cryptographic hash function output.
l Warnings: High level descriptions of potentially harmful activities.
Behavioral Indicators
The analysis report provides a summary of the behavioral indicators generated by Secure Malware
Analytics analysis. These indicators quickly explain any behaviors that might indicate malicious or sus-
picious activity. Secure Malware Analytics generates behavioral indicators during analysis, after the
analysis of the malware activities is complete.
Behavior indicators include detailed descriptions of the activity that produced the indicator. They also
include information on why malware authors leverage that specific technique, plus the specific content
that caused the indicator to trigger during analysis.
Threat Score
The top row of the Behavioral Indicators section of the Analysis Report includes an overall threat score
that can be used as a general indicator of the likelihood that the submission is malicious.
The algorithm used to calculate the threat score is based on a variety of factors, including the number
and type of behavioral indicators, in conjunction with their individual confidence and severity scores.
Behavioral indicators are listed in order by priority according to their potential severity (with most
severe threats listed first), which is reflected by the color coding:
l Red: This is a strong indicator of a malicious activity.
l Orange: This is a suspicious activity and the analyst should carefully assess the submission.
l Grey: Indicates that these activities are not normally leveraged by malicious software, but
provide some additional indicators that could help the analyst come to their own conclusion.
Clicking on one of the network streams will open a web page with the appropriate network stream.
Processes
If any processes are launched during the submission analysis, Secure Malware Analytics displays
them in this section. Click the + icon next to a process to expand the section and access more detailed
information.
Artifacts
If any artifacts (files) are created during the submission analysis, Secure Malware Analytics displays
summary information for each artifact. Click the + icon next to an artifact to expand the section and
access more detailed information.
Registry Activity
If analysis detects changes to the registry, Secure Malware Analytics displays them in this section.
Click the + icon next to a registry activity record to expand the section and access more detailed
information.
Filesystem Activity
If any filesystem activity (file creation, modification, or reads) is detected during the submission ana-
lysis, Secure Malware Analytics presents a summary of the activity information. Click the + icon next to
a filesystem record to expand the section and access more detailed information.
User Guide
Trajectory
Trajectory shows you activity within your Secure Endpoint deployment, either across multiple com-
puters or on a single computer or device.
File Trajectory
File Trajectory shows the life cycle of each file in your environment from the first time it was seen to the
last time, as well as all computers in the network that had it. Where applicable, the parent that brought
the threat into the network is displayed, including any files created or executed by the threat. Actions
performed throughout the trajectory for a file are still shown even if the antivirus software on the com-
puter was later disabled.
File trajectory is capable of storing approximately the 9 million most recent file events recorded in your
environment. When a file triggers an event, the file is cached for a period of time before it will trigger
another event. The cache time is dependent on the disposition of the file:
l Clean files: 7 days
l MS Cabinet files
l MS Office files
l Archive files
l Script files
l Installer files
Visibility includes the First Seen and Last Seen dates and the total number of observations of the file in
question in your network. Observations shows the number of times that the file in question was both a
source of activity and when it was a target of activity. Note that the number of observations can also
include multiple instances of the same file on each endpoint.
Entry Point – identifies the first computer in your network on which the threat was observed.
Created By identifies the files that created the threat in question by their SHA-256. This includes the
number of times the threat was created by that file in both your network and among all Secure End-
point users. Where available the file name and product information are also included. It is important to
note that this information is pulled from the file itself. In some cases a malicious (red) file can include
information claiming it is a legitimate file.
File Details shows additional information about the file in question, as outlined below.
l Known As shows the SHA-256, SHA-1, and MD5 hash of the file.
l Attributes displays the file size and type.
l Known Names includes any names the file went by on your network.
l Detected As shows any detection names in the case of a malicious file.
Note: For descriptions of threat names, see Secure Endpoint Naming Con-
ventions.
Network Profile shows any network activity the file may have participated in. If there are no entries in
this section, this does not necessarily mean the file is not capable of it, but your connectors did not
observe it participating in any while it was in your environment. If your connectors do not have The Net-
work tab contains settings to for the network flow capabilities of your connectors, such as device flow
correlation settings. enabled, this section will not be populated. Network Profile details are as shown
below.
l Connections Flagged As shows any activity that corresponds to an IP blocked list entry.
l IPs it Connects To lists any IP addresses the file initiated a connection to.
l Ports it Connects To lists the ports associated with outbound connections from the file.
l URLs it Connects To lists any URLs that the file initiated a connection to.
l Downloaded From lists any addresses that the file in question was downloaded from.
Trajectory – shows the date and time of each action related to the threat on each affected computer in
your environment.
When an action has a double circle around it , this means the file in question was the source of the
activity. When there is only a single circle, this means that the file was being acted upon by another
file.
Clicking on a computer name will provide more detail on the parent and target actions and SHA-256s
for the file being examined.
By clicking on one of the action icons in the Trajectory display, you can also view additional details
including the filename and path if available.
Event History shows a detailed list of each event identified in the Trajectory. Events are listed chro-
nologically by default but can be sorted by any of the columns.
Device Trajectory
Device Trajectory shows activity on specific computers that have deployed the connector. It tracks file,
network, and connector events, such as policy updates in chronological order. This gives you visibility
into the events that occurred leading up to and following a compromise, including parent processes,
connections to remote hosts, and unknown files that may have been downloaded by malware.
Device Trajectory is capable of storing 30 days of file events in your environment. When a file triggers
an event the file is cached for a period of time before it will trigger another event. The cache time is
dependent on the disposition of the file:
l Clean files – 7 days
l MS Cabinet files
l MS Office files
l Archive files
l Script files
l Installer files
Trajectory View
The vertical axis of the Device Trajectory shows a list of files and processes observed on the computer
by the connector and the horizontal axis represents the time. Running processes are represented by a
solid horizontal line with child processes and files the process acted upon stemming from the line. A
list of file events is displayed on the right side of the device trajectory.
Note: If the selected row is off-screen, click or to return to it.
The blue line graph above the dates shows the number of cloud queries made by the endpoint each
day. Hover the mouse over the line to view the precise number of queries.
Trajectory Events
Click on an event to view its details.
Event details include the file name, path, parent process, file size, execution context, and hashes for
the file. For malicious files, the detection name, engine that detected the file, and the quarantine action
are also shown. Click if you scroll away from the selected event in the pane to return to the event.
Secure Endpoint connector events are displayed next to the System label in Device Trajectory. con-
nector events include reboots, user-initiated scans and scheduled scans, policy and definition
updates, connector updates, and a connector uninstall.
You can view details of the selected computer from the Device Trajectory view by clicking on the com-
puter name in the Device Trajectory view.
Note: You can copy and share a URL of the current Device Trajectory view with
other users in your organization by clicking the button then clicking Copy
URL.
You can also perform several actions on the computer from here, such as: run a full or flash scan,
move the computer to a different group, or initiate diagnostics (see Computer Management: Con-
nector Diagnostics).
Note: Click the fullscreen button to expand the Device Trajectory view to fill the
entire screen. Click the button again to return to the normal view.
Trajectory Indications of Compromise
When certain series of events are observed on a single computer, they are seen by Secure Endpoint
as indications of compromise. In Device Trajectory, these events will be highlighted yellow so they are
readily visible. There will also be a separate compromise event in the Trajectory that describes the
type of compromise. Clicking on the compromise event will also highlight the individual events that
triggered it with a blue halo. A description of the indicator and the tactics and techniques will also be
displayed in the Event Details pane of the trajectory.
Filters
There are five event filter categories in Device Trajectory: Activity, System, Disposition, Flags, and
File Type. You must select at least one item from each category to view results.
Activity describes events that the connector recorded. File, network, and connector activity are rep-
resented.
File events can include a copy, move, execution, and other operations. Network events include both
inbound and outbound connections to both local and remote addresses.
System events can include compromises, reboots, policy or definition updates, scans, and uninstalls.
Disposition allows you to filter events based on their disposition. You can choose to view only events
that were performed on or by malicious files, clean files, or those with an unknown disposition.
Flags are modifiers to event types. For example, a warning may be attached to a malicious file copy
event because the malicious file was detected but not successfully quarantined. Other events, such as
a scan that did not complete successfully or a failed policy update, may also have a warning flag
attached.
The audit only flag means that the events in question were observed but not acted upon in any way
because the Files and Network Conviction Modes policy items under Modes and Engines were set to
Audit.
File Type allows you to filter Device Trajectory events by the type of files involved. You can filter by the
file types most commonly implicated in malware infections, such as executables and PDFs. The other
filter is for all file types not specifically listed, while the unknown filter is for files that the type was
undetermined, possibly due to malformed header information.
Search
The search field on the Device Trajectory page allows you to narrow the Device Trajectory to only
show specific results.
l SHA-256
l File name
l File path
l URL
l Remote IP addresses
l User name
l iOS Bundle ID
To perform a search, enter or paste the search term in the search field and press Enter. Searches are
not case sensitive.
Some values are tokenized so the search will match partial but fully arbitrary partial search is not sup-
ported.
Search examples
Not Sup-
Field Original Value Supported/Matched ported/Not
Matched
l Com-
Detec- CompromiseDetectedHandler Tro- l CompromiseDetectedHandler prom-
tion
name jan.Generic.1408072
l Trojan.Generic.1408072 ise
l Trojan
athA
l ios.am-
iOS b- p.cisco
undle ios.amp.cisco.com l ios.amp.Cisco.com
ID
l cisco.-
com
IP ad- l 192.15-
192.158.1.38 l 192.158.1.38
dress 8.1
l ba7816b-
ba7816b- l ba781-
SHA- f8f01cfea414140de5dae2223b-
f8f01cfea414140de5dae2223b003- 6bf8f0-
256 00361a396177a9cb410ff61f20-
61a396177a9cb410ff61f20015ad 1cfea
015ad
l https://www.-
cisco.-
com:8080/s-
ite/us/en/-
products/security/endpoint
l https://www.-
cisco.-
com:8080/s- l secure-
https://www.- ite/us/en/- end-
cisco.- products/security/endpoint- point
com:8080/s- security/secure- l site/us/-
URL ite/us/en/- endpoint/index.html produc-
products/security/endpoint- l https://www.- ts/se-
security/secure- cisco.- curity
endpoint/index.html com/s- l cisco.-
ite/us/en/- com
products/security/endpoint-
security/secure-
endpoint/index.html
l https://www.-
cisco.-
com/s-
ite/us/en/products/security/
Not Sup-
Field Original Value Supported/Matched ported/Not
Matched
l https://www.cisco.com
l www.cisco.com
l John.doe
User- l john.doe@local
john.doe@local l John
name l John.Doe@LOCAL
l John.doe
Win-
dows
OS A- AdjustTokenPrivileges l adjusttokenprivileges l Adjust
PI na-
me
December, 2023.
l <search term> at:<timestamp> for example, badfile.exe at:2024-05-04T19:00Z to only show
Note: A search term with a timestamp is a logical AND. No events will be dis-
played if there are no matching search terms after the specified timestamp.
You can specify a timestamp without a search term or a search term with a timestamp. The search
term must always be entered before the timestamp.
Mobile App Trajectory
Mobile App Trajectory shows activity for a specific app from all devices running Secure Endpoint iOS
Clarity with that app installed. This can be useful in locating unwanted or suspicious activity. Launch
the Mobile App Trajectory by clicking the App Trajectory link on the Dashboard iOS Clarity tab or by
clicking a bundle ID and selecting Mobile App Trajectory from the context menu.
The top of the page shows a summary of all information that can be gathered about the app including
the version and publisher.
You can use the date slide to choose three days to view. The blue dots on the days indicate the
amount of activity observed from that app.
The Endpoints using this App section shows a list of devices with network activity from that app for the
3 day period selected in the slider. The vertical axis shows the list of devices with the app installed and
the horizontal axis represents the date and time. The length of each arrow indicates the amount of
activity the app was observed generating. Click a device name to view its Device Trajectory for a full
view of all app activity on that device.
You can also click on a day to zoom and show three 8 hour columns. You can continue to zoom to 2
second intervals.
Click on an arrow to show details about the activity, including the number of connections and duration,
specific times, and details of each network connection.
Network Destinations provides a list of all domains accessed by the device organized by top-level
domain (TLD). The list can be sorted alphabetically or by total number of connections. You can
expand entries to view additional details and specific URLs, ports, and connections.
File Repository
The File Repository allows you to download files you have requested from your connectors. This fea-
ture is useful for performing analysis on suspicious and malicious files observed by your connectors.
You can simply request the file from any of the connectors that observed it, wait for the file to be
uploaded, then download it to a virtual machine for analysis. You can also submit the file to File Ana-
lysis for additional decision support. Clicking View All Changes will take you to a filtered view of the
Audit Log showing all requested files. Files that were automatically sent for analysis from Automatic
Analysis and Behavioral Protection will also be available in the repository.
Note: You must have single sign-on (such as Security Cloud sign-on) or Two-
Factor Authentication enabled on your account to request files from your con-
nectors and download them from the File Repository. Files can only be fetched
from computers running version 3.1.9 or later of the Secure Endpoint Windows
connector, version 1.0.2.6 or later of the Secure Endpoint Mac connector, and ver-
sion 1.0.2.261 or later of the Secure Endpoint Linux connector.
Request a Remote File
To request a file for upload to the File Repository, right-click on any SHA-256 value in the Secure End-
point console to bring up the SHA-256 File Info Context Menu.
Select Fetch File from the menu. If the file has already been downloaded to the File Repository, Fetch
File will not be available and instead there will be an option to view the file in the repository.
A dialog will appear allowing you to select which connector to download the file from. If the file was
observed by more than one connector, you can use the drop-down list to select a specific computer
out of up to ten computers that saw the file recently. The default selection is the connector that
observed the file most recently.
Once you have selected a computer, click Fetch to be taken to the File Repository. There you will see
an entry for the file and that it has been requested. Files in the Repository can be in the following
states:
l Requested: a request was made to upload the file but the connector has not responded yet.
l Being Processed: the file has been uploaded from the connector but is still being processed
before it is available.
l Available: the file is available for download.
You will receive an email notification when the file has been processed. Navigate to the File Repos-
itory page to download the file. You can also launch the Device Trajectory for the computer the file was
retrieved from or launch the File Trajectory. Clicking Remove will delete the file from the Repository
but not from the computer it was fetched from. You can also click View Changes to see the Audit Log
entry for the request.
When you download a file from the File Repository it will be a password-protected zip archive con-
taining the original file. The password for the archive will be “infected”.
Note: In some cases you may be downloading live malware from the File Repos-
itory. You should only extract the file from the archive in a secure lab environment.
Under certain circumstances a file may not be available for download even though the connector
observed it. This can occur if the file was deleted from the computer or 3rd party antivirus software
quarantined the file. Files with a clean disposition cannot be retrieved unless they were copied to a dif-
ferent location. In these cases you can attempt to fetch the file from a different computer or manually
retrieve the file from quarantine.
Threat Root Cause
Threat Root Cause helps identify legitimate and rogue applications that are at high risk for introducing
malware into your environment. It focuses on software that is observed installing malware onto com-
puters.
Select Dates
Threat Root Cause allows you to select a date range to view. By default, the date range is set to show
the previous day and current day. Select the start and end dates you want to view, then click Reload to
view the threat root cause for the specified date range.
Threat Root Cause Overview
The Threat Root Cause Overview tab shows the top ten software packages by name that have been
observed introducing malware into your environment in the past day. The “Others” entry is an aggreg-
ate of all other applications introducing malware for comparison purposes. Where available, the ver-
sion numbers of the applications are also displayed.
Details
The Details tab displays each application from the Overview with additional information. The number
of threats the application introduced into your environment, the number of computers that were
affected, and the event type are also displayed. The information icon can be clicked to display a SHA-
256 File Info Context Menu.
Clicking on the program name in this view will take you to the Dashboard Events with the view filtered
to show all events where the particular program was the parent.
Timeline
The Timeline tab shows the frequency of malware downloaded into your environment by each applic-
ation over the previous day. If one application is seen introducing many malware samples at once or
consistently over the period it can indicate that the application is nothing more than a downloader for
malware. There is also a possibility that a vulnerable application being exploited to install malware
could display similar behavior.
Prevalence
Prevalence displays files that have been executed across your organization in relation to global exe-
cutions of those files. This can help you surface previously undetected threats that were only seen by
a small number of users. Generally, files executed by a large number of users tend to be legitimate
applications, while those executed by only one or two users may be malicious, such as a targeted
advanced persistent threat.
Low Prevalence Executables
The page shows each file that was executed and which computer it was executed on. The list is
filtered by operating system, so that low prevalence files from widely deployed operating systems
aren’t obscured by those with lower deployment numbers. File disposition is indicated by the color of
the filename that was executed with malicious files shown in red and unknown files shown in gray.
Files with a known clean disposition are not displayed in the prevalence list.
Expanding an entry shows you the SHA-256 value of the file, the names of up to 10 computers that
were seen executing the file, and other filenames the file may have had when executed. You can click
the information icon next to the SHA-256 value to display the SHA-256 File Info Context Menu. Click
on the File Trajectory button to launch the File Trajectory for the file or the Device Trajectory button to
view the trajectory for the computer that executed the file. You can also send the file for analysis by
clicking the Analyze button if you have the File Repository enabled and the file is a Windows execut-
able. If more than one computer executed the file, click on the name of the computer to view its Device
Trajectory.
Note: If the Analyze button is not available it may be that the file has already been
submitted, the File Repository is not enabled, or the current user is not an admin-
istrator.
When you click the Analyze button, a request is submitted to retrieve the file from the computer. You
can check the status of the file fetch operation from the File Repository. Once the file has been
retrieved it will be submitted to File Analysis.
Automatic Analysis
Automatic analysis sends low prevalence Windows executable files from specific groups to File Ana-
lysis. Click Configure Automatic Analysis to choose your groups.
Note: You must have the File Repository enabled and be an administrator before
you can configure automatic analysis.
On the Automatic Analysis Configuration page there is a drop-down to select the groups you want to
automatically submit low prevalence files. Select your groups then click Apply.
Once you have configured Automatic Analysis, low prevalence executable files will be submitted
every 4 hours. Secure Endpoint will request the file from the connectorthat observed it if it is available.
Once the file has been retrieved, it will be submitted to File Analysis. You can then view the results of
the analysis from the File Analysis page. If the file is not retrieved for a period of time, you can check
the file fetch status in the File Repository.
Note: There are limits to how many files you can submit for analysis per day and
their size. By default, you can submit 100 files per day unless you have entered a
custom Cisco Secure Malware Analytics API key on the Organization Settings
page and they can be up to 20MB each in size.
Vulnerabilities
Navigate to Analysis > Vulnerabilities to view vulnerable software on endpoints in your organization.
Enable Orbital in your policies for best vulnerability information results. Information that is only avail-
able when Orbital is enabled includes:
l Application vulnerabilities.
l Linux vulnerabilities.
connectors.
l High - The current number of high severity (Cisco Security Risk Score of 67 to 100) vul-
Click a card to filter the vulnerabilities table to show only the computers with vulnerabilities of that
severity.
Note: It takes approximately 24 hours for the numbers to be updated after patch-
ing a vulnerable computer.
Filters
l Description - Key words in the CVE description such as operating system, software package
wild.
l Malware exploitable - Vulnerabilities that are currently being actively exploited by mal-
other sources.
l Fixes - Available or not available.
l Group - Groups in your Secure Endpoint organization.
You can export the current view to a CSV file for download. Leave the filters blank to view and export a
list of all vulnerabilities.
Vulnerabilities Table
The vulnerabilities table shows:
l CVE ID
l Facets
l Fix availability
Click a row to open a drawer with more information about the vulnerability including links to available
fixes. Click the number of computers affected to view the Computer Management page filtered to
show those endpoints.
The table can be sorted by compromise event Threat Severity or publication date of the CVE ID. Click
the cog in the top right corner of the table to show or hide table columns.
l Windows 10 and higher; Windows Server 2016 and higher. Windows 10 IoT is not currently sup-
ported
l RedHat Enterprise Linux (and compatible distributions) 7.2 or later
l Amazon Linux
Supported applications:
l Adobe Acrobat
l Adobe Acrobat DC
l Evernote
l Google Chrome
l intelliJ IDEA
l Microsoft Edge
l Microsoft Excel
l Microsoft Office
l Microsoft OneDrive
l Microsoft Outlook
l Microsoft PowerPoint
l Microsoft Silverlight
l Microsoft Teams
l Microsoft Word
l Mozilla Firefox
l Oracle JRE
l PyCharm
l Safari
l VLC
l VMWare Tools
l Wireshark
l WhatsApp
l XCode
l Zoom
l Zoom.us (macOS only)
Reports
Reports allow you to view aggregate data generated in your organization over a one-week, one-
month, or three-month (quarterly) period. They can be accessed from Analysis > Reports on the main
menu. Click the title to view any of the reports, and you can sort the list by clicking the heading of any
of the columns.
Create a Custom Report
Weekly reports cover a one-week period beginning every Sunday at midnight until midnight the fol-
lowing Sunday (UTC). Monthly reports cover a period beginning on the first day of the month at mid-
night until midnight on the last day of the month. Quarterly reports cover a period beginning on the first
day of the month at midnight and ending three months later on the last day of the month. System-
defined reports are created automatically but you can configure your own custom reports.
Configure Custom Reports
You can create, edit and delete reports and choose whether to receive them via email from the report
configuration page. Click the Configure Custom Reports button on the Reports page to access this
page. You can view changes to a single report configuration by clicking the View Changes button
in one of the rows, or all the report configurations by clicking View All Changes.
Create Reports
You can create custom reports to view information about selected groups of computers. Click the New
Custom Report button on the Report Configuration page to display the New Custom Report dialog.
Select the report type (weekly, monthly, or quarterly), enter the title for the report and select the groups
you want to include in the report from the drop-down menu. Fill the Email checkbox if you want to
receive the reports via email, and click Save and Schedule.
Edit Reports
Click the Edit button in the row of the report you want to edit. You can modify the title and selected
groups in the dialog box and click Save and Schedule when done.
Delete Reports
Click the Delete button in the row of the report you want to delete and confirm deletion in the dialog
box by clicking Delete.
Note: You cannot delete system-defined reports. However, you can clear the
Email checkbox for it if you do not want to receive it.
Report Sections
Elements in the reports (E.g. SHA-256, computers, threats) link to the appropriate sections of the
Secure Endpoint console, so you can drill down further into the data.
Some sections contain boxes highlighting important metrics. The little numbers and arrows inside
these boxes display week-to-week trends and when applicable, are green or red to provide “good” or
“bad” context, respectively.
Note: The data displayed in the console may not match the report data exactly if
any retrospective jobs were run after the report was generated.
Active connectors
Shows the number of active connectors in the organization compared to the previous week. To be con-
sidered active, a connector must have checked in at least once in the reporting period. The number of
new installs and uninstalls are also shown.
Connector Status
This shows the number of files and IPs that were scanned during the reporting period, along with the
number of active connectors as of the last day of the reporting period. To be considered active, a con-
nector must have checked in with the Secure Endpoint servers at least once in the reporting period.
This section also displays information about your current license compliance for your organization as
of the last day of the reporting period.
Compromises
New Compromises are a result of threat detections or malware execution on an endpoint. The number
of compromises still open from the previous reporting period are shown along with the number of com-
promises resolved in the current reporting period. Compromises in the graphs are color-coded by
severity. The tables show the top 5 Significant Compromise Observables from the reporting period,
and Compromise Event Types with their respective severity from the reporting period.
File Detections
Shows the number of computers in your organization that observed the highest number of malicious
file detections along with the most frequently seen detections. The daily malware detections can show
any trends about which days of the week computers see the most detections. Computers with high
numbers of file detections may be indicative of a dropper infection.
Network Detections
Shows the number of device flow correlation detections and agentless global threat alerts in your envir-
onment as well as the number of computers in your organization that observed malicious network
detections. The daily network detections can show any trends about which days of the week com-
puters see the most network detections. High numbers of network detections may be indicative of a
bot infection.
Device flow correlation metrics only apply to connectors with device flow correlation enabled in their
policies.
Blocked Applications
Shows how many applications that your connectors blocked from executing. connectors only block
applications that you have added to your blocked application lists (see Application Control - Blocked
Applications).
Vulnerabilities
Shows the number of vulnerable applications that have been executed, moved, or copied, together
with the number of vulnerable computers. Whenever an executable file is moved, copied, or executed,
the Secure Endpoint connector performs a cloud lookup to check the file disposition (clean, malicious,
or unknown). If the executable file is an application with known vulnerabilities recorded in the Common
Vulnerabilities and Exposures (CVE) database, that information is displayed. The Top Vulnerable
Applications table displays the top vulnerable applications in order of severity, the version number, the
number of executions, the number of CVEs, and their severity. The Top Vulnerable Computers table
displays the top vulnerable computers and the number of vulnerable applications on the computers.
Successful Quarantines
Shows the number of files that were quarantined by your connectors each day. Note that not all detec-
tions result in a file being quarantined by the connector. In some cases your antivirus software may
have already quarantined the file or the file was deleted before it could be quarantined.
Retrospective Detections
Shows the number of files that were seen by your connectors but later had their disposition changed to
malicious and were retroactively quarantined.
Indications of Compromise
Shows the number of times Trajectory Indications of Compromise were triggered for the week.
Indicators
Secure Endpoint determines Cloud Indications of Compromise (IOCs) based on multiple events or
sequences of events observed on an endpoint within a certain time period. The purpose of a Cloud
IOC is to act as a notification of suspicious or malicious activity on an endpoint. A Cloud IOC trigger on
a host needs to be investigated further to determine the exact nature and source of suspicious activity
outlined in the IOC description. A single Cloud IOC will only be reported once every four hours per end-
point.
The Indicators page lets you search for Cloud IOCs and Behavioral Protection signatures. You can
access the page from Analysis > Indicators on the main menu. Each indicator includes a brief descrip-
tion along with information about the tactics and techniques employed based on the Mitre ATT&CK
knowledge base. Tactics represent the objective of an attack, such as executing malware or exfiltrat-
ing confidential information. Techniques are the methods attackers use to achieve the objectives or
what they gain. For more information, see Getting Started with ATT&CK.
You can search for specific indicators by name, or filter the list based on tactics, techniques, and sever-
ity. The number of compromises in your organization that are associated with an indicator are also
shown and you can filter the list to only display these.
Click on an indicator to expand the description and display the full list of tactics and techniques. Click
on any tactic or technique for a detailed description.
Click a compromise badge to see a filtered view of the Inbox of all endpoints that have observed the
indicator. Click the Dashboard Tab, Events, or Inbox links to see a filtered view of those pages show-
ing only the computers that observed the indicator.
Accounts
Items under the Accounts menu allow you to manage your Secure Endpoint console. User man-
agement, defaults, and audit logs can all be accessed from this menu.
Users
The Users screen allows you to manage accounts and view notifications and subscriptions for that
account.
You can filter the user list by various fields and settings. Last Login allows you to view users who have
logged in during various time frames or never. User lets you search by username or email address.
The Two-Factor Authentication, Remote File Repository, and Command Line Capture (Secure End-
point Windows connector 5.0 and higher) allows the connector to capture command line arguments
(including usernames, filenames, passwords, etc.) used during file execution and send the information
to Secure Endpoint. This information will be displayed in Device Trajectory for administrators as long
as they have single sign-on (such as Security Cloud sign-on) or Two-Factor Authentication enabled. fil-
ters allow you to filter by whether users have those features enabled or not on their accounts.
You can sort the list of users by email address, name, or last login time. Accounts with a key next to
them are administrators and those without are unprivileged users. Click the My Account link to view
the account you are currently logged in as. This account will also be highlighted blue in the user list.
Clicking the clock icon next to a user account will allow you to see a filtered view of the Audit Log for
activity related to that account. You can also click the View All Changes link to see a filtered view of
the Audit Log showing all activity for user accounts.
To view and edit details of an account, click the name of a user to access the user account page. If you
select your own account you also have the option to reset your password.
Note: You can send an email notification to a user to enable Two-Factor Authentic-
ation from the user account page.
Click New User to create a new Secure Endpoint console user account. A valid email address is
required for the new user to receive an account activation email. The email will provide instructions to
create and log in with their required Cisco Security Cloud sign-on account. You can also add a dif-
ferent email address to receive notifications; for example, if you want all notifications you create to go
to a distribution list. You must also decide if the user will be an administrator or an unprivileged user.
An administrator has full control over all aspects of the Secure Endpoint deployment. If you uncheck
the Administrator box, the user will only be able to view data for groups you assign to them. You can
also change the user’s privileges later by editing their account. See My Account for more details.
When you select a user account you can also view the subscriptions for that user. The Subscriptions
list displays any events and reports they have subscribed to.
Time Zone Settings
To change the time zone displayed by the Secure Endpoint console for your user account:
Click My Account or go to the Users page and click on your name or email address.
Select your preferred time zone settings from the Time Zone drop-down menu.
Note: All connector events will be displayed in the time zone you set and not in the
local time zone of the computer that observed the event.
My Account
Users can access their account settings on this page by clicking My Account.
l Two-Factor Authentication
l Appearance.
Users can choose the types of announcements that they receive by email by clicking the Announce-
ment Preferences link.
Appearance settings allow you to manually select Light or Dark themes for the Console, or select
Auto to use the theme selected through the operating system settings on versions of Windows,
macOS, and iOS that support it.
Secure Endpoint collects usage data with Google Analytics to improve accuracy, improve the product
and help troubleshoot issues. Users can choose to opt out their own account from Google Analytics by
clicking the Opt Out button.
Note: The Opt Out button affects only the user, not the organization. Use the set-
ting under Features on the Organization Settings page to opt the entire organ-
ization out of Google Analytics.
You can choose to opt in to UX Research. This invites you to participate in studies for early Secure
Endpoint designs and features.
Access Control
There are two types of users in Secure Endpoint, administrators and unprivileged users. When you
create a new user you must select their privilege level, but you can change their access level at any
time.
Administrators
The administrator privilege allows full control over all aspects of your Secure Endpoint deployment.
Administrators can view data from any group or computer in the organization and make changes to
groups, policies, lists, and users.
Only administrators can do the following:
l Create and edit Groups
l Create Policies
l View Command Line Capture (Secure Endpoint Windows connector 5.0 and higher) allows the
Note: An administrator can demote another administrator to a regular user but can-
not demote themselves.
Unprivileged Users
An unprivileged or regular user can only view information for groups they have been given access to.
Certain menu items will not be available to them such as Endpoint IOC scans, File Repository, and
Reports.
When you create a new user, you will have the choice whether to grant them administrator privileges.
If you do not grant them those privileges, you can select which groups, policies, and lists they have
access to. There are also options to allow the user to:
l Fetch files and diagnostics from computers in the selected groups.
Start by selecting the groups you want the user to have access to. The Clear button removes all
groups that have been added to that user. To undo changes from the current session, use the Revert
Changes button. The Remove All Privileges button will remove all groups, policies, and Outbreak
Control lists that have been assigned to the user.
The user will be able to view these groups on the Groups page but not be able to make any changes or
create new groups. The user will also be able to view information from connectors in these groups,
such as:
l Dashboard Overview Tab, Events, iOS Clarity Tab
l File Trajectory
l Device Trajectory
l File Analysis
l Prevalence
l Vulnerabilities
l Scan Summary
You can also allow the user to fetch files from computers in the Groups you assign to them so they can
be viewed in the File Repository or view Command Line Capture (Secure Endpoint Windows con-
nector 5.0 and higher) allows the connector to capture command line arguments (including user-
names, filenames, passwords, etc.) used during file execution and send the information to Secure
Endpoint. This information will be displayed in Device Trajectory for administrators as long as they
have single sign-on (such as Security Cloud sign-on) or Two-Factor Authentication enabled. data in
Device Trajectory and Events. The user will need to have single sign-on (such as Security Cloud sign-
on) or Two-Factor Authentication enabled before they can view the repository, request files, or see
command line data on the trajectory page. You can uncheck either of these boxes at any time to
remove these permissions.
Note: Unprivileged users can only request and view files and command line data
from groups they have permission to access.
Once you have selected the groups the user can access, you can select the Policies they are allowed
to view and edit. You can either manually assign individual policies to the user or click one of the auto-
select buttons to populate the policies and policy objects associated with the groups you selected. The
Clear button will remove all policies the user has been given access to.
Next, you can select Policy Objects the same way. Policy objects consist of custom detection lists,
application control lists, IP block and allow lists, exclusions, and device control configurations. Either
select individual lists or click the auto-select button to populate the lists assigned to the policies you
previously selected. The Clear button next to each list will remove only the lists of that type that have
been assigned to the user.
Exercise caution when assigning access to policies and lists. Some policies and lists can be used by
other groups that the user does not have access to. This could allow the user to make changes that
affect those groups.
Note: IP block and allow lists can be added to policies by users who haven’t been
granted permissions to those lists. The users are still unable to view or edit those
lists.
You can also modify a user’s group access at any time, make them an administrator, or demote an
administrator to an unprivileged user. When an unprivileged user views their own account they can
view the list of groups they can access and change their own password, email addresses, or enable
two-factor authentication.
Note: When changing user permissions some data is cached in Search results so
a user may still be able to see it for a period of time even though they no longer
have access to a group. In most cases, the cache is refreshed after 5 minutes.
Two-Factor Authentication
Two-factor authentication provides an additional layer of security against unauthorized attempts to
access your Secure Endpoint console account. It uses an RFC 6238 compatible application such as
Google Authenticator to generate one-time verification codes to be used in conjunction with your pass-
word.
You can enable two-factor authentication for your account by clicking Enable or Manage next to the
Two-Factor Authentication entry on your account in the Users page.
You will then be guided through the steps to enable two-factor authentication on your account, includ-
ing backup codes. It is important to keep a copy of your backup codes in a safe location in case you
are unable to access the device with your authenticator app.
Note: Each backup code can only be used one time. After you have used all your
backup codes you should return to this page to generate new ones.
Once you have successfully enabled two-factor authentication on your account, you will now see a but-
ton to view two-factor authentication Details.
If you need to disable two-factor authentication or generate new backup codes, click this link to return
to the two-factor authentication setup page.
The next time you log in to the Secure Endpoint console you will be prompted for your verification code
after you enter your email address and password.
Checking Remember this computer for 30 days will set a cookie that allows you to bypass two-factor
authentication on the current computer for the next 30 days. Your browser must be set to allow cook-
ies to use this setting.
Note: If you accidentally check Remember this computer for 30 days on a public
computer, a computer you will no longer have access to, or decide to disable two-
factor authentication, you should clear the cookies on your browser.
If you do not have access to your authenticator device, click Can’t log in with your verification code?
and enter one of your backup codes that you generated.
If you do not have access to your authenticator device or your backup codes, you will need to contact
support.
API Credentials
The API Credentials page allows you to add and remove API credentials for specific applications. For
more information see the Secure Endpoint API documentation.
Click New API Credential to generate an API key for your application. You can enter the name of the
application for reference purposes and assign a scope of read only or read and write permissions. You
can also select to allow the API credential access to Command Line Capture (Secure Endpoint Win-
dows connector 5.0 and higher) allows the connector to capture command line arguments (including
usernames, filenames, passwords, etc.) used during file execution and send the information to Secure
Endpoint. This information will be displayed in Device Trajectory for administrators as long as they
have single sign-on (such as Security Cloud sign-on) or Two-Factor Authentication enabled. capture
data. The account used to make API requests for command line data must have administrator priv-
ileges and single sign-on (such as Security Cloud sign-on) or Two-Factor Authentication enabled.
Note: An API credential with read and write scope can make changes to your
Secure Endpoint configuration that may cause significant problems with your end-
points. Some of the input protections built into the Secure Endpoint console do not
apply to the API.
The unique API client ID and API key for the application will be displayed when you click the Create
button. This information cannot be displayed after you leave this page so if you forget the credentials
or need to change them you will have to delete the credentials and create new ones.
Note: Deleting API credentials will lock out any clients using the old ones so make
sure to update them to the new credentials.
When you enable Cisco XDR or Secure Client Cloud Management Integration, there will be an auto-
generated API credential created. These credentials will have read/write permissions and be named
[AUTO-GENERATED] Cisco XDR API Client or [AUTO-GENERATED] Secure Client Cloud Man-
agement Module API Client. These credentials are also used to create an install token for Cisco
Secure Client.
Organization Settings
The Organization Settings screen allows you to specify global defaults for your Secure Endpoint
deployment.
The Organization Name entry appears on all reports that are generated from your Secure Endpoint
deployment. Click Edit to change the Organization name and add up to three Preferred Contact email
addresses. The Preferred Contacts may be used for support escalations, Threat Hunting, or Talos
Intelligence Group to reach out to.
You can also change the Default Group that computers not assigned a group will be a part of. Sim-
ilarly, the Default Policy defines the initial policy for each connector type for any new groups that are
created unless one is specified, or they inherit one through their parent. The Default connector Ver-
sion allows the administrator to specify which version of each connector will be installed during new
deployments.
Enable Request and store files from endpoints to use the File Repository. This setting applies to all
users in your organization. You will need to have single sign-on (such as Security Cloud sign-on) or
Two-Factor Authentication enabled on your account and provide your verification code.
3rd Party API Access allows you to use the application programming interfaces to access your Secure
Endpoint data and events without logging into the console. You can generate the API key from the API
Credentials page. For more information, see the Secure Endpoint API documentation.
Mobile Device Manager shows which MDM Integration you currently have set up to use and deploy
the Secure Endpoint iOS Connector with Clarity on iOS devices. Click MDM Integration to select your
MDM or change your Meraki SM API key.
You can click to configure Single Sign-On if your organization has not migrated to Security Cloud sign-
on. This will allow your users to log in to the Secure Endpoint Console using their single sign-on cre-
dentials once configured. You cannot use Two-Factor Authentication with single sign-on enabled, but
all features requiring two-factor authentication will be enabled.
You can enter your Secure Malware Analytics API key, if you have a separate Cisco Secure Malware
Analytics account. This allows you to see analysis results from your Secure Malware Analytics
account in File Analysis. When you enter a Secure Malware Analytics API key, the number of sub-
missions you can make per day is displayed. If you reach the limit, you will not be able to submit files
through File Analysis or through Automatic Analysis on the Prevalence page. If at any time you need
to revert to the initial Secure Malware Analytics API key that was assigned to you, click the Use
Default Key button.
To limit the number of daily submissions used by Automatic Analysis, you can set the percentage of
your total daily submissions using the slider. You can use up to 80% of your daily submission quota for
Automatic Analysis. You can also set the default operating system that files submitted for analysis are
run in with the VM image for analysis drop-down. All files submitted through Automatic Analysis will be
submitted to a VM using the operating system image selected, but you can change this setting when
manually submitting a file through File Analysis.
The AV Definitions Threshold setting lets you configure the number of days (between 1 and 7) stale
that connector AV definitions can be before they appear as outdated on the Computer Management
page.
Secure Endpoint collects usage data with Google Analytics to improve accuracy, improve the product
and help troubleshoot issues. You can choose to opt out the organization from Google Analytics by
clicking the Opt Out button.
The Inactive Computer Threshold allows you to specify how many days a connector can go without
checking in to the Cisco cloud before it is removed from the Computer Management page list. The
default setting is 90 days. Inactive computers will only be removed from the list and any events they
generated will remain in your Secure Endpoint organization. The computer will reappear in the list if
the connector checks in again.
Note: Licenses are not reclaimed when the connector is removed from the com-
puters page list.
Cisco XDR or Secure Client Cloud Management Integ-
ration
Cisco XDR and Secure Client Cloud Management connect Cisco’s integrated security portfolio and
your infrastructure for a consistent experience. They deliver unified visibility with shared context and
meaningful metrics, built-in integrations with out-of-box interoperability, and strengthen your security
by accelerating threat investigations and remediation across your security ecosystem.
Cisco XDR and Secure Client Cloud Management integration allow you to integrate your Secure End-
point organization with your Cisco XDR or Secure Client Cloud Management account. Integration will
share some of your Secure Endpoint data with Cisco XDR or Secure Client Cloud Management when
enabled.
Secure Endpoint Events are considered automatically by Cisco XDR when they are integrated. Cisco
XDR ingests the events and may use them for incident generation without the need for configuration.
This functionality is enabled by default in Cisco XDR and does not require any user configuration.
When Cisco XDR or Secure Client Cloud Management integration are enabled they will create API
Credentials in your organization. These credentials will have read/write permissions and be named
[AUTO-GENERATED] Cisco XDR API Client or [AUTO-GENERATED] Secure Client Cloud Man-
agement Module API Client depending on the integration. These credentials are also used to create
an install token for Cisco Secure Client.
MDM Integration
Before you can deploy the Secure Endpoint iOS Connector on iOS devices you must connect your
Mobile Device Manager to the Secure Endpoint console on the MDM Integration page. You can also
provide an email address that will be displayed on Clarity endpoints for users to contact if they exper-
ience any problems.
Meraki
You will need to provide the API key from your Meraki SM to deploy the Clarity on your iOS devices.
For information on configuring your Meraki SM, see the Meraki SM Clarity configuration page.
If you need to make changes or add more Groups to your Meraki SM you can do this from the Deploy
Clarity page by navigating to Management > Deploy Clarity for iOS.
Workspace ONE
1. You will first have to add Clarity to your Workspace ONE MDM. From the Workspace ONE
Dashboard:
2. Navigate to Apps & Books > Public Tab.
i. You should see the Clarity app listed. If not, click Add Application.
ii. Select Apple iOS for platform and search for “Clarity”.
3. Select the application from the search results then click Save & Assign.
i. Click Select Assignment Groups > Create Assignment Group to create a new Smart
Group.
ii. Assign a Name to the Smart Group.
iii. Set Ownership to Shared and Corporate.
iv. Set the Platform and Operating System to Apple iOS, Greater Than, and iOS 11.2.0.
v. Click Save.
4. The first time you add the Clarity you may see the Add Assignment dialog.
i. Set App Delivery Method to Auto.
ii. Set Managed Access to Enabled.
iii. Set Make App MDM Managed if User Installed to Enabled.
iv. Click Add.
5. Click Save & Publish then click Publish.
6. Select the Clarity app under Apps & Books. On the Assignment tab make sure your Smart
Group is listed.
MobileIron
You will first have to add the Clarity to your MobileIron MDM. From the MobileIron Dashboard:
1. Navigate to Devices & Users > Labels.
2. Click Add Label.
i. Assign a Name and Description to the new Label.
ii. Add a Criteria with the settings Platform Name, Starts with, and iOS 11.2.
iii. Add another Criteria with the settings Supervised, Equals, and true.
iv. Click Save.
3. Navigate to Apps > App Catalog and click Add.
4. Click iTunes and search for the Clarity.
5. Select Clarity from the search results and click Next.
6. Most of the fields on the next page are already populated. Add a Description and Category then
click Next.
7. Select Send installation request or send convert unmanaged to managed app request (iOS 9
and later) on device registration or sign-in then click Next.
8. Navigate to Apps > App Catalog.
i. Select Actions > Apply to Labels.
ii. Select the label you created in Step 2.
iii. Click Apply.
Other MDMs
From the Secure Endpoint Console.
1. Go to Accounts > Organization Settings.
2. Under Features click MDM Integration.
3. Select Generic from the MDM Type pull-down menu.
4. Enter an email address that will be displayed in the Clarity app for users to contact if they exper-
ience any problems.
5. Enter the MDM’s configuration variables for Serial Number and MAC Address, respectively.
6. Click Save.
Note: For Clarity to work properly, both the Serial Number and MAC Address con-
figuration variables must be entered.
Secure Endpoint single sign-on supports SAML 2.0. You can configure Secure Endpoint to use Cisco
Secure Sign-On, or you can use a custom third-party identity provider. This document assumes your
identity provider is set up with your users. You can learn more about Cisco Secure Sign-On at https://-
cisco.com/go/securesignon.
Caveats
Keep the following caveats in mind when enabling single sign-on for your organization:
l All users must have an account with an email address that has a corresponding email address
at the identity provider. If you have any users who do not have a matching email address at the
identity provider, those users will no longer be able to log in. Contact support to have single
sign-on disabled for those users.
l Using Cisco Secure Sign-On as your SAML provider requires all accounts in your organization
to have existing Cisco Secure Sign-On accounts. You can create Cisco Secure Sign-On
accounts at https://sign-on.security.cisco.com. Users will receive an email and must activate
their accounts within 7 days. Users without an account will not be able to sign in.
l All user passwords will be reset to prevent users from logging in using the standard username
and password mechanism. Admin users will be able to create a one-time password.
l Two-factor authentication will be disabled for each user. You will need to re-enable two-factor
authentication if you disable single sign-on.
l Contact support if you need a user with Secure Sign-On disabled.
Note: Using Cisco Security Cloud Sign-On as your SAML provider requires all
accounts in your organization to have existing Cisco Security Cloud Sign-On
accounts. You can create Cisco Security Cloud Sign-On accounts at https://sign-
on.security.cisco.com. Users without an account will not be able to sign in.
6. Once your account is created, return to the SAML Configuration page, and click Verify Con-
figuration.
7. Sign in with the credentials provided when you created the Cisco Security Cloud Sign-On
account. You are prompted to log in with Duo Security as a second authentication factor.
8. Once you have verified your configuration, note the caveats listed on the SAML Configuration
page then click Enable Cisco Security Cloud Sign-On to complete the setup.
9. An email is sent to each user with instructions on how to log in. Instead of entering their user-
name and password, users must now log in by clicking Use Single Sign-On on the log in page,
entering their email address, then clicking Log In. If the user has not already authenticated to
the identity provider they are redirected to do so.
6. Enter any additional information your identity provider requires, noting the following:
l For Active Directory set Outgoing Claim Type to Email Address.
l For Okta set Name ID format to EmailAddress and Application username to Email.
7. Download the SAML metadata file from your third-party identity provider or copy the SAML
metadata URL.
8. Under Identity Provider Settings, upload the SAML metadata file or paste the SAML metadata
URL.
9. Click Save SAML Configuration.
10. Click Test to test your configuration. You are prompted to log in to your identity provider. If the
test is successful, move on to the next step.
11. Click Enable SAML Authentication to complete the setup.
An email is sent to each of your users with instructions on how to log in. Users must log in by clicking
Use Single Sign-On on the log in page and entering their email address.
Note: If you are the administrator who is disabling single sign-on, you can reset
your password immediately. You do not need to wait for the password reset email.
License Information
Your current license information is displayed on this page. The top of the page shows whether your
organization is compliant, the number of seats in use and how many you have available. Your licenses
and their start and end dates are also shown.
Audit Log
The audit log allows the Secure Endpoint administrator to track administrative events within the con-
sole that may affect other console users. Actions such as account creations, deletions, password
resets, user login, user logout, creation and deletion of reports, policy changes, and other actions are
all tracked. Associated information with each entry includes the date, the object acted on, action,
changes that were made (if applicable), messages associated with the action, the user who triggered
the action, and the IP address they were connected from. Audit log entries are stored for three years.
You can filter the audit log to show certain event types, date ranges, users, or IP addresses. The Type
includes items such as policies, groups, outbreak control lists, and users. Once you select a type you
can select an event specific to the Event type, like creation, deletion, and updates. The Item includes
specific lists, computers, groups, and users.
Note: Item lists with more than 5000 computers cannot be displayed in the pull-
down menu. Go to Computer Management and locate the computer you want to
see the audit log for using the filters, then click the View Changes link for that com-
puter to see a filtered view of the audit log.
Each audit log event can be expanded to show more information on the specific event including the
user who generated the event, the IP address of the computer they were logged into at the time, and
the time and date.
Demo Data
Demo Data allows you to see how Secure Endpoint works by populating your console with replayed
data from actual malware infections. This is useful for evaluating the product and demonstrating its
capabilities without having to infect computers yourself.
Enabling Demo Data will add computers and events to your Secure Endpoint console so you can see
how the Dashboard, File Trajectory, Device Trajectory, Threat Root Cause, Detections, and Events
behave when malware is detected. You can also test the Endpoint Isolation feature by starting and
stopping a simulated isolation session.
Note: The group policy for the Demo Data computers must have Endpoint Isol-
ation enabled to simulate an isolation session. Endpoint Isolation is available for
Windows connector versions 7.0.5 and later and Mac connector versions 1.2.1
and later.
Demo Data can coexist with live data from your Secure Endpoint deployment; however, because of
the severity of some of the Demo Data malware, it may obscure real events in certain views, such as
the Dashboard Indications of Compromise widget.
Click Enable Demo Data to populate your console with the data.
When the Demo Data has been enabled you can click Disable Demo Data to remove it again.
Refresh Demo Data is similar to enabling it. When Demo Data is enabled, refreshing it will simply
refresh all the events so that they appear in the current day’s events.
Applications
The Applications menu shows which applications external to Secure Endpoint you have authorized to
access your organization’s data. For example, you can display Secure Endpoint data in your Cisco
Secure Firewall Management Center dashboard. For more information on Secure Firewall integration
with Secure Endpoint, see your Secure Firewall documentation.
From this page you can view your application settings by clicking on its name, edit the groups that are
sending data to the application, or deregister the application from Secure Endpoint entirely.
Application Settings
When you select the name of an application from your list you will see the current settings for that
application.
The type of application, its authorizations, and the groups it is receiving events for are displayed. From
this view, you can also deauthorize any data streams the device is receiving.
Edit an Application
By default, an application with the streaming event export authorization will receive events from all
groups in your organization.
If you want to exert more granular control over the events sent from your Secure Endpoint deployment
to the application, select one or more groups from the list on the right. If you want to remove a group,
select it from the Event Export Groups list on the left. If the Event Export Groups list is empty, the
application will receive events from all computers across all groups in your organizations. To stop the
application from receiving events from Secure Endpoint entirely, you must deregister it from the main
Applications screen.
AV Definition Summary
This page displays the latest antivirus definition versions available so that you can track when defin-
ition updates became available.
Each of the boxes at the top displays the latest definition versions available for each operating system.
Each of the tabs contains a list of the selected operating system’s AV definition versions. You can click
on the boxes or the tabs to select the operating system. For Secure Endpoint Linux connectors you
can view endpoints with the full ClamAV definition set or those with the Linux-only definition subset.
Cisco XDR
Cisco XDR is a cloud-based solution designed to simplify security operations and empower security
teams to detect, prioritize, and respond to the most sophisticated threats. The solution brings the
entire environment together by connecting third-party and Cisco offerings with the underlying threat
intelligence from Talos to enrich incidents with added context and asset insights. It reduces false-pos-
itives and enhances threat detection, response, and forensic capabilities through clear prioritization of
alerts and providing the shortest path from detection to response. Learn more about Cisco XDR here.
Integrate with Cisco XDR
You must link your Secure Endpoint account to Cisco XDR using your Cisco Security Cloud Sign-On.
For more details on configuring and using Cisco XDR see the documentation on the Cisco
XDR dashboard. Open the ribbon and click Launch next to Cisco XDR, then click the help icon at the
top right of the page.
Casebook App
The casebook app is a tool for saving, sharing and enriching analysis by adding file hashes, IPs,
domains, log entries, etc. into an ongoing investigation and submitting entire cases to Cisco XDR.
Investigators can add notes, descriptions and sync an active casebook across tabs as well as export
cases for use in other tools and systems.
You can access Casebook from the Cisco XDR ribbon to create cases and to add and look up observ-
ables such as IPs, domains, and SHA-256s. For more information, see Casebook App.
Pivot Menu
When Cisco XDR is enabled, you can click the pivot menu button next to observables on any page
to access actions from Cisco Advanced Threat Solutions, like Umbrella, Talos, Secure Malware Ana-
lytics, Cisco XDR, and others. The pivot menu replaces the SHA-256 File Info Context Menu.
Note: The features displayed in the pivot menu depend on the kind of observable
you are investigating.
When hovering over the pivot menu, you will see two buttons that you can click to copy the observable
to the clipboard, and to click and drag it into Casebook, respectively.
Secure Client Cloud Management
Non-XDR customers can integrate with Secure Client Cloud Management to access Orbital user and
API management, manage Secure Client profiles and deployments, and manage Secure Endpoint
API v3 credentials. Secure Client Cloud Management is included with your Secure Endpoint sub-
scription (all tiers). For more information about Secure Client Cloud Management, go here.
Note: Only Secure Endpoint Windows connector 5.1.13 and later can use a local
Secure Endpoint Update Server.
Requirements
The Secure Endpoint Update Server is supported on Window Server 2012 and higher and CentOS
release 6.9 (Final) x86_64. Supported Web servers are Apache, Nginx, and IIS.
Hardware Requirements
l 8 core CPU
l 16 GB RAM
l 100 GB free disk space
Download the Secure Endpoint Update Server
1. Navigate to Management > Policies.
Linux Cron
The MIRRORDIR setting must specify a location that the update utility is able to write to.
For example, to update TETRA definitions hourly you would add the following to your crontab file:
0 * * * * [Full path to binary]/update-linux-[i386 or x86-64] fetch --once --config [Full path to con-
fig]/config.xml - -mirror MIRRORDIR
l C:\AMP\update-win-x86-64.exe
l C:\AMP\config.xml
l C:\AMP\mirror
We also assume that the utility will run once an hour every day in fetch mode.
1. Start the Task Scheduler.
2. Select Create New Task.
3. Select the General tab.
i. Enter a Name for the task.
ii. Select Run whether user is logged on or not.
iii. Select your operating system from the Configure for drop-down.
4. Select the Triggers tab.
i. Click New.
ii. Select On a schedule from the Begin the task drop-down.
iii. Select Daily under Settings.
iv. Check Repeat task every and select 1 hour from the drop-down.
v. Verify that Enabled is checked.
vi. Click Ok.
5. Select the Actions tab.
i. Click New.
ii. Select Start a program from the Action drop-down.
iii. Enter C:\AMP\update-win-x86-64.exe or C:\AMP\update-win-i386.exe in the Pro-
gram/script field.
iv. Enter fetch --config C:\AMP\config.xml --once --mirror C:\AMP\mirror in the Add argu-
ments field.
v. Enter C:\AMP in the Start in field.
vi. Click Ok.
6. Select the Conditions tab.
l [Optional] Check the Wake the computer to run this task option.
Linux hosts
./update-linux-[i386 or x86-64] fetch --config config.xml --mirror MIRRORDIR
Windows hosts
update-win-[i386 or x86-64] fetch --config config.xml --mirror MIRRORDIR
Self-Hosting Mode
In this mode, the Secure Endpoint Update Server will periodically download TETRA definitions and
microdefinitions from the Secure Endpoint servers to a user-specified location, and host them using
the built-in HTTP server. The self-hosting mode is only recommended for Proof-of-Concept, or small
deployments. The user is responsible for the monitoring of the Secure Endpoint Update Server.
Self-Hosting Periodic Fetch Mode
The Secure Endpoint Update Server has to be run in superuser mode, as binding to privileged HTTP
ports is required. In all cases below, the “MIRRORDIR” setting refers to a location specified by the
end-user of the utility that will receive the updates and the configuration file setting (--config) can be
omitted if the configuration file is placed in the same location as the update script.
Linux hosts
./update-linux-[i386 or x86-64] host --config config.xml --mirror MIRRORDIR --server IPADDRESS
Windows hosts
update-win-[i386 or x86-64] host --config config.xml --mirror MIRRORDIR --server IPADDRESS
Set up a Third-Party Web Server to Host the Content
Note that the Secure Endpointconnector requires the presence of the Server HTTP Header in the
response for proper operation. If the Server HTTP Header has been disabled, the Web server may
need additional configuration specified below.
Apache
RedirectMatch ^/av64bit_[\d]+/(.*) /av64bit/$1
RedirectMatch ^/av32bit_[\d]+/(.*) /av32bit/$1
Nginx
The following should be added to the “server” section of the configuration file:
Microsoft IIS
The url-rewrite extension must be installed. Add the following XML snippet to the server configuration
at /[MIRROR_DIRECTORY]/web.config:
<rewrite>
<rules>
<rule name="Rewrite fetch URL">
<match url="^(.*)_[\d]*\/avx\/(.*)$" />
<action type="Redirect" url="{R:1}/avx/{R:2}" appendQueryString="false" />
</rule>
</rules>
</rewrite>
Talos Threat Hunting
Secure Endpoint Premier subscriptions include Cisco Talos Threat Hunting. Talos Threat Hunting
leverages the expertise of both Talos and the Cisco Efficacy Research Team to help identify threats
found in your environment. It is an analyst-centric process that enables organizations to uncover hid-
den advanced threats missed by automated preventative and detective controls. Once threats are
detected, customers are notified so they can begin remediation.
Access Talos Threat Hunting
When Talos Threat Hunting has been enabled on your Secure Endpoint account you can access it
from the Analysis menu.
There will also be an icon in the top right corner of the Console. A badge will be displayed showing the
number of new incidents if any.
Any incidents will also appear in the Dashboard Tab and Events as well as the Device Trajectory for
any computers involved in the incident. Each event links to the Talos Threat Hunting Incident Report.
Overview
The overview pane provides comparative information between your organization and global data as
well as the types of threat hunts performed.
use of a specific set of tools, exploits, or a sequence of events that matches other compromise
incidents.
l Intelligence - threat hunts based on current events or malware incidents taking place across the
globe. These can also include threat hunts based on recently published vulnerabilities.
l Anomaly driven - threat hunts triggered by events that occur outside of expected activity. For
example, a user logging in outside of their normal work hours or from a country they’ve never
logged in from before.
Talos Threat Hunting Incidents
The Talos Threat Hunting Incidents page shows a list of incidents discovered through analysis of your
organization’s data.
Note: Incidents discovered through a threat hunt does not trigger any Automated
Actions.
Talos Threat Hunting Incident Report
Each Incident Report is custom-written to provide actionable information about the incident as well as
remediation and mitigation steps where possible.
Incident Started at is the time the analyst believes the incident started based on the available data.
This time could be updated as more information is uncovered.
Incident Discovered on is the time the analyst first uncovered evidence that the incident took place.
The Tactics and Techniques include information from the MITRE ATT&CK knowledge base. Tactics
represent the objective of an attack, such as executing malware or exfiltrating confidential information.
Techniques are the methods attackers use to achieve the objectives or what they gain. For more
information, see Getting Started with ATT&CK.
Summary provides details the analyst uncovered about the incident from observing data from your
Secure Endpoint account as well as other Cisco XDR products you use. Methods, objectives, and
other significant details involved in the incident will be included to provide context.
Remediation includes recommendations on actions that can or should be taken, to include pointed
investigation components from the incident. Any possible mitigation measures for the specific incident
may be included if applicable.
Orbital Queries provides any existing and custom Orbital queries that you can use to gather additional
information and evidence about the incident.
File Disposition
Files observed by your connectors are divided into three disposition types:
l Clean - the file is known to be clean or signed with a trusted certificate.
Indications of Compromise
Secure Endpoint calculates devices with Trajectory Indications of Compromise based on events
observed over the last 7 days. A single Cloud IOC will only be reported once every four hours per end-
point. Events such as malicious file detections, a parent file repeatedly downloading a malicious file
(Potential Dropper Infection), or multiple parent files downloading malicious files (Multiple Infected
Files) are all contributing factors. Indications of compromise include:
l Threat Detected - One or more malware detections were triggered on the computer.
l Potential Dropper Infection - Potential dropper infections indicate a single file is repeatedly
more severe than a simple threat detection because the malware potentially executed its pay-
load.
l Suspected botnet connection - The computer made outbound connections to a suspected bot-
l Suspicious download - Attempted download of an executable file from a suspicious URL. This
does not necessarily mean that the URL or the file is malicious, or that the endpoint is definitely
compromised. It indicates a need for further investigation into the context of the download and
the downloading application to understand the exact nature of this operation.
l Suspicious Cscript Launch - Internet Explorer launched a Command Prompt, which executed
cscript.exe (Windows Script Host). This sequence of events is generally indicative of a browser
sandbox escape ultimately resulting in execution of a malicious Visual Basic script.
l Suspected ransomware - File names containing certain patterns associated with known ransom-
ware were observed on the computer. For example, files named help_decrypt.<filename> were
detected.
l Possible webshell - the IIS Worker Process (w3wp) launched another process such as power-
shell.exe. This could indicate that the computer was compromised and remote access has been
granted to the attacker.
Note: In certain cases the activities of legitimate applications may trigger an indic-
ation of compromise. The legitimate application is not quarantined or blocked, but
to prevent another Indication of Compromise being triggered on future use you
can add the application to Application Control - Allowed Applications.
known to be used as a bot command and control channel. Check the Device Trajectory for this
computer to see if any files were downloaded and subsequently executed from this host.
l ZeroAccess.CnC.HighRisk - The computer made a connection to a known ZeroAccess com-
mand and control channel.
l Zbot.P2PCnC.HighRisk - The computer made a connection to a known Zbot peer using its
peer-to-peer command and control channel.
l Phishing.Hoster.MediumRisk - The computer made a connection to an IP address that may
host a phishing site. Often, computers phishing sites also host many other websites and the con-
nection may have been made to one of these other benign sites.
Note: Device flow correlation is incompatible with applications that do network tun-
neling, like VPN.
Connector Firewall Exceptions
To allow the Secure Endpoint connectors to communicate with Cisco systems, the firewall must allow
the clients to connect to certain servers over specific ports. There are three sets of servers depending
on where you are located: one for the European Union, one for Asia Pacific, Japan, and Greater
China, and one for the rest of the world. All connectors - Windows, Mac, Linux, Android, and iOS -
require access to certain servers while others are only required if certain features are enabled.
Note: If your firewall requires IP address exceptions, see this Cisco TechNote.
North America Firewall Exceptions
All connectors for organizations located in North America require connectivity from the connector to
the following servers over HTTPS (TCP 443):
l Event Server - intake.amp.cisco.com
To allow the connector to communicate with malware analytics cloud servers for file and network dis-
position lookups and enrollment the firewall must allow the clients to connect to the following server
over TCP 443:
l Cloud Host for Windows, Mac, and Linux - cloud-ec-asn.amp.cisco.com
To use Orbital on your Windows, Mac, and Linux connectors, you must allow access to the following
servers over TCP 443:
l Orbital Updates - orbital.amp.cisco.com
If you have the Behavioral Protection feature enabled on your Windows, Mac, and Linux connectors
you need to allow access to the following server over TCP 443 for signature updates:
l Behavioral Protection Signatures - apde.amp.cisco.com
If you have TETRA enabled on any of your Secure Endpoint Windows connectors you must allow
access to the following servers over TCP 80 and 443 for signature updates:
Update Server - tetra-defs.amp.cisco.com
Certificate Validation - commercial.ocsp.identrust.com, validation.identrust.com
If you have Device Control enabled on any of your Secure Endpoint Windows connectors you must
allow access to the following servers over TCP 443:
l Device Control - endpoints.amp.cisco.com
If you use the Endpoint IOC Scanner on your Secure Endpoint Windows connectors you must allow
access to the following server over TCP 443:
l Endpoint IOC Downloads - ioc.amp.cisco.com
If you have any Custom Detections - Advanced signatures you want your endpoints to use you must
allow access to the following server over TCP 443:
l Advanced Custom Signatures - custom-signatures.amp.cisco.com
European Union Firewall Exceptions
All connectors for organizations located in the European Union must allow connectivity from the con-
nector to the following servers over HTTPS (TCP 443):
Event Server - intake.eu.amp.cisco.com
Management Server - mgmt.eu.amp.cisco.com
Policy Server - policy.eu.amp.cisco.com
Error Reporting - crash.eu.amp.cisco.com
Remote File Fetch - rff.eu.amp.cisco.com
Connector Upgrades - upgrades.eu.amp.cisco.com (TCP 80 and 443)
To allow the connector to communicate with malware analytics cloud servers for file and network dis-
position lookups and enrollment the firewall must allow the clients to connect to the following server
over TCP 443:
l Cloud Host for Windows, Mac, and Linux - cloud-ec-asn.eu.amp.cisco.com
To use Orbital on your Windows, Mac, and Linux connectors, you must allow access to the following
servers over TCP 443:
l Orbital Updates - orbital.eu.amp.cisco.com
If you have the Behavioral Protection feature enabled on your Windows, Mac, and Linux connectors
you need to allow access to the following server over TCP 443 for signature updates:
l Behavioral Protection Signatures - apde.eu.amp.cisco.com
If you have TETRA enabled on any of your Secure Endpoint Windows connectors you must allow
access to the following servers over TCP 80 and 443 for signature updates:
l Update Server - tetra-defs.eu.amp.cisco.com
If you have Device Control enabled on any of your Secure Endpoint Windows connectors you must
allow access to the following servers over TCP 443:
l Device Control - endpoints.eu.amp.cisco.com
If you use the Endpoint IOC Scanner you must allow access to the following server over TCP 443:
l Endpoint IOC Downloads - ioc.eu.amp.cisco.com
If you have any Custom Detections - Advanced signatures you want your endpoints to use you must
allow access to the following server over TCP 443:
l Advanced Custom Signatures - custom-signatures.eu.amp.cisco.com
Asia Pacific, Japan, and Greater China Firewall Excep-
tions
All connectors for organizations located in Asia Pacific, Japan, and Greater China must allow con-
nectivity from the connector to the following servers over HTTPS (TCP 443):
l Event Server - intake.apjc.amp.cisco.com
To allow the connector to communicate with malware analytics cloud servers for file and network dis-
position lookups and enrollment the firewall must allow the clients to connect to the following server
over TCP 443:
l Cloud Host for Windows, Mac, and Linux - cloud-ec-asn.apjc.amp.cisco.com
To use Orbital on your Windows, Mac, and Linux connectors, you must allow access to the following
servers over TCP 443:
l Orbital Updates - orbital.apjc.amp.cisco.com
If you have the Behavioral Protection feature enabled on your Windows, Mac, and Linux connectors
you need to allow access to the following server over TCP 443 for signature updates:
l Behavioral Protection Signatures - apde.apjc.amp.cisco.com
If you have TETRA enabled on any of your Secure Endpoint Windows connectors you must allow
access to the following servers over TCP 80 and 443 for signature updates:
Update Server - tetra-defs.apjc.amp.cisco.com
Certificate Validation - commercial.ocsp.identrust.com, validation.identrust.com
If you have Device Control enabled on any of your Secure Endpoint Windows connectors you must
allow access to the following servers over TCP 443:
Device Control - endpoints.apjc.amp.cisco.com
If you use the Endpoint IOC Scanner you must allow access to the following server over TCP 443:
Endpoint IOC Downloads - ioc.apjc.amp.cisco.com
If you have any Custom Detections - Advanced signatures you want your endpoints to use you must
allow access to the following server over TCP 443:
Advanced Custom Signatures - custom-signatures.apjc.amp.cisco.com
Mac/Linux Connector Status
The Secure Endpoint Mac and Linux connectors report a status that represents a combination of the
following:
l Endpoint Identity Enrollment/Subscription
l Network Status
The status is displayed in the Secure Endpoint Mac connector UI and can also be accessed through
ampcli on both Mac and Linux using the /opt/cisco/amp/ampcli status command.
This diagram outlines the general flow of the connection process and status.
This table describes how the status indicator is set.
Offline (the net- The local network has been dis- Cable disconnected.
work is down) connected. The network interface is disabled.
Release Notes
2024 October 24
Secure Endpoint Console 5.4.20241024
Bugfixes/Enhancements
l Minor bugfixes and performance improvements.
2024 October
2024 October 10
Secure Endpoint Console 5.4.20241010
New
l The new Vulnerabilities page simplifies vulnerability management by providing a complete list
of vulnerabilities (CVEs) detected on your endpoints. This includes OS and applications. Avail-
able in Advantage and Premier tiers only.
l Double-wildcard characters ('**') can be used in Mac process exclusions to exclude processes
launched from all sub-folders from monitoring. Requires Mac connector version 1.24.0 or later.
l Host Firewall added to Secure Endpoint /v1 API. See the Changelog for more information.
2024 October 3
Cisco Security Connector for iOS 1.7.2
New
l Added support for iOS 18.
Bugfixes/Enhancements
l Migrated deprecated APIs for iOS 18 content filter.
l Updated Umbrella to 1.7.2. See the Umbrella release notes for details.
2024 September
2024 September 26
Secure Endpoint Console 5.4.20240926
New
l Host Firewall is now available for Secure Endpoint Windows connector versions 8.4.2 and later
and Mac connector versions 1.24.2 and later. This feature provides centrally-managed visibility
and control over network traffic on your endpoints through the Secure Endpoint console.
Bugfixes/Enhancements
l Host Firewall status and assigned configuration settings are now included in the computer CSV
export.
2024 September 17
Secure Endpoint Linux Connector 1.25.0
New
l Added support for SUSE 15.6. See SUSE Linux Enterprise and openSUSE Leap (x86) for sup-
ported connector versions.
l Added support up to mainline kernel version 6.9.
l Added eBPF CO-RE (Compile Once, Run Everywhere) back end. This update:
l Removes dependency on kernel headers.
Note: eBPF CO-RE requires modern kernel versions. See Troubleshoot Secure
Endpoint Linux Connector Fault 11.
Bugfixes/Enhancements
l Updated ClamAV to 1.4.1.
l Fixed memory consumption related to network monitoring.
l Behavioral engine improvements:
l Increased reliability of signature updates.
Bugfixes/Enhancements
l Fixed an excessive memory consumption issue when network monitoring is configured.
l Patched ClamAV, which addresses the following vulnerability: CVE-2024-20505
2024 September 12
Secure Endpoint Console 5.4.20240912
Bugfixes/Enhancements
l Product update date range is no longer reported as invalid when a new policy is created.
l Product update date range is no longer reset to default values when a product update version is
selected.
l A warning message is displayed on the policy product update tab when the date range ends in
the past.
2024 September 10
Secure Endpoint Windows Connector 8.4.2.30317
(Critical update for Secure Endpoint Windows Connector 8.4.1.30307 )
Bugfixes/Enhancements
l Fixed an unexpected file deletion issue. (CSCwm46230)
Note: We strongly recommend upgrading any 8.4.1 versions of the Windows con-
nector in your organization to version 8.4.2.30317. Windows Connector version
7.x is not affected.
2024 August
2024 August 29
Secure Endpoint Console 5.4.20240829
New
l The Inbox page has been redesigned to provide users with a streamlined experience to view
and triage compromises through a new user interface and improved workflow. Navigate to the
Inbox page and click Try the new version to start using it now.
l The Cisco Security Risk Score now checks application vulnerabilities in addition to
OS vulnerabilities. See Cisco Security Risk Score for the list of supported applications.
Bugfixes/Enhancements
l Extended Cisco Security Risk Score support for Debian operating systems.
2024 August 26
Secure Endpoint Mac Connector 1.24.2
Bugfixes/Enhancements
l Improved reliability of Behavioral Protection signature updates.
l Added a rate limit to unique Behavioral Protection detections.
l Improved Security Extension performance when file path and file extension exclusions are con-
figured.
2024 August 15
Secure Endpoint Console 5.4.20240815
Bugfixes/Enhancements
l Added a button to the computer details grid on the Computers page to view the computer in
XDR Assets. Available to Cisco XDR users.
2024 August 12
Secure Endpoint Windows Connector 8.4.1.30307
(superseded by Secure Endpoint Windows Connector 8.4.2.30317 )
New
l Secure Endpoint Windows connector 8.4.1 now includes support for Windows 11 on ARM. See
Secure Endpoint Windows Connector Version 8.x (64-bit and ARM only) Operating System
Compatibility for supported operating systems and Supported Engines and Features by Con-
nector Version.
Note: The installer will block the connector from being installed on unsupported
versions of Windows on ARM.
l Added protection against attempts to overwrite the master boot record when Exploit Prevention
is enabled.
Bugfixes/Enhancements
l Fixed an issue so that the connector will no longer block critical Windows system files.
l Enhanced efficacy for Behavioral Protection PowerShell script analysis.
l Improved support for Behavioral Protection OS API telemetry.
l Added protection against attempts to block connector communication with Cisco cloud servers.
l Improved PowerShell script exclusions.
l Fixed an issue with unintentional Behavioral Protection Component Download errors.
(CSCwk13319)
l Fixed a crash caused by a specific bad unicode path that was affecting Windows Server 2016
systems. (CSCwh85846)
l Improved protection against anti-malware scan interface (AMSI) bypass techniques when
Exploit Prevention is enabled.
l Fixed a monitoring issue with large text file transfers that could lead to a crash in Behavioral Pro-
tection.
Note: The installer will block the connector from being installed on unsupported
versions of Windows on ARM.
l Added protection against attempts to overwrite the master boot record when Exploit Prevention
is enabled.
Bugfixes/Enhancements
l Fixed an issue so that the connector will no longer block critical Windows system files.
l Enhanced efficacy for Behavioral Protection PowerShell script analysis.
l Improved support for Behavioral Protection OS API telemetry.
l Added protection against attempts to block connector communication with Cisco cloud servers.
l Improved PowerShell script exclusions.
l Fixed an issue with unintentional Behavioral Protection Component Download errors.
(CSCwk13319)
l Fixed a crash caused by a specific bad unicode path that was affecting Windows Server 2016
systems. (CSCwh85846)
l Improved protection against anti-malware scan interface (AMSI) bypass techniques when
Exploit Prevention is enabled.
Bugfixes/Enhancements
l Endpoint isolation status in the Secure Endpoint console and connector now match when
triggered by an automated action.
2024 July
2024 July 18
Secure Endpoint Console 5.4.20240718
Bugfixes/Enhancements
l Minor bugfixes and performance improvements.
2024 July 11
Secure Endpoint Console 5.4.20240711
Bugfixes/Enhancements
l Behavioral protection signature version is now available in computer details.
l Removed Critical from Cisco Security Risk Score filter to align with other Cisco Security
products. Risk scores between 91 and 100 are now part of High.
2024 June
2024 June 26
Secure Endpoint Mac Connector 1.24.1 (supersedes 1.24.0)
Bugfixes/Enhancements
l Fixed false-positive Behavioral Protection detections in the menulet user interface and ampcli
event history.
l Fixed a crash that could occur when starting the Behavioral Protection engine on macOS 11.
l Fixed a crash that could occur when reconfiguring the network extension.
2024 June 21
Secure Endpoint Android Connector 2.9.0
Bugfixes/Enhancements
l Minor bugfixes and performance enhancements.
2024 June 20
Secure Endpoint Console 5.4.20240619
New
l You can now use a Time Start Filter in Device Trajectory to filter the view from a certain time
stamp.
2024 June 6
Secure Endpoint Console 5.4.20240606
Bugfixes/Enhancements
l Extended Cisco Security Risk Score support to Linux operating systems.
2024 June 5
Secure Endpoint Linux Connector 1.24.2
New
l Added official support for Enterprise Linux 9.4. See Cisco Secure Endpoint Linux Connector OS
Compatibility for supported operating systems and kernel versions for this release.
Bugfixes/Enhancements
l Improved efficacy of on-access file scanning.
l Fixed a bug where the connector may fail to upgrade through an automatic policy upgrade.
Bugfixes/Enhancements
l Updated ClamAV to 1.3.1.
l Fixed a bug where invalid scan type and initiator events were being sent to Secure Endpoint
Console.
l Fixed a bug where support snapshot captures with enabled historical data option did not include
archives.
l Improved ability for process exclusions to optimize connector performance.
l Improved logging when the connector is exposed to invalid input.
l Fixed an issue where the connector could not detect files in deeply nested directories.
l Fixed a bug related to Secure Endpoint Console event publishing which could occasionally
cause a crash.
l Fixed hourly CPU spikes.
2024 May 14
Secure Endpoint Windows Connector 8.4.0
New
l Added new Exploit Prevention engine with additional protection. See Exploit Prevention version
8 for a list of the new protections.
Bugfixes/Enhancements
l Fixed an Exploit Prevention compatibility issue with Microsoft Word and Excel.
l Fixed an Exploit Prevention issue where Proplan and GeoWare Intermonitor applications would
crash when launching from a remote share.
l Fixed an issue in advanced custom detections when upgrading from previous connector ver-
sions.
l Addressed an issue where the installer could be terminated during upgrade, leaving the
upgrade unsuccessful.
l Fixed an issue in Behavioral Protection where remotely created files using a UNC path were not
detected.
l Fixed a problem where Device Control rules did not apply if there were hundreds of rules
defined. (CSCwi62747)
l Upgraded curl to version 8.4.0 to fix a vulnerability. (CSCwh89310)
l Telemetry is now available on Windows Server 2016.
l Fixed an issue where the unmanaged growth of a cache file used by the connector could reach
a certain size and cause the connector to terminate. (CSCwj50597)
2024 May 8
Secure Endpoint Console 5.4.20240508
Bugfixes/Enhancements
l Made usability improvements to the device trajectory Day and Time Navigator.
l Session duration setting in My Account can now be as low as 15 minutes.
l Exploit Prevention events include additional details to provide more context. Requires a min-
imum Windows Connector version of 8.2.1.
2024 April
24 April 2024
Secure Endpoint Linux Connector 1.24.1
New
l Added support for Ubuntu 24.04.0 LTS. See Cisco Secure Endpoint Linux Connector OS Com-
patibility for supported operating systems and kernel versions.
l Added support up to mainline kernel version 6.8.
Bugfixes/Enhancements
l Updated libxml2 third-party library to version 2.11.7 to address the vulnerability described in
CVE-2023-45322.
Bugfixes/Enhancements
l Updated Events Filters and Subscriptions to include more detailed time range filters to allow
finer control over the displayed data.
l Reverted these event types to their original names:
l File Detection to Threat Detected.
Bugfixes/Enhancements
l Improved accuracy and reliability of the Cisco Security Risk Score for Windows operating sys-
tems.
18 March 2024
Secure Endpoint Windows Connector 8.2.4.30130
Bugfixes/Enhancements
l Resolved Exploit Prevention engine compatibility issue of ntdll unhooking mechanism.
13 March 2024
Secure Endpoint Console 5.4.20240313
Bugfixes/Enhancements
l Renamed console event types:
l Threat Detected renamed to File Detection.
Bugfixes/Enhancements
l Improved clean-up interval and inter-process communication to fix a memory leak in Windows
connector 8.2.1 where available RAM would be completely consumed. (CSCwi78497)
l Improved efficacy of the Behavioral Protection engine.
l Exploit Prevention engine bug fixes and enhancements.
l Mitigation for the connector service start failure on servers after Windows updates.
(CSCvz56761)
l Fixed a bug where device control rules failed to be updated. (CSCwi37615)
l Fixed an issue where the Secure Client user interface would not launch.
l Fixed an issue that prevented recovery from Cisco Security Connector monitoring service
(CCMS) upgrade failures.
l Fixed a ClamAV false positive.
l Fixed an issue that caused Behavioral Protection signature set updates to fail on the first
attempt.
l Improved Behavioral Protection logging.
l Cleaned up erroneous integrity check log lines created during install.
l Curl updated to 8.4.0 to fix vulnerabilities.
l Addressed crashes resulting from invalid event tracing for Windows (ETW) events.
(CSCwh85846)
l Fixed a vulnerability in the OLE2 file format parser of ClamAV that could allow an unau-
thenticated remote attacker to cause a denial of service condition on an affected device as
described in CVE-2024-20290. (CSCwh67583)
2024 January
31 January 2024
Secure Endpointconsole 5.4.20240131
Bugfixes/Enhancements
l The login session duration for a user can now be extended from 30 minutes to 3 hours.
l New Linux connector policies now default to Linux-specific ClamAV definitions that require less
resources by omitting definitions for Windows and Mac systems.
l The Linux File and Process Scan and Mac File and Process Scan has been expanded to
include 250MB and 500MB in the list of file size options for Maximum Scan File Size and Max-
imum Archive Scan File Size.
24 January 2024
Secure Endpoint Linux Connector 1.24.0
New
l Added support for Amazon Linux 2023 (x86 and ARM).
l Added support for ARM versions of:
l Amazon Linux 2 (5.x kernels only).
l Ubuntu 20.04.
l Ubuntu 22.04.
l Debian 12.
Bugfixes/Enhancements
l The ampcli defupdate command now updates both clamav virus definitions and behavioral pro-
tection signatures.
l Fixed a bug where invalid scan type and initiator events were being sent to the Secure Endpoint
console.
l Fixed a bug where connector metric data was not being collected properly.
17 January 2024
Secure Endpoint console 5.4.20240117
Bugfixes/Enhancements
l New online help style with improved search capability.
l Some cloud indications of compromise are available in the Behavioral Protection engine to
allow protection actions as well as detections. The new detections are:
l Compromised plugin.
l Spawns a shell.
16 January 2024
Secure Endpoint iOS Connector 1.6.9
Bugfies/Enhancements
l Replaced deprecated crash reporting library.
Release Notes Archive
Previous release notes can be found at:
l 2023 Release Notes
My Term
My definition
Index
A
Casebook 397
Cisco 192
Clean Cache TTL 99, 119, 133
Cloud Notifications 97, 117
CnC.Host.MediumRisk 416
Compromises 7
Computer Management 169
Connector Log Level 96, 115, 130
Connector Protection 96
Connector User Interface 193
Conviction Modes 86
Created By 325
Custom Detections - Advanced 39
Custom Detections - Android 41
Custom Detections - Simple 37
Dashboard Tab 5
Data Source 105, 121, 135
debug session 175
Deepscan Files 104
Demo Data 389
Deployment Summary 168
Detection Action 105, 121
Detection Engines 88
Detection Threshold per ETHOS Hash 102
Detection Threshold per SPERO Tree 102-103
DFC.CustomIPList 416
Diagnose 175
diagnostics 175
Disable Demo Data 389
Download Policy XML File 84
Failed 344
Fetch File 344
File > Engines 104, 121, 135
File > Scheduled Scans 104, 121, 135
File Conviction Mode 98, 117, 132
File Trajectory 324
File Type 338
Filters 337
Filters and Search 337
Filters and Subscriptions 27
Firewall Connectivity 184
Full Disk Access 211
List View 29
log rotation 175
PAC URL 89
Parent Menu 151
Phishing.Hoster.MediumRisk 416
pivot menu 398
Policy Contents 92, 140, 147
Policy Menu 152
Potential Dropper Infection 415
Prevalence 351
Product Version 94, 114, 129
Protection Password 96, 116, 131
Proxy 88
Proxy Authentication 89, 110, 126
Proxy Autodetection 185
Proxy Host Name 89
Proxy Hostname 88, 110, 126
Proxy Password 90, 111, 127
Proxy Port 89, 110, 126
Proxy Type 89, 110, 126
Proxy User Name 89
Proxy Username 89, 110, 127
Quarantined Detections 11
Reboot 95
Refresh Demo Data 389
Requested 344
Required Policy Settings 86, 139, 146
Save Filter As 27
Scan Archives 103
Scan Interval 105, 122, 136
Scan Packed 103
Scan Time 106, 122, 136
Scan Type 106, 123, 136
Scanning 194
Search 338
Send Filename and Path Info 96, 115, 130
Send Username in Events 96, 115, 130
Settings 195
SHA-256 File Info Context Menu 28
Significant Compromise Artifacts 7
SPERO 102
Start the client user interface 97, 116, 131
Step-Up Threshold 103
Suspected botnet connection 415
Suspicious Cscript Launch 416
Suspicious download 415
System Extension 211
System Process Protection 98
System Requirements 178
Uninstall 202
Unknown Cache TTL 99, 119, 133
Unprivileged Users 371
Unseen Cache TTL 99, 119, 133
Update Server 94, 114, 129
Use Proxy Server for DNS Resolution 89
Users 366
Zbot.P2PCnC.HighRisk 416
ZeroAccess.CnC.HighRisk 416