Cisco Advanced malware protection uses Cisco Threat Intelligence Extensive latest threats and security trends Knowledge base Analytics and behavioral indicators which will help us to defend in latest spear phishing and malware attacks.
This will basically fall under advanced threat capability category which is capable of providing additional layer of security.These ATP have retrospective detection alerts which is capable of tracking malware alerts which was successful through initial defenses.
AMP is the recent name given to this advanced threat detection by most of the security systems where it has following:
- A separate private isolated environment where it has Implementations for multiple attack vectors/entry points (firewall, network, endpoint, email.
- Ransomware/Malware Threat prevention.
- Retrospective alerting and remediation techniques.
Usually AMP works in the following fashion for any email security system :
Preventive Measure – Strengthens the defense mechanism by having upto date latest malware attacks and defense mechanism from respective real time threat intelligence service.
Ironport uses Talos Engine – https://www.talosintelligence.com/
Using this technique the malicious content will be blocked.
Threat Analysis in Transit of Emails – During this process the file is analyzed as an end user PC(windows/MAC) in a isolated network to detect malware, experience file behavior and mark threat level if at all detected. If the sand boxing is not enabled in local on premise them it captures the fingerprint of each file which hits the gateway and will send them to their AMP cloud based intelligence network. Here we have an option to select which types of files that needs to be analysed via this AMP in most of the gateways.
Tracking after Delivery- In this step it uses continuous analysis which will help to identify if there are any malicious file which are capable of performing any malware attacks after certain period of time. By using this AMP will be able to find the infected source and then alert the admin and visibility till the infected file.
In this article we will have how to enable AMP in cisco ironport.
Login to the appliance – Navigate to security services – Advanced Malware protection – Select File reputation and analysis.
If its enabled we will be getting the below screen. To further fine tune the settings click on edit global settings
Click on – Enable file reputation.
This is used to protect against zero-day and targeted file-based threats.
Following actions are performed After a file’s reputation is evaluated:
• If the file is known to the file reputation service and is determined to be clean, the file is released to the end user.
• If the file reputation service returns a verdict of malicious, then the appliance applies the action that we have specified for such files.
We have Enable File Analysis-
This needs to be enabled. We have almost for all the attachment types.
File Analysis works in coordination with File reputation filtering. When this option is enabled attachments in emails will be sent to file analysis. Here we have the option to choose the file types which we need to perform the analysis. Be very choosy in this section keep in mind that since there is analysis enabled on this file it will take little few minutes to deliver the mail to end user when compared to a user who does not have AMP enabled for their account.
If the file is sent for analysis TO SANDBOXING (cloud or onprem based on setup):
• If the Selected file type is sent to the cloud for analysis: Files are sent over HTTPS.
Also the appliance generates an identifier for each file using a Secure
Hash Algorithm (SHA-256)
•Usually Analysis normally takes minutes, but may take longer based on the size and file type.
• Results for files analyzed using an on premises Cisco AMP Threat Grid appliance are cached locally
Advanced settings for file reputation – Here we need to select our Sand boxing environment based on our configuration. If we are using cloud AMP then we have 4 regions to select based on our requirement.
There is an option to register appliance with AMP for endpoints.Make sure you have a user account in AMP for Endpoints console with admin access rights. For more details on how to create an AMP for Endpoints console user account, contact Cisco TAC.
If we have local on premise AMP setup then we need to select option private reputation cloud and add the required details.
We have the same option cloud or on prem for file analysis
If specifying the cisco cloud server, choose the server that is physically nearest to your
appliance. Newly available servers will be added to this list periodically using standard
If we choose our own private cloud then we need to use the self signed cert or upload one certificate.This is required for encrypted communications between this appliance and yourprivate cloud appliance. This must be the same certificate used by the private cloudserver. I prefer to have one SHA256,2048 bit certificate generated from internal CA and apply them on the private cloud as well as the appliance for this connection alone.
This settings is optional which we can leave as it is or if you want to configure the cache expiry period for File Reputation disposition values.
Once enabled the files enabled in AMP will be passed to them after antivirus engine.
We can see the files blocked in the AMP in the incoming mail dashboard.
- An AMP subscription is required to enable this functionality.
- Advanced Malware Protection services require network communication to the cloud servers on port 443 (for File Reputation) and 443 (for File Analysis). If there is no communication the file types enabled for AMP will be sent to quarantine folder even if they are clean. Below error message will be received if no communication is present to cloud server in incoming email header.
Thanks & Regards