Network Malware Protection and File Policies

The following topics provide an overview of file control, file policies, file rules, Advanced Malware Protection (AMP), cloud connections, and dynamic analysis connections.

About Network Malware Protection and File Policies

To detect and block malware, use file policies. You can also use file policies to detect and control traffic by file type.

Advanced Malware Protection (AMP) for Firepower can detect, capture, track, analyze, log, and optionally block the transmission of malware in network traffic. In the Secure Firewall Management Center web interface, this feature is called malware defense, formerly called AMP for Firepower. Advanced Malware Protection identifies malware using managed devices deployed inline and threat data from the Cisco cloud.

You associate file policies with access control rules that handle network traffic as part of your overall access control configuration.

When the system detects malware on your network, it generates file and malware events. To analyze file and malware event data, see the File/Malware Events and Network File Trajectory chapter in the Cisco Secure Firewall Management Center Administration Guide .

File Policies

A file policy is a set of configurations that the system uses to perform malware protection and file control, as part of your overall access control configuration. This association ensures that before the system passes a file in traffic that matches an access control rule’s conditions, it first inspects the file. Consider the following diagram of a simple access control policy in an inline deployment.

Diagram illustrating the flow of traffic in a simple access control policy that uses file policies.

The policy has two access control rules, both of which use the Allow action and are associated with file policies. The policy’s default action is also to allow traffic, but without file policy inspection. In this scenario, traffic is handled as follows:

  • Traffic that matches Rule 1 is inspected by File Policy A.

  • Traffic that does not match Rule 1 is evaluated against Rule 2. Traffic that matches Rule 2 is inspected by File Policy B.

  • Traffic that does not match either rule is allowed; you cannot associate a file policy with the default action.

By associating different file policies with different access control rules, you have granular control over how you identify and block files transmitted on your network.

Requirements and Prerequisites for File Policies

Model Support

Any

Supported Domains

Any

User Roles

  • Admin

  • Access Admin

License Requirements for File and Malware Policies

To Do This

License Required

File Rule Action

Block or allow all files of a particular type (for example, block all .exe files)

IPS (for threat defense devices)

Protection (for Classic devices)

Allow, Block, Block with Reset

Selectively allow or block files based on a judgment that it contains or is likely to contain malware

IPS (for threat defense devices)

Protection (for Classic devices)

Malware Defense

Malware Cloud Lookup, Block Malware

Store files

IPS (for threat defense devices)

Protection (for Classic devices)

Malware Defense

Any file rule action with Store Files selected

For details about Malware Defense licenses, see:

Best Practices for File Policies and Malware Detection

In addition to the items described below, follow the steps in How to Configure Malware Protection and referenced topics.

File Rule Best Practices

Note the following guidelines and limitations when configuring file rules:

  • A rule configured to block files in a passive deployment does not block matching files. Because the connection continues to transmit the file, if you configure the rule to log the beginning of the connection, you may see multiple events logged for this connection.

  • A policy can include multiple rules. When you create the rules, ensure that no rule is "shadowed" by a previous rule.

  • The file types supported for dynamic analysis are a subset of the file types supported for other types of analysis. To view the file types supported for each type of analysis, navigate to the file rule configuration page, select the Block Malware action, and select the checkboxes of interest.

    To ensure that the system examines all file types, create separate rules (within the same policy) for dynamic analysis and for other types of analysis.

  • If a file rule is configured with a Malware Cloud Lookup or Block Malware action and the management center cannot establish connectivity with the AMP cloud, the system cannot perform any configured rule action options until connectivity is restored.

  • Cisco recommends that you enable Reset Connection for the Block Files and Block Malware actions to prevent blocked application sessions from remaining open until the TCP connection resets. If you do not reset connections, the client session will remain open until the TCP connection resets itself.

  • If you are monitoring high volumes of traffic, do not store all captured files, or submit all captured files for dynamic analysis. Doing so can negatively impact system performance.

  • You cannot perform malware analysis on all file types detected by the system. After you select values from the Application Protocol, Direction of Transfer, and Action drop-down lists, the system constrains the list of file types.

File Detection Best Practices

Consider the following notes and limitations for file detection:

  • If adaptive profiling is not enabled, access control rules cannot perform file control, including AMP.

  • If a file matches a rule with an application protocol condition, file event generation occurs after the system successfully identifies a file’s application protocol. Unidentified files do not generate file events.

  • FTP transfers commands and data over different channels. In a passive or inline tap mode deployment, the traffic from an FTP data session and its control session may not be load-balanced to the same internal resource.

  • If the total number of bytes for all file names for files in a POP3, POP, SMTP, or IMAP session exceeds 1024, file events from the session may not reflect the correct file names for files that were detected after the file name buffer filled.

  • When transmitting text-based files over SMTP, some mail clients convert newlines to the CRLF newline character standard. Since Mac-based hosts use the carriage return (CR) character and Unix/Linux-based hosts use the line feed (LF) character, newline conversion by the mail client can modify the size of the file. Note that some mail clients default to newline conversion when processing an unrecognizable file type.

  • To detect ISO files, set the "Limit the number of bytes inspected when doing file type detection" option to a value greater than 36870, as described in File and Malware Inspection Performance and Storage Options.

  • .Exe files inside some .rar archives cannot be detected, including possibly rar5.

  • If the file disposition is Neutral, it is an unknown disposition.

File Blocking Best Practices

Consider the following notes and limitations for file blocking:

  • If an end-of-file marker is not detected for a file, regardless of transfer protocol, the file will not be blocked by a Block Malware rule or the custom detection list. The system waits to block the file until the entire file has been received, as indicated by the end-of-file marker, and blocks the file after the marker is detected.

  • If the end-of-file marker for an FTP file transfer is transmitted separately from the final data segment, the marker will be blocked and the FTP client will indicate that the file transfer failed, but the file will actually completely transfer to disk.

  • File rules with Block Files and Block Malware actions block automatic resumption of file download via HTTP by blocking new sessions with the same file, URL, server, and client application detected for 24 hours after the initial file transfer attempt occurs.

  • In rare cases, if traffic from an HTTP upload session is out of order, the system cannot reassemble the traffic correctly and therefore will not block it or generate a file event.

  • If you transfer a file over NetBIOS-ssn (such as an SMB file transfer) that is blocked with a Block Files rule, you may see a file on the destination host. However, the file is unusable because it is blocked after the download starts, resulting in an incomplete file transfer.

  • If you create file rules to detect or block files transferred over NetBIOS-ssn (such as an SMB file transfer), the system does not inspect the ongoing file transfers. However, the system inspects the new files that are transferred after you deploy an access control policy invoking the file policy.

  • SMB has a functionality called multi-channel which creates multiple parallel sessions with the same IP address and different ports. For a given transaction over multi-channel, the file download is multiplexed across these sessions which is not inspected by the system as a single file.

  • Files transferred concurrently in a single TCP or SMB session are not inspected.

  • In a cluster environment, if an existing SMB session is moved to a new device due to a cluster role change or a device failure, then the files in any ongoing file transfers may not be inspected.

  • Some SMB file transfers between Microsoft Windows systems use very high TCP window size for quick file transfers. To detect or block such file transfers, it is recommended that you increase the value of Maximum Queued Bytes and Maximum Queued Segments under Network Analysis Policy > TCP Stream Configuration > Troubleshooting Options.

  • If you configure threat defense high availability, and failover occurs while the original active device is identifying the file, the file type is not synced. Even if your file policy blocks that file type, the new active device downloads the file.

File Policy Best Practices

Note the following general guidelines and limitations when configuring file policies.

  • You can associate a single file policy with an access control rule whose action is Allow, Interactive Block, or Interactive Block with reset.

  • You cannot use a file policy to inspect traffic handled by the access control default action.

  • For a new policy, the web interface indicates that the policy is not in use. If you are editing an in-use file policy, the web interface tells you how many access control policies use the file policy. In either case, you can click the text to jump to the Access Control Policies page.

  • For file blocking to work, the NAP policy you apply to the access control policy must be operating in Protection mode, also known as Inline mode.

  • Based on your configuration, you can either inspect a file the first time the system detects it, and wait for a cloud lookup result, or pass the file on this first detection without waiting for the cloud lookup result.

  • By default, file inspection of encrypted payloads is disabled. This helps reduce false positives and improve performance when an encrypted connection matches an access control rule that has file inspection configured.


    Attention


    The File Inpsect preprocessor with the following generator IDs (GIDs) are enabled by default for file/malware policy: GID: 146 and GID: 147.


  • If you enable an access control policy with a file policy that uses either a Malware action or a Store Files option, the computing power and system performance of the device is reduced.

How to Configure Malware Protection

This topic summarizes the steps you must take to set up your system to protect your network from malicious software.

Procedure


Step 1

Plan and Prepare for Malware Protection

Step 2

Configure File Policies

Step 3

Add File Policies to Your Access Control Configuration

Step 4

Configure network discovery policies to associate file and malware events with hosts on your network.

(Do not simply turn on network discovery; you must configure it to discover hosts on your network to build a network map of your organization.)

See Network Discovery Policies and subtopics.

Step 5

Deploy policies to managed devices.

See Deploy Configuration Changes.

Step 6

Test your system to be sure it is processing malicious files as you expect it to.

Step 7

Set Up Maintenance and Monitoring of Malware Protection


What to do next

Plan and Prepare for Malware Protection

This procedure is the first set of steps in the complete process for configuring your system to provide malware protection.

Procedure


Step 1

Purchase and install licenses.

See License Requirements for File and Malware Policies and Licenses in the Cisco Secure Firewall Management Center Administration Guide.

Step 2

Understand how file policies and malware protection fit into your access control plan.

See the chapter Access Control Overview.

Step 3

Understand the file analysis and malware protection tools.

See File Rule Actions and subtopics.

Consider also Advanced and Archive File Inspection Options.

Step 4

Determine whether you will use public clouds or private (on-premises) clouds for malware protection (file analysis and dynamic analysis.)

See Cloud Connections for Malware Protection and subtopics.

Step 5

If you will use private (on-premises) clouds for malware protection: Purchase, deploy, and test those products.

For information, contact your Cisco sales representative or authorized reseller.

Step 6

Configure your firewall to allow communications with your chosen clouds.

See Security, Internet Access, and Communication Ports in the Cisco Secure Firewall Management Center Administration Guide.

Step 7

Configure connections between Firepower and the malware protection clouds (public or private, as applicable).


What to do next

Continue with the next step in the malware protection workflow:

See How to Configure Malware Protection.

Configure File Policies

Before you begin

Complete the tasks up to this point in the malware protection workflow:

See How to Configure Malware Protection.

Procedure


Step 1

Review file policy and file rule restrictions.

See Best Practices for File Policies and Malware Detection and subtopics.

Step 2

Create a file policy.

See Create or Edit a File Policy.

Step 3

Create rules within your file policy.

See File Rules and subtopics.

Step 4

Configure advanced options.

See Advanced and Archive File Inspection Options.


What to do next

Continue with the next step in the malware protection workflow:

See How to Configure Malware Protection.

Add File Policies to Your Access Control Configuration

An access control policy can have multiple access control rules associated with file policies. You can configure file inspection for any Allow or Interactive Block access control rule, which permits you to match different file and malware inspection profiles against different types of traffic on your network before it reaches its final destination.

Before you begin

Complete the tasks up to this point in the malware protection workflow:

See How to Configure Malware Protection.

Procedure


Step 1

Review guidelines for file policies in access control policies. (These are different from the file rule and file policy guidelines that you looked at previously.)

Review File and Intrusion Inspection Order.

Step 2

Associate the file policy with an access control policy.

See Configuring an Access Control Rule to Perform Malware Protection

Step 3

Assign the access control policy to managed devices.

See Setting Target Devices for an Access Control Policy.


What to do next

Continue with the next step in the malware protection workflow:

See How to Configure Malware Protection.

Configuring an Access Control Rule to Perform Malware Protection


Caution


Enabling or disabling Store files in a Detect Files or Block Files rule, or adding the first or removing the last file rule that combines the Malware Cloud Lookup or Block Malware file rule action with an analysis option (Spero Analysis or MSEXE, Dynamic Analysis, or Local Malware Analysis) or a store files option (Malware, Unknown, Clean, or Custom), restarts the Snort process when you deploy configuration changes, temporarily interrupting traffic inspection. Whether traffic drops during this interruption or passes without further inspection depends on how the target device handles traffic. See Snort Restart Traffic Behavior for more information.



Note


Inline normalization is enabled automatically when a file policy is included in an access control rule. For more information, see The Inline Normalization Preprocessor.


Before you begin
  • Adaptive profiling must be enabled (its default state) as described in Configuring Adaptive Profiles for access control rules to perform file control, including AMP.

  • You must be an Admin, Access Admin, or Network Admin user to perform this task.

Procedure

Step 1

In the access control rule editor (from Policies > Access Control), choose an Action of Allow, Interactive Block, or Interactive Block with reset.

Step 2

Choose a File Policy to inspect traffic that matches the access control rule, or choose None to disable file inspection for matching traffic.

Step 3

(Optional) Disable logging of file or malware events for matching connections by clicking Logging and unchecking Log Files.

Note

 

Cisco recommends that you leave file and malware event logging enabled.

Step 4

Save the rule.

Step 5

Click Save to save the policy.


What to do next
  • Deploy configuration changes.

Set Up Maintenance and Monitoring of Malware Protection

Ongoing maintenance is essential for protecting your network.

Before you begin

Configure your system to protect your network from malware.

See How to Configure Malware Protection and referenced procedures.

Procedure


Step 1

Ensure that your system always has the most current and effective protection.

See Maintain Your System: Update File Types Eligible for Dynamic Analysis.

Step 2

Configure alerts for malware-related events and health monitoring.

See the Cisco Secure Firewall Management Center Administration Guide for information on Configuring malware defense Alerting and for information about the following modules:

  • Local Malware Analysis

  • Security Intelligence

  • Threat Data Updates on Devices

  • Intrusion and File Event Rate

  • AMP for Firepower Status

  • AMP for Endpoints Status


What to do next

Review "What to do next items" in the malware protection workflow:

See How to Configure Malware Protection.

Cloud Connections for Malware Protection

Connections to public or private clouds are required in order to protect your network from malware.

AMP Clouds

The Advanced Malware Protection (AMP) cloud is a Cisco-hosted server that uses big data analytics and continuous analysis to provide intelligence that the system uses to detect and block malware on your network.

The AMP cloud provides dispositions for possible malware detected in network traffic by managed devices, as well as data updates for local malware analysis and file pre-classification.

If your organization has deployed AMP for Endpoints and configured Firepower to import its data, the system imports this data from the AMP cloud, including scan records, malware detections, quarantines, and indications of compromise (IOC).

Cisco offers the following options for obtaining data from the Cisco cloud about known malware threats:

  • AMP public cloud

    Your Secure Firewall Management Center communicates directly with the public Cisco cloud. There are three public AMP clouds, in the United States, Europe, and Asia.

Dynamic Analysis Cloud

  • Secure Malware Analytics Cloud

    Public cloud that processes eligible files that you send for dynamic analysis, and provides threat scores and dynamic analysis reports. Firepower supports 200 samples/day for Secure Malware Analytics analysis.

AMP Cloud Connection Configurations

Requirements and Best Practices for AMP Cloud Connections

Requirements for AMP Cloud Connections

You must be an Admin user to set up the AMP cloud.

To ensure your management center can communicate with the AMP cloud, see the topics under Security, Internet Access, and Communication Ports in the Cisco Secure Firewall Management Center Administration Guide.

To use the legacy port for AMP communications, see Communication Port Requirements in the Cisco Secure Firewall Management Center Administration Guide .

AMP and High Availability

Although they share file policies and related configurations, management centers in a high availability pair share neither cloud connections nor captured files, file events, and malware events. To ensure continuity of operations, and to ensure that detected files’ malware dispositions are the same on both management centers, both Active and Standby management centers must have access to the cloud.

In high availability deployments, configure AMP cloud connections on both management centers. These configurations are not synchronized.

Change AMP Options

Procedure

Step 1

Choose Integration > Other Integrations.

Step 2

Click Cloud Services.

Step 3

Select options:

Table 1. AMP for Networks Options

Option

Description

Enable Automatic Local Malware Detection Updates

The local malware detection engine statically analyzes and preclassifies files using signatures provided by Cisco. If you enable this option, the Secure Firewall Management Center checks for signature updates once every 30 minutes.

Share URI from Malware Events with Cisco

The system can send information about the files detected in network traffic to the AMP cloud. This information includes URI information associated with detected files and their SHA-256 hash values. Although sharing is opt-in, transmitting this information to Cisco helps future efforts to identify and track malware.

Step 4

Click Save.


Dynamic Analysis Connections

Requirements for Dynamic Analysis

You must be an Admin, Access Admin, or Network Admin user, and be in the global domain, to use dynamic analysis.

With the appropriate license, the system automatically has access to the Secure Malware Analytics Cloud.

Dynamic analysis requires that managed devices have direct or proxied access to the Secure Malware Analytics Cloud or an on-premises Secure Malware Analytics Appliance on port 443.

See also Which Files Are Eligible for Dynamic Analysis?.

Viewing the Default Dynamic Analysis Connection

By default, the Secure Firewall Management Center can connect to the public Secure Malware Analytics Cloud for file submission and report retrieval. You can neither configure nor delete this connection.

Procedure

Step 1

Choose Integration > AMP > Dynamic Analysis Connections.

Step 2

You can view the cloud in use on the default dynamic analysis connection. To associate the device, click Associate (associate icon). For more information, see Enabling Access to Dynamic Analysis Results in the Public Cloud.


Enabling Access to Dynamic Analysis Results in the Public Cloud

Secure Malware Analytics offers more detailed reporting on analyzed files than is available in the management center. If your organization has a Secure Malware Analytics Cloud account, you can access the Secure Malware Analytics portal directly to view additional details about files sent for analysis from your managed devices. However, for privacy reasons, file analysis details are available only to the organization that submitted the files. Therefore, before you can view this information, you must associate your management center with the files submitted by its managed devices.

Before you begin

You must have a Secure Malware Analytics Cloud account, and have your account credentials ready.

Procedure

Step 1

Select Integration > AMP > Dynamic Analysis Connections.

Step 2

Click Associate (associate icon) in the table row corresponding to the Secure Malware Analytics Cloud.

A Secure Malware Analytics portal window opens.

Step 3

Sign in to the Secure Malware Analytics Cloud.

Step 4

Click Submit Query.

Note

 

Do not change the default value in the Devices field.

If you have difficulties with this process, contact your Secure Malware Analytics representative at Cisco TAC.

It may take up to 24 hours for this change to take effect.


What to do next

After the association is activated, see Viewing Dynamic Analysis Results in the Cisco Cloud in the Cisco Secure Firewall Management Center Administration Guide.

Maintain Your System: Update File Types Eligible for Dynamic Analysis

The list of file types eligible for Dynamic Analysis is determined by the vulnerability database (VDB), which is updated periodically (but no more than once per day.) If you are an Admin user, you can update file types eligible for dynamic analysis.

To ensure that your system has the current list:

Procedure

Step 1

Do one of the following:

Step 2

If your file policies specify individual file types instead of the Dynamic Analysis Capable file type category, update your file policies to use the newly supported file types.

Step 3

If the list of eligible file types changes, deploy to managed devices.


File Policies and File Rules

Create or Edit a File Policy

Before you begin

If you are configuring policies for malware protection, see all required procedures in Configure File Policies.

Procedure


Step 1

Select Policies > Access Control > Malware & File .

Step 2

Create a new policy, or edit an existing policy.

If you are editing an existing policy: If View (View button) appears instead, the configuration belongs to an ancestor domain, or you do not have permission to modify the configuration.

Tip

 

To make a copy of an existing file policy, click Copy (copy icon), then type a unique name for the new policy in the dialog box that appears. You can then modify the copy.

Step 3

Add one or more rules to the file policy as described in Creating File Rules.

Step 4

Optionally, select Advanced and configure advanced options as described in Advanced and Archive File Inspection Options.

Step 5

Save the file policy.


What to do next

Advanced and Archive File Inspection Options

The Advanced Settings in the file policy editor has the following general options:

  • First Time File Analysis—Select this option to analyze first-seen files while AMP cloud disposition is pending. The file must match a rule configured to perform a malware cloud lookup and Spero, local malware, or dynamic analysis. If you deselect this option, files detected for the first time are marked with an Unknown disposition

  • Enable Custom Detection List—Block files on the custom detection list.

  • Enable Clean List—If enabled, this policy will allow files that are on the clean list.

  • If AMP Cloud disposition is Unknown, override disposition based upon threat score—Select an option:

    • If you select Disabled, the system will not override the disposition provided by the AMP Cloud.

    • If you set a threshold threat score, files with an AMP cloud verdict of Unknown are considered malware if their Dynamic Analysis score is equal to or worse than the threshold.

    • If you select a lower threshold value, you increase the number of files treated as malware. Depending on the action selected in your file policy, this can result in an increase of blocked files.

The Advanced Settings in the file policy editor has the following archive file inspection options:

  • Inspect Archives—Enables inspection of the contents of archive files, for archive files as large as the Maximum file size to store advanced access control setting.

  • Block Encrypted Archives—Blocks password-protected archives.

  • Block Uninspectable Archives—Blocks archive files with contents that the system is unable to inspect for reasons other than encryption. This usually applies to corrupted files, or those that exceed your specified maximum archive depth.

  • Max Archive Depth—Blocks nested archive files that exceed the specified depth. The top-level archive file is not considered in this count; depth begins at 1 with the first nested file .

Archive Files

Archive files are files that contain other files, such as .zip or .rar files.

If any individual file in an archive matches a file rule with a block action, the system blocks the entire archive, not just the individual file.

For details about options for archive file inspection, see Advanced and Archive File Inspection Options.

Archive Files That Can Be Inspected
  • File types

    A complete list of inspectable archive file types appears in the management center web interface on the file rule configuration page. To view that page, see Creating File Rules.

    Contained files that can be inspected appears in the same page.

  • File size

    You can inspect archive files as large as the Maximum file size to store file policy advanced access control setting.

  • Nested archives

    Archive files can contain other archive files, which can in turn contain archive files. The level at which a file is nested is its archive file depth. Note that the top-level archive file is not included in the depth count; depth begins at 1 with the first nested file.

    The system can inspect up to three levels of nested files beneath the outermost archive file (level 0). You can configure your file policy to block archive files that exceed that depth (or a lower maximum depth that you specify).

    If you choose not to block files that exceed the maximum archive file depth of 3, when archive files that contain some extractable contents and some contents nested at a depth of 3 or greater appear in monitored traffic, the system examines and reports data only for the files it was able to inspect.

    All features applicable to uncompressed files (such as dynamic analysis and file storage) are available for nested files inside archive files.

  • Encrypted files

    You can configure the system to block archives whose contents are encrypted or otherwise cannot be inspected.

  • Archives that are not inspected

    If traffic that contains an archive file is on a Security Intelligence Block list or Do Not Block list, or if the top-level archive file’s SHA-256 value is on the custom detection list, the system does not inspect the contents of the archive file.

    If a nested file is blocked, the entire archive is blocked; however, if a nested file is allowed, the archive is not automatically passed (depending on any other nested files and characteristics).

    .Exe files inside some .rar archives cannot be detected, including possibly rar5.

Archive File Dispositions

Archive file dispositions are based on the dispositions assigned to the files inside the archive. All archives that contain identified malware files receive a disposition of Malware. Archives without identified malware files receive a disposition of Unknown if they contain any unknown files, and a disposition of Clean if they contain only clean files.

Table 2. Archive File Disposition by Contents

Archive File Disposition

Number of Unknown Files

Number of Clean Files

Number of Malware Files

Unknown

1 or more

Any

0

Clean

0

1 or more

0

Malware

Any

Any

1 or more

Archive files, like other files, may have dispositions of Custom Detection or Unavailable if the conditions for those dispositions apply.

Viewing Archive Contents and Details

If your file policy is configured to inspect archive file contents, you can use the context menu in a table on pages under the Analysis > Files menu, and the network file trajectory viewer to view information about the files inside an archive when the archive file appears in a file event, malware event, or as a captured file.

All file contents of the archive are listed in table form, with a short summary of their relevant information: name, SHA-256 hash value, type, category, and archive depth. A network file trajectory icon appears by each file, which you can click to view further information about that specific file.

Override File Disposition Using Custom Lists

If a file has a disposition in the AMP cloud that you know to be incorrect, you can add the file’s SHA-256 value to a file list that overrides the disposition from the cloud:

  • To treat a file as if the AMP cloud assigned a clean disposition, add the file to the clean list.

  • To treat a file as if the AMP cloud assigned a malware disposition, add the file to the custom detection list.

On subsequent detection, the device either allows or blocks the file without reevaluating the file's disposition. You can use the clean list or custom detection list per file policy.


Note


To calculate a file's SHA-256 value, you must configure a rule in the file policy to either perform a malware cloud lookup or block malware on matching files.

For complete information about using file lists in Firepower, see File List.

Alternatively, if applicable, use Centralized File Lists from AMP for Endpoints.

Centralized File Lists from AMP for Endpoints

If your organization has deployed AMP for Endpoints, Firepower can use Block and Allow lists created in AMP for Endpoints when it queries the AMP cloud for file dispositions.

Requirements:

  • Your organization must be using the AMP public cloud.

  • Your organization has deployed AMP for Endpoints.

  • You have registered your system to AMP for Endpoints using the procedure in Integrate Firepower and Secure Endpoint.

To create and deploy these lists, see the documentation or online help for AMP for Endpoints.


Note


File lists created in Firepower override file lists created in AMP for Endpoints.


Managing File Policies

The File Policies page displays a list of existing file policies along with their last-modified dates. You can use this page to manage your file policies.


Note


The system checks for updates to the list of file types eligible for dynamic analysis (no more than once a day). If the list of eligible file types changes, this constitutes a change in the file policy; any access control policy using the file policy is marked out-of-date if deployed to any devices. You must deploy policies before the updated file policy can take effect on the device. See Maintain Your System: Update File Types Eligible for Dynamic Analysis.


Procedure


Step 1

Select Policies > Access Control > Malware & File .

Step 2

Manage your file policies:

  • Compare—Click Compare Policies; see Comparing policies.

  • Create — To create a file policy, click New File Policy and proceed as described in Create or Edit a File Policy.

  • Copy — To copy a file policy, click Copy (copy icon).

    If View (View button) appears instead, the configuration belongs to an ancestor domain, or you do not have permission to modify the configuration.

  • Delete — If you want to delete a file policy, click Delete (delete icon), then click Yes and OK as prompted.

    If the controls are dimmed, the configuration belongs to an ancestor domain, or you do not have permission to modify the configuration.

  • Deploy—Choose Deploy > Deployment; see Deploy Configuration Changes.

  • Edit — If you want to modify an existing file policy, click Edit (edit icon).

  • Report—Click Report (Report icon); see Generate Current Policy Reports.


File Rules

A file policy, like its parent access control policy, contains rules that determine how the system handles files that match the conditions of each rule. You can configure separate file rules to take different actions for different file types, application protocols, or directions of transfer.

For example, when a file matches a rule, the rule can:

  • allow or block files based on simple file type matching

  • block files based on disposition (whether or not evaluation indicates that it is malicious)

  • store files to the device (For information, see Captured Files and File Storage)

  • submit stored (captured) files for local malware, Spero, or dynamic analysis

In addition, the file policy can:

  • automatically treat a file as if it is clean or malware based on entries in the clean list or custom detection list

  • treat a file as if it is malware if the file’s threat score exceeds a configurable threshold

  • inspect the contents of archive files (such as .zip or .rar)

  • block archive files whose contents are encrypted, nested beyond a specified maximum archive depth, or otherwise uninspectable

File Rule Components

Table 3. File Rule Components

File Rule Component

Description

application protocol

The system can detect and inspect files transmitted via FTP, HTTP, SMTP, IMAP, POP3, and NetBIOS-ssn (SMB). Any, the default, detects files in HTTP, SMTP, IMAP, POP3, FTP, and NetBIOS-ssn (SMB) traffic. To improve performance, you can restrict file detection to only one of those application protocols on a per-file rule basis.

direction of transfer

You can inspect incoming FTP, HTTP, IMAP, POP3, and NetBIOS-ssn (SMB) traffic for downloaded files; you can inspect outgoing FTP, HTTP, SMTP, and NetBIOS-ssn (SMB) traffic for uploaded files.

Tip

 

Use Any to detect files over multiple application protocols, regardless of whether users are sending or receiving.

file categories and types

The system can detect various types of files. These file types are grouped into basic categories, including multimedia (swf, mp3), executables (exe, torrent), and PDFs. You can configure file rules that detect individual file types, or on entire categories of file types.

For example, you could block all multimedia files, or just ShockWave Flash (swf) files. Or, you could configure the system to alert you when a user downloads a BitTorrent (torrent) file.

Note that executables include file types that can run macros and scripts, since these can contain malware.

For a list of file types the system can inspect, select Policies > Access Control > Malware & File, create a temporary new file policy, then click Add Rule. Select a file type category and the file types that the system can inspect appear in the File Types list.

Note

 

Frequently triggered file rules can affect system performance. For example, detecting multimedia files in HTTP traffic (YouTube, for example, transmits significant Flash content) could generate an overwhelming number of events.

file rule action

A file rule’s action determines how the system handles traffic that matches the conditions of the rule.

Depending on the selected action, you can configure whether the system stores the file or performs Spero, local malware, or dynamic analysis on a file. If you select a Block action, you can also configure whether the system also resets the blocked connection.

For descriptions of these actions and options, see File Rule Actions.

File rules are evaluated in rule-action, not numerical, order. For details, see File Rule Actions: Evaluation Order.

File Rule Actions

File rules give you granular control over which file types you want to log, block, or scan for malware. Each file rule has an associated action that determines how the system handles traffic that matches the conditions of the rule. To be effective, a file policy must contain one or more rules. You can use separate rules within a file policy to take different actions for different file types, application protocols, or directions of transfer.

File Rule Actions
  • Detect Files rules allow you to log the detection of specific file types to the database, while still allowing their transmission.

  • Block Files rules allow you to block specific file types. You can configure options to reset the connection when a file transfer is blocked, and store captured files to the managed device.

  • Malware Cloud Lookup rules allow you to obtain and log the disposition of files traversing your network, while still allowing their transmission.

  • Block Malware rules allow you to calculate the SHA-256 hash value of specific file types, query the AMP cloud to determine if files traversing your network contain malware, then block files that represent threats.

File Rule Action Options

Depending on the action you select, you have different options:

File Rule Action Option

Block Files capable?

Block Malware capable?

Detect Files capable?

Malware Cloud Lookup capable?

Spero Analysis* for MSEXE

no

yes, you can submit executable files

no

yes, you can submit executable files

Dynamic Analysis*

no

yes, you can submit executable files with Unknown file dispositions

no

yes, you can submit executable files with Unknown file dispositions

Capacity Handling

no

yes

no

yes

Local Malware Analysis*

no

yes

no

yes

Reset Connection

yes (recommended)

yes (recommended)

no

no

Store files

yes, you can store all matching file types

yes, you can store file types matching the file dispositions you select

yes, you can store all matching file types

yes, you can store file types matching the file dispositions you select

* For complete information about these options, see Malware Protection Options (in File Rule Actions) and its subtopics.


Caution


Enabling or disabling Store files in a Detect Files or Block Files rule, or adding the first or removing the last file rule that combines the Malware Cloud Lookup or Block Malware file rule action with an analysis option (Spero Analysis or MSEXE, Dynamic Analysis, or Local Malware Analysis) or a store files option (Malware, Unknown, Clean, or Custom), restarts the Snort process when you deploy configuration changes, temporarily interrupting traffic inspection. Whether traffic drops during this interruption or passes without further inspection depends on how the target device handles traffic. See Snort Restart Traffic Behavior for more information.


Malware Protection Options (in File Rule Actions)

The system applies several methods of file inspection and analysis to determine whether a file contains malware.

Depending on the options you enable in a file rule, the system inspects files using the following tools, in order:

  1. Spero Analysis and AMP Cloud Lookup

  2. Local Malware Analysis

  3. Dynamic Analysis

For a comparison of these tools, see Comparison of Malware Protection Options.

(You can also, if you choose, block all files based on their file type. For more information, see Block All Files by Type.)

See also information about Cisco's AMP for Endpoints product at (Optional) Malware Protection with AMP for Endpoints and subtopics.

Comparison of Malware Protection Options

The following table details the benefits and drawbacks of each type of file analysis, as well as the way each malware protection method determines a file's disposition.

Analysis Type

Benefit

Limitations

Malware Identification

Spero analysis

Structural analysis of executable files, submits Spero signature to the AMP Cloud for analysis

Less thorough than local malware analysis or dynamic analysis, only for executable files

Disposition changes from Unknown to Malware only on positive identification of malware.

Local malware analysis

Consumes fewer resources than dynamic analysis, and returns results more quickly, especially if the detected malware is common

Less thorough results than dynamic analysis

Disposition changes from Unknown to Malware only on positive identification of malware.

Dynamic analysis

Thorough analysis of unknown files using Secure Malware Analytics

Eligible files are uploaded to the public cloud or an on-premises appliance. It takes some time to complete analysis

Threat score determines maliciousness of a file. Disposition can be based on the threat score threshold configured in the file policy.

Spero analysis and local malware analysis

Consumes fewer resources than configuring local malware analysis and dynamic analysis, while still using AMP cloud resources to identify malware

Less thorough than dynamic analysis, Spero analysis only for executable files

Disposition changes from Unknown to Malware only on positive identification of malware.

Spero analysis and dynamic analysis

Uses full capabilities of AMP cloud in submitting files and Spero signatures

Results obtained less quickly than if using local malware analysis

Threat score changes based on dynamic analysis results for files preclassified as possible malware. Disposition changes based on configured threat score threshold in the file policy, and from Unknown to Malware if the Spero analysis identifies malware.

Local malware analysis and dynamic analysis

Thorough results in using both types of file analysis

Consumes more resources than either alone

Threat score changes based on dynamic analysis results for files preclassified as possible malware. Disposition changes from Unknown to Malware if local malware analysis identifies malware, or based on configured threat score threshold in the file policy.

Spero analysis, local malware analysis and dynamic analysis

Most thorough results

Consumes most resources in running all three types of file analysis

Threat score changes based on dynamic analysis results for files preclassified as possible malware. Disposition changes from Unknown to Malware if Spero analysis or local malware analysis identifies malware, or based on configured threat score threshold in the file policy.

(Block transmission of all files of a specified file type)

Does not require a Malware Defense license

(This option is not technically a malware protection option.)

Legitimate files will also be blocked

(No analysis is performed.)


Note


Preclassification does not itself determine a file's disposition; it is merely one of the factors that determine whether a file is eligible for Dynamic Analysis.


Spero Analysis

Spero analysis examines structural characteristics such as metadata and header information in executable files. After generating a Spero signature based on this information, if the file is an eligible executable file, the device submits it to the Spero heuristic engine in the AMP cloud. Based on the Spero signature, the Spero engine determines whether the file is malware. You can also configure rules to submit files for Spero analysis without also submitting them to the AMP cloud.

Note that you cannot manually submit files for Spero analysis.

AMP Cloud Lookup

For files that are eligible for assessment using Advanced Malware Protection, the management center performs a malware cloud lookup, querying the AMP cloud for the file's disposition based on its SHA-256 hash value.

To improve performance, the system caches dispositions returned by the cloud and uses the cached disposition for known files rather than querying the AMP cloud. For more information about this cache, see Cached Disposition Longevity.

Local Malware Analysis

Local malware analysis allows a managed device to locally inspect executables, PDFs, office documents, and other types of files for the most common types of malware, using a detection rule set provided by the Talos Intelligence Group. Because local analysis does not query the AMP cloud, and does not run the file, local malware analysis saves time and system resources.

If the system identifies malware through local malware analysis, it updates the existing file disposition from Unknown to Malware. The system then generates a new malware event. If the system does not identify malware, it does not update the file disposition from Unknown to Clean. After the system runs local malware analysis, it caches file information such as SHA-256 hash value, timestamp, and disposition, so that if detected again within a certain period of time, the system can identify malware without additional analysis. For more information about the cache, see Cached Disposition Longevity.

Local malware analysis does not require establishing communications with the Secure Malware Analytics Cloud. However, you must configure communications with the cloud to submit files for dynamic analysis, and to download updates to the local malware analysis ruleset.

Cached Disposition Longevity

Dispositions returned from an AMP cloud query, associated threat scores, and dispositions assigned by local malware analysis, have a time-to-live (TTL) value. After a disposition has been held for the duration specified in the TTL value without update, the system purges the cached information. Dispositions and associated threat scores have the following TTL values:

  • Clean — 4 hours

  • Unknown — 1 hour

  • Malware — 1 hour

If a query against the cache identifies a cached disposition that timed out, the system re-queries the local malware analysis database and the AMP cloud for a new disposition.

Dynamic Analysis

You can configure your file policy to automatically submit files for dynamic analysis using Secure Malware Analytics (formerly Threat Grid), Cisco’s file analysis and threat intelligence platform.

Devices submit eligible files to Secure Malware Analytics (either the public cloud or to an on-premises appliance, whichever you have specified) regardless of whether the device stores the file.

Secure Malware Analytics runs the file in a sandbox environment, analyzes the file's behavior to determine whether the file is malicious, and returns a threat score that indicates the likelihood that a file contains malware. From the threat score, you can view a dynamic analysis summary report with the reasons for the assigned threat score. You can also look in Secure Malware Analytics to view detailed reports for files that your organization submitted, as well as scrubbed reports with limited data for files that your organization did not submit.

For more information about Cisco Secure Malware Analytics, see https://www.cisco.com/c/en/us/products/security/threat-grid/index.html

To configure your system to perform dynamic analysis, see the topics under Dynamic Analysis Connections.

Which Files Are Eligible for Dynamic Analysis?

A file's eligibility for dynamic analysis depends on:

  • the file type

  • the file size

  • the file rule's action

Additionally:

  • The system submits only files that match the file rules you configure.

  • The file must have a malware cloud lookup disposition of Unknown or Unavailable at the time the file is sent for analysis.

  • The system must preclassify the file as potential malware.

Dynamic Analysis and Capacity Handling

Capacity handling allows you to temporarily store files that are otherwise eligible for dynamic analysis if the system is temporarily unable to submit files to the cloud, either because the device cannot communicate with the cloud or because the maximum number of submissions has been reached. The system submits the stored files when the hindering condition has passed.

Some devices can store files on the device hard drive or in a malware storage pack. See also Malware Storage Pack.

Captured Files and File Storage

The file storage feature allows you to capture selected files detected in traffic, and automatically store a copy of the file temporarily to a device’s hard drive, or, if installed, to the malware storage pack.

After your device captures the files, you can:

  • Store captured files on the device’s hard drive for later analysis.

  • Download the stored file to a local computer for further manual analysis or archival purposes.

  • Manually submit eligible captured files for AMP cloud lookup or dynamic analysis.

Note that once a device stores a file, it will not re-capture it if the file is detected in the future and the device still has that file stored.


Note


When a file is detected for the first time on your network, you can generate a file event that represents the file’s detection. However, if your file rule performs a malware cloud lookup, the system requires additional time to query the AMP cloud and return a disposition. Due to this delay, the system cannot store this file until the second time it is seen on your network, and the system can immediately determine the file’s disposition.


Whether the system captures or stores a file, you can:

  • Review information about the captured file from Analysis > Files > Captured Files, including whether the file was stored or submitted for dynamic analysis, file disposition, and threat score, allowing you to quickly review possible malware threats detected on your network.

  • View the file’s trajectory to determine how it traversed your network and which hosts have a copy.

  • Add the file to the clean list or custom detection list to always treat the file as if it had a clean or malware disposition on future detection.

You configure file rules in a file policy to capture and store files of a specific type, or with a particular file disposition, if available. After you associate the file policy with an access control policy and deploy it to your devices, matching files in traffic are captured and stored. You can also limit the minimum and maximum file sizes to store.

Stored files are not included in system backups.

You can view captured file information under Analysis > Files > Captured Files, and download a copy for offline analysis.

Malware Storage Pack

Based on your file policy configuration, your device may store a substantial amount of file data to the hard drive. You can install a malware storage pack in the device; the system stores files to the malware storage pack, allowing more room on the primary hard drive to store events and configuration files. The system periodically deletes older files. If the device's primary hard drive does not have enough available space, and does not have an installed malware storage pack, you cannot store files.


Caution


Do not attempt to install a hard drive that was not supplied by Cisco in your device. Installing an unsupported hard drive may damage the device. Malware storage pack kits are available for purchase only from Cisco. Contact Support if you require assistance with the malware storage pack.


Without a malware storage pack installed, when you configure a device to store files, it allocates a set portion of the primary hard drive’s space to captured file storage. If you configure capacity handling to temporarily store files for dynamic analysis, the system uses the same hard drive allocation to store these files until it can resubmit them to the cloud.

When you install a malware storage pack in a device and configure file storage or capacity handling, the device allocates the entire malware storage pack for storing these files. The device cannot store any other information on the malware storage pack.

When the allocated space for captured file storage fills to capacity, the system deletes the oldest stored files until the allocated space reaches a system-defined threshold. Based on the number of files stored, you may see a substantial drop in disk usage after the system deletes files.

If a device has already stored files when you install a malware storage pack, the next time you restart the device, any captured files or capacity handling files stored on the primary hard drive are moved to the malware storage pack. Any future files the device stores are stored to the malware storage pack.

For more information on using MSP on the Firepower devices, see the Firepower Hardware Installation Guide for your device.

Block All Files by Type

If your organization wants to block not only the transmission of malware files, but all files of a specific type, regardless of whether the files contain malware, you can do so.

File control is supported for all file types where the system can detect malware, plus many additional file types. These file types are grouped into basic categories, such as multimedia (swf, mp3), executables (exe, torrent), and PDFs.

Blocking all files based on their type is not technically a malware protection feature; it does not require a Malware Defense license and does not query the AMP cloud.

File Rule Actions: Evaluation Order

A file policy will likely contain multiple rules with different actions for different situations. If more than one rule can apply to a particular situation, the evaluation order described in this topic applies. In general, simple blocking takes precedence over malware inspection and blocking, which takes precedence over simple detection and logging.

The order of precedence of file-rule actions is:

  • Block Files

  • Block Malware

  • Malware Cloud Lookup

  • Detect Files

Creating File Rules


Caution


Enabling or disabling Store files in a Detect Files or Block Files rule, or adding the first or removing the last file rule that combines the Malware Cloud Lookup or Block Malware file rule action with an analysis option (Spero Analysis or MSEXE, Dynamic Analysis, or Local Malware Analysis) or a store files option (Malware, Unknown, Clean, or Custom), restarts the Snort process when you deploy configuration changes, temporarily interrupting traffic inspection. Whether traffic drops during this interruption or passes without further inspection depends on how the target device handles traffic. See Snort Restart Traffic Behavior for more information.


Before you begin

If you are configuring rules for malware protection, see Configure File Policies.

Procedure

Step 1

Select Policies > Access Control > Malware & File.

Step 2

Click the edit icon to modify an existing file policy.

Step 3

In the file policy editor, click Add Rule.

Step 4

Select an Application Protocol and Direction of Transfer as described in File Rule Components.

Step 5

Select one or more File Types.

The file types you see depend on the selected application protocol, direction of transfer, and action.

You can filter the list of file types in the following ways:

  • Select one or more File Type Categories, then click All types in selected Categories.

  • Search for a file type by its name or description. For example, type Windows in the Search name and description field to display a list of Microsoft Windows-specific files.

Tip

 

Hover your pointer over a file type to view its description.

Step 6

Select a file rule Action as described in File Rule Actions, with consideration for File Rule Actions: Evaluation Order.

The actions available to you depend on the licenses you have installed. See License Requirements for File and Malware Policies.

Step 7

Depending on the action you selected, configure options:

  • reset the connection after blocking the file

  • store files that match the rule

  • enable Spero analysis*

  • enable local malware analysis*

  • enable dynamic analysis* and capacity handling

* For information about these options, see File Rule Actions and Malware Protection Options (in File Rule Actions) and its subtopics.

Step 8

Click Add.

Step 9

Click Save to save the policy.


What to do next
  • If you are configuring policies for malware protection, return to Configure File Policies.

  • Deploy configuration changes.

Access Control Rule Logging for Malware Protection

When the system detects a prohibited file (including malware) according to the settings in the file policy, it automatically logs an event to the Secure Firewall Management Center database. If you do not want to log file or malware events, you can disable this logging on a per-access-control-rule basis.

The system also logs the end of the associated connection to the Secure Firewall Management Center database, regardless of the logging configuration of the invoking access control rule.

Retrospective Disposition Changes

File dispositions can change. For example, as new information is discovered, the AMP cloud can determine that a file that was previously thought to be clean is now identified as malware, or the reverse—that a malware-identified file is actually clean. When the disposition changes for a file you queried in the past week, the AMP cloud notifies the system so it can automatically take action the next time it detects that file being transmitted. A changed disposition is called a retrospective disposition.

File and Malware Inspection Performance and Storage Options

Increasing the file sizes can affect the performance of the system.

Table 4. Advanced Access Control File and malware defense Options

Field

Description

Guidelines and Restrictions

Limit the number of bytes inspected when doing file type detection

Specifies the number of bytes inspected when performing file type detection.

0 - 4294967295 (4GB)

0 removes the restriction.

The default value is the maximum segment size of a TCP packet (1460 bytes). In most cases, the system can identify common file types using the first packet.

To detect ISO files, enter a value greater than 36870.

Allow file if cloud lookup for Block Malware takes longer than (seconds)

Specifies how long the system will hold the last byte of a file that matches a Block Malware rule and that does not have a cached disposition, while malware cloud lookup occurs. If the time elapses without the system obtaining a disposition, the file passes. Dispositions of Unavailable are not cached.

0 - 30 seconds

Do not set this option to 0 without contacting Support.

Cisco recommends that you use the default value to avoid blocking traffic because of connection failures.

Do not calculate SHA-256 hash values for files larger than (in bytes)

Prevents the system from storing files larger than a certain size, performing a malware cloud lookup on the files, or blocking the files if added to the custom detection list.

0 - 4294967295 (4GB)

0 removes the restriction.

This value must be greater than or equal to Maximum file size to store (bytes) and Maximum file size for dynamic analysis testing (bytes).

Minimum file size for advanced file inspection and storage (bytes)

These settings specify:

  • The file size that the system can inspect using the following detectors:

    • Spero analysis

    • Sandboxing and preclassification

    • Local malware analysis/ClamAV

    • Archive inspection

  • The file size that the system can store using a file rule.

0 - 10485760 (10MB)

0 disables file storage.

Must be less than or equal to Maximum file size to store (bytes) and Do not calculate SHA-256 hash values for files larger than (in bytes).

Maximum file size for advanced file inspection and storage (bytes)

0 - 10485760 (10MB)

0 disables file storage.

Must be greater than or equal to Minimum file size to store (bytes), and less than or equal to Do not calculate SHA-256 hash values for files larger than (in bytes).

Minimum file size for dynamic analysis testing (bytes)

Specifies the minimum file size the system can submit to the AMP cloud for dynamic analysis.

0 -10485760 (10MB)

Must be less than or equal to Maximum file size for dynamic analysis testing (bytes) and Do not calculate SHA-256 hash values for files larger than (in bytes).

The file size for dynamic analysis must be within the limits defined by the minimum and maximum settings for file analysis.

The system checks the AMP cloud for updates to the minimum file size you can submit (no more than once a day). If the new minimum size is larger than your current value, your current value is updated to the new minimum, and your policy is marked out-of-date.

Maximum file size for dynamic analysis testing (bytes)

Specifies the maximum file size the system can submit to the AMP cloud for dynamic analysis.

0 -10485760 (10MB)

Must be greater than or equal to Minimum file size for dynamic analysis testing (bytes), and less than or equal to Do not calculate SHA-256 hash values for files larger than (in bytes).

The file size for dynamic analysis must be within the limits defined by the minimum and maximum settings for file analysis.

The system checks the AMP cloud for updates to the maximum file size you can submit (no more than once a day). If the new maximum size is smaller than your current value, your current value is updated to the new maximum, and your policy is marked out-of-date.

Tuning File and Malware Inspection Performance and Storage

You must be an Admin, Access Admin, or Network Admin user to perform this task.

Procedure


Step 1

In the access control policy editor, click Advanced Settings.

Step 2

Click Edit (edit icon) next to Files and Malware Settings.

If View (View button) appears instead, settings are inherited from an ancestor policy, or you do not have permission to modify the settings. If the configuration is unlocked, uncheck Inherit from base policy to enable editing.

Step 3

Set any of the options described in File and Malware Inspection Performance and Storage Options.

Step 4

Click OK.

Step 5

Click Save to save the policy.


What to do next

  • Deploy configuration changes.

(Optional) Malware Protection with AMP for Endpoints

Cisco's AMP for Endpoints is a separate malware-protection product that can supplement malware protection provided by the system and be integrated with your Firepower deployment.

AMP for Endpoints is Cisco’s enterprise-class Advanced Malware Protection solution that runs as a lightweight connector on individual users' endpoints (computers and mobile devices) to discover, understand, and block advanced malware outbreaks, advanced persistent threats, and targeted attacks.

Benefits of AMP for Endpoints include:

  • configure custom malware detection policies and profiles for your entire organization, as well as perform flash and full scans on all your users’ files

  • perform malware analysis, including view heat maps, detailed file information, network file trajectory, and threat root causes

  • configure multiple aspects of outbreak control, including automatic quarantines, application blocking to stop non-quarantined executables from running, and exclusion lists

  • create custom protections, block execution of certain applications based on group policy, and create custom Allowed Applications lists

  • use the AMP for Endpoints management console to help you mitigate the effect of malware. The management console provides a robust, flexible web interface where you control all aspects of your AMP for Endpoints deployment and manage all phases of an outbreak.

For detailed information about AMP for Endpoints, see:

Comparison of Malware Protection: Firepower vs. AMP for Endpoints

Table 5. Advanced Malware Protection Differences by Detecting Product

Feature

Firepower Malware Protection (malware defense)

AMP for Endpoints

File type detection and blocking method (file control)

In network traffic, using access control and file policies

Not supported

Malware detection and blocking method

In network traffic, using access control and file policies

On individual endpoints (end-user computers and mobile devices), using a connector that communicates with the AMP cloud

Network traffic inspected

Traffic passing through a managed device

None; connectors installed on endpoints directly inspect files

Malware intelligence data source

AMP cloud (public or private)

AMP cloud (public or private)

Malware detection robustness

Limited file types

All file types

Malware analysis choices

management center-based, plus analysis in the AMP cloud

management center-based, plus additional options on the AMP for Endpoints management console

Malware mitigation

Malware blocking in network traffic, management center-initiated remediations

AMP for Endpoints-based quarantine and outbreak control options, management center-initiated remediations

Events generated

File events, captured files, malware events, and retrospective malware events

Malware events

Information in malware events

Basic malware event information, plus connection data (IP address, port, and application protocol)

In-depth malware event information; no connection data

Network file trajectory

management center-based

management center and the AMP for Endpoints management console each have a network file trajectory. Both are useful.

Required licenses or subscriptions

Licenses required to perform file control and malware defense

AMP for Endpoints subscription. No license is required to bring AMP for Endpoints data into management center.

About Integrating Firepower with AMP for Endpoints

If your organization has deployed AMP for Endpoints, you can optionally integrate that product with your Firepower deployment.

Integration with AMP for Endpoints does not require a dedicated Firepower license.

Benefits of Integrating Firepower and AMP for Endpoints

Integrating your AMP for Endpoints deployment with your system offers the following benefits:

  • Centralized Blocked Applications and Allowed Applications lists configured in AMP for Endpoints can determine verdicts for file SHAs sent from Firepower to the AMP cloud for disposition.

    See Centralized File Lists from AMP for Endpoints.

  • The system can import malware events detected by AMP for Endpoints into Secure Firewall Management Center so you can manage these events along with malware events generated by the system. Imported data for these events includes scans, malware detections, quarantines, blocked executions, and cloud recalls, as well as indications of compromise (IOCs) that management center displays for hosts that it monitors.

  • You can view file trajectory and other details in the AMP for Endpoints console.


Important


If you use a Cisco AMP Private Cloud, see limitations at AMP for Endpoints and AMP Private Cloud.


AMP for Endpoints and AMP Private Cloud

If you configure a Cisco AMP private cloud to collect AMP endpoint data on your network, all AMP for Endpoints connectors send data to the private cloud, which forwards that data to the Secure Firewall Management Center. The private cloud does not share any of your endpoint data over an external connection.

If your organization has deployed an AMP private cloud, all connections to the AMP cloud funnel through the private cloud, which acts as an anonymized proxy to ensure the security and privacy of your monitored network. This includes importing AMP for Endpoints data. The private cloud does not share any of your endpoint data over an external connection.

The following integration features are not available if you use an AMP private cloud:

  • Use of Blocked Applications and Allowed Applications lists configured in AMP for Endpoints. (These lists are used to block or allow files.)

  • Visibility in AMP for Endpoints of malware events generated from Firepower.

You can configure multiple private clouds to support the capacity you require.

Integrate Firepower and Secure Endpoint

If your organization has deployed Cisco's Secure Endpoint product, you can integrate that application with Firepower to achieve the benefits described in Benefits of Integrating Firepower and AMP for Endpoints.

When you integrate with Secure Endpoint, you must configure the Secure Endpoint connection even if you already have malware defense (AMP for Firepower) connections configured. You can configure multiple Secure Endpoint cloud connections.


Note


The Secure Endpoint connections that have not registered successfully does not affect malware defense.


Before you begin
  • You must be an Admin user to perform this task.

  • If your deployment uses Cisco AMP Private Cloud, see limitations at AMP for Endpoints and AMP Private Cloud.

  • Secure Endpoint must be set up and working properly on your network.

  • The management center must have direct access to the Internet.

  • Make sure your management center and Secure Endpoint can communicate with each other. See the topics under Security, Internet Access, and Communication Ports in the Cisco Secure Firewall Management Center Administration Guide.

  • If you are connecting to the AMP cloud after either restoring your Secure Firewall Management Center to factory defaults or reverting to a previous version, use the AMP for Endpoints management console to remove the previous connection.

  • You will need your Secure Endpoint credentials to log in to the Secure Endpoint console during this procedure.

Procedure

Step 1

Choose Integration > AMP > AMP Management.

Step 2

Click Add AMP Cloud Connection.

Step 3

From the Cloud Name drop-down list, choose the cloud you want to use:

  • The AMP cloud closest to the geographical location of your Secure Firewall Management Center.

    APJC is Asia/Pacific/Japan/China.

Step 4

If you want to use this cloud for both malware defense and Secure Endpoint, select the Use for AMP for Firepower check box.

If you configured a different cloud to handle malware defense (AMP for Firepower) communications, you can clear this check box; if this is your only AMP cloud connection, you cannot.

Step 5

Click Register.

A spinning state icon indicates that a connection is pending, for example, after you configure a connection on the Secure Firewall Management Center, but before you authorize it using the Secure Endpoint management console. A Denied (denied icon) indicates that the cloud denied the connection or the connection failed for another reason.

Step 6

Confirm that you want to continue to the Secure Endpoint management console, then log into the management console.

Step 7

Using the management console, authorize the AMP cloud to send Secure Endpoint data to management center.

Step 8

If you want to restrict the data that the management center receives, select specific groups within your organization for which you want to receive information.

By default, the AMP cloud sends data for all groups. To manage groups, choose Management > Groups on the Secure Endpoint management console. For detailed information, see the management console online help.

Step 9

Click Allow to enable the connection and start the transfer of data.

Clicking Deny returns you to the Secure Firewall Management Center, where the connection is marked as denied. If you navigate away from the Applications page on the Secure Endpoint management console, and neither deny nor allow the connection, the connection is marked as pending on the Secure Firewall Management Center’s web interface. The health monitor does not alert you of a failed connection in either of these situations. If you want to connect to the AMP cloud later, delete the failed or pending connection, then recreate it.

Incomplete registration of the Secure Endpoint connection does not disable the malware defense connection.

Step 10

To verify that the connection is correctly configured:

  1. On the Integration > AMP > AMP Management page, click the Cloud Name that includes AMP for Endpoints in the Cisco AMP Solution Type column.

  2. In the AMP for Endpoints console window that displays, choose Accounts > Applications.

  3. Verify that your management center is on the list.

  4. In the AMP for Endpoints console window, choose Manage > Computers.

  5. Verify that your management center is on the list.


What to do next
  • In the AMP for Endpoints console window, configure settings as needed. For example, define group membership for your management center and assign policies. For information, see the AMP for Endpoints online help or other documentation.

  • In high availability deployments, configure AMP cloud connections on both management centers. These configurations are not synchronized.

  • The default health policy warns you if the management center cannot connect to the AMP for Endpoints portal after an initial successful connection, or if the connection is deregistered using the AMP portal.

    Verify that the AMP for Endpoints Status monitor is enabled under System > Health > Policy.

History for Network Malware Protection and File Policies

Feature

Minimum Management Center

Minimum Threat Defense

Details

Communication with AMP cloud

7.0

Any

Legacy port 32137 is no longer supported for communicating with the AMP public or private cloud.

New/Modified screens: On the System > Integration > Cloud Services page, the Use Legacy Port 32137 for AMP for Networks option is no longer available.