www.cisco.com Open in urlscan Pro
104.75.89.30  Public Scan

Submitted URL: https://click.path.cisco.com/?qs=2e123a8d099bc27968c2affcf24680e4cc0f7c01d37a1f622cfd05bc1e5a410f37903ef7b9e21edcd8a6c88d8a96...
Effective URL: https://www.cisco.com/c/en/us/products/collateral/security/fireamp-endpoints/secure-endpoint-og.html
Submission: On October 28 via api from IL — Scanned from IL

Form analysis 0 forms found in the DOM

Text Content

 * Skip to content
 * Skip to search
 * Skip to footer

 * Cisco.com Worldwide
 * Products and Services
 * Solutions
 * Support
 * Learn
 * Explore Cisco
 * How to Buy
 * Partners Home
 * Partner Program
 * Support
 * Tools
 * Find a Cisco Partner
 * Meet our Partners
 * Become a Cisco Partner

 * 
 * Products & Services
 * Security
 * Advanced Malware Protection (AMP)
 * Cisco Secure Endpoint


SECURE ENDPOINT BEST PRACTICES GUIDE


Save
Log in to Save Content

Translations

Download

Print


AVAILABLE LANGUAGES

 * Japan - 日本語


DOWNLOAD OPTIONS

 * 
   PDF (5.9 MB)
   View with Adobe Reader on a variety of devices

Updated:August 26, 2024
Bias-Free Language


BIAS-FREE LANGUAGE

The documentation set for this product strives to use bias-free language. For
the purposes of this documentation set, bias-free is defined as language that
does not imply discrimination based on age, disability, gender, racial identity,
ethnic identity, sexual orientation, socioeconomic status, and
intersectionality. Exceptions may be present in the documentation due to
language that is hardcoded in the user interfaces of the product software,
language used based on RFP documentation, or language that is used by a
referenced third-party product. Learn more about how Cisco is using Inclusive
Language.


Contact Cisco
 * Contact Cisco
 * Chat with Sales
 * Get a call from Sales
 * Product / Technical Support

Save
Log in to Save Content

Translations

Download

Print


AVAILABLE LANGUAGES

 * Japan - 日本語


DOWNLOAD OPTIONS

 * 
   PDF (5.9 MB)
   View with Adobe Reader on a variety of devices

Updated:August 26, 2024

TABLE OF CONTENTS




TABLE OF CONTENTS

 * About this document
 * Information gathering
 * Preparation
 * Secure Endpoint - Console setup
 * Policy design and management – Performance and security
 * Secure Endpoint installation, updates and operational lifecycle
 * EDR/XDR/MDR - Security architecture
 * Appendix-A: Secure Endpoint Private Cloud
 * Appendix-B: Virtual Environments (VDI)
 * Recommended Settings for Microsoft Windows Terminal Server
 * Recommended Settings for Microsoft Hyper-V
 * Virtual Systems in Public Cloud Environments
 * Appendix-C: Add Tetra Manually after/skiptetra was used
 * Appendix-D: 3rd Party integrations with Secure Endpoint
 * Appendix-E: Exclusions in depth

 

 

About this document

Cisco Secure Endpoint is a comprehensive Endpoint Security solution designed to
function both as a stand-alone Endpoint Detection and Response (EDR) product,
and as an important part of the Cisco XDR architecture. There are many
considerations that customers and partners should be aware of prior to deploying
and configuring Secure Endpoint in their environment. The objective of this
document is to provide guidance on best practices for deployment methodology,
setup and configuration.

Note:       The Best practice Guide is designed as a supplemental document for
existing product documentation and does not contain a comprehensive list of all
Secure Endpoint configuration options. For more in-depth detailed product
settings, please see other official Secure Endpoint documentation located at:
https://docs.amp.cisco.com.

This document outlines the recommended stages for successful deploying Cisco
Secure Endpoint. The flow chart here serves as a generalized framework for
customers to use within their environment.

This includes:

●     Information gathering: Necessary information about your environment

●     Design and Deployment: Policy and Rollout planning

●     Operation Lifecycle: Daily product operations, policy adoptions, endpoint
updates and upgrades

●     Security Architecture: Secure Endpoint is a cornerstone of the Cisco XDR
architecture. It also provides post infection tasks and live queries with
Orbital (license needed). You can install Secure Endpoint as an individual
product, but it is highly recommended to run Secure Endpoint is a module within
Cisco Secure Client. Secure Client highly extends visibility into a Cisco
protected endpoint.

●     Security Operations: Activate orchestration workflows to automate security
operations. Enhance existing security architecture and integrate into existing
SOC environments.



During any enterprise-wide deployment, it is recommended to follow these stages
in a progressive manner, starting with information gathering and all the way up
to integrations setup. Continuous review and improvements are also a part of any
successful Secure Endpoint deployment.

They are necessary to ensure a smooth deployment experience, accurate
configuration tuning, and timely resolution of any potential performance issues.
Cisco recognizes that each customer environment is unique, and this framework
should serve as a recommendation only as it may need to be adjusted according to
the specifics of the customer use case.

Information gathering

Introduction

Information gathering is a necessary starting point that ensures the smoothest
deployment experience and configuration of Secure Endpoint. This section
outlines important considerations around environmental data, security product
data, and compliance requirements gathering.

●     Endpoint Operating Systems (Windows/Linux/macOS)

●     Numbers of endpoints

●     Existing security products and architecture

●     Software deployment process

●     Custom applications

●     Proxy availability

●     Endpoint connectivity information (proxies required, remote (VPN) or local
firewalls

●     Privacy requirements

Environment information

The first step is to understand and document the existing security posture. This
includes collecting information on the existing environment. The following
questions are a good place to start, though it is by no means comprehensive
list:

●     How many endpoints need to be protected?

●     What Operating Systems and Architectures are included in deployment?

●     Will Secure Endpoint be installed on endpoints that includes existing EDR
software?

◦    If so, will it be removed before or after Secure Endpoint is installed?

◦    Or will it remain side by side with existing EDR software?

●     What endpoints and software are mission critical?

●     How is software delivered to endpoints?

●     How do endpoints connect with applications/services?

●     Do endpoints rely on the use of a proxy?

●     Do endpoints roam or connect via VPN?

●     Is there inventory of software used on endpoints?

●     Is there a lab environment for testing including the necessary endpoints?

●     Are there any customer defined bandwidth or port restrictions for LAN/WAN
links?

The answers to these questions (along with other business process and policies)
will provide information helpful for decisions related to deployment. Collecting
any other information specific to customer endpoint management needs to be
included during this information gathering step.

Security product information

Many companies already have sophisticated documentation for their endpoint
security solution, including e.g. business critical software, necessary
exclusions and defined deployment processes. This is already a great deal of
information regarding what could potentially be transferred to Cisco Secure
Endpoint policies. Rather than start from scratch, this information should be
compiled, evaluated for current relevance, and used to inform the Secure
Endpoint setup process.

The following list is a good place to start, though it is by no means
comprehensive:

For the product administrative users:

●     Who will need access to the console portal?

●     What access should users be granted to the console portal?

What features are used in existing endpoint security? Such as:

●     Blocking network activity

●     Features that already exist in Secure Endpoint

●     Other security features

What configurations exist in existing endpoint security? Such as:

●     Exclusions

●     Application Block lists

●     Application Allow lists

●     IP address block lists

While collecting this information, the policies and lists can be refined. A
review and cleanup of existing policies, removing old or outdated settings, will
strengthen the security on the endpoint.

Cisco Secure Endpoint is a lightweight connector. Optional, it can operate with
other EPP/ EDR security products. The existing settings and features will need
to be reviewed, in order to ensure that the respective products integrate
properly without interfering with each other.

Auditing and compliance

Many organizations are subject to Auditing and Compliance requirements. These
requirements force organizations to maintain data regarding who accessed and
made changes, when those changes were made, and historical data related to
endpoint security performance. Cisco Secure Endpoint provides detailed user
auditing over years and endpoint historical telemetry data with a limit of 30
days. Additional historical event retention can be gained by utilizing the Event
Streaming functionality.

To ensure that your new Secure Endpoint installation meets these requirements,
it is advisable to obtain answers to the following:

●     What are your organizational auditing requirements?

●     What governmental compliance requirements is your organization subject to?

●     PCI DSS, GDPR

●     What is your organizational requirement for historical data storage?

Info

Cisco Trust Center: Cisco Trust Center – Privacy Sheets

Use the search area on the left to search for “endpoint” topics. Select the
document types below like Privacy Data Sheet or Privacy data map. The guides
also include GDPR related information and

●  Secure Endpoint/ Privacy Data Sheet.

Preparation

Introduction

Deploy preparation is the next step in the process which includes deployment
planning and policy setup. These steps will depend on the information gathered.
While preparing for deployment, there might be some questions that need to be
answered before a proper policy can be configured. In some cases, doing testing
or engaging with pilot user groups can be used to identify answers that can only
be answered in a live environment.

This section outlines background information about Secure Endpoint, which helps
to build a well and functioning Cisco Secure Endpoint environment.

Design and deployment planning

Design and Deployment Planning stage is the next step in preparation. This stage
leverages the data collected in the information gathering section to make
deployment relevant decisions around the use of Secure Endpoint, configuration
planning, and policy setup.



Cloud infrastructure - Features and services

Cisco XDR and Cisco Secure Endpoint follow a cloud first approach. The endpoint
software communicates with the cloud infrastructure to receive new policy
updates, product updates, file dispositions, live query requests, and so on. It
uploads endpoint telemetry data, which is then processed by the Secure Endpoint
cloud engines. The cloud architecture provides a wide range of features,
services, and hunting tools.

With XDR and Secure Client, Cisco provides a sophisticated new concept for a
protected endpoint. This guide will focus on the Secure Endpoint part. You may
review other available documentation including details for all the capabilities
Secure Client provides. Review the Secure Client vs. Secure Endpoint section to
review a short summary explaining the differences between the two concepts.

The drawing below shows Secure Endpoint and Secure Client modules and the
corresponding cloud service they are communicating with. The Secure Endpoint
cloud fully integrates into XDR, which is enabled/configured with just a few
clicks.

Note:       The graphics below shows a schematically view of the architecture
focusing on Secure Endpoint. The XDR architecture includes much more
capabilities than shown in the drawing. Cisco constantly improves and extends
the security cloud architecture, where naming, features, or capabilities are
changing. Please review latest Cisco XDR architecture guides and integration
guides.



●     Secure Endpoint Cloud: Provides all needed services for the endpoint. The
Secure Endpoint cloud fully integrates into Cisco XDR. It acts as an
intelligence for the architecture and pushes telemetry, events and incidents to
Cisco XDR.

◦    Endpoint guides: https://docs.amp.cisco.com/,
https://console.eu.amp.cisco.com/docs, https://console.apjc.amp.cisco.com/docs

◦    Required Server Addresses for Proper Cisco Secure Endpoint and Secure
Malware Operations:
https://www.cisco.com/c/en/us/support/docs/security/sourcefire-amp-appliances/118121-technote-sourcefire-00.html

◦    Cisco Secure Endpoint Support Documentation:
https://www.cisco.com/c/en/us/support/security/fireamp-endpoints/series.html

●     Secure Endpoint Connector: The software package installed to your
endpoints providing protection and generating the telemetry information for the
Cloud Detection Engines.

●     Secure Endpoint Orbital: Provides real time investigation on the endpoint.
Orbital abstracts the endpoint into high performance databases and allows to
query endpoint information using simple SQL statements. For remediation tasks,
Orbital provides remote scripts, which can be executed on the endpoint.

●     Secure Client: the newest Cisco endpoint which extends endpoint security
with different additional modules like the NVM module for Netflow information.

●     XDR cloud architecture: It provides full XDR capabilities, the XDR
analytics engine, a datastore for NetFlow information. It provides security
automation with workflow management. As shown in the graphics above, XDR
provides a long list of security tools and XDR guides a customer through the
threat hunt.

●     XDR Ribbon: The Ribbon is an overlay app, provided by XDR, and is
available for XDR integrated Cisco products. The Ribbon includes other apps like
the casebook app, incident app or Orbital app to start a real time investigation
on the endpoint.

●     XDR Pivot Menu: The Pivot Menu is a security tool, powered by XDR, that is
available in the UIs of many Cisco Secure products. The Pivot Menu provides a
very sophisticated and easy way to get immediate, cross-product reputation
information on Observables, and take common research and response actions on
them across your installed Cisco and 3rd party products.

●     Malware Analytics: File analysis platform to detonate unknown and unique
files to determine malicious behavior indicators.

●     Security Architecture: Secure Endpoint is part of the XDR architecture
including several Threat Hunt and Threat Investigation capabilities beside
typical Endpoint Protection capabilities.

Note:       For high privacy needs Cisco provides the Secure Endpoint Private
Cloud Appliance. This on-premises installation provides highest privacy without
integration into other Cloud products and services. Please review Appendix-A:
Secure Endpoint Private Cloud for more details.

Cloud Infrastructure - Cloud Engines and Intelligence

The Secure Endpoint cloud engines are processing telemetry data provided by the
connector. Based on the connector count, the cloud services are automatically
sized. This data is processed in real time and additional retrospective for 7
days. During this period or time, the Secure Endpoint cloud receives latest
threat information, which is correlated with all the telemetry data from the
endpoints.

The outcome from Real Time Processing and Retrospective Analysis are Cloud IOC
events. Cloud IOCs are generated by logic and intelligence to detect malicious
behavior. This can include malicious files, but in many cases no malicious file
is involved in a possible compromise of an endpoint. To raise the description
and MITRE information. Some main considerations for Cloud IOCs.



Real time and retrospective IOC Events

●     are used to automate post infection tasks (automated actions)

●     are outlined in the Device Trajectory to show endpoint behavior around the
compromise

●     regular updates on these intelligences to provide sophisticated detection

●     MITRE information directly shown in IOC events

When thinking about a security architecture, Cloud IOCs are a very important and
useful information to start a Threat Hunt, starting a Threat Investigation or
drive security automation.

Cloud Infrastructure - Endpoint connectivity

Secure Endpoint needs proper configured firewall/proxy systems to be able to
communicate with the Public Cloud to query dispositions, send telemetry data for
cloud processing, receive policy updates, and receive updated definitions.
Secure Endpoint uses secure technologies to protect information between the
endpoint and cloud. Any communication to the cloud is TLS secured.

Cloud Communication

Secure Endpoint Troubleshooting Technotes on cisco.com website:

Required Server Addresses for proper endpoint and malware analytics operations:
http://cs.co/AMP4EP_Required_URLS



Cloud Communication: Proxy environments

For environments that use proxies, the proxies must be configured so there is no
interception of the TLS communication, which would break communications to the
Public Cloud. Policies also need to include proxy configuration that the
endpoint can use. Secure Endpoint will only use system defined or policy defined
proxies. This prevents communications from being tempered or blocked by sending
communications to a malicious proxy.

Best practice: Disable TLS interception for Secure Endpoint communication, as it
would break the communication.

Cloud Communication: Bandwidth consumption

After Secure Endpoint is installed, the AV Signatures are updated. Secure
Endpoint does incremental updates for the AV signature, but needs a full initial
update after the deployment. For bandwidth saving, you may deploy AMPUpdate
Servers as needed. During EDR operations, where the connector generates the
telemetry data for cloud processing, low bandwidth is needed. See the table
below for details.

Size per update per end-point

Signature update

Normal Operations (Endpoint Telemetry)

~250-300MB

initial AV signature update

n.a.

< 1MB to 8MB

Incremental signature update (~ 4-8 times per day).

If the endpoint misses more than 30 incremental updates, a full signature update
is done.

n.a.

~540 bytes per lookup

n.a.

Expected average count per day ~54 queries/day

All Engines enabled on the endpoint.

Secure Client vs. Secure Endpoint

Some key facts to understand the differences between Secure Endpoint and Secure
Client concept.

●     Secure Endpoint can be installed as a single product or as a module
running inside Secure Client. From a Secure Endpoint perspective, both
installation types include the same product capabilities.

●     Version 8.x is the minimum version of Secure Endpoint which can be run as
a module within Secure Client.

●     There is no change how to operate Secure Endpoint in the Secure Endpoint
console if you are installing Secure Endpoint standalone or as a module in
Secure Client.

●     Secure Client includes several other modules and features, which enhance
the security capabilities on a Cisco protected endpoint: This includes secure
access, posture checks, web security or network visibility.

●     Each Secure Client Module communicates with the proper management system,
which can be Cisco ISE, Firewall or Umbrella DNS.

Installation Option 1: Standalone installation of Secure Endpoint with Orbital.



Installation Option 2: Secure Client installation where Secure Endpoint is
running as a module within Secure Client. Several other available modules have
been added to the installation.



Installation Option 3: Secure Client installation with Secure Endpoint, Orbital
and Cloud management module. Even Secure Endpoint is used in the first phase of
your security architecture, this installation option provides the following
improvements.



●     Generation of the UniqueID for your endpoint, which identifies your
endpoint during an investigation even you reinstall the OS or the security
software.

●     Additional information shown in XDR (Assets)

●     Additional Secure Client modules can be easily deployed with the cloud
management module. E.g., the Network Visibility Module (NVM) to generate and
analyze NetFlow information with XDR analytics.

Note:       To avoid some confusion. Cisco renamed different products to Secure
Client. Regardless which installation option you chose from the options above,
the Tray Application on the endpoint and the corresponding guides show Secure
Client. This provides the same user experience on an endpoint, regardless which
installation option was chosen.

●     Secure Endpoint version 8.x and higher (Standalone installation): Option 1
above.

●     AnyConnect 5.x (was renamed to Secure Client)

●     Secure Client (cloud managed with cloud management module): Option 2 and
Option 3 above.

Analyzing network traffic

Secure Endpoint and Secure client are providing different features to analyze
network traffic. It is important to understand the differences.

●     Secure Endpoint - network engine: This local protection engine is designed
to detect and block command and control traffic. It monitors specific traffic
from new started processes for a specific amount of time or a specific number of
connections (please review the Secure Endpoint docs for details). The engine
consumes threat feeds from Talos and is capable to block malicious traffic. If
there is a block, the proper Event is sent to the Secure Endpoint Cloud. Note:
This engine is not designed to enforce operational guidelines, like blocking
access to a website based on an IP.

●     Secure Client – NVM (Network visibility Module): The Network visibility
module sends NetFlow information to XDR analytics, which includes any network
communication from the endpoint over time. The flow data includes a lot of data
fields like the application, the protocol and port, the user account under which
the application is running, bytes transferred and more. This data is stored and
processed in XDR analytics. NVM does not provide blocking capabilities. Please
review the Cisco Secure Client Configuration Guides for more details about this
module.

Licensing: NVM is not included in any of the Secure Endpoint licenses and needs
to be purchased separately.

On-Premises components

Secure endpoint update server

For environments that have constrained bandwidth requirements, an option to
store AV definitions on premises can be made with an Endpoint update server.
Using this update server is recommended only when Public Cloud with AV scanning
is enabled, and bandwidth usage is a concern.

Secure Endpoint Update Server configuration steps:
https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/213237-amp-tetra-on-prem-server-configuration-s.html



Best practice: It is recommended that an Secure Endpoint update server is not
used with Public Cloud deployments in high network bandwidth environments or for
endpoints that are connected on external networks.

Fundamental Endpoint connector design

The Secure Endpoint Connector is a lightweight connector. The goal is to
minimize the system load on the endpoint as much as possible. From an EPP/EDR
perspective, the connector includes two main areas.

●     Real Time Protection Engines (EPP)

●     Endpoint Monitoring (EDR - telemetry data for cloud processing)

Understanding how the connector works is important and helpful for your Endpoint
Security Design and helps to avoid poor usability. There are many circumstances
which may have an impact on the connector performance and reliability. A proper
configuration is essential for best performance.

As an example, EPP can have an impact on an Application with specific
characteristics. On the other side, specific application characteristics can
result into Secure Endpoint high CPU usage.



Best practice for application impact to connector performance:

There are some common situations which may cause high CPU load:

●     High disk activity, where the connector must scan and hash a lot of files.

●     Scanning archive files, as unpacking archive file consumes much CPU
resources.

Scanning progression for file based threats

Scanning for file based threats is one of the most resource intensive processes
on the endpoint. Secure Endpoint does a lot of steps to scan/detect/quarantine
file-based threats in PE (portable executable) and script based files, or to
scan inside compressed files.

The Secure Endpoint Connector uses the following progression to scan for file
based threats on the disk (schematically view). Please keep in mind that many
circumstances like file size, file type or policy settings can have an impact on
the progression. In most scenarios, the whole progression is not processed.
Engines like Script Protection, which integrates into Microsoft AMSI, Spero and
Ethos are available on Windows Operating System only.

1.     Drivers: The drivers are the view into the OS. The connector engines are
scanning on Create/ Move/Scan/Execute operations.

2.     Hashing: Files are hashed by the driver and added to the local cache.
Some parts of Clam AV engine are used for real File Type detection. This is
important for all other operations.

3.     Cache: Secure Endpoint includes 4 different types of cache. To improve
performance, the file scan process stops, if there is a cache hit. The TTL for
all cache types can be changed in the policy.

4.     AV-Scan: If there is no cache hit AV scanning is done. The AV Engine is
used for OnAccess Scan, OnDemand Scan, Packet Files Scan, Archive File Scan and
Rootkit Scan.

5.     Script Protection: Secure Endpoint integrates into Microsoft Anti Malware
Scanning Interface (AMSI) to scan script files processed by the Microsoft Script
Interpreters.

6.     Cloud Lookup: If there is no match so far, the endpoint does a cloud
lookup to get threat information for a given hash.

7.     SPERO: Machine Learning: Analyzing files with Machine Learning
techniques.

8.     Ethos, Malware Grouping: Malware Grouping Engine, which enables the
endpoint to detect known malicious activity for unknown files.

9.     ClamAV: ClamAV is used as an OEM engine on Linux and macOS system. The
Windows connector does not use this engine for scanning. ClamAV is used to
provide Custom Detection capabilities and file type detection.

Note:       As long there is not hit/detection in one of the steps, the
connector applies the next detection technique in the progression.

Examples:

●     If AV engine does not detect a threat, the progression does not stop.

●     If the disposition returned from the Cloud Lookup or a cached result is
clean, the progression terminates early.

●     If no detection engine on the endpoint detects a threat, the EDR part
still monitors the activity around a file/process and the cloud engines are
processing this information. This can result into a Cloud Indication of
Compromise (IOC) even when no endpoint real time engine reported a detection.



Best practice: File scanning

Finally, for best performance take care about applications generating high disk
activity. E.g., Database Servers, Web Servers, development environments,
inventory software and so on. This guideline is independent if there is a server
or workstation operating system installed. Threat Protection and Detection or
Threat Risk Mitigation is not a linear process. The detection progression should
give you an insight into the product for better understanding on how to tune the
product as needed.

Note:       Please keep in mind, Advanced Custom Detections only work on files
of unknown disposition.

Supported operating systems

The Secure Endpoint connector is available for Windows, Linux and macOS
Operating System. Secure Endpoint console also provides integration for iOS and
Android devices, as they are in supervised mode.

The official supported versions are listed on the cisco.com website.

●     Windows:
https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/214847-amp-for-endpoints-windows-connector-os-c.html

●     Linux:
https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/215163-amp-for-endpoints-linux-connector-os-com.html

●     MacOS:
https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/214849-amp-for-endpoints-mac-connector-os-compa.html

●     Security Connector iOS compatibility:
https://www.cisco.com/c/en/us/support/docs/security/security-connector/215337-cisco-security-connector-apple-ios-compa.html

Windows security center integration



Secure Endpoint integrates into the Windows Security Center for Virus and Threat
Protection. Connector versions lower than 7.4.1 need a full signature update
before registering to Windows Security Center (WSC) This may take some time
until the registration process to WSC is finished. In this state, the connector
provides protection including all other engines and cloud lookups.

With Version 7.4.1.20439 and later, the integration procedure into WSC has been
changed, as the connector registers itself directly after the installation.
Previous versions do a full signature update before registering to WSC.

Windows defender

Connector version 6.3.1 onwards Secure Endpoint includes a new service called
Cisco Security Monitoring Service. The service is responsible to register Secure
Endpoint to the Windows Security Center (WSC). Review details in the Secure
Endpoint User guide.

Competitor products

●     Removal: Secure Endpoint does not remove any competitor products during
the installation process. To replace existing Security products, there are two
possible ways to do so:

◦    Install Secure Endpoint, remove the competitor product. Afterwards reboot
the endpoint. This ensures, that the endpoint is protected at any time.

◦    If there are any issues or product conflicts, you must remove the
competitor product first, reboot the system and install Secure Endpoint after
the reboot.

●     Incompatibilities: There are some known incompatibilities with other
security products, which are listed in the Deployment Strategy Guide:
https://docs.amp.cisco.com/en/SecureEndpoint/Secure%20Endpoint%20Deployment%20Strategy.pdf.

Endpoint grouping

Groups are used to categorize the endpoints and the respective policy. It is
recommended to define groups to apply a policy on similar endpoints. Attributes
to group the endpoints can consist of items such as:

●     Type (Server, Desktop, or Laptop)

●     Location (Region, Branch or Remote access)

●     Application set installed

●     Services or opeerational functions utilized

●     Enabled security features and options

●     User groups (Early adopters, Developers, Power Users, or Regular users)

●     Existing grouping

It is recommended that servers and desktops are associated with separate
policies because the usage, features, and architectures are different.

Best practice: Anything related to the endpoint, including the whole policy,
Feature Activation like Endpoint Isolation or Orbital Real Time Search are tied
to the policy object. A recommended approach is to separate endpoints only if
needed. This reduces the necessary administrative effort to manage the
endpoints.

Beside endpoint grouping based on the info above, it is important to think about
how to assign Policies to these groups. These policies can include different
types of lists. Lists are assigned to Policies. Based on the List Type, a list
can be assigned once to a policy object or multiple times. The settings inside
the Policy Object and the assigned lists are generating the policy information
for the endpoint. Any change triggers a new policy version. During the next
heartbeat, an endpoint sorted into the group receives the new policy.



Policy configuration planning

Secure Endpoint policies need to be configured so that the features selected
provide the best endpoint security while users are not impacted by functional or
performance problems. Policies are associated to groups of endpoints. From the
information gathered and endpoint groups, policies can be configured for the
desired features and exception lists.

Outbreak Control Lists as shown in the graphics, depending on the list type, it
can be assigned once or multiple times to a Policy Object. Each list can be
assigned to multiple Policy Objects.

Exclusion Lists Each List can be assigned multiple times to a policy object.
Each List can be assigned to multiple Policy Objects.

Device Control: The Device control configuration is assigned to a policy object.
One configuration can be assigned to all policy objects with a single step. The
assigned device control configuration can also be reviewed and changed in the
policy object.



Policy configuration planning - File scan

Scanning for file bases threats is one of the base features to protect the
endpoint. This proven technique also needs the most updates (signature updates).
The engine needs to be configured right to avoid high resource consumption on
the endpoint. If configured right, the engine will generate a nominal increase
in CPU and disk resource consumption. Endpoints with applications that require
heavy file I/O might be impacted by the file scanning. In cases where an
application performance is impacted, exclusions can be made on file scanning to
reduce any I/O that interferes with the application.

It is recommended that file scanning is always enabled to protect the endpoint
from file bases threats. The engine is also needed to provide the ability to
retroactively remove file bases threats. Endpoints with applications that
require heavy file I/O might be impacted by the file scanning. In cases where an
application performance is impacted, exclusions can be made on file scanning to
reduce any I/O that interferes with the application.

Policy configuration planning - File scan exclusions

Secure Endpoint provides two different types of exclusion lists. Custom
Exclusions and Cisco Maintained Exclusions. Both can be assigned to a policy
object multiple times.

Best practices guide for configuring exclusions:
http://cs.co/AMP4EP_Best_Practices_Exclusions

Maintained exclusions history:
https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/214809-cisco-maintained-exclusion-list-changes.html

Best practice: Keep your exclusions clean and organized. Defining multiple
Exclusion lists with the right naming greatly simplifies Exclusion Management.

Policy configuration planning - Network engine

Network monitoring allows Secure Endpoint to collect addresses between the
endpoint and other destinations. This information is used to identify and act on
malicious destinations.

Network monitoring will generate a nominal increase in CPU and network requests
to the cloud. Without network monitoring, the information needs to be correlated
with external information and would only be visible for internal network
resources.

It is recommended that network monitoring is enabled for endpoints that do not
have a high network load required. This should be enabled for primarily
workstations and some servers without a need for high volume of network traffic.

If network monitoring interferes with network operations of an endpoint, either
the endpoint can be associated to a policy that doesn’t enable network
monitoring or install the connector without the DFC component.

Best practice: Regardless of if there is a Workstation or Server Operating
System installed, it is recommended to disable Network Monitoring for systems
with high network load, network teaming or if there are many VLANs configured.

Policy configuration planning - Protection engines

Other protection engines (such as Offline engines, Malicious Activity
Protection, etc.) provide protection against malicious behaviors. Enabling each
engine will improve the efficacy of Secure Endpoint. Depending on the engine or
configurations enabled, the efficacy is improved at the cost of performance.
When enabling or changing settings on an engine, it is recommended to test
changes before deploying them to production endpoints.

Note:       When activating a new engine on a sensitive system which deviates
from the recommended settings, a good option is to start in Audit Mode. In Audit
Mode, the connector generates an event, but does not block in any way.

v1.91 Appendix-B: Non-Standard Environments (VDI) shows more information when
activating File Scanning in VDI environments.

It is recommended that engines are enabled and tested.

Below are the choices and considerations on how the policy is configured for the
engines.

Engine Policy Setting

Efficacy

Performance costs

Other Comments

Enabled

Higher efficacy. This improvement depends on

●  Engine options enabled
●  Overzealous exclusions

Higher cost. This cost depends on:

●  Application that run on the endpoint
●  Missing exclusions

Events sent to Cisco XDR Architecture® for visibility and central investigation.

Disabled

Lower efficacy

Lower cost on performance.

Only advised for instances such as:

●  Another product provides equivalent functionality
●  Performance cost is too high to enable
●  Application incompatibility

Configuration changes

Efficacy change depends on configuration changes.

Performance change depends on configuration changes.

Other configurations such as exclusions can be configured to improve engine
performance on the endpoint.

Policy configuration planning - Cisco Advanced Search - Orbital

Cisco Advanced Search (Orbital) enables Real Time Investigations and threat
remediation on your endpoint. The Orbital Client enables are static connection
to the Orbital Cloud Service. It is recommended to enable this feature in the
policy to enhance threat hunting or incident response. Testing needs to be done
for endpoints that are sensitive to increase in CPU usage. Orbital needs a very
small footprint on the endpoint, as information is generated on demand.

Getting more value from your endpoint with Orbital:
https://blogs.cisco.com/security/getting-more-value-from-your-endpoint-security-tool-2-querying-tips-for-security-and-it-operations

Some considerations regarding Orbital

●     Orbital is an additional endpoint component to provide Real-time Queries
on an endpoint.

●     You need the right license for Orbital:
https://www.cisco.com/c/en/us/products/security/amp-for-endpoints/package-comparison.html

●     After activated in the policy, Orbital is installed by Secure Endpoint
fully automated.

●     Orbital Endpoint holds a static TLS 1.2 connection to the Orbital cloud.

●     Orbital allows generating a Forensic Snapshot, which can be generated
manually or automated.

●     Orbital uses SQL (Structured Query Language) to query the endpoint like a
database.

Note : In future releases Orbital will run on the endpoint fully independent
from Secure Endpoint.

Preparation checklist

Take a moment to review the summary for the Secure Endpoint preparation step.

●     Secure Endpoint integrates into the Cisco XDR architecture. Keep in mind
to enable all available feature and functions. Find the list of all Services in
the Cloud Architecture Overview in this document.

●     The cloud engines are processing the endpoint telemetry data in nearly
real time and retrospective for 7 days back.

●     Check Proxy/Firewall settings, so the connector can communicate with the
Cloud services.

●     There is some bandwidth required for the initial AV Signature update or if
there are 30 incremental updates missing. You may deploy AMP Update Server as
needed.

●     Secure Endpoint may have an impact on Application performance and specific
application characteristics may impact connector resource consumption.

●     Secure Endpoint does not change any setting for Windows Defender and does
not remove 3rd party security products.

●     Endpoint Grouping, Policy generation and List Assignment should be well
planned to simplify operational work and to raise security.

●     Cisco Advanced Search provides a very simple way to query endpoint
information using SQL.

Secure Endpoint - Console setup

Secure Endpoint Console Setup: This section will provide important information
on how to configure User Accounts, create and configure Policies and Groups, set
up Prevalence and Outbreak Controls, create Exclusions and activate Automated
actions for post infection tasks.

This includes:

●     User Account Setup

●     Create and configure Policies and Groups

●     Set up Prevalence and Outbreak controls

●     Create Exclusions

●     Activate Automated Actions

●     Set up Secure Endpoint Update Server

After you received the activation e-mail for your Secure Endpoint account, click
the provided link to do the initial setup of your Cisco Security Cloud account.
Cisco Security Cloud acts as the IdP (identity provider) for Secure Endpoint,
including 2FA configuration. This enables SSO for Cisco XDR integrated products.



Follow the provided links in the activation e-mail. Find more information in the
Secure Endpoint Entitlement Guide.

If you want to use your existing IdP environment, please review the Cisco
Security Cloud Sign OnIdentity Provider Integration Guide for details.

User account setup

User Management in Secure Endpoint Console is described in detail in the Secure
Endpoint User Guide. To add new users, do the two following steps.

●     Open the XDR console and navigate to Administration/users. Add a user
account there and send out the invitation to the new user for the Security
Cloud. A user account in the Cisco Security Cloud is mandatory.

●     Review the Cisco XDR help center for further information.

●     Add a user with the same e-mail address to the Secure Endpoint console.
Review the Secure Endpoint User Guide for further information how to add users.

Console setup checklist

Take a moment to review the summary for the console setup.

●     A Cisco Security cloud account is mandatory to login to Secure Endpoint
Console.

●     Two-factor-authentication enablement is mandatory during Security Cloud
Account setup.

●     Add additional users to Secure Endpoint console as outlined in the Secure
Endpoint User Guide.

Policy design and management – Performance and security

Policy creation and management is the heart of Secure Endpoint. Policies control
all configurable aspects of connector function. As such it is important to
ensure that all newly created policies are created with the current and future
organizational structure in mind. To maintain this flexibility, Cisco recommends
creating as few policies as necessary to properly address organizational needs.

The figure shows the Secure Endpoint Policy architecture. This helps to
understand the dependencies between the configurable objects and the Policy
Object itself in the AMP console. This architecture helps you to avoid having
multiple lists with duplicate entries. On the left side the Objects (Outbreak
Control, Management) are listed which can be used directly in Policy Objects.



Outbreak control: Custom Detections (Disposition Change), Application
Allow/Block Lists (Execution), Network IP Allow/Block and Isolation Allow Lists
are assigned to policies. By default, the Secure Endpoint Console provides a
number of policies for administrators to build on-top of. These policies are
designed to provide a high level of security while minimizing potential
performance impact to the endpoints. When determining policy settings for the
various endpoint features, Cisco advises customers to follow the recommended
settings provided on the policy page with minimal modification in order to meet
organizational security needs.

There are two primary types of policies provided by default: Audit and Protect.

●     Audit policies provide a means of deploying an Secure Endpoint connector
while ensuring limited interference on an endpoint. Default Audit policies will
not quarantine files or block network connections and as such, they are useful
for gathering data for connector tuning during initial deployment and
troubleshooting.

●     Protect policies provide a higher degree of endpoint protection.
Connectors utilizing these policies will quarantine known malicious files, block
C2 network traffic, and perform other protective actions.

Best practice: Secure Endpoint best practice for policy creation is to create a
set of base policies, then duplicate these policies to create the debug and
update versions of the same policies. This allows for maintained consistency
while gathering debug data and performing connector updates.

Info: By default, the Secure Endpoint Console provides a number of policies for
administrators to build on-top of. For fast and easy product testing, you can
directly use the predefined groups and policies.

The policy object

Secure Endpoint provides policies for Windows/Linux/MAC, Mobile Devices like
Android and iOS and Network Devices. If no Network device is registered to the
Secure Endpoint cloud, the tab is hidden. The policy Objects are available under
Management → Policies.

The policy view shows much information about the policy object.

●     Configured mode of the Engines

●     Assigned Exclusions

●     Proxy Settings

●     The groups where the policy is used

●     Assigned Detection Lists

●     Application Control Lists

●     Network Lists (Block/Allow)

●     Last modified date

●     Serial Number of the Policy

●     Device Control Policy



Button download XML: The downloaded file can be added to a broken connector
locally in the Secure Endpoint installation directory. This can help, if the
connector is not able to communicate with the Secure Endpoint Cloud anymore. To
replace the policy.xml file on the connector, stop the connector service →
replace policy.xml → start the connector service again.

When generating a new Policy object, the Cisco maintained exclusion list
Microsoft Windows Default is added to the policy object only.

Policy settings: Best performance and security

The steps below outline best practice info for Secure Endpoint policy settings.
There is no difference if you install Secure Endpoint on a Workstation or Server
Operating System, it is the same code base. The previous chapter already gave
you some understanding about fundamental Connector functionality. This section
outlines important information and enables you to build a policy which fits your
performance and security needs. The section outlines useful information to build
your Workstation and Server policy.

Please refer to the Secure Endpoint product guide for any setting not explained
in this guide: https://console.amp.cisco.com/docs. Read this information
carefully.

Policy setting: Modes and Engines

The Modes and Engines area gives you an overview about all available engines and
its modes. It shows the recommended Settings for Servers and Workstations.

Note:       Not all engines are available on all operating systems.

File scanning: Scanning for file based threats is done by several engines on the
endpoint, using different techniques. Even the whole file scanning sequence is
not static. Depending on file type, cache info and more, multiple mechanism get
active to generate a file detection. Review the file scanning sequence info for
details. By switching File Scanning vto Audit, the whole file scanning sequence
does not remove a file from the disk.



Recommended Settings: the info box in the policy configuration window shows the
recommended Engine Settings for Workstation and Server operating systems. These
settings are a good choice to start a new policy. Some considerations for Engine
Conviction modes.

●     When disabling an engine in the policy, the driver is still available on
the endpoint. So the engine can be activated easily at any time.

●     When using the installation switches like /skipdfc or /skiptetra, the
driver is not installed. This requires a re-install of Secure Endpoint to enable
the feature again.

●     Automated actions → move computer to group: This automated post infection
task moves a computer to a configured group if malicious activity has been
detected. This group should have all engines enabled, to ensure the highest
possible detection rate. Therefore, all drivers should be available on the
system.

●     If the AV-Engine driver has not been installed, OnDemand Scans on the
system are not available. Review v1.92 Appendic-C: add Tetra manually after
/skiptetra was used to add AV- scanning to a system if the /skiptetra switch was
used.

Best practice: When designing File scanning in your environment, review the
steps below.

●     If you plan to enable AV-scanning later, do not use the /skiptetra
installation switch, as this prevents the driver installation. Enabling the
policy does not add the driver files to your endpoint. To add drivers to the
endpoint again, Secure Endpoint must be re-installed.

●     File scanning in VDI environments needs some more granular considerations.
Review v1.91 Appendix-B: Virtual Environments (VDI) for details.

●     There is a workaround to manually add AV-Scanning to the Windows Endpoint
later. Review v1.92 Appendix-C: add Tetra manually after/skiptetra was used for
details.

Best practice security: Detection and Protection capabilities.

●     If AV-scanning detection/quarantine events are missing, the cloud engine
may generate additional Cloud IOCs. This can happen if the endpoint detects a
malicious file, but there is no AV-Engine present to remove the file from the
disk.

●     You may use the automated action feature to clean up a system where
AV-scanning was disabled in the policy. Review EDR/XDR/MDR Architecture for
details to move computers to a configured group to enable highest detection
capabilities.

●     OnDemand Scans cannot be performed without the AV-scanning engine.

●     Full detection policy: If there is an indication of compromise where you
want to enable highest detection, AV engine should be enabled.

Policy setting: Define and manage exclusions

Over time there are often many different Exclusions List defined in the Secure
Endpoint console. Exclusions not needed anymore should be removed. Enclosed some
guidelines to help you simplifying Exclusion List management.

Cisco-maintained exclusions: These lists help you to exclude critical files and
processes. The Cisco Maintaind Exclusion Lists hists is available here:
https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/214809-cisco-maintained-exclusion-list-changes.html.

Custom exclusions: Some guidelines to make Exclusion management easy.

●     Global exclusions: Exclusions for Applications which are needed on most of
your systems. E.g. an application which is installed on most of your endpoints.
Such exclusion lists are assigned to many policies. If you need a new exclusion
for this specific application, you just need to update and maintain a single
exclusion list.

●     Exclusion list naming: This simplifies the Exclusion management. If there
are many different versions of an application in place, splitting the exclusions
and adding the software version to the exclusion list name helps to simplify
exclusion clean up in the future. As seen in the screenshot, the Policy Object
is easy to read.

Note:       The Secure Endpoint connector includes some exclusions list limits,
which cannot be changed (Connector version 6.0.5 and higher). All values are
very high and should not be reached during normal operations.

●     The limit of process exclusions is 500 across all the exclusions sets
assigned to one policy object (Connector version 7.3.1 or higher needed)

●     The maximum count of exclusions is 1000

●     The maximum recommended number of exclusions is 300 (monitor connector
performance when going beyond this value)

Best practice: Exclusions: Normally the exclusion list limits should not be
reached. Take care if there are many exclusion lists assigned to a specific
endpoint policy object. Your group design also helps to reduce the amount of
assigned exclusion lists for a group of endpoints. Your group design also helps
to reduce the amount of needed exclusion lists. Find additional information in
the Best practices for Secure Endpoint Exclusions guide:
https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/213681-best-practices-for-amp-for-endpoint-excl.html.

●     name your exclusion lists right

●     multiple exclusion lists help you to cleanup outdated exclusions

●     Cisco maintained exclusions help to lower exclusion handling effort

Wildcard Exclusions need more system resources for evaluation than any other
exclusion type. If possible, use Wildcard Exclusion as less as possible.

Policy setting: Exclusions and security

Exclusions are important for product functionality and reliability. Many
customers exclude business critical applications to prevent any possible impact
from endpoint security. There are many valid factors to define exclusions.
Hashing consumes system resources even before scanning by an engine.

Scan Exclusions also stop the connector from scanning and monitoring. As a
result, excluded areas have the following impact on your EPP/EDR security level.

●     Files are not hashed, not available in the cache, not scanned and no cloud
lookup is done.

●     Activity is not monitored and sent to the Secure Endpoint cloud and
therefore not analyzed by the Cloud Engines.

●     Telemetry is missing for the cloud engines. Malicious activity in an
excluded directory will not generate an output (e.g., Cloud IOCs).

●     There is no information shown in the Device Trajectory.

●     Files will not be uploaded for Advanced Analysis.

Any other activity before and after is monitored and analyzed by all available
engines.

Best practice security: To reach the highest level of security and to maximize
the effectives of Endpoint Engines and Cloud Engines, Cisco recommends adding
Exclusions only if necessary.

Full detection policy: Remove as much as possible exclusions to enable scanning
of most areas on the disk and to enable protection for running processes.

Policy setting: Proxy

The protocol inside the TLS1.2 connection is not HTTP. If TLS is terminated at
the proxy, the proxy will drop the packages, because it is not HTTP, and Secure
Endpoint communication will stop. The connector still uses the Offline Engines,
but all other features like Online Engines (Local connector engines which need
cloud information for full protection coverage, e.g., Machine Learning), Cloud
Lookups and Cloud Engines will not work anymore. Finally, there are some
guidelines for Proxy Connection.

●     Never inspect TLS Traffic on the proxy, it will break the cloud
communication.

●     When using Proxy authentication, there are some unsupported NTLM
authentication scenarios (review the product documentation).

●     If a proxy server is configured, any update is done through the proxy.

●     The cloud communication is dynamic and switches to direct communication if
the proxy is not available.

Policy setting: Connector password (Self-protection)

Always set a password, so the Connector is protected against deactivation and
uninstall from unauthorized users or malware.



Policy setting: File and process scan

On Execute Mode: Cisco recommends keeping On Execute Mode settings as Passive.
Keep this in mind when changing the On Execute Mode to Active:

●     In Active mode, files and scripts are blocked from being executed until
the connector processed the file with all file scanning relevant engines and
until the connector received an answer from a cloud lookup.

●     A cloud lookup does longer than the average access time on the fixed hard
drive, what might cause lower application performance.

Maximum Scan File Size: The Default Value in the Policy is set to 50MB. This
value can be lowered or raised up to 500MB. Any file bigger than this value will
be ignored by the Connector for EPP/EDR functionality. This value is a good
compromise between security and product functionality. Malware files typically
are not bigger in size than 50MB, hashing files up to 50MB does not generate too
much CPU load.



Best practice security: In case, where an infected or compromised endpoint is
moved to a defined group using Automated Actions, you may use the following
settings:

●     Set the maximum scan file size to 500MB, to scan as much as possible
files.

●     If a file is bigger than 500MB, any activity around this file (parent
process and child process) is still monitored, scanned, and processed by the
Cloud Engines.

●     In any case where security is more important than performance, set the On
Execute Mode to Active.

Policy setting: Cache

The cache speeds up connector performance. If there is a hash already available
in the Cache, the connector does not scan a file multiple times.

The cache can be cleared on a system as followed:

1.     Stop the Secure Endpoint connector service.

2.     Delete the Cache files local on the disk (located in the connector
directory)

3.     Start the Secure Endpoint connector Service again.

Review Removal of the Secure Endpoint Cache and History Files on Windows in the
Troubleshooting Technotes.



Best practice security: Cache settings have an impact on performance and
security

●     Microsoft Office Applications x64 are nearly 50Mb in size. Lowering this
value should only be done for endpoints where Microsoft Office is not installed.
Microsoft is still a big attack vector on endpoints.

Full detection policy: Set all cache values to the lowest setting.

Policy setting: File scanning - Archive files vs. Packed files

It is important to understand the difference between these two configurable
settings.

Archive files: The Secure Endpoint connector opens compressed files and scans
their contents. Tetra uses the values from the File and Process Scan settings.

Default value for File Size is 50MB, and for Archive Files 5MB. Typical
compressed files are 7zip, arj, jar (Java Archive), tar or zip files.

Archive Scan uses the following limits to prevent system overload. Enclosed some
guidelines.

●     Archive File scanning depends on the file sizes as listed above.

●     Archive File scanning depends on supported file types.

●     Batch of 1000 files, if compressed file includes e.g., 1mio. files.

There’s a maximum of 5 levels, however there is no limit for files inside of a
zip on the same level unless you want to scan 1 million files at the same time
from one compressed file meaning that would be done automatically by batches of
1000.

Packed files: Having the “Scan Packed Files” option enabled, Tetra Engine
detects files which are an ASCII File, but can be executed. Example: a *.JS file
is an ASCII File, but can be executed (*.JS files are considered a package in
the sense, that the files are executable in that state but are made up of other
files/code).

Best practice: Unpacking files needs a lot of system resources. Especially
development environments working with much compiled and compressed code. So, it
is highly recommended to group such endpoints and assigning a policy, where
special exclusions are configured. Development endpoints are often different to
typical endpoints and standard exclusions may not work. To avoid performance
detraction, you may disable “Scan Archives” in the policy.

Best practice security: Some guidelines for best detection/protection.

- If you deactivate the “Scan Packed Files” Setting, Tetra will no longer detect
malicious JS Files.

Full detection policy: Both settings should be enabled to provide highest
detection/protection capabilities.

Policy settings: Workstation

Generate a new default policy for Workstation Systems:

●     Generate a new policy object under Management → policies by clicking the
new policy button.

●     Select the Operating System you want to generate the policy for and click
new policy.

●     Add a meaningful name, optional a description and click the Apply
Workstation Settings Button on the right. This applies the Cisco recommended
settings.

●     Install the Secure Endpoint without any command line switches (default
installation), so all engines get installed.

The generated policy object is a very good starting point:

●     Files: Quarantine

●     Network: Block

●     Malicious Activity Protection: Quarantine

●     System Process Protection: Protect

●     Script Protection: Quarantine

●     Exploit Prevention: Block

●     Exploit Prevention - Script Control: Audit

●     Behavioral Protection: Protect

Policy adoptions checklist:

●     Exclusions: Add additional exclusions only if really needed to provide the
best security. Review the Secure Endpoint Installation, Updates and Operational
Lifecycle section how to figure out additional needed exclusions. Review
Exclusions best practices for Performance and Security when defining additional
exclusions.

●     Lists: In Secure Endpoint console, under Outbreak control generate a list
for custom detections simple, custom detections advanced, application control
allowed, application control blocked and Network - IP Block and Allow lists.
Assign them to your policy. These lists will also be available in the XDR Pivot
Menu. Review the Policy Configuration Planning for best practice.

●     Endpoint Isolation: Activate this feature as needed. It allows to
disconnect your endpoint from the network manual or automated using Automated
Actions. Review the EDR/XDR/MDR Architecture section for details.

●     Orbital: Activate Orbital to enable Real Time investigation on the
endpoint. Orbital is not available with the standard license. At least Secure
Endpoint Advantage license is needed for Orbital.

●     Engine Settings: Advanced Engine Settings: Under Engines → Common Engine
Settings activate Enable Event Tracing for Windows. This enables Windows Event
Log information for the Behavioral Protection Engine. This feature may conflict
with existing Microsoft Group Policy Settings. Review the info field when
enabling this feature and talk to responsible workplace/endpoint designers
before activating this feature.

●     Identity Persistence: This feature is not visible in the Secure Endpoint
console per default. It helps to avoid duplicate computers in VDI environments,
where endpoints get frequently re- installed using the same computer name. To
enable the feature, please open a TAC case.

●     Review the The Policy settings: Best Performance and Security section for
all other detailed settings.

Policy settings: Server

Generate a new default policy for Server Systems:

●     Generate a new policy object under Management → Policies by clicking the
new policy button.

●     Select the Operating System you want to generate the policy for and click
new policy.

●     Add a meaningful name, optional a description and click the Apply Server
Settings Button on the right. This applies the Cisco recommended settings.

●     Install the Secure Endpoint without any command line switches (default
installation), so all engines get installed.

The generated policy object is a very good starting point:

●     Files: Quarantine

●     Network: Disabled

●     Malicious Activity Protection: Disabled

●     System Process Protection: Disabled

●     Script Protection: Quarantine

●     Exploit Prevention: Audit

●     Exploit Prevention - Script Control: Audit

●     Behavioral Protection: Protect

Policy adoptions checklist:

●     Exclusions: Add additional exclusions only if really needed to provide the
best security. Review the Secure Endpoint Installation, Updates and Operational
Lifecycle section how to figure out additional needed exclusions. Review
Exclusions best practices for Performance and Security when defining additional
exclusions.

●     Lists: In Secure Endpoint console, under Outbreak control generate a list
for custom detections simple, custom detections advanced, application control
allowed, application control blocked and Network - IP Block and Allow lists.
Assign them to your policy. These lists will also be available in the SecureX
Pivot Menu. Review the Policy Design and Management – Performance and Security
section for best practice.

●     Network: On Server OS most time there is much more network load than
Workstation OS. Therefore, some considerations should be done when Network
protection should be set to enabled.

◦    Disabling the feature instead of installing the connector without network
drivers should solve most network issues.

◦    Network protection may slow down network operations. If the server
application needs high network performance or fastest response times, be
carefully when enabling the engine. Detailed testing is highly recommended.

◦    Specific network configurations like Network Teaming or several configured
VLANs on a Server network card must be tested carefully. Cisco recommends
disabling network protection in such scenarios.

◦    If there are still network issues, Secure Endpoint should be re-installed
using the/skipdfc installation switch to prohibit the network driver
installation.

●     System Process Protection: The engine is designed to protect against
“Mimikatz” like attacks. If there are Group policy settings like disabling
NTLMv1 or other possible NTLM Security settings configured, the Engine can be
set to disabled. If the engine should be enabled, Cisco recommends to carefully
test and to monitor server performance.

●     Exploit Prevention: Exploit Prevention Engine triggers under the following
conditions.

◦    A Process is listed on the protected processes list. Review the Secure
Endpoint User Guide for details.

◦    Process was launched by another process in the Exploit Prevention protected
list.

◦    The process was executed from a directory Exploit Prevention is monitoring.
If Exploit Prevention triggers, the tiny DLL is loaded into the process and
changes are done in the memory for this process. Only this process is aware of
the updated memory locations. On Server systems, especially on Domain
Controllers, a change in the memory may result into unexpected behavior. Cisco
recommends to carefully test and to monitor server performance if this engine
gets enabled.

●     Review the The Policy settings: Best Performance and Security section for
all other detailed settings.

●     Activate Real Time Search Orbital on supported Server OS.

●     Activate Endpoint Isolation to disconnect possible compromised Servers
from the network.

Policy setup summary

Take a moment to review the summary for the Policy Setup.

●     Applying the policy settings in the Quick Start section of the policy
object is a good starting point.

●     Review the sections above under which circumstances specific engines need
to be tested carefully.

●     Analyzing threats is not a linear process. Even there is one engine
disabled for an endpoint, all other local connector engines protect the endpoint
and telemetry information for the Cloud Engines is generated.

●     Use the Cisco maintained exclusions lists to add basic exclusions for the
Operating System itself.

●     Define exclusions only if they are needed to provide the highest detection
ratio. Review the Cisco guides how to defines exclusions.

The guidelines here should enable you to define a policy which works without any
interruptions on the endpoint.

Secure Endpoint installation, updates and operational lifecycle

Secure Endpoint: Software rollout

As with any large-scale software deployment, it is always a good practice to
deploy in a slow, methodical way. Staged deployments ensure that as we deploy to
any environment, if we encounter issues, we are able to resolve them while only
impacting a relatively small percentage of endpoints. These concerns are
especially relevant with security software, which is why the Cisco Best practice
is to deploy Secure Endpoint using the phased approach. There are some common
approaches/examples as outlined in the table.

Note:       These are just a few examples to show the different circumstances
for a Security Product Rollout.

Planned Rollout - Scenario 1

Planned Rollout - Scenario 2

Emergency Rollout

Meets the customers deployment strategy

Mostly meets the customers deployment strategy

Outside the Deployment Strategy

Much time for the whole Rollout Project

Limited Time until the Rollout must be finished by a specific date

Emergency, less time, or no time for Project Planning

Testing with the standard Software Images for Endpoints

Testing with the Standard Software Images for Endpoints

Less or no testing

Application Testing and Business critical Systems

Most Application are tested. Some Business-critical Systems are out of scope

Exclude business critical systems (Included in a Worst-Case Scenario)

Rollout: Starting with Standard Image and afterwards deploying sensitive Systems
step-by-step. Focus is on a secure Rollout.

Rollout: After Testing, the software is rolled out to most of the available
systems. Focus is on Rollout End Date and Time.

Rollout: Emergency Rollout where the actual Security Solution is not able to
protect or missing EDR features during a Security incident. As Fast as possible
Rollout is needed.

Each of these deployment scenarios (examples) is possible with Secure Endpoint.
For each scenario think about the Best practices described in the previous
chapters.

Relaxed and Planned Rollout.
Lowest risk for any business impact.

Rollout is mostly planned. There can be some noticeable performance impacts.
Medium Risk for business impact. Possible interruptions are part of the whole
Deployment strategy.

As fast as possible Rollout. More Security or Visibility is needed. This is a
scenario if environment got breached. The Risk of Data loss is much higher than
any Risk caused by Software Deployment. This is a common Situation for Cisco
Incident Response Services when EPP solutions only are in place at a customer.
User interruptions are accepted.

Prework - Quick summary

1.     The Secure Endpoint Preparation section outlined much information around
the Secure Endpoint architecture, how the connector communicates with the cloud,
the fundamental architecture of the connector software and best practices to
plan your Secure Endpoint environment. Secure Endpoint fully integrates into the
Cisco security architecture outlined in the EDR/XDR/ MDR - Security Architecture
section.

2.     The Policy Design and Management – Performance and Security section
outlined useful information to build your Workstation or Server Policy.



Best practices Secure Endpoint rollout

The following section should give you some insights and ideas for a successful
Secure Endpoint rollout. As already outlined in previous chapters, Cisco
recognizes that each customer environment is unique, and this framework should
serve as a recommendation only as it may need to be adjusted according to the
specifics of the customer use case.

Phase 1: LAB Environment - Testing and Rollout

Step 1: Download the Connector from Secure Endpoint console. Consider 2 things
for Connector downloading:

●     If you want to test with a specific Connector version, you have two
options:

◦    Select the right version under Accounts → Organization Settings first (The
Default Value is latest which is the latest connector version available).

◦    Set the connector version under the policy settings. If product upgrade is
not set for a policy, then Organization Setting is used.

●     During Download select the group the endpoint belongs to. The Group ID is
included in the Connector Package. After installation, the Connector will
register itself to this specific group.

Best practice: Set the defined connector version for your environment in the
Secure Endpoint console under Accounts → Organization Settings, so everyone is
installing the same version. Otherwise generate a download URL under Management
→ Download Connector for any admin which has no access rights to the Secure
Endpoint console.

Review the Connector OS Compatibility for Windows, Linux and macOS.

●     Windows: Document ID:214847

●     Linux: Document ID:215163

●     MacOS: Document ID:214849

●     Other Secure Endpoint documents on cisco.com website.

Step 2: Install the Connector to the machines in your LAB. Start with your
standard company image, so you are getting a test result for a high amount of
company endpoints. If possible, try to install as much as possible software
components.

Testing procedures:

●     If any existing Security Product is to remain, confirm the respective
product is functioning as expected.

●     Login to your endpoint and confirm any login scripts execute.

●     Open standard applications and confirm applications launch and are
functional.

●     When using a dedicated proxy or transparent proxy, talk to your Proxy
Admin.

◦    If authentication is requested per company policy, use a dedicated user
account for Secure Endpoint proxy authentication. Look into the Secure Endpoint
help to see non supported NTLM authentication option.

◦    The Proxy Admin may exclude Secure Endpoint connections from Proxy Log,
especially when they are uploaded to another tool (e.g., splunk), to save log
data and costs.

●     Open the Secure Endpoint console to check if the endpoint successfully
connects to the Secure Endpoint cloud and if the right policy as active. Also
check the appropriate Events in Secure Endpoint Console.

●     Identify any issues in functionality or performance. Addressing these
issues will be discussed in the Connector Diagnostic section below.

Best practices: Always test with your existing Deployment Architecture (e.g.,
Microsoft SCCM, Altiris and others). The Deployment Architecture already
provides many Software Packages for testing.

●     Review the Windows Installer Exit Codes if you expect an error or if there
is any issue when installing Secure Endpoint with your deployment tool.

●     If Secure Endpoint is installed, test software installation and upgrades,
as there are many files changed on your system by the installer. These files are
scanned by Secure Endpoint.

●     Monitor the System Performance during the Software Installation and
Upgrade Process.

Software deployment agents should be excluded from scanning by process. For best
security also add the SHA-256 hash to the exclusion.

Phase 2: Gold user group

Step 3: Define the Gold User Group to test with business-critical applications.
There can be situations, where specific application features are generating new
files on the disk. Application testing cannot be done by IT.

●     Gold Users are testing specific application features and performance.

●     Make it easy for gold users to provide feedback.

●     Think about a fast solution for the user, e.g., moving the Connector to a
group where the Connector is set to Monitoring Mode.



Helpdesk: Instruct the Helpdesk about the software tests with Gold Users. It is
always a good choice to involve the Helpdesk in software tests. Add Helpdesk
users to the Gold Group as well.

IT department: Members of the IT department may be added to the Gold Group test,
as they tend to have greater technical knowledge and can give qualified
feedback.

System Owners: Think about the system owners of specific endpoints. Talk to
them, inform them, and involve them in the system change. Show them how to
handle the product, and in a worst case, how they can disable Secure Endpoint.
Define a strategy how the endpoints should be upgraded, when this is possible
and how needed exclusions are configured as fast as possible.

Best practice: Critical Software should be tested by the appropriate User. There
can be situations, where a specific feature inside a software product needs a
special configuration. Just starting a critical software may not show necessary
product adjustments.

Phase 3: Deployment preparation

Step 4: Generate the deployment packages for the Deployment. Cisco recommends
using an existing Deployment Architecture e.g., Microsoft SCCM, Altiris, or
others.

●     Define the deployment packages as needed.

●     Define Removal Package.

●     Test Deployment and Removal.

Best practice: Review available installer command line switches for the Secure
Endpoint connector: http://cs.co/AMP4E_Connector_Install_Switches

Phase 4: Rollout

Step 5: Start the rollout in your environment based on your internal guidelines,
policies and the defined step-by-step rollout plan. Add new exclusions as needed
during the Rollout Phase.

●     Business Critical System: You may start in Audit mode when deploying
Secure Endpoint to Business-Critical Systems.



Best practice: There can always be an issue when installing new software to
endpoints, regardless of if you are installing Secure Endpoint or any other
software package. In a Worst- Case-Scenario a stepwise rollout helps you to
lower the impact on your infrastructure.

Secure endpoint: Operational lifecycle

This section provides strategies to optimize features or functionality in Secure
Endpoint. As new options, features and security fixes are released, it is
recommended that a review is conducted of new connector versions to upgrade the
endpoints for improved protection.

Basic test for a New connector installation

In this phase all network settings are already configured. In most cases when
new features are added to Secure Endpoint, no additional network configuration
are required.

●     Search the computer name in the Secure Endpoint console if it has
registered successfully. If yes, all should be fine.

●     If there is a new cloud service needed, e.g., with the release of the
Behavioral Protection Engine, the Secure Endpoint console shows the proper
information as an announcement.

●     Cisco often recommends using the latest version of the connector, what
makes sense. But in any way, new software should always be tested before doing a
global rollout.

●     Do all other software tests you typically do with new software packages
being deployed. Like install and removal of a software package using a 3rd Party
deployment tool.

New engines and features

With new features released in Secure Endpoint, these features can include new
engines or optional configuration settings for existing engines. While testing
new releases, it is recommended to enable new features that might not exist in
existing products or review the functionality provided in Secure Endpoint. When
trying out new features, it can be helpful to enable an audit setting initially.
Policy changes can be made, tested, and rolled out without any disruption to the
endpoint.

Best practice: If Secure Endpoint causes high CPU load, a very easy and fast way
is to disable engines step-by-step to identify the engine causing the high load.
A specific Secure Endpoint group can be created to allow the engine to be
disabled for the impacted endpoints.

Custom exclusions

Review of logging from Secure Endpoint or other performance tools can be used to
identify custom exclusions.

The steps to identify exclusions from the Secure Endpoint Diagnostics Package
takes the following steps. The Diagnostic package can be generated directly on
the endpoint using the command line, or from the computer properties in the
Secure Endpoint console.

Command line (Windows):

●     Start the debug logging on the endpoint. Debug logging can be activated
directly on the Endpoint UI (Windows) or in the policy under Advanced Settings →
Administrative Features → Connector Log Level.

●     Start the ipsupporttool.exe on the endpoint with the right command line
parameter. Use the right time value, so you can replicate the issue. Details
using the tool can be found in the Secure Endpoint Troubleshooting Technotes.

●     The default location to store the output file is the user desktop.

Secure endpoint console:

●     Navigate to the computer properties under Management → Computers

●     Click the Diagnostic Diagnose Button.

●     In the Popup window select the length of the Debug Session and click the
Create Button.

●     Open the Secure Endpoint Tray to pull a new policy. Debug logging will be
automatically enabled on the endpoint.

●     Replicate the issue on the endpoint.

●     Download the Diagnostic package under Analysis → File Repository.

Analyze the diagnostic package(s)

●     Download the Performance Tuning tool from http://cs.co/AMP4E_Tuning_Tool.

●     Copy the Diagnostic Package(s) and the Tuning Tool into the same
directory.

●     Execute the Tuning Tool and review the result

Best practice: Review the Tuning Tool result and add new exclusions based on the
guidelines from the previous chapters. If necessary, repeat the steps to figure
out additional needed exclusions.

Secure endpoint: Troubleshooting

The Secure Endpoint Deployment Strategy Guide already includes useful
information for troubleshooting This includes:

●     Performance

●     Outlook performance

●     Cloud connectivity

●     Missing information in Device Trajectory

●     Missing network events in Device Trajectory

●     Policy not updating

●     Proxy

●     Duplicate Connectors

●     Simple Custom Detections

●     Application Blocking

Health checker tool for windows connector

The tool provides a set of tools to investigate issues on the endpoint. It can
be downloaded from
https://github.com/CiscoSecurity/amp-05-health-checker-windows. The Live
Debugging option can also be used to determine necessary scan exclusions.



Note:       Newer Secure Endpoint connector versions protect sensitive
information in the policy. xml file. To decrypt this information, you need to
add API credentials to the health checker tool. Read the manual on github for
details.

Connectivity tool on windows endpoints

The tool provides several connection tests including policy pull, event upload,
Orbital update check and checks for Behavioral Protection Engine

To show all possible options

1.     Open a command prompt (cmd) window as administrator.

2.     Navigate to %ProgramFiles%\Cisco\AMP\[Version]\ConnectivityTool.exe

3.     Type ConnectivityTool.exe /? and press enter.



Analyze Secure Endpoint Diagnostic Bundle for High CPU on Windows and MacOS

Find a detailed description how to troubleshoot High CPU condition on the
cisco.com website:

●     Windows:
https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/215261-analyze-amp-diagnostic-bundle-for-high-c.html

●     MacOS:
https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/215570-analize-macos-amp-diagnostic-bundle-for.html

Processes secured by exploit prevention

In rare cases applications show unexpected behavior if Exploit prevention
injected the tiny DLL for the memory changes. To list all running processes
where Exploit Prevention tiny DLLs has been injected, you can use Orbital to
query the endpoint.

●     Open the Orbital console and start a new query

●     Select the host you want to query using host:hostname as the search target

●     Copy the following Custom SQL and click the Live Query button



Note:       If you have not licensed Orbital, you may download and install the
command line version of osquery to execute the SQL statement above.

EDR/XDR/MDR - Security architecture

Secure Endpoint fully integrates into the Cisco XDR platform. Before reading
this chapter, a short recap from the content in this guide.

●     Secure Endpoint is the EDR part of the XDR architecture. The Secure
Endpoint connector generates telemetry data which is then processed by the
Secure Endpoint cloud engines.

●     The Secure Endpoint cloud pushes telemetry, events and incidents to the
XDR analytics engine.

●     Orbital abstracts the operating system into high performance databases and
allows advanced search capabilities on an endpoint using simple SQL statements.

●     Orbital allows to execute scripts on the endpoint for remediation.

●     Secure Endpoint version 8.x can be run as a module within Secure Client.

●     Secure Client provides more security related features for a Cisco
protected endpoint.

●     The Secure Client Network Visibility Module (NVM) allows full network
telemetry.

The Cisco Security architecture is an open platform and allows high flexibility,
even with integrations. This includes different types of integrations:

●     Native integration of Cisco products into Cisco XDR.

●     Cisco XDR integration modules for 3rd Party vendors, which are maintained
and provided by Cisco.

●     Integrations with the provided APIs.

This allows customers to build a sophisticated security architecture with Cisco
products or enhancing and extending an existing security architecture. Based on
the security architecture, the way how incidents are visualized and handled will
vary from customer to customer. This guide focuses on the capabilities with
Secure Endpoint and intros to Cisco XDR.

Secure client incident vs. Cisco XDR incident

It is important to understand the difference between an Incident generated by
Secure Endpoint vs. an incident generated by Cisco XDR.

●     Secure Endpoint (EDR): the cloud engines are processing the telemetry from
the secure endpoint connector only. Based on the threat severity an incident
instance is raised within Secure Endpoint console.

●     Cisco XDR: The XDR analytics engine retrieves information from endpoint
and other sources. All this data is used to generate an incident including data
from multiple sources. Please review the XDR integrations page for more details.
Cisco XDR also processes the NetFlow information from Secure Client NVM module,
which is a separated module and not part Secure Endpoint. Cisco XDR provides
sophisticated features to simplify Security Operations.

The graphics below shows a fundamental overview how incidents are generated by
Secure Endpoint and Cisco XDR.



Note:       The Secure Endpoint Legacy Incident Promotion feature pushes
Incidents to XDR. This function (configured under Admin → Organization Settings)
will be removed in 2024, as all relevant data will be fully ingested into the
XDR analytics engine, where Endpoint telemetry along other sources will be
correlated and analyzed. Secure Endpoint will still generate Secure Endpoint
Incidents in the Secure Endpoint Console (visible under Inbox).

Note:       The XDR part of the drawing above shows the fundamental approach of
Incident creation in XDR. It shows an incomplete list for data telemetry, as
this guide focuses on Secure Endpoint. Review available documentation for XDR
data sources and the analytics engine.

Telemetry information

For better understanding, which telemetry information is processed in Secure
Endpoint and Cisco XDR:

●     Secure Endpoint: The endpoint sends telemetry information to the secure
endpoint cloud. This includes process, file, command line and network activity.
The engines on the Secure Endpoint connector are responsible for several things:

◦    They are protecting the endpoint against different types of threats in real
time.

◦    They reduce the attack surface by changing the memory with Exploit
prevention.

◦    Behavioral Protection can detect and block complex attack scenarios
directly on the endpoint.

◦    Engines also giving us insights into different areas of the endpoint,
including file activity, memory activity or specific behavior on the endpoint.

●     Cisco XDR: the architecture is capable to process raw telemetry from
various sources. This includes network information, public cloud information or
NetFlow Information provided by the Secure Client NVM Module. A short incomplete
list for better understanding

◦    Flow information from network devices and Secure Client.

◦    Event information from Cisco Defense Orchestrator.

◦    Flow Information from Public Cloud Environments.

◦    Secure Endpoint pushes Event information and Incidents to XDR.

◦    Telemetry and Incidents from 3rd Party vendors and products.

Activate Secure Endpoint EDR features

After you have configured the policies and Secure Endpoint is running probably,
it is important to activate the following EDR features.

●     Prevalence: Automatically analyze files with malware analytics which are
unique for your environment, not known globally or where malicious behavior has
been seen. If not enabled, the automated actions for file analysis are not
working.

●     Automated Actions: Enable different post infection tasks to generate more
visibility for EDR, analyze files, isolate the endpoint from the network or
generate a forensic snapshot with Orbital.



Prevalence (Low Prevalence Executables)

This feature ensures that files on an endpoint get stored and analyzed. The
integration with Malware Analytics provides insights into the characteristics
and behavior of files.

To enable the feature: Navigate to Analysis → Prevalence to activate the Low
Prevalence Executables feature per group. After you have activated the feature,
new files and files with specific behavior are available in the Secure Endpoint
cloud. Some important considerations for Low Prevalence Executables:

●     The Secure Endpoint cloud is requesting Low Prevalence Executables from
the endpoint. The primary decision logic/intelligence which files are needed to
be analyzed is in the Secure Endpoint cloud. Files are analyzed by Malware
Analytics only if needed.

●     If there is specific malicious activity seen around a file by the local
Behavioral Protection Engine, it can trigger a file upload to the cloud.

●     The files are stored in the file repository in the Secure Endpoint cloud.
The Secure Endpoint cloud itself forwards files to malware analytics to be
executed and analyzed there.

●     Exclusions prevent a file upload to the cloud. If there is an exclusion
hit, a file does not get scanned, hashed and no telemetry is sent to the cloud.
Therefore, add exclusions only if really needed to provide the highest security
level and detection rate.

Automated post infection tasks

The following Secure Endpoint Built-in features allow to automate security task
if there is malicious activity on an endpoint seen. Secure Endpoint provides
four different tasks.

●     Isolate a Computer upon Compromise: Select the severity level of the event
and the groups where endpoints should be automatically being disconnected from
the network. Configure the rate limit to prevent false positives detections.
Some considerations for the feature:

◦    Start with Severity Critical when using the feature.

◦    Be carefully when using a lower level and configure the rate limit. Monitor
your environment carefully when working with lower severity levels.

◦    Secure Endpoint communication always works, even the endpoint got isolated
from the network.

◦    Prepare IP-Allow lists and add them to the policy, so specific
communication is possible, even the endpoint got isolated from the network.

●     Submit to Secure Malware Analytics upon Detection: It is highly
recommended to enable the feature for all groups, so files get stored in the
Secure Endpoint file repository and are analyzed by Malware Analytics. Some
considerations for this feature:

◦    Review the Secure Endpoint help to review which file types and sizes are
automatically analyzed.

◦    Samples sent to Malware Analytics are set to private, so they are not
shared. Change this value (full Malware Analytics license needed) to public if
you want to share them.

◦    If files must not be uploaded to malware analytics, e.g., for privacy
reasons, you may deactivate the feature for a group of computers or you prevent
a file upload by adding scan exclusions for the connector.

●     Move Computer to Group upon Compromise: This post infection task needs
proper preparation. Best practice is to define a group with the right policy
assigned, which provides the highest detection/protection capabilities. Some
considerations for this policy:

◦    Enable all Engines and set them to Protect/Quarantine. Review the Policy
settings: Best Performance and Security section for additional info.

◦    Reduce the cache setting to the lowest setting.

◦    Remove as much as possible exclusions.

◦    Activate On-Demand Scanning in the policy.

●     Take a forensic snapshot upon compromise: The forensic snapshot is
generated with Orbital. If the generation of a snapshot is triggered, Orbital
does several endpoint queries and combines them together into a forensic
snapshot. The information then is forwarded to the Secure Endpoint console. The
forensic snapshot information is available in the computer object in the console
and available in the Device Trajectory. The snapshot includes the following
information:

◦    Autoexec items

◦    Bitlocker encryption monitoring

◦    DNS Cache table monitoring

◦    Hosts file data

◦    Installed programs on windows host

◦    Listening ports

◦    Loaded modules hashes

◦    Loaded modules processes

◦    Loaded modules vs. Processes

◦    Logon sessions

◦    Mapped drives

◦    Network connections – process

◦    Network interfaces

◦    Network profiles registry key

◦    OS version

◦    PowerShell history

◦    Prefetch directory

◦    Running files hashes

◦    Running services monitoring

◦    Scheduled tasks

◦    Shared resources

◦    Startup items

◦    System network state monitoring

◦    Temp directory file data

◦    Trusted root certificates

◦    USBSTOR registry keys

◦    User Groups

◦    UserAssist Monitoring

◦    Users

◦    Users Logged-in

◦    WMI event filters monitoring

◦    Windows AV products monitoring

◦    Windows BAM entries monitoring

◦    Windows environment variables monitoring

◦    Windows hotfixes

◦    Windows NT domains search

◦    Windows ShellBags monitoring

◦    Windows ShimCache Monitoring

◦    Chrome extensions monitoring

◦    Processes running without running a binary on the disk

◦    WMI script event consumers monitoring

Threat hunting with Secure Endpoint console

Secure Endpoint includes several tools to provide an analyst insight into
detected malicious behavior on an endpoint. This guide provides you a guidance
how to start an investigation. For better understanding review the user guide
searching for these topics.

●     Dashboard

●     Inbox

●     Observables

●     Indicators

●     Threat Severity

●     Device Trajectory

●     File Trajectory

●     Heat Map

Note:       Doing a Threat Hunt is not a linear process. The goal is to collect
as much as possible information about a threat to be able to understand the
threat, the impact and defining the proper remediation steps. Secure Endpoint
provides several tools to provide in-depth information into threats and attacks.

Learn basics with demo data

If you are new to Secure Endpoint, Cisco provides demo data and described
demo-use-cases where you can learn the fundamental functionality of the provided
tools.

Navigate to Admin → Demo Data to enable the demo data. The Demo Data can be
disabled at any time. Some considerations about the Demo Data.

●     Demo Data are highly customized datasets to show the fundamental
functionality of the product. There are Ransomware examples like CryptoWall,
WannaCry, Command Line activity and more. Threats and attacks are highly
dynamic, so please keep in mind that Secure Endpoint shows more and different
data in real threat or attack scenarios.

●     Demo Data events are not streamed out with the Streaming API.

●     Demo Data can be disabled at any time and all the entries will be removed
from your environment.

●     Demo Data hosts are not synced to the XDR asset inventory.

Secure Endpoint dashboard

The Dashboard gives you a broad overview of the status of your environment. The
so-called Heat Map gives you an easy-to-understand overview where Events and
Compromises have been generated in your environment. The Heat Map tiles
represent the groups defined in Secure Endpoint Console.

By clicking into the Heat Map the UI filters all other areas, so an analyst can
easily review what happened in each group, which compromise observables have
been discovered, which Threat Events occurred, Threat Event Types and more.

The example to the right shows the Cisco default groups, which have been moved
under a new root group called Cisco-Root. The Group CiscoDefault Audit has been
selected. 88,9% of the hosts in this group are compromised (Demo Data). By
clicking the Inbox link, the Secure Endpoint UI navigates to the Inbox.



Secure Endpoint Inbox

Based on event type, threat severity and/or event count the Secure Endpoint
Console raises a so-called Incident Instance. The inbox gives you a guidance
which endpoints should be investigated first.

1.     Review the information shown on the page including the system details,
events, observables, Kenna risk score and the available actions. From this page,
you can dig deeper into the details related to the outlined incident.

2.     Set the incident status to Begin Work, so every analyst in your endpoint
ORG knows that someone is working on the incident.

3.     The goal is to collect information to understand the threat, the impact
and defining necessary remediation steps.



At any time, the Secure Endpoint shows observables in the UI, the XDR Pivot Menu
can be used to get more information. The pivot menu provides information about
the source(s) which have generated a judgement for an observable. It also
provides many actions as outlined in the screenshot below. Based on the
integrations you have configured, the XDR Pivot Menu shows more available
actions.

●     If you want to share information about an observable across the
architecture, create a judgement in the Private Intelligence. The creation of an
Indicator is needed to be done first, as a judgement needs to be linked to an
indicator.

●     The search function searches in all areas of the Secure Endpoint UI for
the given observable. This includes all events, indicators, policy objects and
list objects.

●     The File Analysis feature provides information about behavior indicators
if the file was analyzed by Malware Analytics.

●     For detailed information about the file, click the File Trajectory action.

●     If the file is not available in the File Repository, click the File Fetch
action to request the file from the endpoint.

●     If a file is not classified but should be removed from all endpoints,
create a Simple Detection entry.

●     If the execution of a file should be blocked, but it should not be removed
from the file system, create a blocked application entry.

●     In case of a false/positives or to avoid cloud lookups for an observable,
create an allowed application entry. The Appendix-E: Exclusions in depth section
provides more information about the impact of application list entries.

●     If there are just Low Severity events where Secure Endpoint does not
create an incident in XDR, you can manually raise the Inbox instance as an
incident in XDR. Just click the Promote to Incident Manger button.



Create a Casebook

The XDR Ribbon is an overlay app provided by XDR and available in XDR integrated
products. The Ribbon itself includes apps like the Casebook App. The Casebook
app helps you to write down information during your threat hunt and to share
this information across different UIs.

Some considerations when using the Casebook app.

●     During an investigation you will figure out multiple observables with
different observable types. Add them to the casebook, so you have a collection
of the observables including latest Threat Information.

●     Link the casebook to available XDR incidents. You can easily navigate to
the incidents from the casebook.

●     Add notes to the casebook to track your work with the incident.

●     Some observables are detected directly, like SHA256, domain, IP-address,
or e-mail address values. To add additional observables with a different type,
you need to add observable type like the examples below:

◦    hostname:myhost

◦    user:attacker or user:mydomain\attacker

◦    domain:exampledomain.com

◦    url: https://www.exampledomain.com/index.html

◦    file_name:example.exe

◦    file_path:c:\example_foldername\example.exe

By clicking the Run Investigation button Cisco XDR queries all configured
modules for information about observables included in the casebook.



Device Trajectory

The Device Trajectory gives you insights into the activity on the endpoint. The
Device Trajectory page displays information like the computer properties
including the threat events, search and filter options, the relation graph and
event details. Review the Demo Data section and the Secure Endpoint
documentation to learn how to use the tool in detail. Some considerations for
Device Trajectory:

●     When opening the Device Trajectory from the event page, the event is
directly selected.

●     The investigation is always done for one endpoint. So, if there are
multiple endpoints, investigate every endpoint and store your findings in the
casebook.

●     By clicking the Event in the computer properties area, the Device
Trajectory directly jumps to event in the relations graph.

●     The yellow area in the relations graph shows information what activity
resulted into the IOC generation.

●     By clicking an icon in the relations graph, the event details are shown on
the right.

●     Review activity before and after an IOC to get more information.



File Trajectory

The file trajectory gives you insights into files during your threat hunt. It
supports the analyst how to handle a file. The included information may result
into actions like adding the SHA256 to an application allow or block list,
generating a judgement or fetching the file for analysis using the XDR pivot
menu. The File Trajectory page shows the following information:

●     when and where (Entry Point) the file has been seen the first time in the
environment.

●     related processes to the file.

●     file details including the real file type, size, detection names, file
names or signing certificate information.

●     The network profile including ports, IPs, or URLs the file/process
connected to.

●     The trajectory area shows when the file has been seen where and when, how
it was handles and what are the involved processes. A click on the computer name
shows details about related processes.

●     The event history area shows all related events for the file.



Threat hunting services (MDR)

Cisco provides several different services to support customers with Threat Hunt
and Incident Response. Please contact your Cisco representative for details.

Appendix-A: Secure Endpoint Private Cloud

The major differences between the two are:

Infrastructure

Pro

Con

Public Cloud

●  Endpoint features are deployed here first
●  Roaming endpoints can remain connected to the cloud
●  Internal network needs allowances to Public Cloud servers

Private Cloud

●  Better data privacy for the endpoint with cloud servers on premises
●  Dedicated resources are used to service endpoints
●  Hardware limits the number of active endpoints supported

Consideration: Public Cloud vs. Private Cloud

Secure Endpoint Appliance provides two options for deployment: Public Cloud and
Private Cloud. It is important to understand the differences between the two
options to ensure that you choose the best fit for your organization.

Public Cloud:

●     Secure Endpoint Public Cloud deployment is the most common option chosen
by customers. This method of deployment ensures that new features are
immediately available while requiring no server resources to manage endpoint
deployments. As such, this method is more flexible and recommended by Cisco.

Private Cloud:

●     The Secure Endpoint Private Cloud is hosted in your environment. This
deployment option provides more privacy for your organization by keeping all
endpoint telemetry data under your direct control.

●     The Secure Endpoint Private Cloud Appliance comes in two forms, a virtual
appliance and a physical UCS appliance. Each option has its own set of
requirements which should be carefully evaluated before purchasing decisions are
made.

●     Both versions of Secure Endpoint Private Cloud appliance offer two primary
modes of operation:

a.     Proxy Mode: Connection to cloud using the company´s web proxy.

b.    Standalone Connected: Cloud Lookups to cloud available, but telemetry is
stored locally.

c.     Air-Gap Mode: No connection to cloud in any way.

●     Most Secure Endpoint Private Cloud customers run their appliance in Proxy
Mode, as this is the recommended configuration for Private Cloud deployments.

●     Air-Gap Mode is deprecated for virtual Private Cloud deployments (will be
available for physical UCS) and is provided for customers with extreme privacy
requirements or for customers who are unable to have external network
connectivity.

Review the Secure Endpoint Private Cloud Documentation on the cisco.com website:
https://www.cisco.com/c/en/us/support/security/fireamp-private-cloud-virtual-appliance/series.html#~tab-documents

Details: Public Cloud vs. Private Cloud

The table shows some main differentiators between Secure Endpoint Public Cloud
and Secure Endpoint Private Cloud Appliance.

Feature

Public Cloud

Private Cloud

Info

Deployment

Location

Regional Cloud DC

Virtual Appliance or Hardware Appliance

Deployment Strategy Guide

Privacy

Managed Cloud Service

Proxy Mode or Air-gaped Mode

Cisco Trust Portal

Sizing

Managed Cloud Service

100.000 endpoints supported on HW appliance

Virtual Appliance Sizing

High Availability

Managed Cloud Service

Cold Standby

 

Reliability

Managed Cloud Service

Backup/Restore Procedure

 

MSSP Portal

Available

n.a.

 

Policy and Features

Connector Policy

Latest available features

Yes

 

Endpoint Engines

Latest available features

Yes

 

OS Support

Win/Linux/macOS/iOS/Android

Win/Linux/macOS/iOS/

See release notes

Identity Persistence

Yes

Yes

 

Device Control

Yes

Yes

 

Endpoint isolation

Yes

Yes

 

Automated actions

Yes

Yes

 

→ move to group

Yes

Yes

 

→ Isolate endpoint

Yes

Yes

 

→ Submit file for analysis

Yes

Yes

 

→ Forensic Snapshot

Yes

No

Orbital needed *1

Integrations into SecureX and Hunting Services

Cisco XDR

Yes

No

 

Global Threat Alerts

Yes

No

 

Advanced Search (Orbital)

Yes

No

 

Secure Malware Analytics

Cloud

Yes

No

 

On-Premises Appliance

No

Yes

 

*1: Forensic Snapshot depends on Orbital Cloud Service which is not available
for On-premises deployment.

Appendix-B: Virtual Environments (VDI)

Introduction - VDI and Multi-User Environments

Virtual Desktop Infrastructure (VDI) and Multi-User Environments like Terminal
Servers, Hyper-V, VMware and others need some granular planning, so Secure
Endpoint can be installed without interruption or performance degradation of the
virtualization platform. There are so many different virtualization options
available on the market, so we cannot list them all here. The following section
may give you a short insight into virtualization environments and why adding
Endpoint must be planned carefully.

Note:       Review the best practices guides provided by Virtualization vendors
like Microsoft, VMware, Citrix, Open Stack and others.

Best practice: Virtual Environments OS Support

Secure Endpoint is VDI vendor agnostic if the Virtual Desktop operating system
is supported. Virtual Environments need some special configuration so Secure
Endpoint is working without interruptions to the VDI environment.

Endpoint virtualization vs. Application virtualization

Endpoint: Virtualization: The Virtualization platform provides a complete
virtual desktop for a user. The benefit for an IT department is, that any
desktop can be easily rebuilt. With a few steps an admin can re-deploy a whole
virtual endpoint from a golden image.

The virtualization platform is often a part of the deployment strategy for a
customer. If there is a new application needed, a new golden image with a new
version number is created. IT department can test the new image, especially if
there is any bad impact based on the recent changes. After testing, a rollout is
started to re-deploy all end-user virtual systems. It there are any issues, the
IT department can switch back to the previous image.

To prevent the loss of the user settings, stored in the user profile, and to
provide all the settings regardless of where the user does a logon, features
like roaming user profiles are used. These profiles include data like
application settings, Browser favorites and cache, the desktop icons and much
more. During Logon, the profile is copied from a network share to the local
machine. During user logoff, the profile is copied back to the network share.
The challenge with user profiles is the high number of files stored in the user
directory. In many cases SMB protocol is used to access the network share where
the roaming profile is stored.

End-users can access the virtual desktop using a proper configured Windows 10
endpoint (just used as the access device) without local installed applications.
Another option is using a small Terminal, which is booting a small Linux image
including a client to access the virtual desktop.

Summary: For the end-user it looks like e.g., a typical Windows 10 endpoint, but
the backend architecture is completely different than a physical desktop or
notebook.

●     Application virtualization: This approach is divergent to Endpoint
Virtualization because the application only is “virtual”. This means, the
application is not installed on the user endpoint, it is “streamed” from the
virtualization platform

As an example:

1.     The user starts an application from the icon on the desktop.

2.     In the virtualization backend, the user is logged on to another host.
This can be e.g., a Windows Terminal server. This is completely transparent for
the end-user starting the application.

3.     After logon in the backend, the application is started and is streamed to
the user desktop.

●     Commonalities between both approaches: There are many different approaches
available today. Just highlighting two considerations. Both scenarios are using
a Storage System in the backend. Where during user Logon SMB protocol may be
used, a common approach to connect Storage to a Virtualization host is iSCSI.

In any case, there is some Network layer communication. The average access time
from a local disk and a network layer is quite different. Virtualization
environments and Storage systems are providing different features to reduce
problems with access time. Finally, in such a scenario, the goal of a proper
Secure Endpoint configuration, is to avoid degrading the performance by scanning
specific files.

Recommended guidance is to meet with the responsible IT-admins at a customer
site to obtain a thorough understanding of their virtualization environment
before starting the deployment. Note: It´s common that different teams at the
Customer site handle the Virtual environment vs the team that administrate the
Cisco Secure Endpoint solution.

Secure Endpoint Installed in VDI and multiuser environments

Today there are no known incompatibilities between Secure Endpoints and
Virtualization products. As long the OS is supported, Secure Endpoint can be
installed. For proper functionality Endpoint provides several features and
options. The next section shows possible options, starting with the backend
preparation.

Identity persistence

There is often the case where systems are frequently re-deployed. Even the
system name is the same, the AMP connector GUID in the registry is generated
new. Based on this new Connector GUID the Endpoint backend will generate a new
Computer Object. This issue can be solved by activating the Identity persistence
feature in Endpoint Backend. The feature must be enabled by TAC. After the
feature is enabled, a new option is available in your Endpoint policy.



Identity persistence configuration

●     Go to Management → Policies and select the appropriate policy.

●     In your policy navigate to Advanced Settings → Identity Persistence to
configure the proper settings

Best practice: Always take care when moving endpoints between groups where
Identity Persistence is enabling in one group and disabled in the other group.
This may result once again into duplicate computer accounts.

When using Automated Actions, where an Endpoint is automatically moved to
different group, or Endpoints are frequently reinstalled, it is highly advised
to enable Identity Persistence in all groups.

Best practice: Identity Persistence is not a VDI feature, it is most time used
when Secure Endpoint is installed on virtual systems. Frequently re-imaging of
endpoints commonly happens in VDI environments. This feature can be used at any
time, where systems are frequently re- deployed. Take a few moments to think
about what the better approach is for your environment, identifying systems by
MAC Address or Hostname.

Golden image and Endpoint cloning

If there is a need to create a golden image use the /goldenimage command line
switch for connector installation. Find details here:
https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/214462-how-to-prepare-a-golden-image-with-amp-f.html.

Note:       Secure Endpoint does an incremental signature update for 30
signatures. Afterwards the whole signature set is downloaded. A golden image is
often used for a longer period, which exceeds the incremental update limit. In
this case, at any time, a new VDI system gets deployed from that golden image,
Secure Endpoint will download the whole signature set. For such scenarios a
Tetra Update Server should be in place, to speed up the update process and to
save bandwidth consumption to the cloud.

Endpoint Tray Icon

The Secure Endpoint process sfc.exe allows a limited count of Tray Icon
connections. In a Multi-User Environment, e.g., Terminal Servers, disable the
Tray Icon completely in the policy. If not, the Tray Icon will show wrong
information, as the sfc.exe process cannot connect to the tray icon process if
the limit of simultaneous tray app connections is reached.

Best practice: In any environment where multiple users are logging into a
system, e.g., Terminalserver, the Tray Icon should be disabled by policy.

Exclusion and Feature deactivation

Exclude specific types of applications as listed below. As explained in the
previous chapter, exclude any process with high disk activity to prevent any
degratation of performance on the backend storage system. In addition, turn off
Secure Endpoint features generating high disk activity as listed below.

●     Startup intensive applications must be excluded.

●     Profiling/Inventory tools must be whitelisted.

●     No OnDemand Scans/disable flash scan on install.

●     No Endpoint IOC Scans.

●     Exclude all processes which are provided by the Virtualization Vendor.
E.g., all Citrix processes for Application Virtualization.

Tetra Engine: Cisco recommends carefully using Tetra AV in virtual environments.
If there is a need for AV Scanning, install Tetra Step-by-Step on systems.
Monitor system and storage performance before installing on additional
endpoints. Installing Secure Endpoint without AV drivers, using the command line
argument /skiptetra 1 prevents the driver installation.

Automated Actions: When using Automated Actions, where an Endpoint is
automatically moved to different group, or Endpoints are frequently reinstalled,
it is highly advised to enable Identity Persistence in all groups.

Network (DFC): Systems providing Virtualization in any way are needing high
network bandwidth. Install Secure Endpoint without Network DFC using the/skipdfc
1 command line.

Boot storm - Note: When installing Tetra AV on a Multiuser Environment, think
about the Boot storm when endpoints are started, and the users are logging in.

Best practice: Disk Performance and Secure Endpoint Features

→ Best practice - Performance: Avoid any configuration which generates high disk
activity caused by scanning many files.

→ Best practice - Network Performance and stability: Install the Secure Endpoint
connector without the network drivers.

Native Hypervisor Integrations and Secure Endpoint

Native Virtualization Integration: Secure Endpoint can be installed in a virtual
environment, as long the Guest OS is supported by Secure Endpoint. There are
three common integrations/ approaches to scan files in virtual environments.
Each system provides advantages/ disadvantages, based on the point of view.

●     Option: Scanning directly on Hypervisor level (e.g., VMware NSX).

●     Option: Virtual Scanning Appliance, scan process is moved to a scanning
appliance by an agent inside the VM.

●     Option: Endpoint Security running directly in the VM.



For many customers resource consumption for File Scanning is an important factor
for implementation. In many cases, the goal is to move the scan process to a
dedicated appliance. Such approach is for scanning only, but based on this
design, EDR features, or behavior-based engines are missing. Therefore, many
vendors, once again, are installing a software agent into the virtual machine.

Note:       Secure Endpoint is always installed inside the virtual machine.
Today Cisco does not provide file scanning directly on the Hypervisor level.

The tables below show some key differentiations between the virtualization
scenarios. Cisco is not aware about the latest product changes/approaches of
competitor products and features. The table should help you to understand key
features. Always investigate latest product documentation and plan carefully
with the customers IT Team. In addition, the following tables do not include
Hybrid solutions where a Service Appliance and an additional endpoint is in
place. It should give you a basic understanding about the differences of each
approach.

 

Hypervisor Level Scanning

Service Appliance Scanning

Scanning inside the VM

Info

Deployment

Secure Endpoint Placement

no

no

yes

 

Endpoint Software

VMware Tools

Software Agent

Secure Endpoint

 

Scan Appliance Inst. Count

1x per Hypervisor

1x per x endpoints

n.a.

 

Scan Engine Location

Hypervisor (VM)

Service Appliance (VM)

Inside VM

 

Scan Count per file (worst-case)

Once per hypervisor

once per appliance

once per host

← Scanning the same file multiple times can cause high load and latencies on
Storage Systems

Communication to Scan Service

IP based

IP based

Drivers inside VM

Communication between the VM and the Scan Service

High availability

No

Yes

n.a.

 

Impact on Outage

All VMs on Hypervisor

All VMs connected to Appliance

Single VM

 

Resource consumption

100 – 200B per Hypervisor

100-200MB per x endpoints

100MB per endpoint

Resource saving depends on the Architecture, e.g., how many endpoints are hosted
by one Hypervisor. Effectiveness of resource savings is often important for
customers. The resource consumption has an impact on the VM density per
Hardware.

Example 1000 VMs (RAM consumption)

1-2 GB RAM (100VMs per hypervisor)

100-200 MB for appliance. 1GB (10 MB per endpoint)

10 GB (100MB per VM)

RAM consumption for File Scanning Resources over virtual infrastructure

Deployment

File Scanning

3rd Party

3rd Party

Yes

 

Process Information

No

Partial

Yes

 

OnDemand Scan

No

No

Yes

 

Machine Learning

No

No

Yes

 

Behavior Engines

No

No

Yes

Needs endpoint behavior details

Post infection tasks

No

No

Yes

 

High availability

No

Yes

n.a

 

Real Time Forensic

No

No

Yes

 

Resource consumption

100 – 200B per Hypervisor

100-200MB per x endpoints

100MB per endpoint

Resource saving depends on the Architecture, e.g., how many endpoints are hosted
by one Hypervisor. Effectiveness of resource savings is often important for
customers. The resource consumption has an impact on the VM density per
Hardware.

Example 1000 VMs (RAM consumption)

1-2 GB RAM (100VMs per hypervisor)

100-200 MB for appliance. 1GB (10 MB per endpoint)

10 GB (100MB per VM)

RAM consumption for File Scanning Resources over virtual infrastructure

Summary: Various Integrations into virtualization environments are useful for
resource savings for RAM and CPU by moving Scanning Resources to a dedicated
system. Without an additional endpoint component, such solutions are missing
endpoint protection and EDR functionality and do not provide post infection task
like

●     Isolating the endpoint from the network

●     Generating forensic snapshot

●     Advanced file analysis triggered by endpoint behavior

Best practice: If a product for Agentless Scanning is already in place, you may
install the Secure Endpoint connector without Tetra Engine using the/skiptetra 1
installation switch. Second option is using a policy where Tetra is disabled, so
you can enable AV scanning in Secure Endpoint without re-installing the product.

Integration: Scanning per hypervisor (e.g., VMware)

Description: A 3rd Party Scanning appliance is installed on the Hypervisor. This
Appliance is responsible for AV Scanning only.

AV Scanning done by Hypervisor insights:

●     No Process information available for the Scanning Appliance.

●     OnDemand Scans are not possible.

●     Path Exclusions only are available, no process exclusions possible.

●     Automated Deployment of a Scanning Appliance possible (vendor dependent).

●     VMware Tools must be installed.

●     Additional Software Component inside VM needed providing protection beyond
AV scanning and EDR.



Secure Endpoint Deployment:

●     Install Secure Endpoint without Tetra with the /skiptetra 1 installation
switch.

◦    (Duplicate Scanning possible, but needs more system Resources, not
recommended)

●     All other engines can be installed based on the guidelines in the previous
sections.

Info: VMware acquired Carbon Black and Lastline. New features provided by the
acquisitions are not part of this document.

Integration: Scanning with dedicated scanning node (e.g., Hyper-V, Citrix,
OpenStack)

Description: A dedicated Scanning Appliance is used to scan content for virtual
systems across multiple Hypervisors. One appliance can also be used serving the
scanning service for virtual endpoints hosted on different Hypervisors and
versions.

AV scanning done by dedicated Appliance:

●     Can handle many endpoints across Hypervisor Platforms.

●     Distributed Cache (Vendor dependent).

●     SW-Agent in VM sends file for scanning.

●     Exclusions possible based on Process (vendor dependent).

●     No OnDemand Scans.



Secure Endpoint Deployment:

●     Install Secure Endpoint without Tetra with the /skiptetra 1 installation
switch.

◦    (duplicate Scanning possible, but needs more system Resources, not
recommended)

●     All other engines can be installed based on the guidelines in the previous
sections.

●     Configure Exclusions for the SW Agents, which forwards files to the
Scanning Appliance.

OnDemand/IOC scanning in virtual environments

The drawing shows an easy example of a virtual environment. One or more storage
systems are connected to the Hypervisor using iSCSI. Several virtual systems are
hosted by the Hypervisor.

AV scanning done by dedicated Appliance:

●     Secure Endpoint is running in the memory of the virtual machine.

●     The Operating System files are located on the storage system.

To scan a file, it must be fully copied from the storage system to the virtual
machine. If the same file is available on multiple virtual systems, the file
must be copied several times.



Best practice: OnDemand Scan:

Avoid OnDemand Scanning (File Scanning and IOC Scanning) in virtual
environments. If a customer requests OD-Scans as part of the Security
Guidelines, separate the endpoints in different groups, so not all endpoints
start the scan at the same time.

Recommended Settings for Microsoft Windows Terminal Server

Microsoft Terminal Server have some special characteristics and therefore a
proper Secure Endpoint configuration is important.

Characteristics:

●     Multiple user sessions at once.

●     Roaming Profiles are often used and stored on a remote network drive. This
results into high network bandwidth usage during user logon and logoff. Roaming
profiles include thousands of files, which are copied to the local drive.

●     Login/Logout storms are generating high load on the Terminal Server
system.

●     A lot of running Applications in the memory.

●     High disk activity generated by the running applications.

Recommended settings

●     Define an own Group and Policy Template for Terminal Servers.

●     Assign the Cisco Maintained Exclusion List for Microsoft Windows.

●     Exclude Processes which are related to the virtualization system. Review
the recommended Terminal Server AV exclusions from Microsoft website:
https://social.technet.microsoft.com/wiki/contents/articles/18439.terminal-server-antivirus-exclusions.aspx

●     Disable the Tray icon for Secure Endpoint in the policy as outlined above.

●     Disable the Network Protection in the Policy. If there are still issues
with the network performance, re-install the endpoint using the /skipdfc install
switch. Review the Deployment Guide for details, outlines in the Secure Endpoint
Preparation and operational Lifecycle section of this guide.

●     Malicious Activity Protection Engine and Exploit-Protection Engine must be
tested carefully, as changes to the memory may generate issues in a Terminal
Server environment. Start in Audit Mode and switch to protection mode
Step-by-Step.

●     Do not use On-Demand Scans for Terminal Servers to avoid disk performance
issues. If required by the customer, do the OnDemand scan during times where no
users are logged on to the Terminal server. Use different smaller OnDemand
scans, where parts of the disk are scanned, to speed up the scanning process.

Recommended Settings for Microsoft Hyper-V

Microsoft Hyper-V provides virtualization of other Operating Systems. Secure
Endpoint is VDI vendor agnostic if the Virtual Desktop operating system is
supported. For performance reason the Hyper-V Platform has no Endpoint Security
installed, as the virtual VMs are already protected. In cases where protecting
the Hypervisor platform is a customer requirement, Secure Endpoint needs a
proper configuration.

Building a Policy for Microsoft Hyper-V.

●     Define an own Group and Policy Template for Microsoft Hyper-V systems.

●     Assign the Cisco Maintained Exclusion List for Microsoft Windows.

●     Add additional necessary exclusions recommended by Microsoft:
https://learn.microsoft.com/en-us/troubleshoot/windows-server/virtualization/antivirus-exclusions-for-hyper-v-hosts

●     If the Hypervisor is clustered, add Microsoft Cluster Exclusions based on
the Microsoft recommendations:
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/configure-server-exclusions-microsoft-defender-antivirus?view=o365-worldwide

◦    If there is a quorum disk configured, the whole path must be excluded from
scanning. Review Microsoft Information for quorum disk:
https://docs.microsoft.com/en-us/windows-server/failover-clustering/manage-cluster-quorum

●     Disable Exploit Prevention and Malicious Activity Protection in the
Policy.

●     Disable/Remove any OnDemand Scan on the Hyper-V System.

●     Network Performance is essential for a Hyper-V system. Install Secure
Endpoint using the/skipdfc installation switch to stop the Secure Endpoint
network driver installation.

◦    Disable Secure Endpoint product update in the policy. If the connector is
updated using the internal feature, the standard installation command line is
used.

Best practice: Always test carefully when installing Secure Endpoint on a
Microsoft Hypervisor System.

Virtual Systems in Public Cloud Environments

Secure Endpoint can be installed on any virtualization platform if the OS in the
virtual workload is supported. In public cloud environments like Amazon Web
Services (AWS) and others, performance generates costs. A proper Secure Endpoint
configuration helps to save costs.

●     Review if the virtual OS in the public cloud environment is supported by
Secure Endpoint. Review the Supported Operating Systems section of this
document. Review the official supported OS information from the cisco.com
website.

●     Review the Policy Design and Management – Performance and Security section
to build a Secure Endpoint policy with a low resource impact on the endpoint.

●     Activate On-Demand scanning only if necessary or if you are expecting a
compromise. In such cases you may activate Automated Actions feature to move a
computer to the appropriate group, after a Cloud IOC was generated.

●     Endpoint IOC scans are very resource and time intensive. Run Endpoint IOC
scans only if needed. Review the integration of XDR into public cloud
environments and the options with Orbital, as XDR provides much more outcome
than an IOC scan.

In public cloud environments where system resources generate costs, check system
performance in regular intervals. Review the Secure Endpoint: Troubleshooting
section to figure out high CPU problems.

VDI checklist

Take a moment to review the summary to install Secure Endpoint in a VDI
environment.

●     Open a TAC case to enable Identity persistence.

●     Verify the type of the virtualization platform.

●     Use the /goldenimage command line switch to generate a golden image. Take
care, that the image does not connect to Secure Endpoint backend before
freezing.

●     Incremental Updates are available for a max. count of 30 Signature
updates, afterwards the whole Signature package will be downloaded. Deploy an
AMP Update Server to store the Signature Files in the local network.

●     The sfc.exe process supports a limited count Tray Icon connection. Disable
the Tray Icon in the Policy for Multi-User deployments.

●     If enabling Tetra, be carefully and enable step-by-step to prevent storage
overload. Review the guidelines for Exclusion and Feature deactivation.

●     Do not install the network driver on systems with high network load or if
many VLANs are configured on the network interface.

●     Secure Endpoint always runs inside the virtual OS.

●     OnDemand Scan can degrade the Storage Performance. Avoid ODScanning/IOC
Scans for daily operations.

●     Review the recommendations for specific environments like Microsoft
Terminal server, Hyper-V and public cloud infrastructure environments.

Appendix-C: Add Tetra Manually after/skiptetra was used

As this is a workaround, always test in a non-productive environment before
doing a global rollout!

Adding Tetra Manually to an Endpoint tested with connector version 7.3.15
Perform the following steps to add Tetra again to your endpoint, if the
/skiptetra 1 installation switch has been used.

1.     Stop the Connector

2.     Copy trufos.sys from C:\Program Files\Cisco\AMP\tetra to
C:\Windows\System32\drivers

3.     Create registry entries at location
HKLM\System\ControlSet001\Services\Trufos. See Registry Key values below.

4.     Ensure Tetra is enabled in the Policy on the portal:

a.     Advanced Settings → TETRA → TETRA checkbox should be checked

b.    Models and Engines → TETRA checkbox should be checked

5.     Start the Connector

There is one side effect: - if after performing these steps, in the future if
amp is uninstalled, then trufos.sys and registry entries created above will have
to be manually removed. If you do not remove the files/registry keys, this does
not have any impact on the endpoint.

Batch file to generate registry key values

Copy the following text into a .bat file to add all registry key at once.



Appendix-D: 3rd Party integrations with Secure Endpoint

Several 3rd party security companies developed integrations with Secure
Endpoint. The latest list can be found at:
https://www.cisco.com/c/en/us/products/security/amp-for-endpoints/AMP-endpoints-partners-integrations.html#~third-party-solutions.

Integrate Secure Endpoint Using API Code Examples

Basic examples for API usage can be found at:
https://developer.cisco.com/amp-for-endpoints

Cisco Security on GitHub – Sample Integration Code

Sample integration code at:
https://github.com/CiscoSecurity?q=amp&type=&language=&sort=

Appendix-E: Exclusions in depth

The guide outlines a lot of useful information around exclusion management for
Secure Endpoint.

●     Policy Configuration Planning section showing how the policy object looks
like and how list objects are assigned to policies.

●     Known limits for exclusions in the Policy Setting: Define and manage
Exclusions section. Best practices for List management and assignment.

●     Troubleshooting the endpoint to determine necessary exclusions. Use the
Device Trajectory to show which engine detected a threat.

●     Clean-up exclusion on a regular basis to provide the highest security
level.

●     Use minimum possible exclusions to provide the highest security level.

File Analysis and other Endpoint Protection areas with Secure Endpoint are not a
linear process. As an example, File scanning is using several stages based on
the file type, cache status and more. Review the File Scan Sequence for details.

Insights into the drawing below.

●     Scan Exclusions (Path/Wildcard/File Extension/Threat) are having an impact
on AV-Scanning and the Script Protection Engine. The exclusion impacts the
System Activity Monitor of Behavioral Protection Engine. Excluded files are not
hashed and no telemetry for the backend engines is generated. Excluded processes
are not visible in the Device Trajectory, except command line activity.

●     Process exclusions are more related to single engines.

◦    Process → File Scan: The process is not scanned. Any file generated by this
process is also not scanned.

◦    Process → Behavioral Protection: The process is excluded from the Attack
Pattern Engine.

◦    Process → System Process Protection or Malicious Activity Protection: The
process is excluded from the specific engine

●     Application Allow Lists: Entries have an impact on the following areas of
the endpoint connector.

◦    File Type: Entries are processed for Portable Executables and other file
types, e.g., PDF files.

◦    SPERO (Machine Learning): Allowed hashes are excluded from machine learning
detection.

◦    Cloud Lookups: Allowed hashes are excluded from cloud lookups. Cloud lookup
detections are shown in Device Trajectory as SHA engine.

◦    Files from the quarantine folder are restored to the original location on
the disk if a hash has been added to the application allow list.

●     Cloud IOC exclusions are not available today. Exclusions are added to the
backend by Cisco. Please open a TAC case to add necessary Cloud IOC detection
exclusions.





Best practice: Use minimum possible exclusions to provide the highest security
level and to maximize the detection of the Backend Detection Engines. Review
“Configure and Identify Secure Endpoint Exclusions” at the Configuration Exmples
and Technotes website:
https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/213681-best-practices-for-amp-for-endpoint-excl.html

 






LEARN MORE




By continuing to use our website, you acknowledge the use of cookies.
Privacy Statement Change Settings



CONSENT MANAGER




 * YOUR PRIVACY


 * STRICTLY NECESSARY COOKIES


 * PERFORMANCE COOKIES


 * TARGETING COOKIES


 * FUNCTIONAL COOKIES

YOUR PRIVACY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. From the list on
left, please choose whether this site may use Performance and/or Targeting
Cookies. By selecting Strictly Necessary Cookies only, you are requesting Cisco
not to sell or share your personal data. Note, blocking some types of cookies
may impact your experience on the site and the services we are able to offer.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies


These cookies provide metrics related to the performance and usability of our
site. They are primarily focused on gathering information about how you interact
with our site, including: page load times, response times, error messages, and
allowing a replay of a visitor’s interactions with our site, which enables us to
review and analyze visitor behavior, helping to improve site usability and
functionality. These cookies also allow us to count visits and traffic sources
so we can measure and improve the performance of our site. They help us to know
which pages are the most and least popular and see how visitors move around the
site. If you do not allow these cookies we will not know when you have visited
our site and will not be able to monitor its performance.

TARGETING COOKIES

Targeting Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Back Button


COOKIE LIST

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Clear
checkbox label label
Apply Cancel
Save Settings
Allow All