File Policies and AMP for Firepower

advertisement
File Policies and AMP for Firepower
The following topics provide an overview of file control, file policies, file rules, AMP cloud connections,
and dynamic analysis connections.
• File Policies and AMP for Firepower Overview, page 1
• File Control and Cisco AMP Basics, page 2
• File Policies, page 7
• File Rules, page 12
• Cloud Connections, page 18
• Collective Security Intelligence Communications Configuration, page 25
File Policies and AMP for Firepower Overview
Malicious software, or malware, can enter your organization’s network via multiple routes. To help you
identify and mitigate the effects of malware, the Firepower System’s Advanced Malware Protection for
Firepower (AMP for Firepower) features can detect, track, store, analyze, and optionally block the transmission
of malware in network traffic.
You configure AMP for Firepower and file control (which allows control over all files of a specific type
regardless of whether the files contain malware) as part of your overall access control configuration. File
policies that you create and associate with access control rules handle network traffic that matches the rules.
You can download files detected in that traffic and run local malware analysis to determine whether the files
contain malware. You can also submit files to the AMP Threat Grid cloud for dynamic analysis to determine
whether the files represent malware.
The system automatically enables file event, malware event, and captured file logging for active file policies.
When a file policy generates a file or malware event, or captures a file, the system also automatically logs the
end of the associated connection to the Firepower Management Center database.
Note
File events generated by inspecting NetBIOS-ssn (SMB) traffic do not immediately generate connection
events because the client and server establish a persistent connection. The system generates connection
events after the client or server ends the session.
Firepower Management Center Configuration Guide, Version 6.0
Online Only
1
File Policies and AMP for Firepower
File Control and Cisco AMP Basics
To further target your analysis, you can use a malware file’s network file trajectory page to track the spread
of an individual threat across hosts over time, allowing you to concentrate outbreak control and prevention
efforts where most useful.
Tip
If your organization uses AMP for Endpoints, the system can import and display endpoint-based data
alongside any data gathered by AMP for Firepower. Importing this data does not require a license.
If your organization requires additional security or wants to limit outside connections, you can use a Cisco
AMP Private Cloud Virtual Appliance (AMPv). AMPv privately collects AMP for Endpoints events and
forwards them to the Firepower Management Center.
File Control and Cisco AMP Basics
AMP for Firepower
AMP for Firepower allows you to detect, store, track, analyze, and block malware on your network using
managed devices deployed inline. AMP for Firepower can block many types of malware files, including PDFs
and Microsoft Office documents.
File Detection and Storage
With AMP for Firepower, managed devices monitor network traffic for transmissions of certain file types.
When a device detects an eligible file, it sends the file's SHA-256 hash value to the Firepower Management
Center. The Firepower Management Center performs a malware cloud lookup, querying the AMP cloud for
the file's disposition. The device can also store an eligible file to its hard drive or malware storage pack using
the file storage feature. You can view captured file information in the event viewer, and download a copy for
offline analysis.
File Analysis
The system applies several methods of file inspection and analysis to determine whether a file contains
malware.
Note
Based on your configuration, you can either inspect a file the first time the system detects it, and wait for
a cloud lookup result, or pass the file on this first detection without waiting for the cloud lookup result.
Based on whether you enable the option in a file rule, the system inspects files in the following order:
Spero Analysis
If the file is an eligible executable file, the device can analyze the file's structure and submit the resulting
Spero signature to the AMP Threat Grid cloud. The cloud uses this signature to determine if the file
contains malware.
Firepower Management Center Configuration Guide, Version 6.0
2
Online Only
File Policies and AMP for Firepower
AMP for Firepower
Local Malware Analysis
Using a local malware inspection engine, the device examines an eligible file, blocks it if the file contains
malware and the file rule is configured to do so, and generates malware events.
The device also generates a file composition report detailing a file's properties, embedded objects, and
possible malware.
Dynamic Analysis
If the device preclassifies files as possible malware, it submits these files to the AMP Threat Grid cloud
or an AMP Threat Grid on-premises appliance for dynamic analysis, regardless of whether the device
stores the file.
The AMP Threat Grid cloud or on-premises AMP Threat Grid appliance runs the file in a sandbox
environment to determine whether the file is malicious, and returns a threat score that describes the
likelihood a file contains malware. From the threat score, you can view a dynamic analysis summary
report that details why the cloud assigned the threat score.
File and Malware Events and Captured Files
Based on the file analysis results, you can review captured files and generated malware and file events from
the event viewer. When available, you can examine a file's composition, disposition, threat score, and dynamic
analysis summary report for further insight into the malware analysis. You can also access the network file
trajectory, which displays a map of how the file traversed your network, passing among hosts, as well as
various file properties.
Archive Files
The system can inspect up to three levels of nested files beneath the outermost archive file (level 0) if the file
is an archive (such as .zip or .rar archive files). If any individual file matches a file rule with a block action,
the system blocks the entire archive, not just the individual file. The system can also block archives that exceed
a specified level of nesting, or whose contents are encrypted or otherwise cannot be inspected.
File Tracking
If a file has a disposition in the AMP cloud that you know to be incorrect, you can add the file’s SHA-256
value to a file list:
• To treat a file as if the AMP cloud assigned a clean disposition, add the file to the clean list.
• To treat a file as if the AMP cloud assigned a malware disposition, add the file to the custom detection
list.
On subsequent detection, the device either allows or blocks the file without reevaluating the file's disposition.
You can use the clean list or custom detection list per file policy.
Note
You must configure a rule in the file policy to either perform a malware cloud lookup or block malware
on matching files to calculate a file's SHA-256 value.
Firepower Management Center Configuration Guide, Version 6.0
Online Only
3
File Policies and AMP for Firepower
AMP for Firepower
Malware Dispositions
The system determines file dispositions based on the disposition returned by the AMP cloud. To improve
performance, if the system already knows the disposition for a file based on its SHA-256 value, the Firepower
Management Center uses the cached disposition rather than querying the AMP cloud. Based on its disposition,
the system can block the file. If any nested file inside an archive file is blocked, the system blocks the entire
archive file.
A file can have one of the following file dispositions as a result of addition to a file list, or due to threat score:
• Malware indicates that the AMP cloud categorized the file as malware, local malware analysis identified
malware, or the file’s threat score exceeded the malware threshold defined in the file policy.
• Clean indicates that the AMP cloud categorized the file as clean, or that a user added the file to the clean
list.
• Unknown indicates that the system queried the AMP cloud, but the file has not been assigned a disposition;
in other words, the AMP cloud has not categorized the file.
• Custom
Detection
indicates that a user added the file to the custom detection list.
• Unavailable indicates that the system could not query the AMP cloud. You may see a small percentage
of events with this disposition; this is expected behavior.
Archive files have dispositions based on the dispositions assigned to the files inside the archive. All archives
that contain identified malware files receive a disposition of Malware. Archives without identified malware
files receive a disposition of Unknown if they contain any unknown files, and a disposition of Clean if they
contain only clean files.
Table 1: Archive File Disposition by Contents
Archive File Disposition
Number of Unknown Files
Number of Clean Files
Number of Malware Files
Unknown
1 or more
Any
0
Clean
0
1 or more
0
Malware
Any
Any
1 or more
Archive files, like other files, may have dispositions of Custom
for those dispositions apply.
Tip
Detection
or Unavailable if the conditions
If you see several Unavailable malware events in quick succession, make sure the Firepower Management
Center can contact the AMP cloud.
Note that file dispositions can change. For example, the AMP cloud can determine that a file that was previously
thought to be clean is now identified as malware, or the reverse—that a malware-identified file is actually
clean. When the disposition changes for a file you queried in the last week, the AMP cloud notifies the system
so it can automatically take action the next time it detects that file being transmitted. A changed disposition
is called a retrospective disposition.
Firepower Management Center Configuration Guide, Version 6.0
4
Online Only
File Policies and AMP for Firepower
File Control without AMP for Firepower
Dispositions returned from an AMP cloud query, associated threat scores, and dispositions assigned by local
malware analysis, have a time-to-live (TTL) value. After a disposition has been held for the duration specified
in the TTL value without update, the system purges the cached information. Dispositions and associated threat
scores have the following TTL values:
• Clean — 4 hours
• Unknown — 1 hour
• Malware — 1 hour
If a query against the cache identifies a cached disposition that timed out, the system re-queries the AMP
cloud for a new disposition.
File Control without AMP for Firepower
If your organization wants to block not only the transmission of malware files, but all files of a specific type
(regardless of whether the files contain malware), the file control feature allows you to cast a wider net. As
with AMP for Firepower, managed devices monitor network traffic for transmissions of specific file types,
then either block or allow the file.
File control is supported for all file types where the system can detect malware, plus many additional file
types. These file types are grouped into basic categories, including multimedia (swf, mp3), executables (exe,
torrent), and PDFs. Note that file control, unlike AMP for Firepower, does not require queries of the AMP
cloud.
AMP for Endpoints
AMP for Endpoints is Cisco’s enterprise-class Advanced Malware Protection solution that discovers,
understands, and blocks advanced malware outbreaks, advanced persistent threats, and targeted attacks. The
following diagram details the general flow of information using AMP for Endpoints.
If your organization uses AMP for Endpoints, individual users install lightweight connectors on endpoints:
computers and mobile devices. Connectors can inspect files upon upload, download, execution, open, copy,
move, and so on. These connectors communicate with the AMP cloud to determine if inspected files contain
malware.
When a file is positively identified as malware, the AMP cloud sends the threat identification to the Firepower
Management Center. The AMP cloud can also send other kinds of information to the Firepower Management
Firepower Management Center Configuration Guide, Version 6.0
Online Only
5
File Policies and AMP for Firepower
AMP for Firepower vs. AMP for Endpoints
Center, including data on scans, quarantines, blocked executions, and cloud recalls. The Firepower Management
Center logs this information as malware events.
AMP for Endpoints can generate indications of compromise (IOC) when a host’s security may be compromised.
The Firepower System can display this IOC information for its monitored hosts. Cisco occasionally develops
new IOC types for endpoint-based malware events, which the system automatically downloads.
With AMP for Endpoints, you can not only configure Management Center-initiated remediations and alerts
based on malware events, but you can also use the AMP for Endpoints management console help you mitigate
the effect of malware. The management console provides a robust, flexible web interface where you control
all aspects of your AMP for Endpoints deployment and manage all phases of an outbreak. You can:
• configure custom malware detection policies and profiles for your entire organization, as well as perform
flash and full scans on all your users’ files
• perform malware analysis, including view heat maps, detailed file information, network file trajectory,
and threat root causes
• configure multiple aspects of outbreak control, including automatic quarantines, application blocking
to stop non-quarantined executables from running, and exclusion lists
• create custom protections, block execution of certain applications based on group policy, and create
custom whitelists
Tip
For detailed information on AMP for Endpoints, see the AMP for Endpoints management
console.
AMP for Firepower vs. AMP for Endpoints
You can use the Firepower System to work with data from both AMP for Firepower and AMP for Endpoints.
Because AMP for Endpoints malware detection is performed at the endpoint at download or execution time,
while managed devices detect malware in network traffic, the information in the two types of malware events
is different. For example, endpoint-based malware events contain information on file path, invoking client
application, and so on, while malware detections in network traffic contain port, application protocol, and
originating IP address information about the connection used to transmit the file.
As another example, for network-based malware events, user information represents the user most recently
logged into the host where the malware was destined, as determined by network discovery. But AMP for
Endpoints-reported users represent the user currently logged into the endpoint where the malware was detected.
Note
Depending on your deployment, endpoints monitored by AMP for Endpoints may not be the same hosts
as those monitored by AMP for Firepower. For this reason, endpoint-based malware events do not add
hosts to the network map. However, the system uses IP and MAC address data to tag monitored hosts
with indications of compromise obtained from your AMP for Endpoints deployment. If two different hosts
monitored by different AMP solutions have the same IP and MAC address, the system can incorrectly tag
monitored hosts with AMP for Endpoints IOCs.
The following table summarizes the differences between the two strategies.
Firepower Management Center Configuration Guide, Version 6.0
6
Online Only
File Policies and AMP for Firepower
File Policies
Table 2: Network vs Endpoint-Based Advanced Malware Protection Strategies
Feature
AMP for Firepower
AMP for Endpoints
file type detection and
blocking method (file
control)
in network traffic, using access control and file
policies
not supported
malware detection and
blocking method
in network traffic, using access control and file
policies
on individual endpoints, using a connector that
communicates with the AMP cloud
network traffic inspected
traffic passing through a managed device
none; connectors installed on endpoints directly
inspect files
malware detection robustness limited file types
all file types
malware analysis choices
Management Center-based, plus analysis in the
AMP cloud
Management Center-based, plus additional options
on the AMP for Endpoints management console
malware mitigation
malware blocking in network traffic, Management AMP for Endpoints-based quarantine and outbreak
Center-initiated remediations
control options, Management Center-initiated
remediations
events generated
file events, captured files, malware events, and
retrospective malware events
information in malware
events
basic malware event information, plus connection in-depth malware event information; no
data (IP address, port, and application protocol) connection data
network file trajectory
Management Center-based
required licenses or
subscriptions
licenses required to perform file control and AMP AMP for Endpoints subscription (not
for Firepower
license-based)
malware events
Management Center-based, plus additional options
on the AMP for Endpoints management console
File Policies
A file policy is a set of configurations that the system uses to perform AMP for Firepower and file control,
as part of your overall access control configuration. This association ensures that before the system passes a
file in traffic that matches an access control rule’s conditions, it first inspects the file. Consider the following
diagram of a simple access control policy in an inline deployment.
Firepower Management Center Configuration Guide, Version 6.0
Online Only
7
File Policies and AMP for Firepower
File Policy Advanced Configuration
The policy has two access control rules, both of which use the Allow action and are associated with file
policies. The policy’s default action is also to allow traffic, but without file policy inspection. In this scenario,
traffic is handled as follows:
• Traffic that matches Rule
1
is inspected by File
• Traffic that does not match Rule
by File Policy B.
Policy A.
1 is evaluated against Rule 2. Traffic that matches Rule 2 is inspected
• Traffic that does not match either rule is allowed; you cannot associate a file policy with the default
action.
You can associate a single file policy with an access control rule whose action is Allow, Interactive Block,
or Interactive Block with reset. The system then uses that file policy to inspect network traffic that meets
the conditions of the access control rule.
By associating different file policies with different access control rules, you have granular control over how
you identify and block files transmitted on your network. Note, however, that you cannot use a file policy to
inspect traffic handled by the access control default action.
File Policy Advanced Configuration
Advanced File Inspection Configuration Notes
In a file policy, you can configure advanced options to block files on the custom detection list, allow files on
the clean list, and set a threshold threat score above which files are considered malware.
You can also configure your file policy to inspect the contents of archive files, allowing you to analyze and
block archive files according to your organization’s needs. All features applicable to uncompressed files (such
as dynamic analysis and file storage) are available for nested files inside archive files.
Firepower Management Center Configuration Guide, Version 6.0
8
Online Only
File Policies and AMP for Firepower
Managing File Policies
Archive File Inspection Notes
Some archive files contain additional archive files (and so on). The level at which a file is nested is its archive
file depth. Note that the top-level archive file is not considered in the depth count; depth begins at 1 with the
first nested file.
Although the system can only inspect up to 3 levels of nested archive files, you can configure your file policy
to block archive files that exceed that depth (or a lower maximum depth that you specify). If you want to
restrict nested archives further, you have the option to configure a lower maximum file depth of 2 or 1.
If you choose not to block files that exceed the maximum archive file depth of 3, when archive files that
contain some extractable contents and some contents nested at a depth of 3 or greater appear in monitored
traffic, the system examines and reports data only for the files it was able to inspect.
Note
If traffic that contains an archive file is blacklisted or whitelisted by Security Intelligence, or if the top-level
archive file’s SHA-256 value is on the custom detection list, the system does not inspect the contents of
the archive file. If a nested file is blacklisted, the entire archive is blocked; however, if a nested file is
whitelisted, the archive is not automatically passed (depending on any other nested files and characteristics).
If your file policy is configured to inspect archive file contents, you can use the event viewer context menu
and the network file trajectory viewer to view information about the files inside an archive when the archive
file appears in a file event, malware event, or as a captured file.
All file contents of the archive are listed in table form, with a short summary of their relevant information:
name, SHA-256 hash value, type, category, and archive depth. A network file trajectory icon appears by each
file, which you can click to view further information about that specific file.
File Policy Configuration Notes and Limitations
• For a new policy, the web interface indicates that the policy is not in use. If you are editing an in-use
file policy, the web interface tells you how many access control policies use the file policy. In either
case, you can click the text to jump to the Access Control Policies page.
• For an access control policy using a file policy with Block Malware rules for FTP, if you set the default
action to an intrusion policy with Drop when Inline disabled, the system generates events for detected
files or malware matching the rules, but does not drop the files. To block FTP fire transfers and use an
intrusion policy as the default action for the access control policy where you select the file policy, you
must select an intrusion policy with Drop when Inline enabled.
Managing File Policies
Smart License
Classic License
Threat (file control) Protection (file
Malware (AMP for control)
Firepower)
Supported Devices Supported Domains Access
Any
Any
Admin/Access
Admin
Malware (AMP for
Firepower)
The File Policies page displays a list of existing file policies along with their last-modified dates. You can
use this page to manage your file policies.
Firepower Management Center Configuration Guide, Version 6.0
Online Only
9
File Policies and AMP for Firepower
Managing File Policies
In a multidomain deployment, the system displays policies created in the current domain, which you can edit.
It also displays policies created in ancestor domains, which you cannot edit. To view and edit policies created
in a lower domain, switch to that domain.
Note
The system checks the AMP cloud for updates to the list of file types eligible for dynamic analysis (no
more than once a day). If the list of eligible file types changes, this constitutes a change in the file policy;
any access control policy using the file policy is marked out-of-date if deployed to any devices. You must
deploy policies before the updated file policy can take effect on the device.
Procedure
Step 1
Step 2
Select Policies > Access Control > Malware & File .
Manage your file policies:
• Compare—Click Compare Policies; see Comparing Policies.
• Create — To create a file policy, click New File Policy and proceed as described in Creating a File
Policy, on page 10.
• Copy — To copy a file policy, click the copy icon (
).
If a view icon ( ) appears instead, the configuration belongs to an ancestor domain, or you do not have
permission to modify the configuration.
• Delete — If you want to delete a file policy, click the delete icon (
), then click Yes and OK as
prompted.
If the controls are dimmed, the configuration belongs to an ancestor domain, or you do not have permission
to modify the configuration.
• Deploy—Click Deploy; see Deploying Configuration Changes.
• Edit — If you want to modify an existing file policy, click the edit icon (
• Report—Click the report icon (
).
); see Generating Current Policy Reports.
Creating a File Policy
Smart License
Classic License
Threat (file control) Protection (file
Malware (AMP for control)
Firepower)
Supported Devices Supported Domains Access
Any
Any
Admin/Access
Admin
Malware (AMP for
Firepower)
Firepower Management Center Configuration Guide, Version 6.0
10
Online Only
File Policies and AMP for Firepower
Managing File Policies
Procedure
Step 1
Select Policies > Access Control > Malware & File .
Tip
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
To make a copy of an existing file policy, click the copy icon ( ), then type a unique name for the
new policy in the dialog box that appears. You can then modify the copy.
Click New File Policy.
Enter a Name and optional Description for your new policy.
Click Save.
Add one or more rules to the file policy as described in Creating File Rules, on page 17.
Optionally, select the Advanced tab and configure advanced options as described in Advanced and Archive
File Inspection Options, on page 11.
Save the file policy.
What to Do Next
• Add the file policy to an access control rule as described in Access Control Rule Configuration to Perform
File Control and Malware Protection.
• Deploy configuration changes; see Deploying Configuration Changes.
Advanced and Archive File Inspection Options
The Advanced tab in the file policy editor has the following general options:
• First Time File Analysis - submit a file for file analysis that the system detects for the first time. The
file must match a rule configured to perform a malware cloud lookup and Spero, local malware, or
dynamic analysis. If you disable this option, files detected for the first time are marked with an Unknown
disposition.
• Enable Custom Detection List - block files on the custom detection list
• Enable Clean List - allow files on the clean list
• Mark files as malware based on dynamic analysis threat score - set a threshold threat score; files
with scores equal or worse than the threshold are considered malware
If you select lower threshold values, you increase the number of files treated as malware. Depending on
the action selected in your file policy, this can result in an increase of blocked files.
The Advanced tab in the file policy editor has the following archive file inspection options:
• Inspect Archives - allows you to inspect the contents of archive files
Caution
Enabling or disabling archive file inspection restarts the Snort process when you deploy
configuration changes, temporarily interrupting traffic inspection. Whether traffic drops
during this interruption or passes without further inspection depends on the model of
the managed device and how it handles traffic.
Firepower Management Center Configuration Guide, Version 6.0
Online Only
11
File Policies and AMP for Firepower
File Rules
• Block Encrypted Archives - allows you to block archive files that have encrypted contents
• Block Uninspectable Archives - allows you to block archive files with contents that the system is unable
to inspect for reasons other than encryption; this usually applies to corrupted files, or those that exceed
your specified maximum archive depth
• Max Archive Depth - allows you to block nested archive files that exceed the specified depth; the
top-level archive file is not considered in this count; depth begins at 1 with the first nested file
Editing a File Policy
Smart License
Classic License
Threat (file control) Protection (file
Malware (AMP for control)
Firepower)
Supported Devices Supported Domains Access
Any
Any
Admin/Access
Admin
Malware (AMP for
Firepower)
Procedure
Step 1
Step 2
Step 3
Select Policies > Access Control > Malware & File .
Click the edit icon ( ) next to the file policy you want to edit. If a view icon ( ) appears instead, the
configuration belongs to an ancestor domain, or you do not have permission to modify the configuration.
You have the following options:
• Add a file rule by selecting Add File Rule. For more information, see File Rules, on page 12.
• Edit an existing file rule by clicking the edit icon (
) next to the rule you want to edit.
• Configure advanced options as described in Advanced and Archive File Inspection Options, on page
11.
Note
The file policy editor displays how many access control policies use the file policy you are currently
editing. You can click the notification to display a list of the parent policies and, optionally, continue
to the Access Control Policies page.
What to Do Next
• Deploy configuration changes; see Deploying Configuration Changes.
File Rules
A file policy, like its parent access control policy, contains rules that determine how the system handles files
that match the conditions of each rule. You can configure separate file rules to take different actions for
different file types, application protocols, or directions of transfer.
Firepower Management Center Configuration Guide, Version 6.0
12
Online Only
File Policies and AMP for Firepower
File Rule Components
Once a file matches a rule, the rule can:
• allow or block files based on simple file type matching
• block files based on disposition
• store captured files to the device
• submit captured files for local malware, Spero, or dynamic analysis
In addition, the file policy can:
• automatically treat a file as if it is clean or malware based on entries in the clean list or custom detection
list
• treat a file as if it is malware if the file’s threat score exceeds a configurable threshold
• inspect the contents of archive files (such as .zip or .rar)
• block archive files whose contents are encrypted, nested beyond a specified maximum archive depth,
or otherwise uninspectable
File Rule Components
Table 3: File Rule Components
File Rule Component
Description
application protocol
The system can detect and inspect files transmitted via FTP, HTTP, SMTP, IMAP, POP3, and
NetBIOS-ssn (SMB). Any, the default, detects files in HTTP, SMTP, IMAP, POP3, FTP, and
NetBIOS-ssn (SMB) traffic. To improve performance, you can restrict file detection to only one
of those application protocols on a per-file rule basis.
direction of transfer
You can inspect incoming FTP, HTTP, IMAP, POP3, and NetBIOS-ssn (SMB) traffic for
downloaded files; you can inspect outgoing FTP, HTTP, SMTP, and NetBIOS-ssn (SMB) traffic
for uploaded files.
Tip
file categories and types
Use Any to detect files over multiple application protocols, regardless of whether users
are sending or receiving.
The system can detect various types of files. These file types are grouped into basic categories,
including multimedia (swf, mp3), executables (exe, torrent), and PDFs. You can configure file
rules that detect individual file types, or on entire categories of file types.
For example, you could block all multimedia files, or just ShockWave Flash (swf) files. Or, you
could configure the system to alert you when a user downloads a BitTorrent (torrent) file.
Note
Frequently triggered file rules can affect system performance. For example, detecting
multimedia files in HTTP traffic (YouTube, for example, transmits significant Flash
content) could generate an overwhelming number of events.
Firepower Management Center Configuration Guide, Version 6.0
Online Only
13
File Policies and AMP for Firepower
File Rule Actions and Evaluation Order
File Rule Component
Description
file rule action
A file rule’s action determines how the system handles traffic that matches the conditions of the
rule.
Depending on the selected action, you can configure whether the system stores the file or performs
Spero, local malware, or dynamic analysis on a file. If you select a Block action, you can also
configure whether the system also resets the blocked connection.
Note
File rules are evaluated in rule-action, not numerical,
order.
File Rule Actions and Evaluation Order
To be effective, a file policy must contain one or more rules. File rules give you granular control over which
file types you want to log, block, or scan for malware.
Each file rule has an associated action that determines how the system handles traffic that matches the conditions
of the rule. You can set separate rules within a file policy to take different actions for different file types,
application protocols, or directions of transfer. Simple blocking takes precedence over malware inspection
and blocking, which takes precedence over simple detection and logging.
The rule actions are as follows, in rule-action order:
• Block Files rules allow you to block specific file types. You can configure options to reset the connection
when a file transfer is blocked, and store captured files to the managed device.
• Block Malware rules allow you to calculate the SHA-256 hash value of specific file types, query the
AMP cloud to determine if files traversing your network contain malware, then block files that represent
threats.
• Malware Cloud Lookup rules allow you to obtain and log the disposition of files traversing your network,
while still allowing their transmission.
• Detect Files rules allow you to log the detection of specific file types to the database, while still allowing
their transmission.
Caution
Changing a file rule action to or from Detect Files or Block Malware, or enabling or disabling Store
files, restarts the Snort process when you deploy configuration changes, temporarily interrupting traffic
inspection. Whether traffic drops during this interruption or passes without further inspection depends on
the model of the managed device and how it handles traffic.
Depending on the file rule action, you can configure options to reset the connection when a file transfer is
blocked, store captured files to the managed device, locally analyze files for malware, submit captured files
to the AMP cloud for dynamic and Spero analysis, and store files that cannot be currently submitted to the
cloud for later submission.
Firepower Management Center Configuration Guide, Version 6.0
14
Online Only
File Policies and AMP for Firepower
File Policy Notes and Limitations
Table 4: File Rule Actions
File Rule Action
Option
Block Files
capable?
Block Malware
capable?
Detect Files
capable?
Spero Analysis for
MSEXE
no
yes, you can submit no
executable files
yes, you can submit
executable files
Dynamic Analysis
no
yes, you can submit no
executable files with
Unknown file
dispositions
yes, you can submit
executable files with
Unknown file
dispositions
Capacity Handling
no
yes
no
yes
Local Malware
Analysis
no
yes
no
yes
Reset Connection
yes (recommended) yes (recommended) no
no
Store Files
yes, you can store
all matching file
types
yes, you can store
file types matching
the file dispositions
you select
yes, you can store yes, you can store
file types matching all matching file
the file dispositions types
you select
Malware Cloud
Lookup capable?
File Policy Notes and Limitations
File Rule Configuration Notes and Limitations
• A rule configured to block files in a passive deployment does not block matching files. Because the
connection continues to transmit the file, if you configure the rule to log the beginning of the connection,
you may see multiple events logged for this connection.
• If a file rule is configured with a Malware Cloud Lookup or Block Malware action and the Firepower
Management Center cannot establish connectivity with the AMP cloud, the system cannot perform any
configured rule action options until connectivity is restored.
• Cisco recommends that you enable Reset Connection for the Block Files and Block Malware actions
to prevent blocked application sessions from remaining open until the TCP connection resets. If you do
not reset connections, the client session will remain open until the TCP connection resets itself.
• If you are monitoring high volumes of traffic, do not store all captured files, or submit all captured files
for dynamic analysis. Doing so can negatively impact system performance.
• You cannot perform malware analysis on all file types detected by the system. After you select values
from the Application Protocol, Direction of Transfer, and Action drop-down lists, the system constrains
the list of file types.
Firepower Management Center Configuration Guide, Version 6.0
Online Only
15
File Policies and AMP for Firepower
File Policy Notes and Limitations
File Detection Notes and Limitations
• If a file matches a rule with an application protocol condition, file event generation occurs after the
system successfully identifies a file’s application protocol. Unidentified files do not generate file events.
• FTP transfers commands and data over different channels. In a passive or inline tap mode deployment,
the traffic from an FTP data session and its control session may not be load-balanced to the same Snort.
• If the total number of bytes for all file names for files in a POP3, POP, SMTP, or IMAP session exceeds
1024, file events from the session may not reflect the correct file names for files that were detected after
the file name buffer filled.
• When transmitting text-based files over SMTP, some mail clients convert newlines to the CRLF newline
character standard. Since Mac-based hosts use the carriage return (CR) character and Unix/Linux-based
hosts use the line feed (LF) character, newline conversion by the mail client can modify the size of the
file. Note that some mail clients default to newline conversion when processing an unrecognizable file
type.
File Blocking Notes and Limitations
• If an end-of-file marker is not detected for a file, regardless of transfer protocol, the file will not be
blocked by a Block Malware rule or the custom detection list. The system waits to block the file until
the entire file has been received, as indicated by the end-of-file marker, and blocks the file after the
marker is detected.
• If the end-of-file marker for an FTP file transfer is transmitted separately from the final data segment,
the marker will be blocked and the FTP client will indicate that the file transfer failed, but the file will
actually completely transfer to disk.
• File rules with Block Files and Block Malware actions block automatic resumption of file download
via HTTP by blocking new sessions with the same file, URL, server, and client application detected for
24 hours after the initial file transfer attempt occurs.
• In rare cases, if traffic from an HTTP upload session is out of order, the system cannot reassemble the
traffic correctly and therefore will not block it or generate a file event.
• If you transfer a file over NetBIOS-ssn (such as an SMB file transfer) that is blocked with a Block Files
rule, you may see a file on the destination host. However, the file is unusable because it is blocked after
the download starts, resulting in an incomplete file transfer.
• If you create file rules to detect or block files transferred over NetBIOS-ssn (such as an SMB file transfer),
the system does not inspect files transferred in an established TCP or SMB session started before you
deploy an access control policy invoking the file policy so those files will not be detected or blocked.
Firepower Management Center Configuration Guide, Version 6.0
16
Online Only
File Policies and AMP for Firepower
Creating File Rules
Creating File Rules
Smart License
Classic License
Threat (file control) Protection (file
Malware (AMP for control)
Firepower
Caution
Supported Devices Supported Domains Access
Any
Any
Admin/Access
Admin
Malware (AMP for
Firepower
Adding or removing a file type or file category, changing a file rule action to or from Detect Files or
Block Malware, or enabling or disabling Store files restarts the Snort process when you deploy
configuration changes, temporarily interrupting traffic inspection. Whether traffic drops during this
interruption or passes without further inspection depends on the model of the managed device and how it
handles traffic.
Procedure
Step 1
Step 2
Step 3
In the file policy editor, click Add File Rule.
Select an Application Protocol and Direction of Transfer as described in File Rule Components, on page
13.
Select one or more File Types. You can filter the list of file types in the following ways:
• Select one or more File Type Categories, then click All types in selected Categories.
• Search for a file type by its name or description. For example, type Windows in the Search name and
description field to display a list of Microsoft Windows-specific files.
Hover your pointer over a file type to view its
description.
Select a file rule Action as described in File Rule Actions and Evaluation Order, on page 14.
Depending on the action you selected, configure whether you want to:
Tip
Step 4
Step 5
• reset the connection after blocking the file
• store a matching file
• enable Spero analysis
• enable local malware analysis
• enable dynamic analysis and capacity handling
as described in File Rule Actions and Evaluation Order, on page 14.
Step 6
Step 7
Click Add.
Click Save to save the policy.
Firepower Management Center Configuration Guide, Version 6.0
Online Only
17
File Policies and AMP for Firepower
Cloud Connections
What to Do Next
• Deploy configuration changes; see Deploying Configuration Changes.
Cloud Connections
The Firepower System provides connections to the following public cloud-based servers to help you perform
Cisco Advanced Malware Protection (AMP):
• AMP cloud—allows you to retrieve AMP for Firepower malware dispositions and updates, and AMP
for Endpoints scan records, malware detections, quarantines, and indications of compromise (IOC)
• AMP Threat Grid cloud—allows you to submit eligible files for AMP for Firepower dynamic analysis,
and retrieve threat scores and dynamic analysis reports
Depending on your organization's privacy or security needs, you can also deploy private cloud servers:
• An AMP Private Cloud Virtual Appliance (AMPv) acts as a compressed, on-premises AMP cloud.
• An AMP Threat Grid appliance acts as an on-premises AMP Threat Grid cloud that does not contact
the public AMP Threat Grid cloud.
AMP Cloud Connections
The Advanced Malware Protection (AMP) cloud is a Cisco-hosted server that uses big data analytics and
continuous analysis to help you detect and block malware on your network. Both Cisco AMP solutions use
the AMP cloud:
• AMP for Firepower uses the AMP cloud to retrieve dispositions for possible malware detected in network
traffic by managed devices, and obtain local malware analysis and file pre-classification updates.
• AMP for Endpoints is Cisco’s enterprise-class AMP solution. Individual users install lightweight
connectors on their computers and mobile devices that communicate with the AMP cloud. The Firepower
Management Center can then import records of scans, malware detections, and quarantines, as well as
indications of compromise (IOC).
Depending on your deployment, endpoints monitored by AMP for Endpoints may not be the same hosts as
those monitored by AMP for Firepower. For this reason, endpoint-based malware events do not add hosts to
the network map. However, the system uses IP and MAC address data to tag monitored hosts with indications
of compromise obtained from your AMP for Endpoints deployment. If two different hosts monitored by
different AMP solutions have the same IP and MAC address, the system can incorrectly tag monitored hosts
with AMP for Endpoints IOCs.
Use the AMP Management page (AMP > AMP Management) to manage connections to the AMP cloud.
By default, a connection to the United States (US) AMP public cloud is configured and enabled for AMP for
Firepower. You cannot delete or disable an AMP for Firepower cloud connection, but you can switch between
the European Union (EU) and United States (US) AMP clouds, or configure a private cloud (AMPv) connection.
To add a separate FireAMP connection for endpoints, you must have an account in the FireAMP portal. An
AMP for Endpoints connection that has not registered successfully to the portal does not disable AMP for
Firepower.
Firepower Management Center Configuration Guide, Version 6.0
18
Online Only
File Policies and AMP for Firepower
AMP Cloud Connections
Requirements for AMP Cloud Connections
• AMP for networks - The system uses port 443 to perform malware cloud lookups for AMP for networks,
whether you use a public or private AMP cloud. You must open that port outbound for communications
from the Firepower Management Center.
• AMP for endpoints - The system uses port 443/HTTPS to connect to the Cisco cloud (public or private)
to receive endpoint-based malware events. You must open that port, both inbound and outbound, for
communications with the Firepower Management Center. Additionally, the Firepower Management
Center must have direct access to the Internet. The default health policy includes the AMP Status Monitor,
which warns you if the Firepower Management Center cannot connect to the cloud after an initial
successful connection, or if the connection is deregistered using the AMP portal.
To use the legacy port for AMP communications, see Collective Security Intelligence Communications
Configuration Options, on page 25.
AMP Cloud Connections and Multitenancy
In a multidomain deployment, you configure the AMP for Firepower connection at the Global level only.
Each Firepower Management Center can have only one AMP for Firepower connection. You can configure
AMP for Endpoints connections at any domain level, provided you use a separate AMP for Endpoints account
for each connection. For example, each client of an MSSP might have its own AMP for Endpoints deployment.
Caution
Cisco strongly recommends you configure AMP for Endpoints connections at the leaf level only, especially
if your leaf domains have overlapping IP space. If multiple subdomains have hosts with the same IP-MAC
address pair, the system could save endpoint-based malware events to the wrong leaf domain, or associate
IOCs with the wrong hosts.
Configuring an AMP for Endpoints Cloud Connection
Smart License
Classic License
Supported Devices Supported Domains Access
Any
Any
Any
Any
Admin
If your organization has deployed AMP for Endpoints, you can import threat identifications, indications of
compromise (IOC), and other malware-related information from the AMP cloud to the system. You must
configure an AMP for Endpoints connection even if you already have a AMP for Firepower connection
configured.
Caution
In a multidomain deployment, Cisco strongly recommends you configure AMP for Endpoints connections
at the leaf level only, especially if your leaf domains have overlapping IP space. If multiple subdomains
have hosts with the same IP-MAC address pair, the system could save endpoint-based malware events to
the wrong leaf domain, or associate IOCs with the wrong hosts.
Firepower Management Center Configuration Guide, Version 6.0
Online Only
19
File Policies and AMP for Firepower
AMP Cloud Connections
Before You Begin
• If you are connecting to the AMP cloud after either restoring your Firepower Management Center to
factory defaults or reverting to a previous version, use the AMP for Endpoints management console to
remove the previous connection.
Procedure
Step 1
Step 2
Step 3
Choose AMP > AMP Management.
Click Create AMP Cloud Connection.
From the Cloud Name drop-down list, choose the cloud you want to use:
• For the European Union AMP cloud, choose EU Cloud.
• For the United States AMP cloud, choose US Cloud.
• For AMPv, choose Private Cloud and proceed as described in Cisco AMP Private Clouds, on page
21.
Step 4
Check the Use for AMP for Firepower check box if you want to use this cloud for AMP for Firepower and
AMP for Endpoints.
In a multidomain deployment, this check box appears only in the Global domain. Each Firepower Management
Center can have only one AMP for Firepower connection.
Step 5
Click Register.
A spinning state icon indicates that a connection is pending, for example, after you configure a connection
on the Firepower Management Center, but before you authorize it using the AMP for Endpoints management
console. A failed or denied icon (
for another reason.
Step 6
Step 7
Step 8
Step 9
) indicates that the cloud denied the connection or the connection failed
Confirm that you want to continue to the AMP for Endpoints management console, then log into the
management console.
Using the management console, authorize the AMP cloud to send AMP for Endpoints data to the Firepower
Management Center.
If you want to restrict the data you receive, select specific groups within your organization for which you
want to receive information.
By default, the AMP cloud sends data for all groups. To manage groups, choose Management > Groups on
the AMP for Endpoints management console. For detailed information, see the management console online
help.
Click Allow to enable the connection and start the transfer of data.
Clicking Deny returns you to the Firepower Management Center, where the connection is marked as denied.
If you navigate away from the Applications page on the AMP for Endpoints management console, and neither
deny nor allow the connection, the connection is marked as pending on the Firepower Management Center’s
web interface. The health monitor does not alert you of a failed connection in either of these situations. If you
want to connect to the AMP cloud later, delete the failed or pending connection, then recreate it.
Firepower Management Center Configuration Guide, Version 6.0
20
Online Only
File Policies and AMP for Firepower
AMP Cloud Connections
Cisco AMP Private Clouds
You can configure a Cisco AMP Private Cloud Virtual Appliance (AMPv) to collect AMP endpoint data on
your network. AMPv is a proprietary Cisco virtual machine that acts as a compressed, on-premises version
of the AMP cloud.
All AMP for Endpoints connectors send data to AMPv, which forwards that data to the Firepower Management
Center. AMPv does not share any of your endpoint data over an external connection. The Firepower
Management Center connects to the public AMP cloud for disposition queries for files detected in network
traffic and receipt of retrospective malware events.
Each private cloud can support as many as 10,000 AMP for Endpoints connectors, and you can configure
multiple private clouds.
Use the AMP Management page (AMP > AMP Management) on the Firepower Management Center to
manage connections to AMPv.
Note
Dynamic analysis, a component of AMP for Firepower, requires that managed devices have direct or
proxied access to the AMP Threat Grid cloud or an on-premises AMP Threat Grid appliance on port 443.
AMPv does not support dynamic analysis, nor does AMPv support anonymized retrieval of threat
intelligence for other features that rely on Cisco Collective Security Intelligence (CSI), such as URL and
Security Intelligence filtering.
Connecting to AMPv
Smart License
Classic License
Supported Devices Supported Domains Access
Malware (AMP for Malware (AMP for Any
Firepower)
Firepower)
Any (AMP for
Endpoints)
Any
Admin
Any (AMP for
Endpoints)
Before You Begin
• Configure your Cisco AMP private cloud or clouds according to the directions in the AMPv
documentation. During configuration, note the private cloud host name. You will need this host name
later to configure the connection on the Firepower Management Center.
• Make sure the Firepower Management Center can communicate with AMPv, and confirm that AMPv
has internet access so it can communicate with the AMP cloud.
Firepower Management Center Configuration Guide, Version 6.0
Online Only
21
File Policies and AMP for Firepower
AMP Cloud Connections
Procedure
Step 1
Step 2
Step 3
Step 4
Choose AMP > AMP Management.
Click Create AMP Cloud Connection.
From the Cloud Name drop-down list, choose Private Cloud.
Enter a Name.
This information appears in malware events that are generated or transmitted by AMPv.
Step 5
Step 6
In the Host field, enter the private cloud host name that you configured when you set up AMPv.
Click Browse next to the Certificate Upload Path field to browse to the location of a valid TLS or SSL
encryption certificate for AMPv. For more information, see the AMPv documentation.
Check the Use for AMP for Firepower check box if you want to use this private cloud for AMP for Firepower
and AMP for Endpoints.
If you configured a different private cloud to handle AMP for Firepower communications, you can clear this
check box; if this is your only AMPv connection, you cannot.
Step 7
In a multidomain deployment, this check box appears only in the Global domain. Each Firepower Management
Center can have only one AMP for Firepower connection.
Step 8
Step 9
To communicate with AMPv using a proxy, check the Use Proxy for Connection check box.
Click Register, confirm that you want to disable existing direct connections to the AMP cloud, and finally
confirm that you want to continue to the AMPv management console to complete registration.
Step 10 Log into the management console and complete the registration process. For further instructions, see the
AMPv documentation.
Managing AMP Cloud and AMPv Connections
Smart License
Classic License
Supported Devices Supported Domains Access
Malware (AMP for Malware (AMP for Any
Firepower)
Firepower)
Any (AMP for
Endpoints)
Any
Admin
Any (AMP for
Endpoints)
Use the Firepower Management Center to delete an AMP cloud or AMPv connection if you no longer want
to receive malware-related information from the cloud. Note that deregistering a connection using the AMP
for Endpoints or AMPv management console does not remove the connection from the system. Deregistered
connections display a failed state on the Firepower Management Center web interface.
You can also temporarily disable a connection. When you reenable a cloud connection, the cloud resumes
sending data to the system, including queued data from the disabled period.
Firepower Management Center Configuration Guide, Version 6.0
22
Online Only
File Policies and AMP for Firepower
Dynamic Analysis Connections
Caution
For disabled connections, the AMP cloud and AMPv can store malware events, indications of compromise,
and so on until you re-enable the connection. In rare cases—for example, with a very high event rate or
a long-term disabled connection—the cloud may not be able to store all information generated while the
connection is disabled.
In a multidomain deployment, the system displays connections created in the current domain, which you can
manage. It also displays connections created in ancestor domains, which you cannot manage. To manage
connections in a lower domain, switch to that domain. Each Firepower Management Center can have only
one AMP for Firepower connection, which belongs to the Global domain.
Procedure
Step 1
Step 2
Select AMP > AMP Management.
Manage your AMP cloud connections:
• Delete — Click the delete icon (
), then confirm your choice.
• Enable or Disable — Click the slider, then confirm your choice.
Dynamic Analysis Connections
The AMP Threat Grid cloud runs files in a sandbox environment. AMP for Firepower uses the cloud to retrieve
threat scores and dynamic analysis reports for dynamic analysis-submitted files. With the appropriate license,
the system automatically has access to the cloud.
If your organization's security policy does not allow the Firepower System to send files outside of your
network, you can configure an on-premises AMP Threat Grid appliance. See the Cisco AMP Threat Grid
Appliance Setup and Configuration Guide for more information.
Use the Dynamic Analysis Connections page (AMP > Dynamic Analysis Connections) on the Firepower
Management Center to manage public dynamic analysis connections to the AMP Threat Grid cloud and a
private dynamic analysis connection to an on-premises AMP Threat Grid appliance.
Threat Grid On-Premises Appliance
If your organization has privacy or security concerns with submitting files to the public AMP Threat Grid
cloud, you can deploy an on-premises AMP Threat Grid appliance. Like the public cloud, the on-premises
appliance runs eligible files in a sandbox environment, and returns a threat score and dynamic analysis report
to the Firepower System. However, the on-premises appliance does not communicate with the public cloud,
or any other system external to your network.
You can connect one on-premises AMP Threat Grid appliance to the Firepower Management Center. See the
Cisco AMP Threat Grid Appliance Setup and Configuration Guide for more information.
If you configure a dynamic analysis connection to an on-premises appliance, the system uses the public AMP
cloud to perform malware cloud lookups, and verify that files have not been previously submitted for dynamic
analysis.
Firepower Management Center Configuration Guide, Version 6.0
Online Only
23
File Policies and AMP for Firepower
Dynamic Analysis Connections
The system also uses the default public dynamic analysis connection to the AMP cloud for public report
retrieval. If your on-premises appliance did not generate a dynamic analysis report for the file, the system
queries the public AMP cloud for the dynamic analysis report. Unless your organization submits a file, you
can only view a scrubbed report containing limited data.
Viewing the Default Dynamic Analysis Connection
Smart License
Classic License
Supported Devices Supported Domains Access
Malware
Malware
Any
Global only
Admin/Access
Admin/Network
Admin
By default, the Firepower Management Center can connect to the public AMP Threat Grid cloud for file
submission and report retrieval. You can neither configure nor delete this connection.
Procedure
Step 1
Step 2
Choose AMP > Dynamic Analysis Connections.
Click the edit icon (
).
Configuring an On-Premises Dynamic Analysis Connection
Smart License
Classic License
Supported Devices Supported Domains Access
Malware
Malware
Any
Global only
Admin/Access
Admin/Network
Admin
If you install an on-premises AMP Threat Grid appliance on your network, you can configure a dynamic
analysis connection to submit files and retrieve reports from the appliance. When configuring the on-premises
appliance dynamic analysis connection, you register the Firepower Management Center to the on-premises
appliance.
Before You Begin
• Set up an on-premises AMP Threat Grid appliance; see the Cisco AMP Threat Grid Appliance Setup
and Configuration Guide.
• Download the public key certificate from the AMP Threat Grid appliance to use for logins to the
on-premises appliance; see the Cisco AMP Threat Grid Appliance Administrator's Guide.
• Configure a proxy if you want to connect to the on-premises appliance using a proxy; see Editing
Management Interfaces.
Firepower Management Center Configuration Guide, Version 6.0
24
Online Only
File Policies and AMP for Firepower
Collective Security Intelligence Communications Configuration
Procedure
Step 1
Step 2
Step 3
Step 4
Step 5
Choose AMP > Dynamic Analysis Connections.
Click Add New Connection.
Enter a Name.
Enter a Host URL.
Next to Certificate Upload, click Browse to upload the public key certificate you want to use to establish
connections with the on-premises appliance.
If you want to use a configured proxy to establish the connection, select Use Proxy When Available.
Click Register.
Click Yes to display the on-premises AMP Threat Grid appliance login page.
Enter your username and password to the on-premises AMP Threat Grid appliance.
Step 6
Step 7
Step 8
Step 9
Step 10 Click Sign in.
Step 11 You have the following options:
• If you previously registered the Firepower Management Center to the on-premises appliance, click
Return.
• If you did not register the Firepower Management Center, click Activate.
Collective Security Intelligence Communications Configuration
The Firepower System uses Cisco’s Collective Security Intelligence (CSI) for reputation, risk, and threat
intelligence. With the correct licenses, you can specify communications options for the URL Filtering and
AMP for Firepower features.
Collective Security Intelligence Communications Configuration Options
Enable URL Filtering
Allows traffic filtering based on a website’s general classification, or category, and risk level, or reputation.
Adding a URL Filtering license automatically enables Enable URL Filtering and Enable Automatic Updates.
URL filtering must be enabled before you can choose other URL filtering options.
When you enable URL filtering, depending on how long since URL filtering was last enabled, or if this is the
first time you are enabling URL filtering, the Firepower Management Center retrieves URL data from Cisco
CSI.
Due to memory limitations, some device models perform URL filtering with a smaller, less granular, set of
categories and reputations. For example, if a parent URL's subsites have different URL categories and
reputations, some devices may use the parent URL's data for all subsites. As a specific example, the system
might evaluate mail.google.com using the google.com category and reputation. Affected devices include the
7100 Family and the following ASA models: ASA5506-X, ASA5506H-X, ASA5506W-X, ASA5508-X,
ASA5512-X, ASA5515-X, ASA5516-X, and ASA5525-X. For virtual devices, see the Firepower System
Firepower Management Center Configuration Guide, Version 6.0
Online Only
25
File Policies and AMP for Firepower
Collective Security Intelligence Communications Configuration Options
Virtual Installation Guide for information on allocating the correct amount of memory to perform category
and reputation-based URL filtering.
Enable Automatic Updates
Allows the Firepower Management Center to update your deployment’s URL data automatically. Although
URL data typically updates once per day, enabling automatic updates forces the Firepower Management
Center to check every 30 minutes. Although daily updates tend to be small, if it has been more than five days
since your last update, new URL data may take up to 20 minutes to download, depending on your bandwidth.
Then, it may take up to 30 minutes to perform the update itself.
If you need strict control of when the system contacts external resources, disable automatic updates and use
the scheduler instead.
Note
Cisco recommends that you either enable automatic updates or use the scheduler to schedule updates.
Although you can manually perform on-demand updates by clicking Update Now, automating the process
ensures the most up-to-date, relevant data. You cannot start an on-demand update if an update is already
in progress.
Query Cisco CSI for Unknown URLs
Allows the system to submit URLs for threat intelligence evaluation when users browse to a website whose
category and reputation are not in the local dataset. Disable this option if you do not want to submit your
uncategorized URLs, for example, for privacy reasons.
Connections to uncategorized URLs do not match rules with category or reputation-based URL conditions.
You cannot assign categories or reputations to URLs manually.
Enable Automatic Local Malware Detection Updates
The local malware detection engine statically analyzes and preclassifies files using signatures provided by
Cisco. If you enable this option, the Firepower Management Center checks for signature updates once every
30 minutes.
Share URI from Malware Events with Cisco
The system can send information about the files detected in network traffic to the AMP cloud. This information
includes URI information associated with detected files and their SHA-256 hash values. Although sharing is
opt-in, transmitting this information to Cisco helps future efforts to identify and track malware.
Use Legacy Port 32137 for AMP for Firepower
By default, AMP for Firepower uses port 443/HTTPS to communicate with the AMP cloud (or AMPv). This
option allows AMP for Firepower to use port 32137. If you updated from a previous version of the system,
this option may be enabled.
Firepower Management Center Configuration Guide, Version 6.0
26
Online Only
File Policies and AMP for Firepower
Configuring Communications with Collective Security Intelligence
Configuring Communications with Collective Security Intelligence
Smart License
Classic License
Supported Devices Supported Domains Access
URL Filtering (URL URL Filtering (URL Any
filtering)
filtering)
Any
Admin
Malware (AMP for Malware (AMP for
Firepower)
Firepower)
Procedure
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Step 8
Step 9
Select System > Integration.
Click Cisco CSI.
If you want to perform access control on a URL’s category and reputation, select Enable URL Filtering.
If you want to automatically update URL data, select Enable URL Filtering, then select Enable Automatic
Updates.
If you want to submit uncategorized URLs for threat intelligence evaluation, select Enable URL Filtering,
then select Query Cisco CSI for Unknown URLs.
If you want to automatically update the local malware detection engine signatures, select Enable Automatic
Local Malware Detection Updates.
If you want to send information about detected files to the AMP cloud, select Share URI from Malware
Events with Cisco.
If you want to use port 32137 for communications with the AMP cloud, select Use Legacy Port 32137 for
AMP for Networks.
Click Save.
Firepower Management Center Configuration Guide, Version 6.0
Online Only
27
File Policies and AMP for Firepower
Configuring Communications with Collective Security Intelligence
Firepower Management Center Configuration Guide, Version 6.0
28
Online Only
Download