Cisco Secure Endpoint malicious file detected on multiple hosts

This rule is part of a beta feature. To learn more, contact Support.
This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect when a malicious file is found on multiple hosts.

Strategy

This rule monitors Cisco Secure Endpoint logs for detecting when a malicious file is found on multiple hosts.

Triage and response

  1. Investigate the file, {{@event.file.file_name}}, to determine if the file is malicious.
  2. Investigate host(s) ({{@event.computer.hostname}}) in which the malicious file has been detected.
  3. Analyze the file activity pattern for the potential attack.
  4. Implement immediate measures to block or limit the impact of the suspicious activity, if confirmed as a threat.
  5. Follow company procedures for handling malicious files, including isolating the endpoint, running antivirus/antimalware scans, analyzing logs, and updating security policies.