![]() ![]() It is recommended to create a duplicate policy to avoid business security concerns and disruptions to identify Computers with performance issues indicators and separate them into a group to use this duplicate policy.Ĭaution: Configuration changes on the dashboard requires time to allow connectors to sync the policy. Note: It is recommended to contact other Anti-Virus (AV) vendors and request their recommended exclusions to be added, this ensures the Secure Endpoint and AV to function in tandem also minimize performance impact. These exclusions can be found on the Cisco-Maintained Exclusion List in your console. Obvious Exclusions are exclusions that have been created based on research and test for commonly used operating systems, programs, and other security software. As such exclusions are defined must be uniquely tailored to each situation.ĭifferent exclusions can be categorized in two ways, obvious exclusions and indistinct exclusions. This article describes exclusions for Secure Endpoint Cloud, TETRA, SPP, and MAP.Įvery environment is unique as well as the entity which controls it, varying from stringent to open policies, where the latter would be classified as a honeypot. Exclusions are a necessity to ensure a balance of performance and security on a machine when endpoint protection such as Secure Endpoint is enabled. Background Information How to understand ExclusionsĪn exclusion set is a list of directories, file extensions, or threat names that you do not want the Secure Endpoint Connector to scan or convict. If your network is live, ensure that you understand the potential impact of any command. All of the devices used in this document started with a cleared (default) configuration. The information in this document was created from the devices in a specific lab environment. The information in this document is based on Windows, Linux and MacOS operating systems. ![]() ![]() A working knowledge of your environment.Prerequisites RequirementsĬisco recommends that you have knowledge of these topics: This document describes the best practices to locate and create exclusions on the Secure Endpoint.Ĭontributed by Cisco Engineers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |