AMP Endpoints Basics Lab v1.6-US
AMP Endpoints Basics Lab v1.6-US
The scenarios and lab environment utilize virtual machines within dCloud and a dedicated AMP for Endpoints account in the AMP
cloud. At the end of the training lab, your “customer” will have a fully functional AMP for Endpoints deployment. Private AMP Cloud,
AMP for networks, and integration of those products is out of scope for this lab. Android and Mac endpoints are also out of scope
for this lab although several aspects of the deployment will apply to those endpoints.
The included series of lab scenarios are designed to be completed over a two-day consecutive period. It is possible to perform all
lab activities in a single day.
© 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 325
Cisco dCloud
This AMP for Endpoints training includes the following Lab Scenarios:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 325
Cisco dCloud
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 325
Cisco dCloud
Topology
You will perform all tasks from a Windows 10 workstation named Jumphost in the dCloud environment. Throughout the
dCloud: The Cisco Demo Cloud
deployment, you will utilize Remote Desktop connections from the Jumphost machine to connect to the other Windows machines
within the lab environment. There is also a CentOS 7 server (named CentOS) in the lab environment that will have a connector
installed on it which will be also be utilized during Advanced Custom Detection (ACD) creation. You have the ability to connect to
the Jumphost system either through AnyConnect VPN, or the web based Remote Desktop connection located on your dCloud
session page. It is highly recommended that you do not connect to any machine other than the Jumphost directly.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 325
Cisco dCloud
perform the steps required to prepare your AMP for Endpoints console for use in the lab.
Note: It is critical that you perform all steps in this scenario. Failure to do so will prevent you from successfully completing the labs.
When performing the cleanup processes, if you do not see an entry you are instructed to remove, it is likely that the previous
student did not configure that component and you may move on to the next step of the cleanup process.
1. Connect to the Jumphost system within dCloud via Web Client or by using the designated VPN/RDP credentials.
2. Open the Chrome web browser by double-clicking the shortcut on the desktop of the Jumphost machine
3. Click the AMP for Endpoints Console shortcut located just beneath the URL bar at the top left of the Chrome browser.
4. If you receive the certificate error shown below, click the ADVANCED button and then select the option to Proceed to
198.18.134.139. This error is due to the way SSO authentication is setup within the dCloud lab environment.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 325
Cisco dCloud
5. You will be automatically logged in to the AMP for Endpoints console without entering a username or password.
a. If you are prompted with a security or certificate error, please continue past the error to load the console page.
6. There may be messages at the top of the AMP Console. If so, 1 by 1, click the X on each message to close it. There may
be several to clear.
7. Click the Management menu and select the Computers menu item.
a. Place a checkmark in the box next to every computer listed on the Computers page. Your entries may be
different than shown, or you may even see no entries at all.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 325
Cisco dCloud
b. Once all computers have been selected from the list, click the Delete button, and choose Delete again from the
pop-up window.
c. There should no longer be any computers listed on the Computers page. dCloud: The Cisco Demo Cloud
8. Click the Management menu and select the Groups menu item.
a. The current list of groups will display. You will now delete all groups that start with the letters ABC. Do Not delete
any other groups from the console. For every group prefixed by ABC, click the Delete button next to the group.
b. Verify that you are only deleting a group that begins with ABC, then click OK on the Delete Group window.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 325
Cisco dCloud
c. Continue deleting groups until no groups remain that start with the characters ABC.
9. Click the Management menu and select the Policies menu item.
b. For each policy that begins with the letters ABC, click the plus symbol on the policy to expand it, and then click
the Delete button in the bottom right corner.
c. On the Delete Policy window, after verifying it is an ABC policy, click the Delete button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 325
Cisco dCloud
d. Repeat this process to delete all policies that begin with the letters ABC.
10. Click on the Management menu and select the Exclusions menu item.
a. For each exclusion set on this page that starts with the letters ABC, click the plus sign (+), then click the Delete
button associated with that exclusion set, and then confirm the deletion by clicking Delete in the pop-up window..
b. Repeat this process to delete all exclusion sets that begin with the letters ABC.
11. Click the Accounts menu and select the API Credentials menu item.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 325
Cisco dCloud
a. Place a checkmark next to all entries on the API credentials page and click the Delete button.
12. You will now verify that Demo Data is not enabled. Click the Accounts menu and select the Demo Data menu option.
a. You should see the following screen asking if you would like to enable demo data. Do NOT click the Enable
Demo Data button. If you see the below screen, demo data is not enabled, and you may continue the lab steps.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 10 of 325
Cisco dCloud
b. If you see the following screen, then demo data is enable and must be disabled. Click the Disable Demo Data
button.
13. Click the Outbreak Control menu and select the CUSTOM DETECTIONS > Simple menu item.
a. Click the Delete button for any entries on this page that begin with the letters ABC.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 11 of 325
Cisco dCloud
14. Click the Outbreak Control menu and select the CUSTOM DETECTIONS > Advanced menu item.
15. Click the Outbreak Control menu and select the APPLICATION CONTROL > Blocking menu item.
a. Click the Delete button on any entries that begin with the letters ABC.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 12 of 325
Cisco dCloud
16. Click the Outbreak Control menu and select the APPLICATION CONTROL > Whitelisting menu item.
a. Click the Delete button for any entries that begin with the letters ABC.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 13 of 325
Cisco dCloud
c. After you click Delete on the whitelist, it may not immediately go away in the console due to the amount of
hashes it is processing the deletion for. Continue with the lab.
17. Click the Outbreak Control menu and select the NETWORK > IP Blacklists & Whitelists menu dCloud:
option.The Cisco Demo Cloud
a. Click the Delete button for all entries on the Network - IP Blacklists & Whitelists page.
18. Click the Outbreak Control menu and select the menu item ENDPOINT IOC > Installed Endpoint IOCs.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 14 of 325
Cisco dCloud
a. Place a checkmark next to each entry on the page(right side of the page), click the Actions menu, and select
the Delete menu item.
19. Click the Analysis menu and select the File Repository menu item.
a. Click the plus symbol to expand any entries in the file repository and click the Remove button on each entry.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 15 of 325
Cisco dCloud
21. Click the Analysis menu and select the Events menu item.
b. Click the Select a Filter drop-down menu in the top right corner of the events page and select one of the entries
on the menu.
c. If you receive the You have unsaved changes warning at any time during this scenario you may click the
Discard Changes button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 16 of 325
Cisco dCloud
g. The filter is deleted. Repeat the above process until all remaining Event Filters are removed.
h. Once all event filters are deleted your drop-down menu should appear as shown below.
22. Click the Accounts menu and select the Business menu item.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 17 of 325
Cisco dCloud
a. The Business settings page appears. Notice that there is a section for Default Product Versions
b. The setting should be set to Latest. If the Default Product Versions section looks like the screenshot below and
has the value Latest shown then you may go to the end of this scenario. If there are anydCloud:
version numbers
The Cisco Demo Cloud
i. Click the Edit button in the upper right-hand corner of the screen.
iii. Click the drop-down menu for the Default Connector Version and change the value to Latest.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 18 of 325
Cisco dCloud
iv. Click the Update button after changing the Default Connector Version.
v. Verify that the Default Product Versions section has updated to Latest. If any other product versions
besides Windows have a specific version specified, please use the above steps to change the value to
Latest.
You have completed the clean-up steps required to prepare your AMP for Endpoints console for the following lab scenarios. This
activity is for dCloud lab purposes only and would not be a part of a typical customer deployment. Please proceed with the
following scenario to get started on deploying AMP for Endpoints.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 19 of 325
Cisco dCloud
Note: In a POV, or small environment, the default exclusions, policies, and groups may be used. However, in larger environments,
where there are multiple types of machines, or if the requirement exists to manage multiple instances of workstations or servers
with unique sets of exclusions, groups, and/or policies, you will be required to create, and configure, these items manually. During
the following labs, you will go through the procedure of creating required objects for the customer without utilizing the default
objects. This method is used to best familiarize yourself with the overall process and allow for the most flexible deployment.
Note: In the labs, you will be using a prefix for every configuration item you create. This is so you can distinguish your objects from
the default items already existing within the AMP for Endpoints console. In this lab, the prefix used is “ABC,” which is derived from
our fictitious company utilized during the implementation scenarios you are performing. This is a best practice to simplify identifying
custom configuration vs. default configuration.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 20 of 325
Cisco dCloud
2. Ensure you are logged into the AMP for Endpoints Console.
3. Select the Management menu and select the Exclusions menu item.
4. The Exclusions page will now appear. Click on the + New Exclusion Set button.
Note: You will be creating exclusion sets that can be attached to multiple policies.
5. Click the Select Product dropdown menu and select Windows from the OS choices.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 21 of 325
Cisco dCloud
9. Enter the following values with each on a separate line of the window.
c. CSIDL_LOCAL_APPDATA\BigFix
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 22 of 325
Cisco dCloud
11. You will be taken back to the New Exclusion Set window with the multiple values you entered shown in the exclusion list.
12. An exclusion set cannot be saved with a blank entry. When a new exclusion set is created, a blank entry is created as
well. Click the trash can icon near the blank entry at the top of the list to remove it.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 23 of 325
Cisco dCloud
14. You will receive a message that the exclusion set was created successfully. Notice at this time the exclusion set is not in
use by any policies or groups.
15. Click the left arrow icon to return to the exclusion sets screen
16. Create another Exclusion Set by clicking the + New Exclusion Set button.
17. Click the Select Product dropdown menu and select Windows from the OS choices.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 24 of 325
Cisco dCloud
Note: The servers in our customer environment could possibly have the BigFix software installed on different drive letters, and
not just the C: drive. You will therefore be using wildcard exclusions to ensure differences in the configuration of the software
within the customer environment are taken into account such that the exclusions work in all cases.
20. Click on the drop-down menu next to the blank entry and choose the Wildcard menu item.
21. Enter *\Program Files (x86)\BigFix Enterprise\BES Server\* as the text for the exclusion.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 25 of 325
Cisco dCloud
22. Click the + Add Exclusion button 3 times to insert 3 new blank lines.
a. 2nd Entry:
b. 3rd Entry:
c. 4th Entry:
23. Your exclusion values are now added to the exclusion set and you have successfully added the required exclusions for
BigFix to both the workstation and server exclusion sets.
Note: You have successfully created exclusion sets for an application in the customer environment that is not a part of the Cisco
default exclusions. Remember that an exclusion set must have at least one exclusion in order to be created and that multiple
exclusion sets may be attached to a single policy. During the initial phases of a deployment you may not have any paths identified
that need to be excluded for certain endpoint types (Mac’s, Linux, etc.). Policies for those endpoint types may not have any
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 26 of 325
Cisco dCloud
exclusions attached or may just have the Cisco default entries. You can always create a custom exclusion set and attach it at a
later time.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 27 of 325
Cisco dCloud
1. Click the Outbreak Control menu and select the CUSTOM DETECTIONS > Simple menu item
2. The Custom Detections - Simple screen will now appear. Click the Create button.
3. In the Name field enter ABC - Quarantine List and click the Save button.
4. The ABC - Quarantine List Simple Custom Detection now appears in the list. Notice that it is not yet tied to any policies
and does not have any file entries in the list. We are creating this Simple Custom Detection at this time, so it can be
referenced in the Policy configuration we are about to create. It will be edited later in the deployment when we desire to
block specific files.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 28 of 325
Cisco dCloud
Application Control
You will now create both the Application Control Blocking and Whitelisting lists, so they may be used later in the deployment.
dCloud: The Cisco Demo Cloud
These must be created prior to Policies so they can be referenced during Policy configuration.
1. Click the Outbreak Control menu and select the APPLICATION CONTROL > Blocking menu item
a. The Application Control - Blocking page will now appear. Click the Create button.
b. In the Name field, enter ABC - Application Block List and click the Save button
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 29 of 325
Cisco dCloud
c. You will now see the ABC - Application Block List that was just created.
2. We will now add our Whitelist. Click the Outbreak Control menu and select the APPLICATION CONTROL > Whitelisting
menu item
a. The Application Control - Whitelisting page will now appear. Click the Create button.
b. In the Name field enter ABC - Application Whitelist and click the Save button.
c. You will now see the ABC - Application Whitelist that was created.
You have created the objects in the AMP for Endpoints console that are required items before creating policies and groups. Now
that you have created the exclusion sets, Simple Custom Detection list, and application whitelist items you may now proceed to
create the policies in the console.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 30 of 325
Cisco dCloud
2. The Policies page will appear along with some of the built-in policies that are created in the console by default. Click the +
New Policy button.
3. The New Policy box will appear. Click the Select Product dropdown menu and select the Windows product.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 31 of 325
Cisco dCloud
5. The New Policy page appears. You will now customize the policy settings.
6. Complete the Modes and Engines section of the policy configuration by entering in the values listed below:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 32 of 325
Cisco dCloud
b. Description: Audit mode policy for Windows desktops and laptops utilized by end users
c. Files: Audit
dCloud: The Cisco Demo Cloud
d. Network: Audit
7. Scroll down if necessary, click the Next button, and the form will move ahead to the Exclusions section
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 33 of 325
Cisco dCloud
Note: Notice that you can attach multiple exclusion sets from the Cisco-Maintained Exclusions as well as Custom Exclusions that
you have created. The Microsoft Windows Default exclusion set is pre-selected for you.
dCloud: The Cisco Demo Cloud
8. Click the dropdown menu button under Cisco-Maintained Exclusions that currently says None Selected
9. You will see a list of exclusion sets that Cisco has prebuilt and a way to search those existing exclusion sets
10. During project planning phase, your customer stated that they are running Symantec Endpoint Protection and Windows
Defender on some machines in the environment. You will now search for those exclusions and add them to the policy
configuration.
11. Type Symantec in the Search field and place a checkmark in the Symantec Endpoint Protection entry.
12. Type Windows Defender in the Search field and place a checkmark in the Windows Defender entry.
13. All required Cisco-Maintained Exclusions for this customer have been added, you will now add in the custom exclusion
set you created earlier.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 34 of 325
Cisco dCloud
14. Click the dropdown menu button under Custom Exclusions that currently says None Selected
15. Place a checkmark in the ABC – BigFix Client Exclusions entry. You have completed attaching exclusions to the policy.
16. Click the Next button and the form will move ahead to the Proxy settings.
17. On the Proxy configuration page, leave the default value of None as the proxy type.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 35 of 325
Cisco dCloud
18. Click the Outbreak Control menu on the left side of the page and configure the settings based on the values below:
e. When finished, your policy settings should match those shown below.
19. Click the Advanced Settings menu on the left side of the screen and review the settings on the Administrative Features
sub-menu. No changes are currently required on this page.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 36 of 325
Cisco dCloud
20. Click the Client User Interface sub-menu of Advanced Settings on the left of the screen and review the settings. No
changes are currently required on this page.
21. Click the File and Process Scan sub-menu of Advanced Settings on the left side of the screen and configure the
settings based on the values below:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 37 of 325
Cisco dCloud
22. Click the Cache sub-menu of Advanced Settings on the left side of the screen and review the settings. No changes are
needed on this page.
23. Click the Engines sub-menu of Advanced Settings on the left side of the screen and review the settings. No changes
are needed on this page.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 38 of 325
Cisco dCloud
24. Click the TETRA sub-menu of Advanced Settings on the left side of the screen and review the settings. No changes are
needed on this page.
25. Click the Network sub-menu of Advanced Settings on the left side of the screen and configure the settings based on the
values below
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 39 of 325
Cisco dCloud
26. Click the Scheduled Scans sub-menu of Advanced Settings on the left side of the screen and review the settings. No
changes are needed on this page.
27. Click the Save button to save the changes you have made to the new policy.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 40 of 325
Cisco dCloud
28. You have now created a Windows Endpoint Audit Policy. You will now create additional Audit Mode policies required for
this customer deployment.
Note: Notice that when making changes to a default setting within a policy, the circle with a white “i” (information) changes its color
to blue to signal that you have changed this from its default value. This is just for informational purposes to denote custom vs.
default settings.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 41 of 325
Cisco dCloud
1. On the Management > Policies page, click the + New Policy button.
2. The New Policy box will appear. Click the Select Product dropdown menu and select Windows.
4. The New Policy page appears. You will now customize the policy settings.
5. Complete the Modes and Engines section of the policy configuration by entering in the values listed below
b. Description: Audit mode policy for Windows servers that are not Active Directory servers
c. Files: Audit
d. Network: Disabled
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 42 of 325
Cisco dCloud
7. On the Exclusions page ensure that you have the following exclusions attached (Attach what is missing if necessary)
a. Cisco-Maintained
b. Custom Exclusions
9. On the Proxy configuration page leave the default value of None as the proxy type.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 43 of 325
Cisco dCloud
10. Click the Outbreak Control menu on the left side of the page and configure the settings based on the values below.
11. Your Outbreak Control settings should match those shown below:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 44 of 325
Cisco dCloud
12. Click the Advanced Settings menu on the left of the screen.
15. Click the Save button to save the changes you have made to the new policy.
16. You have now created our ABC - Windows Server Audit policy. You will now create additional Audit Mode policies
required for the deployment.
Note: As referenced in the “AMP for Endpoints Deployment Strategy” guide, for servers that require a high number of network
connections such as SQL, Exchange, or large file servers, it is recommended to disable DFC (Device Flow Correlation). These
servers could be placed in a separate policy that has this setting configured.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 45 of 325
Cisco dCloud
2. The New Policy box will appear. Click the Select Product dropdown menu and select the Linux product.
4. The New Policy page appears. You will now customize the policy settings.
5. Complete the Modes and Engines section of the policy configuration by entering in the values listed below
c. Files: Audit
d. Network: Disabled
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 46 of 325
Cisco dCloud
7. On the Exclusions configuration page, since we have not yet created a Linux Exclusion list, we can click Next and leave
the default setting on this page.
8. On the Proxy configuration page leave the default value of None as the proxy type.
9. Click the Outbreak Control menu on the left side of the page and configure the settings based on the values below.
10. Click the Advanced Settings menu on the left of the screen.
12. On the File and Process Scan window configure the settings based on the values below
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 47 of 325
Cisco dCloud
13. Click the Save button to save the changes you have made to the new policy.
14. You have now created the ABC - Linux Server Audit policy.
Note: You have successfully created policies for Windows Endpoints, Windows Servers, and Linux Server connectors. You will
now create Groups that will allow AMP for Endpoint Connectors to be managed within a logical container and have policy applied
to them.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 48 of 325
Cisco dCloud
The customer has Windows desktop endpoints, Windows application servers, and Linux application servers. Within the Windows
desktop endpoints there are several functional types of machines. Machines that are subject to certain regulatory or compliance
rules such as PCI or HIPAA will be managed via a separate group structure for management and reporting purposes. As the
deployment progresses, more groups could be created to manage additional types of endpoints separately from the main groups we
will be working with currently.
1. Click the Management menu and select the Groups menu item.
b. In the Description field enter Group to manage Windows endpoint devices in Audit mode
c. In the Windows Policy field choose the ABC - Windows Endpoint Audit policy item.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 49 of 325
Cisco dCloud
3. Leave all other settings at the default values and click the Save button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 50 of 325
Cisco dCloud
1. Ensure you are on the Groups configuration page. Click the Create Group button.
b. In the Description field enter Group to manage Windows endpoint devices that fall under Compliance
regulations in Audit mode
c. In the Windows Policy field choose the ABC - Windows Endpoint Audit policy item.
2. Leave all other settings at the default values and click the Save button.
Note: The group you just made for customer Compliance systems is using the policy you previously created for Windows
Endpoints in Audit mode. The systems that are members of the ABC - Windows Endpoints Audit group and systems that are
members of the ABC - Windows Compliance Audit group will have the same configuration applied to them at this point (same
exclusions, audit/block settings, user interface settings, etc.) but can be managed separately for reporting purposes.
Additionally, at a later time, the policy settings could be changed to a different policy if the configuration of these machines
needed to be separate from the ABC - Windows Endpoint Audit group systems.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 51 of 325
Cisco dCloud
1. Ensure you are on the Groups configuration page. Click the Create Group button.
b. In the Description field enter Group to manage Windows servers in Audit mode
c. In the Windows Policy field choose the ABC - Windows Server Audit policy item.
2. Leave all other settings at the default values and click the Save button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 52 of 325
Cisco dCloud
1. Ensure you are on the Groups configuration page. Click the Create Group button.
b. In the Description field enter Group to manage Linux servers in Audit mode
c. In the Linux Policy field choose the ABC - Linux Server Audit policy item.
2. Leave all other settings at the default values and click the Save button.
Note: You have successfully created groups for the devices you will deploy the AMP for Endpoints Connector to in Audit mode.
You will now deploy the Connector to various types of endpoints within the customer deployment.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 53 of 325
Cisco dCloud
Note: IMPORTANT!!! The following steps are to be completed on the machines in the dCloud lab environment ONLY!
DO NOT perform the connector installation on any systems outside of the dCloud lab environment. Ensure you are connected to
the Jumphost machine in the dCloud environment through AnyConnect or the dCloud web-based RDP connection before
continuing.
1. Ensure you are logged in to the AMP for Endpoints console from the Jumphost workstation
2. Click the Management menu and select the Download Connector menu item.
3. The Download Connector screen now appears prompting you to Select a Group.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 54 of 325
Cisco dCloud
4. Click the Select a Group dropdown menu and select the ABC - Windows Endpoints Audit group.
5. In the Windows section, ensure both the Flash Scan on Install and Redistributable checkmark boxes are checked.
Note: Checking the Redistributable box means that the installer can be used offline and does not need to download installation
files from the cloud. The Redistributable option would be required for most software deployments and eliminates many
potential issues associated with downloading installation files on-demand at installation time.
6. Click the Show URL button in the Windows section of the page.
7. You will now see the URL that can be used to download the Connector for the Windows Endpoint machines. Click the
Copy URL button to copy the URL into the clipboard so you can paste it later.
8. On the desktop of the Jumphost machine (you may need to minimize Chrome to see the desktop), double-click on the
Remote Desktop Connection shortcut for the Wkst1 computer
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 55 of 325
Cisco dCloud
9. You should automatically be logged onto the Wkst1 machine. You can verify that you are logged into the Wkst1 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
10. Open the Chrome web browser by double-clicking the shortcut on the desktop of the Wkst1 machine
11. Paste the URL copied from the AMP for Endpoints Console in the previous step in the address bar of the browser and
press the Enter key.
12. The setup file will begin to download. Once the file has downloaded you should see it appear in the lower left corner of the
Chrome browser.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 56 of 325
Cisco dCloud
13. Click on the downloaded file “ABC_-_Windows_Endpoints_Audit_FireAMPSetup.exe” in the lower left of the browser
to launch the setup process.
14. If you are presented with a User Account Control window prompt, click the Yes button to proceed dCloud:
with theThesetup process.
Cisco Demo Cloud
15. When prompted for the Install Location take the setup defaults and click the Install button.
16. The setup process will now begin. This may take a few minutes to complete.
17. Once the installation has been completed you should receive the following notification. Click the Next button to proceed.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 57 of 325
Cisco dCloud
18. Place a checkmark in the Create Desktop Shortcut checkmark box and click the Close button.
19. The Cisco AMP for Endpoints user interface will now display. The status should say Connected.
20. Notice the AMP4E system tray icon (blue circle) on the remote desktop computer tray in the lower right of the screen near
the date and time. You may need to click the Show Hidden Icons up-arrow to have the system tray icons appear.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 58 of 325
Cisco dCloud
21. The installation appears to be successful and the AMP4E Connector appears to be running. We will investigate the
installation status more in depth during later Connector installs. You will now verify the Connector appears in the AMP4E
console.
22. Disconnect from your Remote Desktop session with the WKST1 machine by clicking the X on the blue bar at the top of
the screen.
23. Return to the AMP for Endpoints console window running in Chrome on the Jumphost machine in dCloud. Click the
Management menu and select the Computers menu item.
24. The WKST1 machine should now appear in the list of Computers. You may click the plus symbol next to the computer
name to expand the entry and view more details about the computer.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 59 of 325
Cisco dCloud
25. The WKST1 computer has successfully had the AMP for Endpoints Connector installed and you have verified that it is
connecting to the AMP for Endpoints Console. You will now perform an installation for an additional Windows Workstation
endpoint.
26. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the Wkst2
computer
27. You should automatically be logged onto the Wkst2 machine. You can verify that you are logged into the Wkst2 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
28. Open the Chrome web browser by double-clicking the shortcut on the desktop of the Wkst2 machine
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 60 of 325
Cisco dCloud
29. Paste the same Connector Download URL copied from the AMP for Endpoints Console previously into the address bar of
the browser and hit the Enter key.
30. The setup file will begin to download. Once the file has downloaded you should see it appear in the lower left corner of the
Chrome browser.
31. Click on the downloaded file “ABC_-_Windows_Endpoints_Audit_FireAMPSetup.exe” in the lower left of the browser
to launch the setup process.
32. If you are presented with a User Account Control window prompt, click the Yes button to proceed with the setup process.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 61 of 325
Cisco dCloud
33. When prompted for the Install Location take the setup defaults and click the Install button.
34. The setup process will now begin. This may take a few minutes to complete.
35. Once the installation has been completed you should receive the following notification. Click the Next button to proceed.
36. Place a checkmark in the Create Desktop Shortcut checkmark box and click the Close button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 62 of 325
Cisco dCloud
37. The Cisco AMP for Endpoints user interface will now display. The status should say Connected.
38. Notice the AMP4E system tray icon (blue circle) on the computer in the lower right of the screen near the date and time.
You may need to click the Show Hidden Icons up-arrow to have the system tray icons appear.
39. The installation appears to be successful and the AMP4E Connector appears to be running. We will investigate the
installation status more in depth during later Connector installs. You will now verify the Connector appears in the AMP4E
console.
40. Disconnect from your Remote Desktop session with the WKST2 machine by clicking the X on the blue bar at the top of
the screen.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 63 of 325
Cisco dCloud
41. Return to the AMP for Endpoints console window running on the Jumphost machine in dCloud. Click the Management
menu and select the Computers menu item.
42. The WKST2 machine should now appear in the list of Computers. You may click the plus symbol next to the computer
name to expand the entry and see more details about the computer.
43. The WKST2 computer has successfully had the AMP for Endpoints Connector installed and you have verified that it is
connecting to the AMP for Endpoints Console. You will now perform an installation for an additional endpoint type.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 64 of 325
Cisco dCloud
1. Ensure you are logged in to the AMP for Endpoints console from the Jumphost.
2. Click the Management menu and select the Download Connector menu item.
4. Click the Select a Group dropdown menu and select the ABC - Windows Server Audit group.
5. Ensure both the Flash Scan on Install and Redistributable checkmark boxes are checked and click the Show URL
button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 65 of 325
Cisco dCloud
6. You will now see the URL that can be used to download the Connector for the Windows Server machines. Click the Show
URL button to copy the URL into the clipboard so you can paste it later.
7. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the Server1
computer
8. You should automatically be logged onto the Server1 machine. You can verify that you are logged into the Server1
machine by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop
will show the name of the machine currently logged into as shown below.
9. Open the Internet Explorer web browser by clicking the Start button and then selecting the Internet Explorer icon on the
Start Menu.
10. Paste the URL copied from the AMP for Endpoints Console in the previous step in the address bar of the browser and
press the Enter key.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 66 of 325
Cisco dCloud
11. Verify the name of the connector is for the Windows Server, then click the Save button.
12. Once the download has completed open an Administrative Command Prompt by right-clicking on the Start button and
selecting the Command Prompt (Admin) menu item.
13. The Command Prompt window will now appear. Enter the command cd C:\Users\Administrator.AD1\Downloads and
press the Enter key.
14. You will now use command line parameters to customize the setup of the AMP for Endpoints Connector installation for
servers. Enter the following command at the command prompt and press the Enter key. (You can speed the entry and
accuracy of the executable name by typing ABC, then pressing the tab key to autocomplete the filename. After the name
appears, continue to complete the entire command.
Note: As mentioned in the AMP for Endpoints Deployment Guide, it is recommended that servers that have a large amount of
network transactions and/or applications with high resource demands have the Tetra engine and Device Flow Correlation disabled.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 67 of 325
Cisco dCloud
In addition to the policy settings you previously set for the Servers policy, you must also use the command line shown above to
prevent the installation of the components.
dCloud: The
15. There will not be any visual indicators that the setup process is running as the command-line parameters Cisco
have Demo Cloud
configured
the install to run in silent mode. You will now verify that the installation completed successfully.
16. Open Computer Management by right-clicking the Start button and selecting the Computer Management menu item.
17. In the left-pane of Computer Management, expand Services and Applications and select Services.
18. On the right window pane look for the service entry of the Cisco AMP for Endpoints Connector service. Verify that it
exists, and that the status of the service is Running.
Note: You can also review the installation log file named “immpro_install.log” that is written to the
“C:\ProgramData\Cisco\AMP” folder on the computer. This is not necessary for this lab, but feel free to explore as necessary.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 68 of 325
Cisco dCloud
19. Exit the remote Server1 remote session by clicking the X on the top bar of the RDP client.
20. You will now verify the Connector appears in the AMP4E console.
dCloud: The Cisco Demo Cloud
21. Return to the AMP for Endpoints console window running on the Jumphost machine in dCloud. Click the Management
menu and select the Computers menu item.
22. The Server1 machine should now appear in the list of Computers. You may click the plus symbol next to the computer
name to expand the entry and see more details about the computer.
23. The Server1 computer has successfully had the AMP for Endpoints Connector installed and you have verified that it is
connecting to the AMP for Endpoints Console. You will now perform an installation for an additional endpoint type.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 69 of 325
Cisco dCloud
1. Ensure you are logged in to the AMP for Endpoints console from the Jumphost.
2. Click the Management menu and select the Download Connector menu item.
4. Click the Select a Group dropdown menu and select the ABC - Linux Server Audit group.
5. In the Linux section, ensure the Flash Scan on Install checkmark box is checked.
7. Click the Download button in the Linux section and verify the download has completed before continuing.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 70 of 325
Cisco dCloud
8. You will now utilize WinSCP to transfer the installation file to the Linux server, so the installation can be executed on that
system via SSH. Open the WinSCP application using the shortcut on the desktop of the Jumphost machine. Do not
upgrade the WinSCP product.
dCloud: The Cisco Demo Cloud
c. Port number: 22
e. Password: C1sco12345
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 71 of 325
Cisco dCloud
12. If presented with a Warning screen referring to the SSH key fingerprint, click the Yes button to proceed.
13. You will now connect to the Linux server via WinSCP and must now navigate to the location on the Jumphost machine
where the AMP for Endpoints Linux Connector is located in order to transfer it to the Linux server.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 72 of 325
Cisco dCloud
14. In the left window pane of WinSCP, navigate up the directory structure one directory by double-clicking on the folder
with the two periods and up arrow. You may also use the “parent directory” button with an up arrow on it in the user
interface navigation bar. Locate the Downloads folder.
dCloud: The Cisco Demo Cloud
16. You should now see the RPM file located in the downloads directory. You will now transfer the RPM file to the remote
Linux server.
17. Upload the RPM file by selecting the file on the left pane and clicking the Upload button on the left side of the WinSCP
application.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 73 of 325
Cisco dCloud
19. You will now see that the RPM file has been successfully transferred to the remote system as it appears on the right
window pane of WinSCP.
20. Close the WinSCP application and Click OK when asked to confirm Terminate the session.
21. Now that the installation file has been transferred to the Linux server, you will login via SSH and execute the setup
process. Open the PuTTY application on the Jumphost by double-clicking on the shortcut located on the desktop.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 74 of 325
Cisco dCloud
b. Port: 22
25. When prompted for the user name and password, use the following values:
b. Password: C1sco12345
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 75 of 325
Cisco dCloud
26. Ensure you are in the /root directory by typing the command cd /root and pressing the Enter key
28. You should receive a message stating that the installation is complete as shown below.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 76 of 325
Cisco dCloud
29. Once the installation has completed, you may verify the AMP Connector is functional.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 77 of 325
Cisco dCloud
30. You will see the status of the connector states it is “Connected”, as well as which Policy the connector is attached. If it is
still “Initializing…”, try the command again until the status is “Connected”.
Note: You can access the log files generated by the AMP for Endpoints Connector for Linux in /var/log/cisco on the Linux host’s
file system. This is not required for this lab.
31. Close the SSH session to the Linux host by typing Exit and pressing Enter.
32. You will now verify the Connector appears in the AMP4E console.
33. Return to the AMP for Endpoints console window running on the Jumphost machine in dCloud.
34. Click the Management menu and select the Computers menu item.
35. The CentOS machine should now appear in the list of Computers. You may click the plus symbol next to the computer
name to expand the entry and see more details about the computer.
36. The CentOS computer has successfully had the AMP for Endpoints Connector installed and you have verified that it is
connecting to the AMP for Endpoints Console.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 78 of 325
Cisco dCloud
Note: You have deployed the AMP for Endpoints Connector in Audit mode for all machine types in the customer environment.
You will now move on to analyzing Connector behavior and other tasks required before moving any systems into Protect
mode. dCloud: The Cisco Demo Cloud
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 79 of 325
Cisco dCloud
Note: While it is unlikely that standard commercial applications would be blocked by Cisco AMP for Endpoints, it is a best
practice to go through a testing phase of the deployment in Audit mode. During this phase, it is beneficial to have the customer
test all approved business applications on the pilot machines before moving into Protect mode. This will identify if there are
any applications that may be blocked before causing a production issue. Additionally, this testing phase can help show the
customer that the majority of their standard applications will not be affected by Cisco AMP for Endpoints
Note: The scenarios below are just examples of some applications in our fictitious customer’s environment that need to be
tested for functionality. The applications you test in your customer deployments will need to reflect their actual usage of
applications within their unique environment. Ideally, the AMP for Endpoints Connector would be installed on either dedicated
testing machines where end users can verify functionality, or some of the initial pilot machines would include varying segments
of the end user population such that real daily activity can be seen and monitored for potential quarantines in audit mode.
2. You should automatically be logged onto the Wkst1 machine. You can verify that you are logged into the Wkst1 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
3. The customer has notified you that the Marketing department has a specialized financial application that should be
specifically tested on the audit mode machines. You will now run the application to generate events in the AMP for
Endpoints console and review the results.
5. Double-click on the Simple Calculator shortcut to run the Marketing department’s critical application.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 80 of 325
Cisco dCloud
6. The Simple Calculator application should appear on the screen. Perform some basic calculations to simulate use of the
application, and then close the window.
7. Open the Word application by double-clicking on the Word 2016 shortcut on the desktop
9. Type Cisco AMP for Endpoint Testing on the document, click the File menu, and click the Save menu item.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 81 of 325
Cisco dCloud
10. On the Save As screen, click This PC, and click the Documents folder
11. When prompted to name the file, use the default value, and click the Save button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 82 of 325
Cisco dCloud
13. Open the Excel application by double-clicking on the Excel 2016 shortcut on the desktop
dCloud: The Cisco Demo Cloud
15. Type Cisco AMP for Endpoint Testing in the workbook, click the File menu, and click the Save menu item.
16. On the Save As screen, click This PC, and click the Documents folder
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 83 of 325
Cisco dCloud
17. When prompted to name the file, use the default value, and click the Save button.
19. Open the Adobe Reader application by double-clicking on the Adobe Reader XI shortcut on the desktop
20. If prompted to make Adobe the default PDF reader, click OK. Then click Yes. Then click OK.
21. Click the File menu and select the Open menu item
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 84 of 325
Cisco dCloud
22. Select the Documents folder on the left of the screen, select the AMP for Endpoints Deployment Strategy pdf file, and
click the Open button at the bottom of the window
23. Once the PDF file has successfully loaded, you may close the Adobe Reader application
24. Close the Remote Desktop Connection to the WKST1 machine and return to the desktop of the Jumphost machine.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 85 of 325
Cisco dCloud
Analysis
After completing the application usage tests, you can now review the data available in the AMP for Endpoints Console. Specifically,
dCloud: The Cisco Demo Cloud
you will be checking if any Detection events occurred.
1. Ensure you are logged in to the AMP for Endpoints console from the Jumphost workstation
2. Click the Analysis menu and select the Detections / Quarantine menu item.
3. When the Dashboard Events filter window displays, click the button next to Time Range that is currently set to the value
Week. Change this value to Day.
4. Click the plus symbol for the Group filter on the right of the screen and select the ABC - Windows Endpoints Audit
group
Note: Due to this being a lab environment, if you do not select the correct time range and group, you may see events from
previous classes. Please ensure you look at the current day values for Events.
5. You should see no events for the current day for the WKST1 machine
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 86 of 325
Cisco dCloud
Note: Monitoring Threat Detected events is the primary method you can utilize to verify that connectors are ready to be moved
from Audit mode into Protect mode. It is important to monitor the events coming from connectors in Audit mode for enough
time to observe all normal end user activity and verify no blocks would have occurred for legitimate applications prior to
moving into Protect mode in production environments.
7. You will now look more closely at the data from the WKST1 machine to verify that the console has received data from the
endpoint and view what the AMP for Endpoints Connector observed during your application testing.
8. Click the Management menu and select the Computers menu item
9. Find the entry for the WKST1 computer, expand the entry by clicking the plus sign, and click the Device Trajectory
item in the bottom left of the expanded section for WKST1
Note: The items you see in the Device Trajectory may not exactly match the screenshots in your lab. This is normal as there
are different processes running at various times depending on time of day and other factors. You should still see the data from
your application testing.
10. On the Device Trajectory screen, you will be able to see the processes from the WKST1 computer and their activity.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 87 of 325
Cisco dCloud
11. You will now filter the data to only show information relating the Microsoft Excel process: excel.exe
12. At the top of the screen in the Search Device Trajectory field, type excel.exe, then press Enter
13. The items in the Device Trajectory window will now be filtered to include only those that relate to the value you have
searched. If you see no results displayed, both check the spelling of your search entry, and/or wait a couple minutes and
try again.
14. Click on each of the File and Network event circle and review the data contained in each event.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 88 of 325
Cisco dCloud
15. You will see that Excel created the book1.xlsx file then moved the file.
16. Review the other events for the application. Note that many of the values in the event can open additional menus and
reports to help with investigations as well as provide additional context.
17. The Device Trajectory view is currently under development in AMP Cloud and migrating to a new interface view. You
need to Click Use the New Device Trajectory to go back.
18. Enter acro into the Search field at the top of the page and press Enter
19. Review the entries for the matching files. There may be several entries related to the Adobe Acrobat processes such as
acrord32.exe and acroext.exe. In this example notice the network activity being generated by the acrord32.exe. Click on
one of the events on the device trajectory to bring up additional information about the event.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 89 of 325
Cisco dCloud
20. Click on the hash value for the file in the event details pane (see image below). Notice the Disposition is Clean, and the
file name is marked in green. From this menu you could investigate further if desired.
Note: You may not see the exact events for Adobe Acrobat as shown in the lab manual although there should be event
entries in the Device Trajectory for you to verify that event data is passing to the console based on your activities.
21. You have verified that you are indeed getting event data from the machine you performed the application testing on and
that it does not appear that any of the apps would have been blocked if the machine had been in Protect mode.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 90 of 325
Cisco dCloud
You will now review the data available in the AMP for Endpoints Console. Specifically, you will be checking to see if any Detection
events occurred for the servers within the customer environment.
1. Ensure you are logged in to the AMP for Endpoints console from the Jumphost workstation
2. Click the Analysis menu and select the Detections / Quarantine menu item.
Note: Accessing the Detections/Quarantine item from the Analysis menu accomplishes the same task as selecting Events
from the Analysis menu and then choosing the event types Threat Detected and Threat Detected in Exclusion.
3. When the Events filter window displays, click the button next to Time Range that is currently set to the value Week.
Change this value to Day.
4. Click the plus symbol for the Group filter again and select the ABC - Linux Server Audit group
5. Click the plus symbol for the Group filter again and select the ABC - Windows Server Audit group
Note: Due to this being a lab environment, if you do not select the correct time-range and group, you may see events from
previous classes. Please ensure you look only at the current days values for Events with the correct group filters.
6. You should see several entries for the Server1 machine. These entries represent instances where an application would
have been blocked on Server1 if the machine had been in Protect mode. You must now gather more information on this
activity before proceeding to move machines into Protect mode.
7. If you do not see the detection events for server1, the scheduled task that executes the application may not have
executed yet due to various timing factors. You may force the scheduled task to run by following the below steps if
needed.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 91 of 325
Cisco dCloud
a. Connect to the Server1 machine via the Remote Desktop shortcut on the desktop of the Jumphost
b. On Server1, Open Computer Management by right-clicking on the Start button and selecting Computer
Management dCloud: The Cisco Demo Cloud
c. When the Computer Management window appears, expand Task Scheduler and select the Task Scheduler
Library folder
d. Right-click on the Server Maintenance task and select the Run menu item
e. Return to the Jumphost machine by minimizing the Remote Desktop window for Server1 with the minimize
button located on the blue bar at the top of the screen
f. Return to the event logs for the server machines and refresh the page to see the event data generated by
running the scheduled task
8. Click the plus symbol on the most recent event for the Server1 machine to expand the event.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 92 of 325
Cisco dCloud
Note: All text colored blue with the funnel/filter icon next to it can be used to add a filter to the current events filter in order to
only show data for the item you just clicked on.
9. On the File Detection tab of the newly opened Event, notice the following items:
c. File Name: The specific file that was detected as being malicious
d. File Path: The location on the hard disk of the connector (computer) where the file was executed from
f. Parent Fingerprint: The hash of the process that launched the malicious file
g. Parent Filename: The name of the process that launched the malicious process
Note: You may see a Report button in the step below rather than an Analyze button. This means that the file has been
recently analyzed already from a previous lab participant. You may click the Report button instead to view the Threat Grid
report and proceed with the lab.
10. Click the Analyze button. [If you DO NOT have an Analyze button in your console, see step A after reading the remaining
text that follows here.] This will cause the AMP for Endpoints connector on Server1 to fetch the file in question, submit it to
the File Repository in the AMP cloud, and have it undergo a ThreatGrid analysis. This process can several minutes to
complete (plan for a minimum of 15 minutes for the file fetch and then another 10 minutes minimum for the analysis after
that). We will continue to investigate the file using other methods while the File Fetch and ThreatGrid analysis is being
performed.
a. If there is no analyze button, this is due to the file being recently analyzed by another student who used this Pod
prior to you. You may skip to the next numbered step in this lab (Step 11).
b. The details of the File Fetch request appear giving you the opportunity to choose which connector to retrieve the
file from (if the file existed across multiple computers in the customer environment) and What Operating System
to use for the analysis.
c. Ensure Server1 is selected and leave the VM image for analysis at the default value.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 93 of 325
Cisco dCloud
d. A blue bar will appear letting you that an email will be sent when the file has been uploaded to the repository.
e. Click the X in the upper right of the window to close the screen and return to the AMP for Endpoints console.
11. Click on the file hash next to Fingerprint (SHA-256) to open a drop-down menu for the file
12. You are shown several pieces of information on the drop-down menu as well as being given the option of looking at
additional information in the console about this file. Here are descriptions of each option in this pop-up menu.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 94 of 325
Cisco dCloud
a. Disposition: How the AMP cloud is categorizing the file, such as Unknown, Malicious, or Clean
c. Add to Filter: Allows you to add this hash to the Event filter.
d. Copy: Copies the full SHA-256 hash (unique identifier) of the file to the clipboard so it can be pasted in other
screens if desired
e. Search: Will search for all computers with the file, will search the file repository for a matching file, and will look
in File Analysis for a matching file. (Sample screen shown below. You do not need to select this option now.)
f. Virus Total / Risk / Full Report: Pertains to data obtained about this hash that was received from Virus Total.
g. File Fetch: Allows you to Fetch the file for analysis or view it in the repository.
h. File Analysis: Opens the file analysis for the file (if the file has been previously fetched, and the analysis has
had enough time to complete)
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 95 of 325
Cisco dCloud
i. File Trajectory: Shows a summary of information about the file across the entire environment including all
machines seen with the file, network activity associated, how the file was written, and if the file created any new
threats
dCloud: The Cisco Demo Cloud
j. Outbreak Control: Quickly add this hash to an Outbreak Control list in the product
k. Investigate in Cisco Threat Response: Allows you to open Cisco Threat Response filtered on this Hash.
14. The File Trajectory page opens in a new browser tab and displays statistics about the file. Review the data shown on the
File Trajectory screen including the following:
a. Visibility: Statistics on how many instances involving the file have been observed as what the first/last dates of
observation were
b. Entry Point: The first connector in the environment that saw the file
c. Created By: Data regarding how the file arrived on the connector
d. File Details: Information from the executable header of the file, the disposition, size, hashes, and type
g. Event History: A list of all events in the AMP for Endpoints console involving the file
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 96 of 325
Cisco dCloud
Note: The details of the File Trajectory screen above may look somewhat different than that displayed in your lab depending on
how many times the file has executed and various other factors.
dCloud: The Cisco Demo Cloud
15. After reviewing the data on the File Trajectory screen, close the browser tab for the File Trajectory and return to the
Events screen showing the detection events for nircmdc.exe
16. Click on the Connector Info menu option on the left of the expanded event section (below File Detection)
17. Details about the machine that generated this specific event appear.
18. Click the Management link to view more information about the computer that has generated the event.
19. The Computers screen opens in a new browser tab. Click the plus symbol next to the Server1 entry to expand the
information about the computer.
20. Review the current information available about the Server1 computer. Notice that from this screen, you have the ability to
launch an on-demand scan, move the computer to a different group in the console, delete the computer, go to events
specifically related to this machine, launch the Device Trajectory, and view audit log changes.
21. Close the current browser tab containing the Computers screen and return to the Events screen showing the detection
events for nircmdc.exe
22. Launch the Device Trajectory by clicking on either the button in the top row of the event header, or the link for Device
Trajectory on the Connector Info screen of the event.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 97 of 325
Cisco dCloud
or
23. The Device Trajectory window appears in a new tab with data relating to the nircmdc.exe file and dCloud: The Cisco Demo Cloud
its activity
24. Based on the data in the Device Trajectory, we can see two processes involved: nircmdc.exe and cmd.exe. (You may
also see [ system]) The process nircmd.exe is colored red, indicating that its event disposition is malicious. The process
cmd.exe is colored green, indicating that its event disposition is benign. The icon associated with the events on the
Device Trajectory matches the execute event type as shown at the bottom of the screen. Additionally, there is an ‘eye’
icon on the events, symbolizing that the event is in audit mode.
25. Click on one of the execute events in the device trajectory and review the event data.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 98 of 325
Cisco dCloud
Note: The event specifically says the file was not quarantined. This is due to the connector being in Audit mode.
26. You can determine that the parent process was cmd.exe (Executed by…), the full path of the file is
dCloud: The Cisco Demo Cloud
c:\maintenance\nircmd.exe, and the specific command line used (available in some events: choose another event if you
are not seeing the command line as this may not always appear based on application behavior at that time).
27. Additionally, you are presented with all hash values of the process and parent process.
28. Click on the abbreviated hash (12459a5e…) of the nircmdc.exe file located next to its name on the top line of the current
window.
29. Details about the file appear including a VirusTotal section. Click on the Full Report menu item.
Note: VirusTotal is a site that analyses files using signatures from many different anti-malware vendors. It can be useful to gain
additional context when investigating a file.
30. The VirusTotal site is opened to the page containing information about the hash that was selected.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 99 of 325
Cisco dCloud
31. It appears that many of the antivirus engines that VirusTotal ran the file against are marking it as an unwanted program or
risky tool.
32. Close the VirusTotal tab of the browser and return to the Device Trajectory screen.
33. Click on the hash of the nircmdc.exe file, click the File Fetch sub-menu, and select the View in File Repository menu
item.
Note: You can also access the File Repository by accessing the Analysis menu and selecting File Repository.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 100 of 325
Cisco dCloud
Note: You had previously requested that AMP for Endpoints fetch the file and begin an analysis (or possibly a previous student
already fetched the file). It can take over 30 minutes for the file fetch and analysis to complete. Depending on the length of time
from when you requested the file fetch and analysis, the file may not be available yet. If the Status does not say “Available” on the
previous step, you may need to wait for this process to complete or move ahead without the analysis to review in your lab. Also, if
you do not see any entries in the File Repository, please verify that you successfully requested the file and review the beginning of
this lab section for the steps on initiating the file fetch and analysis.
34. When the File Repository screen appears click the plus symbol to expand the entry for nircmdc.exe. If you do not see
results in the Repository, return to the previous menu and use the Fetch File option to grab a new copy of the file from
Server1.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 101 of 325
Cisco dCloud
35. Notice from this screen, you could launch a File Trajectory or Device Trajectory, download a copy of the actual file to your
admin console, or remove the file from the repository. At this point in the lab, the file analysis should be completed, and
you should see the Analysis results link. Hover your mouse pointer over the Report button to see the pop-up
dCloud: The Cisco Demo Cloud
information.
36. Review the data on the screen, then click the Report button at the bottom of the section
37. You are presented with the ThreatGRID analysis report that shows information about the file obtained when it was
executed and analyzed within the ThreatGRID sandbox environment.
38. Review the data in the report, then close the analysis report browser tab when complete
Note: The steps below outline a sample conversation that you would have with your customer during a deployment in a similar
case as this where a file has been marked as malware in quarantine mode but appears to be a legitimate application in use by the
customer. During a production deployment, ensure you have customer approval by the appropriate department before whitelisting
processes classified as malware by AMP for Endpoints. Read the following steps until you are directed to take another action in the
AMP for Endpoints console.
39. At this point in our deployment scenario, you have performed several investigative actions using the AMP for Endpoints
console and it is time to talk to the customer in order to gather more information about this file and why it is running on the
Server1 machine.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 102 of 325
Cisco dCloud
a. The customer’s server team has been asked if they know anything about the file running on Server1 and they
have responded that they have no knowledge of the file.
b. You subsequently explain to the server team that unless the file is specifically allowed todCloud:
run, it The
willCisco
be blocked
Demo Cloud
c. The server team suddenly remembers, “yes, we do know about the file. It is a utility we utilize for maintenance
scripts.” They have requested that it be whitelisted and not blocked.
d. You verify with your customers IT Security department, or primary contact for your AMP for Endpoints project,
that they also approve of whitelisting the utility file as it seems it is not true malware, but instead, a risky and
sometimes misused administrative utility.
e. The IT Security team has issued an approval for you to move forward with whitelisting the file in the AMP for
Endpoints console.
Note: You will now use the AMP for Endpoints console to whitelist the file, so it will not be blocked when the connectors move into
Protect mode.
41. Expand the newest nircmd.exe entry by clicking the associated + icon.
a. Click the File Hash near the Fingerprint (SHA-256) value and locate the Whitelist menu option on the pop-up
menu (It may be at the bottom of your menu, or nested under Outbreak Control).
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 103 of 325
Cisco dCloud
Note: By adding the hash for the nircmdc.exe file into the whitelist used by all the customer policies, the file will be whitelisted for
dCloud: The Cisco Demo Cloud
the entire environment. In this deployment, that is acceptable to the customer. There may be times when it is not desired to
whitelist a file for all computers, but rather only a subset of machines. In that case, a separate whitelist could be created, and the
group that needed the whitelist could have its policy edited to point to the new whitelist. This way, only that specific group would
have the file whitelisted.
43. Again, Click Analysis > File Analysis and Expand the newest nircmd.exe entry by clicking the associated + icon.
44. Click the File Hash near the Fingerprint (SHA-256) value
45. Notice that the Disposition is now Whitelisted and no longer “malicious”. You have successfully whitelisted the file and
prevented it from being blocked by connectors in Protect mode. You will now verify your work.
Note: On systems where the file already exists with a Malicious disposition, they will not immediately change the disposition to
Whitelisted after the file is added to a whitelist. In the Policy settings, there is a Cache menu that controls the TTL for various
dispositions (shown below). For the change to take effect on a connector that already has the file, either wait for the TTL to
expire (1 hour for malicious files) or stop the connector service and delete the cache.db file from the connector install directory,
and then restart the service. This will cause the connector to perform an immediate cloud lookup and not block the file.
46. You will now login to the Server1 machine to manually execute the file you have just whitelisted to test whether the
connector is treating the file as having a Whitelisted disposition
47. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the Server1
computer
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 104 of 325
Cisco dCloud
48. You should automatically be logged onto the Server1 machine. You can verify that you are logged into the Server1
machine by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop
will show the name of the machine currently logged into as shown below.
49. Open Computer Management by right-clicking on the Start button and selecting Computer Management
50. When the Computer Management window appears, expand Task Scheduler and select the Task Scheduler Library
folder
51. Right-click on the Server Maintenance task and select the Run menu item
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 105 of 325
Cisco dCloud
52. Return to the Jumphost machine by minimizing the Remote Desktop window for Server1 with the minimize button
located on the blue bar at the top of the screen
53. Ensure you are logged in to the AMP for Endpoints console from the Jumphost workstation
54. Click the Analysis menu and select the Detections / Quarantine menu item.
55. When the Events filter window displays, click the button next to Time Range that is currently set to the value Week.
Change this value to Day.
56. Click the plus symbol for the Group filter on the right of the screen and select the ABC - Windows Server Audit group
57. There should be an event listed that matches the time period from when you manually started the scheduled task on
Server1 after the file was whitelisted. Notice that the connector still generated a detection event for malware even though
the file was whitelisted. This is due to the disposition of the file being in the cache.db file. This malicious disposition will
not expire until the TTL value for the cache has elapsed.
58. Click on the file Hash next to SHA-256 for the file. Notice the disposition is Whitelisted. You will now force the connector
to retrieve new disposition data by manually deleting the cache.db on the Server1 machine.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 106 of 325
Cisco dCloud
59. Return to the Server1 machine by clicking on the minimized session you already have launched in the taskbar.
Alternately, double-click on the desktop shortcut for the Server1 remote desktop session again.
Note: Manually deleting the cache.db is usually a troubleshooting step or used for certain instances where a new disposition is
needed immediately and is not considered a normal operational task that will be performed on a regular basis. You are going
through this exercise to have a better understanding of the timing involved in making whitelist/blocklist changes and in case you
needed to immediately have the change take effect on a small number of computers you will be familiar with the process. This is
not an activity you should expect to perform after every whitelist change.
60. You will now stop the connector service on the Server1 computer. Open an elevated PowerShell prompt by right-
clicking on the PowerShell shortcut (This looks like a > symbol) on the taskbar and selecting the Run as
Administrator menu item
Note: The name of the service changes with the version of the connector installed. You will use PowerShell to determine the
current status of the service, the exact name of the service, and use wildcards in the commands that will work even if the
connector version changes.
61. Once the Windows PowerShell prompt appears, run the command get-service CiscoAMP* (Do NOT forget the * at the
end of the command)
62. Notice the Status of the service is Running, the name of the service is shown as well as the DisplayName of the service.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 107 of 325
Cisco dCloud
63. Stop the service by running the command stop-service -name CiscoAMP*
64. Verify the service is stopped by running the command get-service CiscoAMP*
66. Now that the service is stopped, you may delete the cache.db file from the connector installation directory on Server1
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 108 of 325
Cisco dCloud
b. If no errors appear after running the del command, then the cache.db file was successfully deleted and you may
now restart the service, so the agent will be forced to pull down a new disposition for the file you have whitelisted
without waiting for the 1-hour TTL to expire.
c. Start the connector service by running the command start-service -name CiscoAMP*
Note: If you prefer to use the Services MMC and File Explorer user interfaces to stop the service, delete the file, and start the
service, that is ok, and will accomplish the task as well.
67. You will now manually start the scheduled task on the Server1 computer to verify that the connector is no longer detecting
the file as malware and has updated its disposition as whitelisted.
68. Open Computer Management by right-clicking on the Start button and selecting Computer Management
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 109 of 325
Cisco dCloud
69. When the Computer Management window appears, expand Task Scheduler and select the Task Scheduler Library
folder
70. Right-click on the Server Maintenance task and select the Run menu item
71. Return to the Jumphost machine by minimizing the Remote Desktop window for Server1 with the minimize button
located on the blue bar at the top of the screen
72. Ensure you are logged in to the AMP for Endpoints console from the Jumphost workstation
73. Click the Analysis menu and select the Detections / Quarantine menu item.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 110 of 325
Cisco dCloud
74. When the Events filter window displays, click the button next to Time Range that is currently set to the value Week.
Change this value to Day.
75. Click the plus symbol for the Group filter on the right of the screen and select the ABC - Windows Server Audit group
76. You will see the previous entries from when the connector on Server1 recognized the file as malicious, before the whitelist
operation was performed. No new threat detected events should be displayed in the console that match the time period of
the last scheduled task execution.
77. You have investigated whether any legitimate applications in use by the customer would have been quarantined by Cisco
AMP for Endpoints. You have successfully whitelisted a server application that would have been quarantined if the
connector was in protect mode. You have gone through the manual process of forcing the disposition update without
waiting for the Cache TTL to expire. Now that the customer environment has been analyzed for known good applications
that may be quarantined, and required changes made to whitelist them, it is time to move forward with the tasks needed
to prepare the environment for Protect mode.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 111 of 325
Cisco dCloud
would not have blocked any activity that it found to be malware or on a block list. Once a Connector moves into Protect mode,
blocks will occur based on matching values from the cloud, or blocklists created by you as the administrator.
You will now create Policies in the AMP for Endpoints console. To speed up this process, we will clone our audit policies as a
starting point, then edit each cloned policy with the required modifications.
2. The Policies page will appear and display all existing policies. Type ABC in the search window, then click the
magnifying glass to perform a policy search on the All Products tab.
3. Click the plus sign to expand the ABC - Linux Server Audit Policy.
5. You should now see a new policy in the list: Copy of ABC - Linux Server Audit
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 112 of 325
Cisco dCloud
6. Before editing this new policy, we will create the remaining 2 copies of the other Audit policies using the same process we
just utilized:
7. Once you have completed duplicating the other 2 policies, you should see a total of 6 policies for the ABC deployment. 3
“ABC”, and 3 “Copy of ABC” policies.
8. We can now proceed to the next section where we will modify each duplicated policy as required.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 113 of 325
Cisco dCloud
1. Expand the Copy of ABC - Linux Server Audit policy by clicking the associated plus sign. Be certain that this is the
Copy, and not the original policy.
3. You should now see the contents of the Copy of ABC - Linux Server Audit policy
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 114 of 325
Cisco dCloud
d. Do not change any other settings on the Modes and Engines page of this policy form.
5. Click Outbreak Control on the left side of the form. Notice how the other settings have carried over as part of the policy
duplication process as well.
6. Click Save at the bottom of the form to save the modify Protect policy.
7. After saving, you will see the following message in the console.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 115 of 325
Cisco dCloud
8. Type ABC in the policy search field at the top of the page, then click the magnifying glass to filter for our custom
policies.
9. You should still see 6 total ABC policies, but now only 2 are listed as “Copy of”. Additionally, you should now see the
newly created ABC - Linux Server Protect policy.
10. We can now continue to the next lab section to customize another duplicated policy as required.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 116 of 325
Cisco dCloud
1. Expand the Copy of ABC - Windows Endpoint Audit policy by clicking the associated plus sign. Be certain that this is
the Copy, and not the original policy.
3. You should now see the contents of the Copy of ABC - Windows Endpoint Audit policy
b. Description: Protect mode policy for Windows desktops and laptops utilized by end users
e. Do not change any other settings on the Modes and Engines page of this policy form at this time. In a production
deployment, you may choose to utilize Malicious Activity Protection and System Process Protection at this time.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 117 of 325
Cisco dCloud
5. Click Save at the bottom of the form to save the modified Protect policy.
6. After saving, you will see the following message in the console.
7. Type ABC in the policy search field at the top of the page, then click the magnifying glass to filter for our custom
policies.
8. You should still see 6 total ABC policies, but now only 1 is listed as “Copy of”. Additionally, you should now see the newly
created ABC - Windows Endpoint Protect policy.
9. We can now continue to the next lab section to customize our final duplicated policy.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 118 of 325
Cisco dCloud
1. Expand the Copy of ABC - Windows Server Audit policy by clicking the associated plus sign. Be certain that this is the
Copy, and not the original policy.
b. Description: Protect mode policy for Windows servers that are not Active Directory servers
d. Do not change any other settings on the Modes and Engines page of this policy form at this time.
4. Click Save at the bottom of the form to save the modified Protect policy.
5. After saving, you will see the following message in the console.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 119 of 325
Cisco dCloud
6. Type ABC in the policy search field at the top of the page, then click the magnifying glass to filter for our custom
policies.
7. You should still see 6 total ABC policies, but now you have 3 types of policies, each with an Audit and Protect version.
Note: You have successfully created protect policies for Windows Endpoints, Windows Servers, and Linux Server connectors. You
will now create the necessary Groups to associate with these policies that will allow AMP for Endpoint Connectors to be placed into
protect mode.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 120 of 325
Cisco dCloud
1. Click the Management menu and select the Groups menu item.
4. In the Description field enter Group to manage Windows endpoint devices in Protect mode
5. In the Windows Policy field choose the ABC - Windows Endpoint Protect policy item.
6. Leave all other settings at the default values and click the Save button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 121 of 325
Cisco dCloud
1. From the Groups page in the console, click the Create Group button.
3. In the Description field enter Group to manage Windows endpoint devices that fall under Compliance regulations in
Protect mode
4. In the Windows Policy field choose the ABC - Windows Endpoint Protect policy item.
5. Leave all other settings at the default values and click the Save button.
Note: The group you just made for the Compliance machines is using the policy you previously created for Windows
Endpoints in Protect mode. The machines that are members of the ABC - Windows Endpoints Protect group and machines
that are members of the ABC - Windows Compliance Protect group will have the same configuration applied to them at this
point (same exclusions, audit/block settings, user interface settings, etc.), but can be managed separately for reporting
purposes. Additionally, at a later time, the policy settings could be changed to a different policy, if the configuration of these
machines needed to be separate from the ABC - Windows Endpoint Protect group machines.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 122 of 325
Cisco dCloud
1. From the Groups page within the console, click the Create Group button.
3. In the Description field enter Group to manage Windows servers in Protect mode
4. In the Windows Policy field choose the ABC - Windows Server Protect policy item.
5. Leave all other settings at the default values and click the Save button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 123 of 325
Cisco dCloud
1. From the Groups page in the console, click the Create Group button.
3. In the Description field enter Group to manage Linux servers in Protect mode
4. In the Linux Policy field choose the ABC - Linux Server Protect policy item.
5. Leave all other settings at the default values and click the Save button.
Note: You have successfully created groups tied to Protect Mode policies. We will now be able to transition connectors from Audit
mode into Protect mode.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 124 of 325
Cisco dCloud
Note: Throughout this scenario, WKST1 will remain in the audit mode group for comparison purposes. WKST2 will be moved over
to the ABC - Windows Compliance Protect mode group. In production, you will likely utilize a staged migration similar to the steps
in this lab scenario to transition systems to protect mode, rather than moving all connectors simultaneously.
1. Click the Management menu and select the Computers menu item.
2. The list of all computers with the AMP for Endpoints connector installed will appear. You will now filter the list of
computers to show only those computers in the ABC - Windows Endpoints Audit group.
3. Click the plus sign next to Filters to expand the Filter section
Note: Notice the many options for filtering computers. This can be very beneficial for managing devices based on Operating
System, version of the AMP connector software, IP range, or other values that you may want to group machines together by over
time.
4. Click the drop-down menu for Group and select the ABC - Windows Endpoints Audit group
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 125 of 325
Cisco dCloud
6. You will see 2 systems have been returned: wkst1 & wkst2. We have been informed that wkst2 should be classified as a
compliance system and placed in Protect. Place a checkmark in the box associated with wkst2.
7. Click the Move to Group button and then select ABC - Windows Compliance Protect from the drop-down.
Note: The name may be abbreviated due to length of the window as shown in the example above.
8. Click the Move button to complete the move process for the computer
9. The move is successfully completed. In the following labs, you will now repeat the process for the other machines (with
the exception of WKST1) by moving them into their appropriate protect mode groups.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 126 of 325
Cisco dCloud
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 127 of 325
Cisco dCloud
1. Ensure you are still on the Management > Computers page of the console.
2. Clear the currently applied filter by clicking the Clear Filters button
3. Place a checkmark next to the entry for the Server1 computer in the list and click the Move to Group button.
4. The Move Computer to Group window will now appear. Choose the option to Move To Existing Group and select the
ABC - Windows Server Protect
Note: The name may be abbreviated due to length of the window as shown in the example below.
5. Click the Move button to complete the move process for the computer
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 128 of 325
Cisco dCloud
1. Ensure you are still at the Computers page of the console and no filters are applied
2. Place a checkmark next to the entry for the centos computer in the list and click the Move to Group button.
3. The Move Computer to Group window will now appear. Choose the option to Move To Existing Group and select the
ABC - Linux Server Protect
4. Click the Move button to complete the move process for the computer
5. The move is successfully completed. You have completed all the Protect Mode group transitions required at this time as
wkst1 should remain in Audit.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 129 of 325
Cisco dCloud
Note: You cannot quarantine a file through creating a Simple Custom Detection if the hash of the file has a “Clean” disposition in
the AMP cloud. If you attempt to do so, the attempt will fail, and you will be notified that you should create an application block
instead.
Important! AMP for Endpoints will not allow a file that has a clean disposition to have an SCD created for it. Because of this, any
file that has been seen by the AMP cloud, and is not deemed to be malware, will become classified with a clean disposition over a
period of time unless malicious behavior is found to be associated with the file. In order for this lab scenario to function and allow
you to create a Simple Custom Detection, you must use a file that has an “Unknown” disposition within AMP. This is difficult since
any file used for lab purposes over time will become either classified as Clean or Malicious and the lab exercise will no longer
function. For the purposes of this lab, you will run a script that will generate a file with a new hash (unique identity) so that it will
have an “Unknown” disposition. This will allow us to quarantine using an SCD in the AMP for Endpoints console. This process of
creating the file is only for the purposes of the lab in order for us to simulate a new file in a customer environment that the AMP
cloud has not yet seen and classified but that the customer needs quarantined immediately. The steps required to generate this file
are not a normal administrative task and are only used here to create a file that AMP has not seen so that it can be quarantined
manually. In production customer environments, you can simply skip to creating a SCD with the hash of the unknown files or
creating application blocks for files that the customer does not want to execute but that are classified as Clean by AMP. Please
proceed with the lab instructions as this SCD lab will not function correctly without generating the unique file.
2. Open File Explorer on the Jumphost workstation by double-clicking the JUMPHOST shortcut on the desktop
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 130 of 325
Cisco dCloud
4. Double-click on the DataGen.bat file to execute the script that will generate an executable file with an unknown
disposition to be used in this lab scenario. This batch file will create a unique executable file every time it is run and
transfer the file to both the WKST1 and WKST2 machines. If you run this batch file more than 1 time, it will create a file
with a new hash each time. Please ensure you are using the correct hash value later in the lab as you create the SCD.
5. Wait for the batch file to complete and prompt you to continue. Press the Enter key to continue and close the batch file
screen.
6. Using the File Explorer window on the screen, navigate to the “C:\Setup Files\NoSleepyTime” directory. You should now
see a file in that location named NoSleepyTime.exe
7. You now have a new unique file that does not have a Clean disposition in AMP. Please proceed with the remainder of the
lab.
Note: Remember that the previous steps used to create the file were only required in the lab environment to produce a unique
executable file. In a normal deployment, this would not be necessary. You would either create the SCD based on the hashes
provided by the customer or create application blocks.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 131 of 325
Cisco dCloud
1. Ensure you are logged in to the AMP for Endpoints console from the Jumphost workstation
2. Click the Outbreak Control menu, navigate to the Custom Detections section and select the Simple menu item.
3. The Custom Detections - Simple page appears. The ABC - Quarantine List item is displayed on the screen with all the
groups and policies that utilize this SCD. Click the Edit button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 132 of 325
Cisco dCloud
5. You will now upload a copy of the file the customer has provided to you that they desire to be quarantined. The console
will calculate the SHA-256 hash of the file and enter the value into the SCD. If you already had the hash of the file, you
could enter that instead on the Add SHA-256 tab. In this case, we have the file and will upload it. Click the Browse button.
dCloud: The Cisco Demo Cloud
6. Navigate to the C:\Setup Files\NoSleepyTime directory on the Jumphost machine, select the NoSleepyTime.exe file,
and click the Open button
7. In the Note field, enter the text Unauthorized File - NoSleepyTime and click the Upload button
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 133 of 325
Cisco dCloud
8. You should receive a message indicating that the file was successfully uploaded.
9. Click the Edit button on the ABC - Quarantine List object to review the entry you just created.
10. Click the hash under “Files Included” to see the details for the file you just uploaded (the IP address of the connection
that created the entry, the user account that created the entry, and the date/time stamp when the entry was created).
Note: The hash values you see in your lab for the file will be different than what is shown for the lab document screenshots as
each instance of the NoSLeepyTime.exe file has a unique hash.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 134 of 325
Cisco dCloud
11. Click on the hash of the file and note that the disposition is Blacklisted due to you adding the hash to a Simple Custom
Detection.
12. You have successfully created a Simple Custom Detection for the file your customer requested you to quarantine. Any
connector that is a member of a group using a policy that references this SCD object will now quarantine the file.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 135 of 325
Cisco dCloud
SCD Testing
You will now test the SCD by executing the file that you just added to the SCD. dCloud: The Cisco Demo Cloud
2. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the Wkst1
computer
3. You should automatically be logged onto the Wkst1 machine. You can verify that you are logged into the Wkst1 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
4. Launch the File Explorer on WKST1 by double-clicking on the WKST1 shortcut on the desktop.
5. Navigate to the Local Disk C:\Setup Files\NoSleepyTime directory. (Make sure you are on the Local Disk of WKST1
and NOT one of the other mapped drives to the JUMPHOST)
7. You are presented with a notification when the file is launched. Click the OK button to close. The file was allowed to
execute even though it should be quarantined because the WKST1 machine is running an audit mode policy.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 136 of 325
Cisco dCloud
8. Open an Admin Command Prompt on WKST1 by right-clicking the windows Start button and selecting Command
Prompt (Admin). Click Yes to allow.
9. Terminate the NoSleepyTime.exe process on WKST1 by running the command taskkill /im nosleepytime.exe /f
11. Return to the AMP for Endpoints console on the Jumphost machine. You will now review the events generated by the
WKST1 machine.
12. Click the Analysis menu and select the Detections / Quarantine menu item.
13. Expand the event entry for WKST1 showing the detection of NoSleepyTime.exe by clicking the plus symbol. Notice
AMP for Endpoints detected this as a Simple_Custom_Detection. Also notice that the event shows Quarantine: Not
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 137 of 325
Cisco dCloud
Seen. This is due to the connector being in an audit mode policy. AMP for Endpoints shows the detection but does not
block the file from executing or quarantine the file.
14. You will now attempt to run the file from the WKST2 machine in protect mode.
15. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the WKST2
computer
16. You should automatically be logged onto the Wkst2 machine. You can verify that you are logged into the Wkst2 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
18. Launch the File Explorer on WKST2 by double-clicking on the WKST2 shortcut on the desktop.
Note: If you do not see the file in the directory below, it is most likely due to it already being quarantined. This behavior is normal,
and you can continue in the lab.
19. Navigate to WKST2 Local Disk C:\Setup Files\NoSleepyTime directory. (Make sure you are on the Local Drive of
WKST2 and not on a remote mapped drive.)
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 138 of 325
Cisco dCloud
a. Possibility 1: File is missing or is does not execute when double-clicked: Depending on the timing of your lab
progress and your connector’s current behavior, the AMP for Endpoints Connector may have
dCloud:already discovered
The Cisco Demo Cloud
the file and initiated a quarantine action against it to remove it from the directory. If the file is missing, proceed
with the lab.
b. Possibility 2: File exists but executes normally and is not prevented: If your execution of NoSleepyTime.exe is
successful and you see the application notification screen (you should not see this), you may need to Sync the
Connector policy on WKST2 (Your connector has not learned of its policy assignment change yet). Due to the
nature of the lab environment, it is possible you are performing lab tasks faster than the updates are occurring.
To force a policy sync on WKST2, click on the “Cisco AMP for Endpoints Connector” tray icon near the clock in
the bottom right corner of the screen (you may need to show the hidden icons). Once the AMP Interface opens,
click Settings, then click the Sync Policy button. After the policy is Sync’d, attempt to run NoSleepyTime.exe
again. It should now fail.
c. Possibility 3: File executes normally and the Connector believes it is up to date: It is possible that the policy
assignment on the Group that contains WKST2 has not yet updated within the AMP cloud. If you look at the
computer in the console, you may see that the Group assignment is correct, but the Policy change has not yet
been applied to the Group.
We can validate that our Group is configured correctly via Management > Groups:
If this is the case, you must be patient and wait for the policy configuration to take place in the AMP cloud prior to
testing. You may choose to wait for a bit until the policy changes or move ahead with the lab as best you can at
this time and revisit the outcome later. Alternatively, you can attempt to modify the policy attached to the ABC –
Windows Compliance Protect group, then after saving the change, modify it back to the correct ABC – Windows
Compliance Protect Policy and save it again. Occasionally, this will speed up the transition. Do not forget that
you may need to Sync Policy on the WKST2 system after ensuring the correct configuration is ready in the AMP
cloud.
22. Return to the AMP for Endpoints console running on the Jumphost machine
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 139 of 325
Cisco dCloud
23. Click on the Analysis menu and select the Events menu item
24. Change the filter settings to show events from the Time Range = Day and from Group = ABC - Windows Compliance
Protect as shown below dCloud: The Cisco Demo Cloud
25. Expand the entry for WKST2 by clicking the plus symbol. Notice the event type is either Quarantine: Successful or
Executed: Malware depending on your testing outcome and timing of the actions taking place during your lab. (both
images are displayed below) The file was discovered by the connector and successfully quarantined due to the connector
being in protect mode.
Note: Quarantining a file removes it from the connector rather than just blocking the execution of the file.
26. You have successfully created a Simple Custom Detection for a hash that the AMP cloud had not already classified. All
machines in protect mode within our customer environment will now quarantine the file. All audit mode machines will
report on the detection.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 140 of 325
Cisco dCloud
1. Ensure you are logged in to the AMP for Endpoints console from the Jumphost workstation
2. Click the Analysis menu and select the Vulnerable Software menu item.
3. The Vulnerable Software page appears and displays several applications identified in the customer environment as
having vulnerabilities. (Your list may vary from what is displayed below)
4. Expand an entry for the Oracle Java Platform. Notice that the console displays the number of vulnerabilities, the specific
CVE numbers, the groups that contain connectors that have observed the vulnerable application, the last computer the
file was observed on, as well as links to view additional data in the File Trajectory, Device Trajectory, and Events pages
within the console.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 141 of 325
Cisco dCloud
5. Click on one of the CVE entries to view the information about the vulnerability.
6. Return to the AMP for Endpoints Console Vulnerable Software tab in your browser
7. Click on the hash of the Java file to open a menu. Notice that the Disposition is Clean meaning that the file is not being
classified as malicious and will not be quarantined by AMP for Endpoints.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 142 of 325
Cisco dCloud
8. From the file hash menu, select Outbreak Control, select Application Blocking, and select the ABC - Application
Block List menu item
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 143 of 325
Cisco dCloud
9. There may not be any visual confirmation that the file has been added to the Block List entry. Mouse over the Application
Blocking menu again and you will see a check mark in the entry for ABC - Application Block List confirming it has been
added to the block list.
dCloud: The Cisco Demo Cloud
10. Repeat the previous steps for ALL the other entries shown in the Vulnerable Software list for Java. If there is only a single
Java entry in the list you may proceed with the lab. Do NOT perform the steps for Adobe Acrobat Reader at this time.
a. For each in the list, Click the file hash for the application, select Outbreak Control, select Application
Blocking, and select the ABC - Application Block List menu item
b. NOTE: If the popup menu goes off the bottom of your screen, while hovering the mouse over the menu option,
press the down-arrow on your keyboard to scroll downward. (only if necessary)
11. You will now view the settings of the ABC - Application Block List item.
12. Click the Outbreak Control menu, navigate to the APPLICATION CONTROL section, and select the Blocking menu
item.
13. The Application Control - Blocking screen appears with the entry for the ABC - Application Block List item on the
screen. All the policies and groups that utilize this block list are shown on the screen.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 144 of 325
Cisco dCloud
Note: You will see that you can specify specific SHA-256 hashes, upload a file, or upload a file containing SHA-256 hashes to
block files. This is the same method used to specify files for Simple Custom Detections.
15. Verify that you see the entries for the files you added from the Vulnerable Applications screen in the block list’s Files
Included section. (your hashes may vary)
16. Click on the first of the file hashes. Note that you are able to see audit information about which user account added the
hash value. You are also able to delete the entry if needed. Do not delete the entry.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 145 of 325
Cisco dCloud
17. You have verified your application block entries exist and have become familiar with where in the interface to administer
the entries for application blocking.
18. You will now test the behavior on the WKST1 computer in audit mode and the WKST2 computer in protect mode by
launching the applications that you just blocked.
19. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the Wkst1
computer
20. You should automatically be logged onto the Wkst1 machine. You can verify that you are logged into the Wkst1 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
21. On the desktop of the WKST1 machine, close any open windows, then double-click on the Simple Calculator shortcut
to run the Marketing department’s critical application.
22. The Simple Calculator application appears on the screen. Perform some basic calculations to simulate use of the
application and then close the window.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 146 of 325
Cisco dCloud
23. Close the Remote Desktop Connection to the WKST1 machine and return to the desktop of the Jumphost machine
24. Return to the AMP for Endpoints Console on the Jumphost machine
26. When the Events dashboard appears, you will edit the filter settings to show the appropriate data.
27. Change the Time Range value to Day in order to show current events
28. Click the plus symbol in the Group filter setting and select the ABC - Windows Endpoint Audit as well as the ABC -
Windows Compliance Protect group to filter event data only for connectors that are members of those groups
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 147 of 325
Cisco dCloud
29. There should be several event entries that appear on the screen that show that the connector detected the application
execution but did not block the execution. Notice the Event Type is Detected. Click on the entry for the Java process to
expand it.
a. If you do not have entries for wkst1, it is possible that your system had not pulled the policy updates yet. You can
return to the wkst1 system, sync the AMP policy, run the Calculator app again, and return to the console on the
Jumphost to see the events.
b. If you continue to not see the entries, it could be a delay in the AMP Cloud. Continue with the labs, and check in
on this later in the day or tomorrow and continue working.
30. The expanded details show the computer that the detection event was generated on, the current user account logged in
to the connector computer, and links to open up the Device Trajectory and Management windows for the computer as well
as the ability to initiate a scan against the computer if desired.
31. The WKST1 machine is in audit mode due to its group membership and policy configuration. The connector will report on
what would have happened if the machine was in protect mode but will not actually block the application.
32. You will now test the behavior of the WKST2 machine that is in protect mode due to it being a member of the ABC -
Compliance Protect group and review the event data in the console
33. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the WKST2
computer
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 148 of 325
Cisco dCloud
34. You should automatically be logged onto the Wkst2 machine. You can verify that you are logged into the Wkst2 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
dCloud: The Cisco Demo Cloud
35. On the desktop of the WKST2 machine, double-click on the Simple Calculator shortcut to run the Marketing
department’s critical application.
b. If the application is not blocked, please verify that you have created an Application Block for the javaw.exe file
that is being executed by the Simple Calculator shortcut. There are several Java processes that may be
identified as vulnerable but the application runs from javaw.exe.
Note: The default policy configuration is to not show File Events in the AMP for Endpoints connector client interface. This is the
reason that no block message was displayed when the applications failed to launch. This can be changed in the Policy settings
under Advanced Settings > Client User Interface.
36. Close the Remote Desktop connection to WKST2 and return to the Jumphost machine to view the data in the AMP for
Endpoints console
37. Refresh the Event window in the AMP for Endpoints console to see the new events that should have occurred due to
attempting to launch the applications on the WKST2 machine. If you have closed the event window, please refer to the
earlier steps in the lab to open it again and apply the correct filter.
38. You should see events showing that the WKST2 machine actually blocked the execution of the Java files. Notice that the
event type is Blocked Exec now that the connector is actually blocking the execution rather than the Detected Exec
event type when the machine was in audit mode.
a. If you do not see the entries in the console, it could be a delay in AMP Cloud reporting. Check on this later today,
or tomorrow and continue working.
39. Expand the entry for one of the blocked events shown on the page and click the Device Trajectory link
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 149 of 325
Cisco dCloud
40. The Device Trajectory page opens, showing the execution block events for the application symbolized by the red circles
(see the key at the bottom for symbols). Notice that the process is not being marked as malicious. This is shown by the
process being displayed in green rather than red.
dCloud: The Cisco Demo Cloud
41. You have successfully verified that you are able to block vulnerable applications from executing on machines in protect
mode without quarantining the files and that machines in audit mode are not affected by the block but still report on the
execution.
42. Your customer has requested that you change the client user interface settings to show file and network events on the
AMP for Endpoint connector user interface. You will now make the configuration changes required to show notifications in
the connector user interface.
43. Click the Management menu and select the Policies menu item
44. Expand the entry for the ABC - Windows Endpoint Protect policy.
a. Notice that this policy is in use by two groups, the ABC - Windows Endpoint Protect group (used for generic
windows workstation machines in protect mode) and the ABC - Windows Compliance Protect group (used for
machines that fall under compliance regulations such as PCI, HIPAA, or other polices). Modifying the policy
settings for this policy will affect all connectors in groups that use this policy. At this point in the lab, only the
WKST2 machine will be affected.
46. The policy settings page appears. Click the Advanced Settings menu, select the Client User Interface sub-menu, and
uncheck the following options:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 150 of 325
Cisco dCloud
Note: Notice that the informational icons next to the options change color when a non-default option is set. You can hover over the
information icon to determine what the default value for the setting was.
48. You will now connect to the WKST2 machine and test your user interface changes
49. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the WKST2
computer
50. You should automatically be logged onto the Wkst2 machine. You can verify that you are logged into the Wkst2 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 151 of 325
Cisco dCloud
51. The connector will automatically update its policy settings over time. However, you want to force the update to happen
immediately, so you can perform your testing.
52. Click the notification area arrow in the bottom right of the screen next to the time/date to displaydCloud:
the system tray
The Cisco icons.
Demo Cloud
53. Double-click on the Cisco AMP for Endpoints icon that looks like a blue circle with white lines on it.
54. The Cisco AMP for Endpoints connector UI appears. Click the Settings button.
55. The Settings page appears. Click the Sync Policy button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 152 of 325
Cisco dCloud
56. You are notified that the policy has been successfully updated. Click the OK button and close the settings menu and
close the Cisco AMP for Endpoints Client page.
57. Open the Simple Calculator application by double-clicking on the Simple Calculator shortcut on the desktop
58. You will now see the Process Blocked message in the lower right of the screen. Close any message and dialogs when
you have completed reviewing them.
59. You have successfully configured the client UI notifications to show when the connector takes a block action.
60. Close the remote connection to WKST2 and return to your AMP console on Jumphost.
Note: Each customer deployment may have different requirements for configuring the client UI. It is a best practice to ensure that
the customer understands the options available for end user notifications and that the settings that are desired in the customer
environment be tested and finalized during the initial deployment to ensure customer satisfaction. In some environments, it is not
desirable to have any notifications at all due to potential user confusion the impact it may have on new helpdesk tickets. In other
environments, it may be beneficial to ensure that the notifications are enabled so that it is easily determined whether AMP for
Endpoints was involved in a situation where an application or file is being blocked. Without the end user notification, application
issues may be blamed on the AMP connector when it actually has nothing to do with the problem that is occurring.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 153 of 325
Cisco dCloud
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 154 of 325
Cisco dCloud
Your customer, the ABC Company, uses imaging technology to deploy all workstations. The WKST3 machine is being used as
their master image. They have asked you to ensure that no applications already installed in the image will be blocked by AMP for
Endpoints. The customer imaging team has stated that all applications and custom executable files are located in the following
paths:
• C:\ProgramData
• C:\Program Files
• C:\Program Files (x86)
Additionally, your customer has some other critical files that execute from a network path that they also require to be whitelisted.
You will generate a list of hashes from the network location as well as the files on the master image in order to upload these to
AMP for Endpoints, so they can be whitelisted. The MD5Deep utility and its associated files will be used to generate SHA-256
hashes of all required files.
2. Right-click on the Start button in the lower left of the screen and select the Command Prompt (Admin) item.
3. If prompted by the User Account Control window, click the Yes button to allow the program to make changes.
4. Change directory to the location of the MD5Deep utility by typing the command cd “c:\setup files\md5deep” and
pressing Enter.
5. The hashing utility does not accept network UNC paths, so you will create a mapped network drive to the files on
\\ad1\apps to access the files via command line:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 155 of 325
Cisco dCloud
Note: The -r parameter of sha256deep64.exe instructs the tool to move recursively through the specified path and hash all files in
that path and all files in all subdirectories of the path. The greater than arrow, >, is used to capture the output of the command to a
file that can then be uploaded to the AMP for Endpoints console.
c. When the command finishes and the prompt returns (it may take a few minutes), type the command:
i. notepad.exe appsharehashes.txt
6. The results of the hashing process are displayed in the text file. You will now upload the file to the Whitelisting object you
created earlier to whitelist these files for your customer.
7. Close notepad.exe
9. Click the Outbreak Control menu and select the APPLICATION CONTROL > Whitelisting menu item.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 156 of 325
Cisco dCloud
10. Click the Edit button on the ABC - Application Whitelist item.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 157 of 325
Cisco dCloud
13. When prompted for the file to upload, navigate to the C:\Setup Files\md5deep directory and choose the
appsharehashes.txt file. Click the Open button once you have selected the correct file.
14. In the Note field, type Network App Share and click the Upload button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 158 of 325
Cisco dCloud
15. You will receive a message that the contents of the uploaded file will be processed in the background. It could take a little
while for the hashes to appear. Continue to work in the labs and check back on this later today or tomorrow.
16. Click the Edit button on the ABC - Application Whitelist item.
17. Notice that now all the file hashes contained in the file you uploaded have been added to the whitelist. (If they are not
here yet, wait a few minutes and refresh the page. Depending on the time of day and load on the AMP cloud, it is possible
that this takes a bit of time. Feel free to continue with the labs and check on this later today or tomorrow.)
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 159 of 325
Cisco dCloud
You have successfully created the hash list for the customer’s custom network application share and added those hashes to the
whitelist, so they will not be blocked even if they have a malicious disposition in the cloud.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 160 of 325
Cisco dCloud
2. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the Wkst3
computer.
3. You should automatically be logged onto the Wkst3 machine. You can verify that you are logged into the Wkst3 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
4. Right-click on the Start button in the lower left of the screen and select the Command Prompt (Admin) item.
5. If prompted by the User Account Control window, click the Yes button to allow the program to make changes.
6. Change directory to the location of the MD5Deep utility by typing the command cd “c:\setup files\md5deep” and press
Enter.
a. You may get some denies in specific areas, such as Windows Defender. This is ok and expected.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 161 of 325
Cisco dCloud
b. Once the command finishes and the prompt returns, continue with the next command.
a. Once the command finishes and the prompt returns, continue with the next command.
10. Once the command completes, open File Explorer, navigate to the C:\Setup Files\md5deep folder, right-click on the 3
text files you just generated and select the Edit with Notepad++ menu item.
11. Review the contents of the files. Notice the sha256 hash as well as the file path exists for each entry.
13. Close the remote desktop connection to wkst3 and return to the Jumphost machine.
14. Open the AMP for Endpoints Console, click the Outbreak Control menu, and select the APPLICATION CONTROL >
Whitelisting menu item.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 162 of 325
Cisco dCloud
15. Click the Edit button on the ABC - Application Whitelist item.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 163 of 325
Cisco dCloud
Note: The Jumphost machine has mapped network drives to the other computers in the lab so files can be transferred. In the next
step you are accessing files on the WKST3 machine that you generated the hashes on.
18. Navigate to the path Q:\Setup Files\md5deep when prompted for what file to upload, select the master-programdata.txt
file, and click the Open button.
19. In the Note field type Master Image - ProgramData and click the Upload button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 164 of 325
Cisco dCloud
20. The console displays that it is processing the contents of the file in the background. Click the Edit button to upload
another file.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 165 of 325
Cisco dCloud
23. Navigate to the path Q:\Setup Files\md5deep when prompted for what file to upload, select the master-programfiles.txt
file, and click the Open button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 166 of 325
Cisco dCloud
24. In the Note field type Master Image - ProgramFiles and click the Upload button.
25. The console displays that it is processing the contents of the file in the background. Click the Edit button to upload
another file.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 167 of 325
Cisco dCloud
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 168 of 325
Cisco dCloud
28. Navigate to the path Q:\Setup Files\md5deep when prompted for what file to upload, select the master-
programfilesx86.txt file, and click the Open button.
29. In the Note field type Master Image - ProgramFilesx86 and click the Upload button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 169 of 325
Cisco dCloud
31. Wait a short (or possibly long, depending on the current AMP cloud load) period of time and refresh the page to view the
new file count in the whitelist.
a. If this is taking a long time to update, you can return later today or tomorrow to check on the progress.
Note: The number of files may not be exactly that shown in the screenshot of the lab. This is normal, and you may proceed.
You have successfully ensured that the custom network application files and specific portions of the customer’s master image are
in the whitelist. None of these files will be blocked even if they are assigned a malicious disposition. There are several utilities that
have a malicious disposition in the cloud due to being used for nefarious purposes but that are also used by valid and benign
software applications. Creating hash lists like you did in the previous scenario can ensure these apps are approved in the
beginning of a deployment so you don’t have to troubleshoot after connectors are deployed. It is important to ensure that the files
on the master image are pristine and that no actual malware exists as the effects of whitelisting malware on a master image could
be highly detrimental. AMP for Endpoints does not allow a file size over 20MB to be uploaded with hash data.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 170 of 325
Cisco dCloud
the hash. You will utilize the centos Linux machine to assist with created the ACD in the lab. In production, you should use a
dedicated machine that is segmented from the network when dealing with and analyzing potentially malicious files.
In this scenario, we will be using “fake” malware. This is a lab requirement due to the fact that AMP would quarantine any known
malware by default and the lab would not function properly. The files in use in the lab are meant to simulate a potential threat that
has not yet been given a disposition by AMP.
There are many ways to analyze files. The methods used in the lab can be helpful in a real deployment but may need to change
based on the circumstance and the type of file being analyzed. The steps in the lab should be used as an example for a given
situation rather than a specific procedure in every case.
You will be creating two types of Advanced Custom Detections. One will be using characteristics contained in the PE header of a
binary file to match on files that are similar but have different hashes. The second ACD you will create will be based on a string
value contained inside of a file.
2. The centos Linux Server must be running an audit mode policy before continuing. We will now place the centos connector
in the ABC - Linux Servers Audit group before continuing with this lab:
d. Select ABC - Linux Server Audit from the Select Group drop-down
3. The Centos Linux system should be in Audit mode, but the connector may not receive the policy update before you
transfer the files. You will run a manual policy sync shortly
4. You will now generate additional files on the Jumphost machine in order to use with the ClamAV signature creation
process.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 171 of 325
Cisco dCloud
a. Open File Explorer on the Jumphost machine and navigate to the Local Disk directory C:\Setup
Files\NoSleepyTime
b. Rename the NoSleepyTime.exe file to NoSleepyTime1.exe by right-clicking on the file, selecting the Rename
menu item, typing the new name, and hitting Enter.
d. Double-click on the DataGen.bat file to execute the script that will generate another executable with a unique
hash.
e. Wait for the batch file to finish and prompt you to continue. Press the Enter key to continue and close the batch
file screen.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 172 of 325
Cisco dCloud
f. Using the File Explorer window on the screen, navigate to the “C:\Setup Files\NoSleepyTime” directory. You
should now see a file in that location named NoSleepyTime.exe
i. Double-click on the DataGen.bat file to execute the script that will generate a third executable with a unique
hash.
j. Wait for the batch file to finish and prompt you to continue. Press the Enter key to continue and close the batch
file screen.
k. Using the File Explorer window on the screen, navigate to the “C:\Setup Files\NoSleepyTime” directory. You
should now see a file in that location named NoSleepyTime.exe
5. You now have three files with unique hashes but perform the same tasks. The Simple Custom Detection entry you added
for the NoSleepyTime.exe file earlier was based on its specific hash value. Only the NoSleepyTime1.exe file will match on
the SCD entry (since that is the file we originally renamed). The other two files will not be blocked even though they
perform the same function. You will now transfer these files to a machine to analyze them, so you can write a ClamAV
signature
6. Open the PuTTY application on the Jumphost by double-clicking on the shortcut located on the desktop.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 173 of 325
Cisco dCloud
8. Click the Logging menu on the top left in the Category pane and enter the following values
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 174 of 325
Cisco dCloud
9. Click the Session menu on the top left in the Category pane and enter the following values:
11. When prompted for the user name and password, use the following values:
b. Password: C1sco12345
13. The policy is now synced so the connector understands it is in audit mode.
14. Leave the Putty SSH window open. You will return to the window later in the lab.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 175 of 325
Cisco dCloud
15. You will now utilize WinSCP to transfer the files to the Linux server so the ClamAV signatures can be created. Open the
WinSCP application using the shortcut on the desktop of the Jumphost machine.
a. If prompted to upgrade, simply click Close. dCloud: The Cisco Demo Cloud
c. Port number: 22
e. Password: C1sco12345
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 176 of 325
Cisco dCloud
19. If presented with a Warning screen referring to the SSH key fingerprint, click the Yes button to proceed.
20. You will now transfer the required files needed for both the PE header ACD and the string value ACD scenarios.
21. Double-click on the clamavsigs folder on the right window pane to enter the directory on the centos machine.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 177 of 325
Cisco dCloud
22. Select the badbos.rtf file in the Documents directory on the left window pane, right-click on the file, and choose the
Upload menu option.
24. Ensure the file is in the /root/clamavsigs directory on the right window pane before proceeding.
25. You will now transfer the three NoSleepyTime files you created earlier. Navigate to the C:\Setup Files\NoSleepyTime
directory in the left window pane of the WinSCP application.
a. You can use the up-arrow folder to navigate towards the root of C: until you locate the Setup Files folder in the
left window pane.
26. Upload the three NoSleepyTime*.exe files to the /root/clamavsigs directory again by selecting all three files, right-
clicking the files, and choosing the Upload menu option.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 178 of 325
Cisco dCloud
28. You should now see all the required files in the /root/clamavsigs folder.
Note: In a production deployment, you should use a dedicated machine that is segmented from the rest of the network for any type
of potential malware analysis activity. The centos machine is being used in this lab for the purposes of completing the lab. In a
customer environment, you would not use a standard production machine for this purpose.
31. In order to updated the ClamAV signatures, Type the command sudo freshclam -v and press Enter
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 179 of 325
Cisco dCloud
a. You may see some errors along the way, this is normal. Let the process complete.
dCloud: The Cisco Demo Cloud
32. Once the signature update completes, Type the command cd /root/clamavsigs/ and press Enter.
33. We can now analyze the files provided to you by the customer within this environment.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 180 of 325
Cisco dCloud
1. Ensure you are logged in to the centos machine via Putty from the Jumphost workstation.
3. A large amount of text will output to the screen. Once the command is finished, you will see a SCAN SUMMARY message
appear.
a. Ensure that Scanned Files: 1 is present in the SCAN SUMMARY or your Centos system may still be in Protect
mode and may have quarantined the file upon execution due to the SCD that is present in the policy.
i. If Scanned Files = 0, you may need to ‘sync’ your linux client to ensure it is instructed to be in
Audit mode, as well as you will need to return to the WinSCP window and again Upload
NoSleepyTime1.exe to the centos system. Once the file is back in place, re-run the clamscan
command. If you continue to have the issue, double check your current policy (it should be
Audit).
b. Notice that since we used the built-in ClamAV signatures, and this file is not seen as a virus, Infected Files = 0.
4. Open the Putty output log file C:\Setup Files\putty.log with the Notepad++ application by using the Notepad++ shortcut
on the Jumphost system and opening the file at C:\Setup Files\putty.log.
5. There are thousands of lines of output from the debug command. You do not have to review all the data in the log file.
Attempt to find some of the following entries in the file: (you can press CTRL+F to search the open document)
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 181 of 325
Cisco dCloud
6. Close Notepad++
7. In the Putty SSH window, Type the command strings NoSleepyTime1.exe and press Enter. This will output all text
strings contained in the file. This can be useful in certain circumstances when attempting to gather more information about
files.
8. Briefly review the output from the strings command by scrolling back in the SSH window and then proceed with the lab. In
this instance, you will not utilize any of the output from the strings command.
10. The PE (portable executable) sections of the file are exported to dat files in the current directory.
11. Type ls and press Enter to see that the PE Header Section *.dat files were created
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 182 of 325
Cisco dCloud
12. Type the command sigtool --mdb *.dat > ABC-SigDB01.mdb and press Enter
13. Type the command clamscan -d ABC-SigDB01.mdb NoSleepyTime1.exe and press Enter
14. Using the signature database (mdb file) you created from the PE headers, the NoSleepyTime1.exe file is now being
detected as a virus (Infected Files: 1). You will now check the other two instances of the file that each have unique
hashes.
15. Type the command clamscan -d ABC-SigDB01.mdb NoSleepyTime2.exe and press Enter. The second file is detected
as well (Infected Files: 1) even though it too has a different hash.
16. Type the command clamscan -d ABC-SigDB01.mdb NoSleepyTime3.exe and press Enter. The third file is detected
even though it has a different hash as expected.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 183 of 325
Cisco dCloud
17. You will now view the contents of the signature file you have created so the data can be entered into the AMP for
endpoints console.
18. Type the command cat ABC-SigDB01.mdb and press Enter. The contents of the ClamAV signature file are displayed.
Leave the Putty window open.
a. If your putty window is wrapping lines to a second line, you can widen or full screen your putty screen and re-run
your last command.
19. Return to the AMP for Endpoints console, click the Outbreak Control menu, and select the CUSTOM DETECTIONS >
Advanced menu item
20. Click the Create Signature Set button on the Custom Detections - Advanced page.
21. In the Name field, type ABC - Advanced Quarantine List, and click the Save button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 184 of 325
Cisco dCloud
22. Click the Edit button on the ABC - Advanced Quarantine List signature set.
24. The Add Signature window appears prompting for the value to add. Using the following steps, you will now copy each line
from the MDB file on the Linux server and add a signature value for each line in the MDB file.
b. Return to the Putty window and copy the first line of text shown. Be sure to get the entire entry as it may wrap to
the next line (do not grab any trailing whitespace beyond the end of the line).
i. To copy text in a Putty window, simply highlight the line with your mouse. Upon releasing the mouse
button, the text is automatically copied to your clipboard.
c. Paste the text into the Signature field on the AMP for Endpoints console window and click the Add Signature
button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 185 of 325
Cisco dCloud
25. Click the Add Signature button to add the second entry.
a. Return to the Putty window and copy the second line of text shown.
b. Paste the text into the Signature field on the AMP for Endpoints console window and click the Add Signature
button.
26. The signature is added. Click the Add Signature button to add the third entry.
27. Repeat the procedure until all 5 lines of the ABC-SigDB01.mdb file have been added as individual signatures as shown
below.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 186 of 325
Cisco dCloud
28. Once all 5 entries are added as signatures, click the Build Database From Signature Set button.
29. You should receive a browser pop-up window stating that Your signature was successfully built. Click the OK button.
30. You have successfully created the ACD, but it is not currently associated with any policies. None of the customer’s
connectors will actually use the ACD until it is associated with a policy.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 187 of 325
Cisco dCloud
1. Ensure you are logged in to the AMP for Endpoints console from the Jumphost workstation.
2. Click the Management menu and select the Policies menu item.
3. Expand the entry for the ABC - Windows Endpoint Audit policy and click the Edit button.
5. In the Custom Detections - Advanced section click the drop-down menu and select the ABC - Advanced Quarantine
List entry.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 188 of 325
Cisco dCloud
9. In the Custom Detections - Advanced section click the drop-down menu and select the ABC - Advanced Quarantine List
entry.
11. You will now generate a new instance of the NoSleepyTime.exe file with a unique hash to test if the ACD detects and
quarantines the file even with the hash being different yet again.
12. Open File Explorer on the Jumphost workstation by double-clicking the JUMPHOST shortcut on the desktop
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 189 of 325
Cisco dCloud
14. Double-click on the DataGen.bat file to execute the script that will generate an executable file with an unknown
disposition to be used in the lab. You have already created an SCD earlier that is matching based on a unique hash. After
generating a new file, the hash will no longer match the SCD. You will be testing to see if the signature you made with the
dCloud: The Cisco Demo Cloud
ACD will work based on characteristics of the file even if the files are not exactly the same.
15. Wait for the batch file to finish and prompt you to continue. Press the Enter key to continue and close the batch file
screen.
16. Using the File Explorer window on the screen, navigate to the “C:\Setup Files\NoSleepyTime” directory. You should now
see a file in that location named NoSleepyTime.exe along with the previous iterations of the file you generated. The new
instance of the file has already been copied to the WKST1 and WKST2 machines.
44. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the Wkst1
computer.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 190 of 325
Cisco dCloud
45. You should automatically be logged onto the Wkst1 machine. You can verify that you are logged into the Wkst1 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
17. You will now ensure that the connector has the latest policy updates by opening the connector user interface and forcing
a policy update.
18. Click the taskbar icon arrow in the lower right corner of the screen in the system tray and double-click on the Cisco
AMP for Endpoints icon (blue circle).
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 191 of 325
Cisco dCloud
21. You may receive a message that notifies you that the policy is already up to date or that the policydCloud: The Cisco Demo Cloud
was updated
successfully depending on the timing of the connector’s communication to the AMP cloud.
23. Launch the File Explorer on WKST1 by double-clicking on the WKST1 shortcut on the desktop.
24. Navigate to the Local Disk C:\Setup Files\NoSleepyTime directory and double-click the NoSleepyTime.exe file to
launch the application.
25. You are presented with a notification from the file being launched. Click the OK button to close. The file was allowed to
execute even though quarantine was expected due to the WKST1 machine being in audit mode.
a. Open an administrative command prompt by right-clicking the Start menu and selecting Command Prompt
(admin). Click Yes to allow it to run.
27. Close the Remote Desktop window for WKST1 and return to the AMP for Endpoints console on the Jumphost machine.
You will now review the events generated by the WKST1 machine.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 192 of 325
Cisco dCloud
29. Expand the event for the WKST1 machine. Notice that the NoSleepyTime.exe was detected but not quarantined due to
the connector being in audit mode. dCloud: The Cisco Demo Cloud
30. Click the file hash next to Fingerprint (SHA-256). Notice that the Disposition is Unknown but that the connector is still
detecting the file through the ACD you created and not through the Simple Custom Detection rule that uses only the hash
of the previous file instance.
32. Using the AMP for Endpoint Connector client interface on wkst2, Sync the policy for this connector.
33. Once the policy is Sync’d, navigate to C:\Setup Files\NoSleepyTime\ and double-click NoSleepyTime.exe.
a. You may need to try more than once if you are working through the lab very quickly. Shortly after the Sync
request occurs, this system will learn about the new ACD configuration and quarantine the file.
35. Review the events to find the event for the WKST2 machine. Notice that the event type is Quarantine Successful, and that
it used Clam and not Simple_Custom_Detection.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 193 of 325
Cisco dCloud
1. Return to the Putty SSH session with the centos Linux server.
3. Type the command strings badbos.rtf | grep "Ad V1ct0r1am" and press Enter.
4. It appears that the identifying text string is present in the file. You will now analyze the file in a hex editor to obtain the hex
value for the string and view the contents of the file.
5. On the desktop of the Jumphost machine, double-click the HxD shortcut to launch the hex editor program.
6. Click the File menu and select the Open menu item.
7. Navigate to the Documents folder by selecting the Libraries folder on the left and then double-click on the Documents
folder.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 194 of 325
Cisco dCloud
9. The contents of the file appear in string value on the right of the screen and in hex on the left side of the screen.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 195 of 325
Cisco dCloud
10. You will now search for the string in the file. Click the Search menu and select the Find menu item.
11. In the Search for field enter the text Ad V1ct0r1am and click the OK button.
12. The string is found in the file and the associated hex value is shown as being 41642056316374307231616D
13. Right-click on the hex value currently selected and click on the Copy menu item to copy the hex value to the clipboard.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 196 of 325
Cisco dCloud
14. Return to the Putty SSH session window for the centos Linus server machine.
Note: The name of the NDB file does not matter. It is just a temporary file used to contain the signature you are creating
before you enter the data on the AMP for Endpoints console.
16. In the Nano text editor window, type the string below
a. Trojan.Win32.ABC-Bad-File.A:0:*:41642056316374307231616D
b. You can paste the last portion of the text above as it is the hex output we just copied. You will need to remove
the spaces between each pair of numbers so the output matches the above when you are done.
i. Name: The descriptive name you wish the threat to be detected as in the AMP for Endpoints console.
ii. Type: The type of file represented by one of the following numerical values
1. 0 = any file
4. 3 = HTML
5. 4 = Mail file
6. 5 = Graphics
7. 6 = ELF
iii. Offset: The position within the file to search for the hex string. Wildcards accepted.
17. Once you have verified that the contents of the file are correct, press Ctrl+X to exit the file.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 197 of 325
Cisco dCloud
18. When prompted to Save modified buffer press the Y key and then press Enter.
19. You will now test the signature file you just created against the badbos.rtf file to see if the signature matches.
20. Type the command clamscan -d ABC-badbossig.ndb badbos.rtf and press Enter.
21. The clamscan command returns with a match and the SCAN SUMMARY section displays Infected files: 1.
22. Your signature has matched successfully on initial testing. You will now create the ACD in the AMP for Endpoints console.
a. If your signature did not match and you got an error about a bad database file, recreate the file using the steps
above but making sure you type everything manually rather than using copy-paste.
24. Copy the text Trojan.Win32.ABC-Bad-File.A:0:*:41642056316374307231616D from the Putty window to be used in the
AMP for Endpoints console.
a. Again, to copy text within a Putty window, just highlight the text and release the mouse button and it will
automatically be copied into your buffer.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 198 of 325
Cisco dCloud
31. Return to the AMP for Endpoints console, click the Outbreak Control menu, and select the CUSTOM DETECTIONS >
Advanced menu item.
25. Click the Edit button on the ABC - Advanced Quarantine List entry.
27. In the Signature field, paste the copied text from the output of the NDB file in the Putty window and click the Add
Signature button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 199 of 325
Cisco dCloud
29. You should receive a browser pop-up window stating that Your signature was successfully built. Click the OK button.
30. You have successfully edited the ACD with the signature containing the identifying text string. You will now test your
changes to verify that files containing that string are detected correctly.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 200 of 325
Cisco dCloud
1. First, we will copy the badbos.rtf file from the Jumphost machine to the WKST1 and WKST2 machines using the following
steps.
2. Open the File Explorer on the Jumphost machine by double-clicking the Jumphost shortcut on the desktop.
5. Navigate to the O:\Users\admin\Documents folder and right-click then select paste to paste the file here. Ensure you
see the file here before moving on.
6. Navigate to the P:\Users\admin\Documents folder and right-click then select paste to paste the file here. Ensure you
see the file here before moving on.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 201 of 325
Cisco dCloud
7. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the Wkst1
computer.
8. You should automatically be logged onto the Wkst1 machine. You can verify that you are logged into the Wkst1 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
36. You will now ensure that the connector has the latest policy updates by opening the connector user interface and forcing
a policy update.
37. Click the taskbar icon arrow in the lower right corner of the screen in the system tray and double-click on the Cisco
AMP for Endpoints icon (blue circle).
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 202 of 325
Cisco dCloud
40. You may receive a message that notifies you that the policy is already up to date or that the policy was updated
successfully depending on the timing of the connector’s communication to the AMP cloud.
42. Launch the File Explorer on WKST1 by double-clicking on the WKST1 shortcut on the desktop.
43. Navigate to the Documents folder, right-click the badbos.rtf file, click the Cisco AMP for Endpoints menu, and select
the Scan Now menu item
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 203 of 325
Cisco dCloud
45. You will now edit the badbos.rtf file and save the edited file to disk so that the hash of the file will be different.
46. Double-click the badbos.rtf file to open the file in MS Word. (This works because wkst1 is in Audit mode)
47. Type the current time and date on the first line of the file.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 204 of 325
Cisco dCloud
50. Close the Remote Desktop connection and return to the AMP for Endpoints console on the Jumphost machine.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 205 of 325
Cisco dCloud
51. Click the Analysis menu and select the Events menu item.
52. There are several events related to the badbos.rtf file. Notice that both the WKST1 and WKST2 machines detected the
file and that WKST2 performed a quarantine action on the file.
a. If you do not yet have entries for WKST2, that policy has not Sync’d yet. This is ok, you may proceed.
53. Expand the oldest badbos.rtf detection event for the WKST1 machine (a few entries down the list of events). Notice the
hash of the file.
54. Expand the most recent detection event for the WKST1 machine for the badbos.rtf file. Compare the hash of the file in the
latest event after the save took place to the hash of the file in the first event.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 206 of 325
Cisco dCloud
55. The hashes are different but the ACD signature you created is detecting the string within the file. You have successfully
detected the threat based on the content of the file.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 207 of 325
Cisco dCloud
across an organization. You will utilize Endpoint IOCs by importing existing IOC definitions created by the security community, as
well as creating your own IOC. You will then scan the endpoints in your ABC company deployment for attributes defined in your
IOC’s to determine if any systems have been compromised.
1. Ensure you are logged in to the AMP for Endpoints console on the Jumphost machine
2. Close all open applications except for your AMP console Chrome window.
3. Click the Outbreak Control menu and select the ENDPOINT IOC > Installed Endpoint IOCs menu item
4. The Installed Endpoints IOCs page appears and shows that no Endpoint IOCs have been uploaded to your AMP console.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 208 of 325
Cisco dCloud
5. You will now upload a subset of IOCs that are provided as samples in the Cisco Endpoint IOC Attributes document.
Note: We have already downloaded the IOCs to the local machine. For real deployments, you can access the list of sample IOCs
at the following link, or by opening the online help in the AMP for Endpoints console and accessing Contents > Endpoint IOC
Scanner > Installed Endpoint IOCs > View and Edit
https://docs.amp.cisco.com/Cisco%20Endpoint%20IOC%20Attributes.pdf .
b. The Upload Endpoint IOCs window appears prompting for the individual XML file or a ZIP containing multiple
XML files. Click the Browse button to select the ZIP file containing the IOCs.
c. Navigate to the JUMPHOST Local Disk C:\Setup Files\AMP4E IOC Bundle folder, select the AMP4E-IOC-
Bundle.zip file, and click the Open button
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 209 of 325
Cisco dCloud
d. Click the Upload button to submit the ZIP file containing the IOCs
e. You will receive a message stating that the file has been uploaded successfully. It may take several minutes for
the uploaded IOCs to be extracted and display in the console.
6. In approximately 2-3 minutes, refresh the console screen to see the IOCs you just uploaded. Refresh the console
webpage as necessary.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 210 of 325
Cisco dCloud
7. Click the plus symbol on the first IOC entry to view more details
9. Notice that you have the ability to edit details of the IOC and assign certain Categories, Groups, and even Keywords. You
also have the ability to edit the source of the IOC entry in XML format. Review the different options and click the Cancel
button to return to the Installed Endpoint IOCs page.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 211 of 325
Cisco dCloud
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 212 of 325
Cisco dCloud
1. Your customer has provided you with IOC attributes they have obtained from a subscription threat intelligence feed. The
attributes you will define in the IOC are – please continue to the next step and you will be shown how to create the IOC in
later steps:
2. Open the IOC editor application by double-clicking on the Mandiant IOCe shortcut on the desktop of the Jumphost
machine
3. When prompted to select the directory the program should use for IOCs, select the Downloads directory, and click the
OK button.
4. Click the File menu, select the New submenu, and select the Indicator menu item
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 213 of 325
Cisco dCloud
6. Click the drop-down arrow on the Item button to open the list of attributes to add.
7. Navigate through the list to the RegistryItem menu and select the Registry Value Name object
8. The Registry Value Name item is added but has no value defined in it. Double-click on the entry to add a value.
9. After double-clicking you will have a text field to enter the data for the registry value name. Enter winupdtldr as the
value and hit Enter.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 214 of 325
Cisco dCloud
10. The entry changes to match the value you just added
11. Ensure the Registry Value Name item (the entry you just added) is selected and add another entry by clicking the
drop-down arrow on the Item button, select the ProcessItem menu, and select the Process Name field item
a. You must click the down arrow next to the Item button to get the pop-up item selector to appear.
12. Type winupdtldr.exe in the value for the Process Name and hit Enter.
13. Once you have added the entries, verify your screen appears as the example below before continuing in the lab.
14. Save the IOC file by clicking the File menu and selecting the Save menu item.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 215 of 325
Cisco dCloud
16. You will now upload the IOC you have just created to the AMP for Endpoints console.
17. Return to the AMP for Endpoints console and open the Outbreak Control > ENDPOINT IOC > Installed Endpoint IOCs
page.
20. Navigate to the Downloads directory, select the IOC file you just saved from the IOC editor, and click the Open button
(the name may be different, look for the latest modified file, or just select the IOC file entry that does not have tesla in the
name)
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 216 of 325
Cisco dCloud
22. The ABC - Fake Windows Update IOC entry is displayed on the screen.
Note: If your IOC entry is not marked as active, you may need to review the settings from your IOC file to ensure your settings are
valid. Review the previous steps in the lab and attempt to recreate the IOC file or make the necessary edits and try again. If your
entry is marked as Active, please proceed.
23. You have successfully created a custom IOC based on attributes provided by your customer.
Note: In order for the IOC flash scan to match the winupdtldr.exe process, that process must be running. For the purposes of the
lab only you will now ensure that the IOC scan finds a matching winupdtldr.exe process.
24. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the Wkst1
computer
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 217 of 325
Cisco dCloud
25. You should automatically be logged onto the Wkst1 machine. You can verify that you are logged into the Wkst1 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
dCloud: The Cisco Demo Cloud
27. Open an Admin Command Prompt on WKST1 by right-clicking the windows Start button and selecting Command
Prompt (Admin). Click Yes to allow.
26. Type the command copy c:\users\admin\Desktop\putty.exe c:\Windows_Updates and hit Enter
27. Type the command ren c:\Windows_Updates\putty.exe winupdtldr.exe and hit Enter
29. The Putty application will now appears. Leave the Putty window open – do not close it. This is being used for the
purposes of the lab to have a process running that will match the IOC definition.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 218 of 325
Cisco dCloud
30. Close the Remote Desktop window to WKST1 and return to the Jumphost machine.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 219 of 325
Cisco dCloud
1. In the AMP Console, click the Management > Computers menu item
2. Expand the wkst1 computer object, and click the Scan button
3. Select Endpoint IOC as the Scan Engine and leave the Scan Depth as Flash.
4. Click the Start Scan button. Then click the X to close the Run Scan window.
5. In the lab environment, we will force a policy update on the AMP connector to help it start the scan in a timely manner
although it can still take several minutes for the scan to start.
6. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the Wkst1
computer
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 220 of 325
Cisco dCloud
7. You should automatically be logged onto the Wkst1 machine. You can verify that you are logged into the Wkst1 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
dCloud: The Cisco Demo Cloud
8. At the bottom right corner of the screen of the WKST1 machine, click the taskbar icon arrow to show hidden system tray
icons. Double-click on the AMP for Endpoints blue circle icon to open the connector interface.
11. You will receive the notification that the policy settings are up to date. Click the OK button and remain on the Settings
screen.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 221 of 325
Cisco dCloud
13. You should eventually see the connector show that it is Scanning… (Occasionally, this process takes a bit of time to start
on the connector. Feel free to move on to lab 15 which will give the connector time to complete the scan, then return to
complete the remaining steps of lab 14 later today or tomorrow.)
14. Wait for the scan to complete. The button will then change from “Scanning…” to “Scan Now”.
15. You will be able to see the history for this AMP for Endpoints connector. Click the History button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 222 of 325
Cisco dCloud
16. Select the entry on the right pane of the window for the Flash Scan that just completed. The details pane on the right of
the window will show information regarding the amount of total IOC objects that were scanned and the amount that were
detected. You will likely see 1 or 2 matching IOC objects depending on your configuration.
dCloud: The Cisco Demo Cloud
18. Close the Remote Desktop connection to the WKST1 machine and return to the AMP for Endpoints console on the
Jumphost machine.
19. Open Events by clicking the Analysis menu and selecting the Events menu item.
20. Change the event filter settings to show events from the Time Range of Day and the group ABC - Windows Endpoints
Audit.
21. Continue to apply filters by selecting the Endpoint IOC Events top-level item (which will include all sub-items) from the
Event Type drop-down
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 223 of 325
Cisco dCloud
22. Notice that there are several events generated by the WKST1 machine in reference to the IOC changes and scan.
23. Expand the entry for the Endpoint IOC Scan Detection Summary event. Notice that the event displays how many total
IOCs were scanned for and how many matched. The event also details the specific IOC that matched
24. Click the link for the ABC - Fake Windows Update IOC shown in the event. The summary of the IOC detection for the
wkst1 machine appears in a new Chrome tab.
25. Ensure the entry is expanded and view the matches below it. Remember that the IOC you created had registry entries in
it. Those are not shown below. The Flash Scan only matched the running process and file entries as they were the only
items active during the flash scan.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 224 of 325
Cisco dCloud
27. When the Device Trajectory tab loads, look for the entries showing the policy update and scan events. Click on each of
the policy update and scan events and review the data in the event. (If you do not see these events, scroll back in the
Device Trajectory timeline to the appropriate time.)
dCloud: The Cisco Demo Cloud
28. In the search field at the top of the page, enter in the name of the executable in the IOC, winupdtldr, to filter the events
on the Device Trajectory to only show those related to the executable.
29. Review the events shown on the device trajectory for informational purposes. It does not appear that there are any
malicious actions being taken by the file presently.
Note: In a production environment you could create a Simple Custom Detection to quarantine the file if active processes were
found in an IOC.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 225 of 325
Cisco dCloud
2. You should automatically be logged onto the Wkst1 machine. You can verify that you are logged into the Wkst1 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
3. You should now be automatically logged onto the Wkst1 machine. You can verify that you are logged into the Wkst1
machine by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop
will show the name of the machine currently logged into as shown below.
4. Right-click on the Start button in the lower left of the screen and select the Command Prompt (Admin) item. If
prompted by the User Account Control window, click the Yes button to allow the program to make changes.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 226 of 325
Cisco dCloud
5. Change directory to the location of the AMP for Endpoints connector by typing the command cd “C:\Program
Files\Cisco\AMP\6.1.7” and press Enter. (Your installed version may vary, see the note below.)
Note: As AMP versions change, the path to the directory used in this lab will change as well. If you receive an error message
stating the path is invalid, open File Explorer and navigate to the C:\Program Files\Cisco\AMP directory and determine what the
correct version number is to type in during the previous command.
6. Type the command ConnectivityTool.exe and press Enter. Notice that the command returns a success.
7. You will now view the log file for the ConnectivityTool.exe command. Open File Explorer and navigate to the WKST1
Local Disk C:\Program Files\Cisco\AMP\6.1.7 directory (or appropriate version number).
8. Right-click on the ConnectivityTool.exe.log file and select the Edit with Notepad++ item.
9. Review the log file paying attention to items such as the following:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 227 of 325
Cisco dCloud
Note: If a proxy is in the path of the communication this output may be different. Specifically pay attention to the SSL
dCloud: The Cisco Demo Cloud
certificate message. If the certificate is not valid that may indicate that the HTTPS session is being intercepted by a proxy or
application layer firewall.
10. Go to the end of the log file and review the SUMMARY. This is an easy way to determine if any potential issues exist and
which part of the connector’s network communication process is having an issue as part of the troubleshooting process.
The Connectivity Tool can be helpful in diagnosing a potential network, firewall, or proxy issue in a customer environment. Using a
web browser to connect to the link in the previous step can also be a simple way to verify that the environment is permitting the
traffic and that there are no issues with the AMP cloud itself.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 228 of 325
Cisco dCloud
1. Open the PuTTY application on the Jumphost by double-clicking on the shortcut located on the desktop.
3. Enter the following values and click the Open button to connect to the Linux server
b. Port: 22
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 229 of 325
Cisco dCloud
4. When prompted for the user name and password, use the following values
b. Password: C1sco12345
6. The AMP for Endpoints Connector Command Line Interface displays in interactive mode.
7. Type help and press Enter. Notice there are several commands that roughly match to the functionality of the Windows
connector GUI.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 230 of 325
Cisco dCloud
d. Policy: What policy defined in the AMP for Endpoints console is controlling the settings for this connector
10. Type sync and press Enter. You have initiated a request for the agent to download its policy from the AMP cloud.
11. Type the command history list and press Enter. You are shown a list of local events for the connector. You may or may
not see similar events as shown below based on the activities on the connector. Review and proceed with the lab.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 231 of 325
Cisco dCloud
12. Type the command scan help and press Enter. Notice that you have the ability to start a flash, full, or custom scan. You
can also control a scan that is already running.
15. This is the location of the AMP connector log files. You can view the contents by running the command cat
/var/log/cisco/ampdaemon.log
a. Review the contents of the log files and proceed when done.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 232 of 325
Cisco dCloud
Policy Updates
You will now go through the process of manually updating the policy of an AMP for Endpoints connector. During your deployments
dCloud: The Cisco Demo Cloud
you may run into a situation where the connector is unable to download a needed policy update and must have the policy change
loaded manually in isolated cases. This could be due agents being initially installed with incorrect proxy configuration in the policy
settings. This would cause all agents installed with the incorrect settings unable to talk to the AMP cloud even if the correct settings
were applied later. The updated policy configuration with the correct proxy values could be manually applied or the connector could
be uninstalled and reinstalled later with the correct settings. Additionally, there could be a machine that is currently offline for some
other reason that needs an urgent approval of a file or some other setting.
1. Ensure you are logged in to the AMP for Endpoints console on the Jumphost machine.
2. Click the Management menu and select the Policies menu item.
3. Expand the selection for the ABC - Windows Endpoints Audit policy by clicking the plus symbol
4. Take note of the Serial Number value (your serial number value number will be different than that shown in the
screenshot) and click the Edit button.
5. Change the description of the policy by adding a period or other character to the end of the description field.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 233 of 325
Cisco dCloud
7. Expand the entry for the ABC - Windows Endpoint Audit policy and review the Serial Number. Notice that it has
incremented.
9. The XML file is downloaded via Chrome to the Downloads folder and appears in the lower left corner of the browser
screen.
10. Click the up arrow to the right of the XML file download and select the Show in folder menu option.
11. The downloads folder appears with the XML policy file.
13. Navigate to O:\Setup Files directory and right-click, then select paste to place a copy of this file here. This is a mapped
network drive that will place the XML policy file on the WKST1 computer.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 234 of 325
Cisco dCloud
14. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the Wkst1
computer
15. You should automatically be logged onto the Wkst1 machine. You can verify that you are logged into the Wkst1 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
16. You will now stop the AMP for Endpoints Connector service.
17. Right-click the Start button in the lower left of the WKST1 desktop and select the Run menu item.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 235 of 325
Cisco dCloud
18. Type services.msc in the Open field and click the OK button.
19. The Services MMC console appears. Locate the Cisco AMP for Endpoints Connector <version> service, select the
service, and click the Stop (square) button at the top of the screen.
20. Open File Explorer and navigate to the Local Disk C:\Program files\Cisco\AMP directory.
21. Right-click on the policy.xml file in the directory and select the Edit with Notepad++ menu item.
22. Find the serial_number section in the file and note the value.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 236 of 325
Cisco dCloud
23. Briefly review the contents of the file. You can find information dealing with policy details, exclusions, proxy configuration,
and other configuration values.
26. Rename the XML policy file you downloaded earlier by right-clicking on the file and choosing the Rename menu item.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 237 of 325
Cisco dCloud
28. Copy the policy.xml file you just renamed and paste it to the Local Disk C:\Program Files\Cisco\AMP directory path.
29. When prompted to replace the file, choose the Replace the file in the destination option.
30. If prompted for Administrator access, select Continue. (If you are denied a second time, please ensure that the service is
not running)
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 238 of 325
Cisco dCloud
31. Edit the policy.xml file with Notepad++ again and review the policy number.
33. Using the Services MMC console, start the Cisco AMP for Endpoints Connector service by clicking the Start/Play
button on the top of the window (Green Arrow).
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 239 of 325
Cisco dCloud
34. You will now verify the connector is able to connect to the AMP cloud after manually replacing its policy.xml file.
35. Click the notification area arrow in the bottom right of the screen next to the time/date to display the system tray icons.
36. Double-click on the Cisco AMP for Endpoints icon that looks like a blue circle with white lines on it.
37. The Cisco AMP for Endpoints connector UI appears, and the Status says Connected.
39. Close the Remote Desktop connection to WKST1 and return to the Jumphost machine.
You have successfully updated a policy configuration file manually. While this is not something that would be a normal
administrative task, there may be special circumstances that prevent the connector from reaching the AMP cloud and manually
updating the policy config can be very beneficial.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 240 of 325
Cisco dCloud
Performance
There are some applications that perform intensive reads and writes to the disk subsystem or perform a high number of process
dCloud: The Cisco Demo Cloud
launches. These applications can potentially cause AMP for Endpoints to use higher amounts of the computer’s resources as it
tries to scan the file writes and process executions. It can be beneficial to performance if certain data file locations are excluded
from the connector scanning that activity. Very few times do application support teams have the detailed technical knowledge of
how their application functions or where data is actually being written to in order to give you paths that would benefit from
exclusions. Determining what processes are performing read/write operations and in what paths is important so that appropriate
exclusions can be written to reduce performance impact on highly utilized systems. You will now troubleshoot the performance of a
database server in the customer environment.
Database Server
Your customer has received reports from an application support group that since the AMP for Endpoints connector was installed on
the machine, the application performance has suffered. They have agreed to assist you with reproducing the application behavior
that is negatively affected. You have been given a database script to run that reproduces the application behavior. You will now
utilize the Microsoft utility, Process Monitor, to determine what processes and paths are involved in data writes with the goal of
determining what exclusions should be written to help reduce the performance impact of the AMP for Endpoints connector on this
highly utilized server.
1. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the Server1
computer
2. You should automatically be logged onto the Server1 machine. You can verify that you are logged into the Server1
machine by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop
will show the name of the machine currently logged into as shown below.
4. Open the Process Monitor application by double-clicking on the Process Monitor shortcut on the desktop of Server1.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 241 of 325
Cisco dCloud
5. If you are prompted with a list of filter options. Click the OK button to accept the defaults and proceed.
7. Click the registry button at the top of the screen to disable monitoring of registry activity. It should no longer have a
highlighted box around it after disabling it. (Left-most icon in the image below)
8. Leave the Process Monitor window running. Minimize the window to see the desktop of the Server1 machine.
9. Open the SSMS console by double-clicking on the Microsoft SQL Server Management Studio 17 shortcut on the
desktop.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 242 of 325
Cisco dCloud
10. When prompted to connect to the SQL server, accept the default values as shown below and click the Connect button.
11. Expand the Databases folder by clicking the plus symbol in the Object Explorer pane on the left of the window.
13. Once the Weisshaupt database has been highlighted, click the File menu, click Open, and select File.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 243 of 325
Cisco dCloud
14. Navigate to the Local Disk C:\Setup Files directory, select the SqlQuery.sql file, and click the Open button.
15. The SQL query is loaded into the console. Click the Execute button to run the query.
16. The query may take several minutes to complete. You should see the status message of Executing query in the lower
left of the screen.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 244 of 325
Cisco dCloud
19. Stop the capture process by clicking the Capture button (magnifying glass icon at the top left of the Process Monitor
window).
20. Once the capture process has stopped you should see a red X over the magnifying glass icon. This symbolizes no data
being captured.
21. Briefly review the data on the Process Monitor screen. You will see detailed information for all file writes, process, and
network activity. Attempt to find entries related to SQL server (sqlservr.exe).
22. Click the Tools menu and select the File Summary menu item.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 245 of 325
Cisco dCloud
23. It may take several minutes for the summary to be generated. All file events monitored by the Process Monitor application
are now being analyzed. Wait until summary processing has completed before proceeding.
24. The File Summary screen appears showing how many instances there were of specific types of file behavior per file path
during the monitored time period.
25. Click on the Write Bytes column header to sort the entries by the amount of data written.
26. Notice that there are several entries for database related files as indicated by the MDF and LDF extensions.
a. Feel free to maximize the application and change column sizes within the application so you can see the data
necessary.
27. Click on the Writes column header to sort the entries by the amount of file write operations observed. You may see
entries related to the SQL Server Management Studio application and the database files that are in the path containing
Microsoft SQL Server.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 246 of 325
Cisco dCloud
Note: Your data will not show exactly that of the screenshots in the lab document based on various factors. You should see data
relating to the MDF and LDF files generating large numbers of writes, bytes written, etc. If you do not see these entries, please
verify your lab steps.
28. Double-click the entry containing the Weishaupt.mdf file in the File Summary window. Leave the File Summary window
open while you perform the next few steps.
29. Return to the Process Monitor window. The data in the Process Monitor window is filtered to show activity for the path
you just selected from the File Summary window. You can see the process name is sqlservr.exe.
30. Double-click on one of the entries in the process monitor window for sqlsrvr.exe.
31. The Event Properties window appears. Click on the Process tab.
32. The process details appear for the process that was writing the database files. You now see the path to the process that
was writing data.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 247 of 325
Cisco dCloud
35. You can also view the file summary data by extension. Click the By Extension tab at the top of the window and sort by
writes.
Note: File writes initiated by applications can cause AMP for Endpoints to initiate a scan of the new or modified files. Applications
such as databases or similar apps that write large amounts of data, can potentially run into a performance issue due to the
scanning of the data files being written. Using a tool such as Process Monitor to determine the path can be helpful in resolving
performance issues.
a. You have been able to determine that SQL database files (MDF and LDF files in the list) have had a large
amount of data and a large number of write operations to the “C:\Program Files\Microsoft SQL
Server\MSSQL14.MSSQLSERVER\MSSQL\DATA\” folder.
b. You have also been able to determine that the process performing the file writes is “C:\Program
Files\Microsoft SQL Server\MSSQL14.MSSQLSERVER\MSSQL\Binn\sqlservr.exe”
c. With these pieces of information, you are now able to create the exclusions required for this type of system to
prevent AMP for Endpoints from scanning the database files and database server process to improve with the
server’s performance.
38. You will now review the current exclusions being applied to Server1.
39. Open the AMP for Endpoints user interface on Server1 by double-clicking on the system tray icon.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 248 of 325
Cisco dCloud
41. The Settings screen appears. Scroll down until the Protection Exclusions section appears.
a. Briefly review the different exclusion categories. Depending on the settings you configured earlier in the lab for
exclusions, the exclusions for SQL data files and processes may not appear. You could also check the exclusion
settings in the AMP for Endpoints console by going to Management and then Exclusions.
43. Close the Remote Desktop Connection to Server1 and return to the Jumphost machine.
44. You will now add the exclusions necessary to prevent the AMP4E connector from scanning the database server paths.
45. Ensure you are logged into the AMP for Endpoints Console.
46. Select the Management menu and select the Exclusions menu item.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 249 of 325
Cisco dCloud
49. Click the Trash Can icon next to every automatically added Exclusion in the new list until no entries remain.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 250 of 325
Cisco dCloud
53. Enter the following exclusions. Make sure you only have a single entry per line.
a. .mdf
b. .ldf
54. Click the Add Exclusions button. You should be presented with the 3 exclusions.
Note: Wildcards can be useful if entered carefully. Entering in exact drive letter paths runs the risk of not matching a process if
the application is installed to a different drive letter or directory. Applications that have several versions that use a version
number in the data file path (such as SQL Server) can also benefit from wildcards to have one exclusion work across multiple
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 251 of 325
Cisco dCloud
versions as shown above. The above exclusion will work for any version of SQL Server on any drive letter whether it is in the
Program Files or Program Files (x86) or any other root directory that follows the standard SQL naming convention.
56. We now need to add this Exclusion set to our Servers Policies. dCloud: The Cisco Demo Cloud
58. Expand the ABC – Windows Server Audit policy and click the Edit button
59. Click the Exclusions menu, then the Exclusions dropdown menu, then select the ABC – SQL Exclusions list
checkbox to add it.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 252 of 325
Cisco dCloud
61. Expand the ABC – Windows Server Protect policy and click the Edit button
dCloud: The Cisco Demo Cloud
62. Click the Exclusions menu, then the Exclusions dropdown menu, then select the ABC – SQL Exclusions list
checkbox to add it.
65. Open the AMP Client UI, go to Settings, and click Sync Policy.
66. Scroll down to the Protection Exclusions Section in the Client UI.
67. Notice the File Extensions for LDF and MDF have been added as well as the Wildcard Exclusion for the sqlservr.exe
process.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 253 of 325
Cisco dCloud
It is important to give a high priority to potential performance issues raised by your customer. If the issue is not determined quickly
then the deployment of AMP for Endpoints could be delayed or brought to a halt. Using tools such as Process Monitor can assist in
showing where the data is being written. This in turn shows some potential exclusion paths for the highly active files and
processes. It can be beneficial to proactively do some performance testing on customer endpoints to determine if any data file
paths may need to be excluded.
Keep in mind that AMP is not protecting the paths that are excluded. Care should be taken when specifying exclusions or the
security that AMP for Endpoints provides can be rendered ineffective.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 254 of 325
Cisco dCloud
console has expired or will expire soon, or it may be due to a troubleshooting scenario where it needs to be determined if the AMP
for Endpoints connector is causing an issue.
1. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the Server1
computer
2. You should automatically be logged onto the Server1 machine. You can verify that you are logged into the Server1
machine by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop
will show the name of the machine currently logged into as shown below.
3. Right-click on the Start button in the lower left corner of the screen and select the Command Prompt (Admin) item.
4. You will determine the path to the uninstallation executable file by looking in the registry.
Note: This registry path can be used by a customer’s software deployment team for inventory purposes (determining if a machine
has the AMP for Endpoints Connector installed or what version is installed for upgrades) as well as scripting an uninstall if needed.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 255 of 325
Cisco dCloud
6. Navigate to the following key of the registry and review the entries. Specifically take note of the QuietUninstallString
value that contains the path to the uninstall.exe file.
a. HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Imm
unet Protect
Note: Your values may be different depending on the version of the connector in use at the time of your lab. Please change the
values shown based on version number if needed.
7. Return to the Command Prompt window and type the following command (for your installed connector version) then press
Enter:
b. The uninstall process does not display any windows based on the silent (/S) command line parameter and will
clean up all related files after a reboot based on the /remove 1 parameter.
8. Open File Explorer and navigate to the C:\ProgramData\Cisco\AMP directory (the directory is hidden, you may need to
type the path in the address bar of File Explorer).
9. Double-click on the immpro_install.log file and briefly review the contents. Find the start of the uninstall process and
where the service was successfully uninstalled (the removal process tries several times, so you may see a failure, this is
normal)
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 256 of 325
Cisco dCloud
11. Return to the Command Prompt window, type the command services.msc, and press Enter.
12. In the Services window, ensure the Cisco AMP for Endpoints Connector service no longer appears. If the service is still in
the list the uninstall did not complete successfully, start at the beginning of the procedure and try again or review the log
data for further details.
13. Close the Remote Desktop Connection to Server1 and return to the Jumphost machine.
You have successfully uninstalled the connector via command line. You will now enable the connector protection feature and view
the difference on uninstalling the connector.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 257 of 325
Cisco dCloud
Connector Protection
Connector Protection can prevent unauthorized users from removing the connector from endpoints. When dCloud:
implementing an
The Cisco Demo Cloud
endpoint security product, it is undesirable to have end users remove the security product and potentially enable them to violate
the customer’s IT policy standards. Enabling connector protection can help ensure that once the AMP for Endpoints connector is
deployed, that it remains deployed.
1. Ensure you are logged in to the AMP for Endpoints console from the Jumphost machine.
2. Click the Management menu and select the Policies menu item.
3. Expand the entry for the ABC - Windows Endpoint Protect policy by clicking the plus symbol.
5. When the Edit Policy screen appears, click the Advanced Settings menu on the bottom left.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 258 of 325
Cisco dCloud
8. In the Connector Protection Password field enter C1sco12345 as the password and click the Save button.
9. Perform the same steps shown previously to enable Connector Protection for the ABC - Windows Endpoint Audit
policy with the same password before continuing.
a. Once Connector Protection has been enabled for the two policies you may proceed with the lab.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 259 of 325
Cisco dCloud
10. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the Wkst2
computer
11. You should automatically be logged onto the Wkst2 machine. You can verify that you are logged into the Wkst2 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
12. Open the AMP for Endpoints user interface on the WKST2 machine.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 260 of 325
Cisco dCloud
16. You will now test the Connector Protection feature to see how it interacts with attempts to stop the connector service and
perform uninstalls.
17. Right-click the Start button in the lower left of the WKST2 desktop and select the Run menu item.
18. Type services.msc in the Open field and click the OK button.
19. The Services MMC console appears. Locate the Cisco AMP for Endpoints Connector <version> service, select the
service, and click the Stop button at the top of the screen.
a. The service does not stop. Attempting to change the service configuration in any way is prevented. Leave the
Services console open.
20. Open the AMP for Endpoints user interface and click the Settings button.
21. Scroll down until you see the Cisco AMP Connector Settings section and expand that section.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 261 of 325
Cisco dCloud
23. You receive an error stating the password entered does not match the password in the policy configuration. Click the OK
button.
24. In the Password field, type C1sco12345 and click the Stop Service button.
25. The service stops, and you are notified to start it again you must use the Windows Service Control Manager.
26. Return to the Services console window. Refresh the current service list by clicking Action and then Refresh. You will
see that the Cisco AMP for Endpoints service is not shown as Running.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 262 of 325
Cisco dCloud
27. Select the Cisco AMP for Endpoints service and click the Start button (green triangle) at the top of the screen.
31. You have verified the Connector Protection functionality for the service. Now you will proceed with the uninstall.
32. Click the Start button in the lower left corner of the screen on the WKST2 machine.
34. When the Windows Settings window appears, click the System icon.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 263 of 325
Cisco dCloud
39. When the uninstall window appears click the Next button.
40. You are now prompted for the Uninstall password. Enter the value C1sco12345 that you configured in the policy earlier
and click the Uninstall button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 264 of 325
Cisco dCloud
41. The uninstall has completed successfully. Click the Close button.
44. The WKST2 machine will reboot and the Remote Desktop connection will close, returning you to the Jumphost machine.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 265 of 325
Cisco dCloud
You have successfully gone through the uninstallation process on a Windows connector with connector protection as well
as a connector without connector protection. You will now perform an uninstall on a Linux connector.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 266 of 325
Cisco dCloud
Linux Uninstall
1. You will now connect to the Centos Linux server to perform an uninstallation. dCloud: The Cisco Demo Cloud
2. Open the PuTTY application on the Jumphost by double clicking on the shortcut located on the desktop.
4. Enter the following values and click the Open button to connect to the Linux server
b. Port: 22
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 267 of 325
Cisco dCloud
5. When prompted for the user name and password, use the following values
b. Password: C1sco12345
6. To uninstall the AMP for Endpoints Connector, run the command: sudo yum remove ciscoampconnector -y
7. You should receive a message stating the removal is complete. Notice that the removal does leave some files behind and
the command to remove the leftover data is given on the screen.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 268 of 325
Cisco dCloud
9. Close the SSH window and return to the AMP for Endpoints Console.
You have successfully uninstalled the Linux connector. You will now proceed in the labs to go through the connector upgrade
process.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 269 of 325
Cisco dCloud
Upgrades can be enabled at a policy level in the console. This will cause all machines attached to that policy to begin the upgrade
process. Upgrades can also be initiated from the customer environment using a software deployment solution such as Microsoft
SCCM or IBM BigFix using a silent command line. A software deployment solution can give customers more control over which
computers receive the upgrade during certain time schedules and control reboot behavior.
In the lab you will configure the default connector version. This step is required to install an older version connector in order to be
able to upgrade. In a customer environment, changing the default connector version to an older version is not a normal step but
can be useful for troubleshooting if it is believed that there is a compatibility issue with a specific new connector version.
Additionally, if a customer has standardized on a specific connector version and Cisco releases a new connector version, setting
the default version can allow the customer to continue their deployment on the version they have already approved and
standardized.
Note: Please only make the specified changes in this section exactly as directed. Making changes that are not explicitly defined
in the lab document can render the lab unusable. Please follow the instructions explicitly in this section.
1. Ensure you are logged in to the AMP for Endpoints console on the Jumphost machine.
2. Click the Accounts menu and select the Business menu item.
3. The Business settings page appears. Notice that there is a section for Default Product Versions and the current setting
is Latest.
4. Click the Edit button in the upper right-hand corner of the page.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 270 of 325
Cisco dCloud
6. Click the drop-down menu for the Default Connector Version and change the value to 6.0.9.10685 (Or another version
that is older than the most recent version listed. You must select a version lower than the highest version listed in the
menu or you will not be able to upgrade).
7. Click the Update button after changing the Default Connector Version.
8. Verify that the Default Product Versions section has updated to the value you selected.
9. You will now install the older connector version on WKST3 and WKST2 in order to be able to go through the upgrade
process within this lab.
10. Click the Management menu and select the Download Connector menu item.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 271 of 325
Cisco dCloud
11. Click the drop-down menu for Group and select the ABC - Windows Compliance Protect group.
12. Click the Show URL button in the Windows section of the page.
14. You will now connect to the WKST2 machine to download and install the older version connector.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 272 of 325
Cisco dCloud
15. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the Wkst2
computer.
16. You should automatically be logged onto the Wkst2 machine. You can verify that you are logged into the Wkst2 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
17. Open the Chrome web browser by double-clicking the shortcut on the desktop of the Wkst2 machine.
18. Paste the Connector Download URL copied from the AMP for Endpoints Console in the previously in the address bar of
the browser and press the Enter key.
19. The setup file will begin to download. Once the file has downloaded you should see it appear in the lower left corner of the
Chrome browser.
20. Click on the downloaded file ABC_-_Windows_Compliance_Protect_FireAMPSetup.exe in the lower left of the
browser to launch the setup process.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 273 of 325
Cisco dCloud
21. Complete the installation process for the older version connector.
22. Once the setup has completed, close the Remote Desktop connection to WKST2.
dCloud: The Cisco Demo Cloud
23. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the Wkst3
computer.
24. You should automatically be logged onto the Wkst3 machine. You can verify that you are logged into the Wkst3 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
25. Open the Chrome web browser by double-clicking the shortcut on the desktop of the WKST3 machine.
26. Paste the Connector Download URL copied from the AMP for Endpoints Console in the previously in the address bar of
the browser and hit the Enter key.
27. The setup file will begin to download. Once the file has downloaded you should see it appear in the lower left corner of the
Chrome browser.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 274 of 325
Cisco dCloud
28. Click on the downloaded file ABC_-_Windows_Compliance_Protect_FireAMPSetup.exe in the lower left of the
browser to launch the setup process.
29. Complete the installation process for the older version connector.
31. Return to the AMP for Endpoints console on the Jumphost machine.
33. Verify that the WKST2 and WKST3 machines appear in the list. Expand each entry and note the Connector Version of
each.
a. Please note, due to how we are rapidly moving through the lab at this point, you may see some entries for
uninstalled computers that have not yet been flushed from the system. This is ok.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 275 of 325
Cisco dCloud
34. You will now change the configuration of the console to choose the latest version of the connector in the Business
settings page so that you will be able to download the newer connector to perform an automated upgrade.
35. Click the Accounts menu and select the Business menu item.
36. Click the Edit button in the upper right-hand corner of the Business screen.
38. Click the drop-down menu for the Default Connector Version and change the value to Latest.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 276 of 325
Cisco dCloud
39. Click the Update button after changing the Default Connector Version.
40. Verify that the Default Product Versions section has updated to Latest.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 277 of 325
Cisco dCloud
1. You will now download the latest connector version onto the WKST2 machine. Do not launch the setup file when it is
finished downloading. Wait until instructed to do so in the lab.
2. Click the Management menu and select the Download Connector menu item.
3. Click the drop-down menu for Group and select the ABC - Windows Compliance Protect group.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 278 of 325
Cisco dCloud
6. You will now connect to the WKST2 machine and download the newer connector version.
7. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the Wkst2
computer.
8. You should automatically be logged onto the Wkst2 machine. You can verify that you are logged into the Wkst2 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
12. Open the Chrome web browser by double-clicking the shortcut on the desktop of the Wkst2 machine.
13. Paste the Connector Download URL copied from the AMP for Endpoints Console in the previously in the address bar of
the browser and press the Enter key.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 279 of 325
Cisco dCloud
14. The setup file will begin to download. Once the file has downloaded you should see it appear in the lower left corner of the
Chrome browser. Do NOT launch the file at this time.
15. Open an administrative command prompt window by Right-Clicking the Start button and selecting the Command
Prompt (Admin) menu item. Click Yes.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 280 of 325
Cisco dCloud
18. Wait until the command prompt has finished running the previous command. There will be no visual indicators of the
success or failure.
a. You can choose to review the installation log located at “C:\ProgramData\Cisco\AMP\immpro_install.log” andCloud
dCloud: The Cisco Demo
view the status of the Cisco AMP for Endpoints Connector service in the Services console. We will check the
Services Console.
iii. Locate Cisco AMP for Endpoints in the Services list (it will not be running). You may continue once this
entry is in the list
19. Return to the command Prompt to Reboot the WKST2 machine by typing the command shutdown /r /f and pressing
Enter.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 281 of 325
Cisco dCloud
22. Wait until the WKST2 machine has rebooted and then reconnect via Remote Desktop. If you are unable to connect to the
machine after the reboot, please allow additional time and then try again.
23. Open the AMP for Endpoints user interface on the WKST2 machine and click on the About link on the main screen.
Notice that the version is now updated.
25. Ensure you are logged into the AMP for Endpoints console on the Jumphost machine.
26. Click the Management menu and select the Computers menu item.
27. Click the plus symbol on the entry for the WKST2 computer to expand its section. Notice the Connector Version has
updated.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 282 of 325
Cisco dCloud
You have successfully upgraded the connector software by using a silent command line. This process can be turned over to
the customer software distribution team to roll out through a solution such as Microsoft SCCM or IBM BigFix. The process is
very similar to the initial silent install of the connector.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 283 of 325
Cisco dCloud
1. Click the Management menu and select the Policies menu item.
2. Click the plus symbol to expand the entry for the ABC - Windows Endpoint Protect policy.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 284 of 325
Cisco dCloud
a. Product Version: (Choose the highest version available in your console at the time of the lab)
b. Date Range:
dCloud: The Cisco Demo Cloud
i. Choose the current date of the lab machine for the start date
ii. Choose the following calendar day as the end date. (please keep in mind the lab machine is on
UTC time zone)
7. Click the Details button that shows more information on the computers that need reboots. It shows the version and
number of machines that require reboots with a link to view the specific computers if desired. Click OK.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 285 of 325
Cisco dCloud
8. Be sure to return to the Policy edit page if you navigated away while reviewing the reboot Details.
18. On the desktop of the Jumphost machine, double-click on the Remote Desktop Connection shortcut for the Wkst3
computer.
19. You should automatically be logged onto the Wkst3 machine. You can verify that you are logged into the Wkst3 machine
by looking at the top of the screen for the Remote Desktop Connection bar and the background of the desktop will show
the name of the machine currently logged into as shown below.
10. The connector will automatically perform its upgrade from the console over time. However, we will force the connector to
check in with the update server now to force the communication to happen.
11. Click the notification area arrow in the bottom right of the screen next to the time/date to display the system tray icons.
12. Double-click on the Cisco AMP for Endpoints icon that looks like a blue circle with white lines on it.
13. The Cisco AMP for Endpoints connector UI appears. Click the about link. Notice the agent version is the older version
you installed earlier.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 286 of 325
Cisco dCloud
15. The Settings page appears. Click the Sync Policy button.
16. You are notified that the policy has been successfully updated. Click the OK button and close the settings menu.
17. The upgrade will begin in the background shortly (If it doesn’t seem to proceed, force a second Sync). Once the upgrade
is completed, you will receive the notification that the machine will be restarted
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 287 of 325
Cisco dCloud
18. Return to the AMP for Endpoints console on the Jumphost machine.
19. Click the Analysis menu and select the Events menu item.
20. Monitor the events coming in from the WKST3 machine. It may take a little time for these events to display. Be patient, or
review the images below, and continue with the lab. Notice the upgrade process starts with the “started and product
update” event and ends with the “completed a product update” event.
21. You may need to wait several minutes for the “completed a product update” event to appear. You can verify locally on the
WKST3 machine if desired and proceed with the lab without waiting on the event.
You have successfully upgraded connectors through the AMP for Endpoints console as well as through a silent automated setup
process. Both of these methods have their advantages and disadvantages. Silent installs executed by a customer solution can give
more control and granularity to deployment but may require involvement by many other resources at the customer and take a long
time to test and actually deploy due to non-technical issues. Console based upgrades do not offer much granularity (targets all
machines inside a policy) and can potentially cause production outages if reboots are not disabled, but it allows you to manage the
upgrade with no other prerequisites other than Internet connectivity. Work with your customer to discuss which strategy will work
best for the current situation and if there may be instances where both options can be helpful.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 288 of 325
Cisco dCloud
1. Ensure that you are logged into the AMP for Endpoints console on the Jumphost machine.
2. Click the Analysis menu and select the Events menu item.
3. The events dashboard opens with no filters being applied, showing all events from all connectors.
4. You will create a filter to show only events from the servers in the deployment.
5. In the Group field, click the plus symbol, and select each of the following groups to add them to the group filter:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 289 of 325
Cisco dCloud
7. On the Save Filter window, type Server Events in the Name field, and click the Save button.
8. The filter is saved and appears in the filter drop-down in the top right corner.
10. Notice the options that would allow you to receive email notifications through a subscription. Do NOT click any of the
options and actually create a subscription. Due to the lab architecture in dCloud, there is no way for you to receive any of
the email notifications that would result from the subscription.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 290 of 325
Cisco dCloud
12. Begin to create a new event filter by clicking the plus symbol in the Group field. dCloud: The Cisco Demo Cloud
15. On the Save Filter window, type Workstation Events in the Name field, and click the Save button.
16. The filter is saved and appears in the filter drop-down in the top right corner.
18. You will now create an event filter to show only events related to connector health.
19. Click the plus symbol on the Event Type field that currently says All Event Types.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 291 of 325
Cisco dCloud
20. Add the following event types into the Event Type filter (You can scroll, or start to type the Event Name to find it):
b. Install Failure
c. Uninstall
22. On the Save Filter window, type Connector Health Events in the Name field, and click the Save button.
23. The filter is saved and appears in the filter drop-down in the top right corner.
25. You will now create an event filter to show only events related to a general malware detection.
26. Click the plus symbol on the Event Type field that currently says All Event Types.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 292 of 325
Cisco dCloud
27. Add the following event types into the Event Type filter:
a. Threat Detected
b. Execution Blocked
c. Exploit Prevention
d. Threat Quarantined
Note: These are just sample event types. There are many different and more specific types of events related to malware in the
console. Select the events that are relevant to your deployment in a production environment.
29. On the Save Filter window, type Malware Threats in the Name field, and click the Save button.
30. The filter is saved and appears in the filter drop-down in the top right corner.
Note: Event filters are a way to easily view relevant data in a deployment without having to constantly make filter changes.
Judicious use of Subscriptions to get email alerts can be beneficial for alerting purposes as well.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 293 of 325
Cisco dCloud
Audit Log
It can be important to determine whether or not an administrative change was made at certain times duringdCloud:
a deployment.
The Cisco Demo Cloud
1. Click the Accounts menu and select the Audit Log menu item.
Note: You have the ability to show only changes initiated by a specific user account or connections coming from a specific IP or
CIDR range.
3. You will now change the Audit Log filters to show events related to a Policy configuration changes.
4. Click the Type drop-down menu and select the Policy event type.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 294 of 325
Cisco dCloud
6. For individual events displayed, once expanded, all changes to policy configuration are shown along with the user
account that made the change, the IP address the user connected to the AMP for Endpoints console with, as well as the
specific values that were changed.
7. Briefly review the other event types that can be filtered in the Audit log and proceed with the lab.
Note: It may be necessary to investigate whether a change was made to a whitelist or a blocklist if a required file or network
address suddenly starts being blocked in a customer environment. Sudden unanticipated changes in behavior should be
investigated to see if an administrative change is involved.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 295 of 325
Cisco dCloud
Reporting
There are prebuilt weekly reports in the AMP for Endpoints console that you can choose to receive via email or access on demand
dCloud: The Cisco Demo Cloud
once they are generated. There are no options for editing the reports and they auto-generate for the previous Monday through
Sunday period. You will now review the data shown in the reports.
Note: You will not be enabling the email option for the weekly reports as email access for the user account you are using to
complete the labs is not available. Please do not enable the option to generate report emails. If you see the option enabled, please
disable it. Depending on the timing of the labs, you may not see data in the report simply due to the environment not being online
long enough.
1. Click the Analysis menu and select the Reports menu item.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 296 of 325
Cisco dCloud
5. Review the data in the report. Ensure that you DO NOT enable email notifications for any of the reports due to the lab
architecture.
You have become familiar with the options in the console for email alerts, event filtering, audit logging, anddCloud:
the built-in weekly
The Cisco Demo Cloud
reports. Utilizing these options effectively in your deployments can help you determine root cause of issues in a timelier manner
and become aware of potential issues early on.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 297 of 325
Cisco dCloud
1. Ensure that you are logged into the AMP for Endpoints console on the Jumphost machine.
2. Click the Accounts menu and select the API Credentials menu item.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 298 of 325
Cisco dCloud
6. The API credentials are generated. This is the only screen that will show the credentials. You will not be able to view
them again after leaving this screen. Leave this screen open, and do not navigate away from heredCloud:
withinThe
theCisco
console
Demo until
Cloud
instructed.
a. If you lose these values, you will have to repeat this potion of the API lab to generate new credentials.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 299 of 325
Cisco dCloud
1. Open the Postman application on the Jumphost machine by double-clicking on the Postman shortcut on the desktop.
4. We will now create a new Environment within Postman. This will allow us to easily access various API features later in the
lab.
7. Type ID
8. Open the AMP for Endpoints console (It should still be on the API Credentials page).
9. With your mouse, highlight the 3rd Party API Client ID value, and right-click Copy.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 300 of 325
Cisco dCloud
12. Press CTRL-v to paste our 3rd Party API Client ID here
13. Click on the New Key field just below our ID entry and type KEY
14. Open the AMP for Endpoints console (It should still be on the API Credentials page).
15. With your mouse, highlight the API Key value, and right-click Copy.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 301 of 325
Cisco dCloud
19. Once you have completed adding both your ID and KEY entries, click the Add button.
21. Close the Manage Environments window by clicking the X button on the top right of the window.
22. Select the new ABC AMP4E Environment from the drop-down in the upper right corner of the application.
23. Once the environment is selected, you can continue with the lab.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 302 of 325
Cisco dCloud
1. Ensure you are in the Postman application with the ABC AMP4E environment selected.
2. You should see a New Tab with GET selected below it.
b. At this point, you will receive a popup that allows you to select the Keys we defined within the currently selected
AMP4E Environment. Select ID by clicking on it in the popup window.
c. The GET request will complete your ‘variable’ selection as {{ID}} in the text field
d. Your cursor should be at the end of the line, continue by typing :{{ (Do not forget the colon)
e. Select KEY from the popup to autocomplete that variable selection in the text field and your cursor should be at
the end of the line.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 303 of 325
Cisco dCloud
i. @api.amp.cisco.com/v1/computers
dCloud: The Cisco Demo Cloud
ii. We are using AMP for Endpoint accounts in the North America AMP Cloud for this lab. For production
installations elsewhere in the world, you may need to enter a different DNS name for API access.
4. Once the GET request looks like the above image, click the Send button.
5. Once completed, you will see the returned results at the bottom of the Postman application.
a. Scroll through the results. Notice that each Computer returned illustrates several pieces of information including:
Connector_guid, hostname, links to various AMP Console locations for this computer, internal/external IP, OS,
Policy, etc.
6. Let’s save this GET request in Postman so we can use it later if needed.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 304 of 325
Cisco dCloud
c. Click + Create Collection, then enter AMP4E Collection in the Name your collection text field
d. Click the Check Mark at the end of the new collection row
7. You are now presented with the AMP4E Collection. Notice the GET requested within the collection. Click the X in the
upper right corner of the collection to close the pop-over window.
8. We can now make another GET request. This time, we will get AMP Groups via the API.
a. Highlight the GET URL from the previous request then right-click and select Copy.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 305 of 325
Cisco dCloud
b. Open a new Tab in Postman by clicking the + symbol next to the current tab
c. Click in the Enter request URL field and press CTRL-v to paste the previous URL into this text field. Modify
this URL by removing computers and replacing it with groups.
d. Click Send
e. Scroll through the returned response data. You should see our Groups and related values which includes the
group’s assigned guid.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 306 of 325
Cisco dCloud
a. Click the AMP4E Collection on the left side of the Postman window and it will expand to show you the 2 GET
requests that we have saved.
10. We have validated our API is functional. We are ready to move onto a more complex example of what the API can
accomplish.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 307 of 325
Cisco dCloud
Using the AMP for Endpoints API to Change a Host Group Assignment
Our customer has informed us that the WKST2 system is no longer a Compliance system. We want to usedCloud:
the API to process the
The Cisco Demo Cloud
group assignment change within the console.
1. Open the AMP for Endpoints Console and navigate to Management > Groups
2. Click the entry for ABC - Windows Compliance Protect, then notice it has direct members listed (minimally wkst2
should be listed here).
4. Expand the wkst2 computer. Copy the Connector GUID value from the form by highlighting the value, right-clicking
the value, and selecting Copy.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 308 of 325
Cisco dCloud
6. In the Collection on the left, click on the 1) AMP4E Computers GET Request in our collection
8. Go to the GET Request URL field and add a forward slash (/) then press CTRL-v to paste the connector guid we just
copied at the end of the line. (Your value will be different than what is displayed below)
10. You will notice that the results of this request are specific to our requested Connector and includes a great deal more
detail about that particular system. Scroll through the data returned.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 309 of 325
Cisco dCloud
11. If you get an error, ensure there is not a space character anywhere in the GET field.
12. Let’s save this to our collection by clicking the drop-down button next to Save (Do Not click Save directly as it will
overwrite our previous GET request.) This will allow you to Click Save As
13. Save the request as 3) AMP4E Specific Computer, Select the AMP4E Collection, then click the Save to AMP4E
Collection button.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 310 of 325
Cisco dCloud
14. We now need to locate the Group GUID for the group we want to move the wkst2 system into. We will use a previous API
request from our collection to obtain that information.
15. In the Collection on the left, click on the 2) AMP4E Groups GET Request in our collection. dCloud: The Cisco Demo Cloud
17. When the results load, scroll through the information returned to locate the ABC - Windows Endpoints Protect group
18. Highlight the associated guid value and right-click to select Copy
19. Select the 3) AMP4E Specific Computer request from our collection by clicking on the entry. This will bring you to the
correct tab within Postman.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 311 of 325
Cisco dCloud
21. Click in the URL field and add the following to the end of the line: ?group_guid=
22. Paste the group GUID we copied earlier to the end of the line by pressing CTRL-v. (Your URL will vary based on your
own values.)
25. Return to your AMP for Endpoints console and Select Management > Computers
26. Expand the entry for wkst2 and note the current Group Assignment has changed as expected based on our API PATCH
request.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 312 of 325
Cisco dCloud
28. Expand the ABC API credential and notice the data displayed. The Client ID is available, but the API Key is not
displayed. If you had lost this API Key value, you would need to configure a new API Credential.
30. The documentation will open in a new tab. Click v1. Browse the Resources section to see what API calls are currently
available to AMP for Endpoints API integrations.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 313 of 325
Cisco dCloud
You have completed the API lab and now have a better understanding of the capabilities of the existing API.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 314 of 325
Cisco dCloud
2. We will now save the modified API request 3) AMP4E Specific Computer that includes our change to “PATCH” as well as
the extended URL requests.
b. Ensure your API URL includes both the specific connector guid as well as the ?group_guid= portion of the entry
from our previous steps
c. Once ready, click Save to overwrite the 3)… entry in our Postman Collection
a. NOTE: The various options you can pass between API calls is listed in the API documentation.
5. Click Send
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 315 of 325
Cisco dCloud
7. Notice the “connector_guid” value. We will now try to pull that data specifically from the response information
8. Scroll back up just below the GET url request and select the Tests option
9. Type the following 2 lines in the Tests entry window as displayed in the following image:
a. Click the dropdown NEXT TO SAVE so we can save this as a new entry rather than overwriting
b. Save this as displayed in the following image being sure to change the Request Name to “4) AMP4E WKST2” as
well as selecting the AMP4E Collection.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 316 of 325
Cisco dCloud
11. Now we need to create a new update API call to make use of the stored variable
12. Click 3) AMP4E Specific Computer then highlight the guid value in the url just after /computer/
13. With the text highlighted, type {{CONNECTOR_GUID_VAR}}. We are replacing the previous guid value with a variable
entry.
a. This value will be created for us by the previous code entered in the “Tests” section of the 3)… request
14. Using SAVE AS, save this as 5) AMP4E Update WKST2 Group being sure to add it to the AMP4E Collection
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 317 of 325
Cisco dCloud
15. Before running the above API Calls, let’s move the computer back to the ABC – Windows Endpoint Audit group.
b. Expand wkst2
d. Click Move
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 318 of 325
Cisco dCloud
18. Click the eye icon, near the ABC AMP4E Environment
19. Notice the CONNECTOR_GUID_VAR has been dynamically set as a result of this recent API call
20. Now click 5) AMP4E Update WKST2 Group and Press Send
24. Before we proceed, expand WKST2, click Move to Group, and set the group to ABC – Windows Endpoint Audit.
25. We can even further automate this process running this collection in Postman using Collection Runner. We will do that
next.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 319 of 325
Cisco dCloud
1. Return to Postman
3. In Postman, from the main application bar, select Help > Check for Updates then press the Update button
5. When postman restarts, close the pop-over window with the X in the upper right-hand corner.
6. Set ABC AMP4E as the current environment in the top right corner of the screen.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 320 of 325
Cisco dCloud
8. Click Run.
9. Set the form data on the left to be as displayed in the following image
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 321 of 325
Cisco dCloud
11. You should see each entry in the collection run in order automatically.
14. You should see that by chaining the collection together as a single run job, the WKST2 computer has changed group
assignment to the Protect policy.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 322 of 325
Cisco dCloud
4. This will open a Generate Code Snippets window. Click HTTP and select Shell > cURL
5. You should now see the code for this Collection Entry translated into a curl command. Click Copy to Clipboard.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 323 of 325
Cisco dCloud
8. Enter 198.18.134.50 in the Host Name (or IP address) field and click Open
11. Right-click in the Putty widow. This will paste the cURL command from your clipboard.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 324 of 325
Cisco dCloud
13. Note the results! The API curl request we exported has retrieved data to our Linux workstation.
As you can see, with tools such as Postman available to you, and a little experience, you can one day leverage APIs to their fullest
capacity.
Lab Completion
Congratulations! You have now completed all scenarios in the AMP for Endpoint FE Training lab content.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 325 of 325