Solved! Go to Solution.
Hello ,
Please be informed that we already have coverage for this variant of Malware in our Production DAT / AMCore content as well as GTI coverage. Kindly ensure your DAT / AMCore content is upto date
Thank you .
McAfee Support .
Hello ,
Please be informed that we already have coverage for this variant of Malware in our Production DAT / AMCore content as well as GTI coverage. Kindly ensure your DAT / AMCore content is upto date
Thank you .
McAfee Support .
Thank you very much.
Glenn
We strongly recommand you upscale to 10.7 latest version asap.
Also make sure you are aware of the different modules inkl. ATP / TIE Server.
The "Endpoint Security Advanced Threat Protection ATP" Module is free with the ENS licence new.
You can use it CLOUD-based or install a licences TIE-Server internal but only recommnded together with an ATP-Sandbox (Expensive but you need it these days....) With the TIE-Server you have more control and can aprove yourself or deny and also all info is kept on premise (Inhouse).
Greetings from Switzerland
We are in the process of upgrading to ENS 10.7 and I recently implemented TIE and DXL.
I will be posting another message regarding how some powershell scripts are now being detected as malicious after upgrading to 10.7.
I hope you can review this and let me know you opinion.
Thank you again,
Hello,
About the Powershell (If its not your code) check it on virustotal.com.
That INFO is also pulled by ENS ATP and also TIE. They seem to have a extreme large amount of false/Positive with virustotal.com because they integrated some new fresh scanners.
You can't turn ALL powershell Options in the EXPLOIT Modul on. Some are impossible to use in an example develelopment enviroment company.
Greetings from switzerland
Thank you again...I may add a separate post on how best to manage Powereshell Script issues. Since implementing ATP as part of ENS 10.6.1, we have seen some strange detections related to certain Powershell scripts. Adding the actual script as an exclusion resolved the issue for OAS.
In the latest case, ATP is in "Enable Mode" yet the description results state:
"Adaptive Threat Protection would have repaired C:\Windows\ccmcache\5m\GUI.ps1 based on its reputation (Known Malicious), but didn't because Observe mode is enabled."
Additional notes:
Threat Source Process Name: powershell.exe
Event Category: Malware detected using heuristics
Threat Name: Real Protect-PSL!5077131b8a83
Threat Type: Trojan
Action Taken: Adaptive Threat Protection Would Clean
Threat Handled: True
Analyzer Detection Method: Real Protect Client
Module Name: Adaptive Threat Protection
Rule Description: No rule affected this reputation
Thank you!
New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.
Thousands of customers use our Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership: