Cisco Secure Endpoint malicious file detected on multiple hosts

This rule is part of a beta feature. To learn more, contact Support.

Set up the cisco-secure-endpoint integration.

Esta página aún no está disponible en español. Estamos trabajando en su traducción.
Si tienes alguna pregunta o comentario sobre nuestro actual proyecto de traducción, no dudes en ponerte en contacto con nosotros.

Goal

Detect when a malicious file is found on multiple hosts.

Strategy

This rule monitors Cisco Secure Endpoint logs for detecting when a malicious file is found on multiple hosts.

Triage and response

  1. Investigate the file, {{@event.file.file_name}}, to determine if the file is malicious.
  2. Investigate host(s) ({{@event.computer.hostname}}) in which the malicious file has been detected.
  3. Analyze the file activity pattern for the potential attack.
  4. Implement immediate measures to block or limit the impact of the suspicious activity, if confirmed as a threat.
  5. Follow company procedures for handling malicious files, including isolating the endpoint, running antivirus/antimalware scans, analyzing logs, and updating security policies.