Question: With so many advanced detection engines, why does Cisco AMP 4 E still leverage SHA 2 5 6 hashes to identify malware? File hashes allow
With so many advanced detection engines, why does Cisco AMPE still leverage SHA hashes to identify malware?
File hashes allow multiple components in the AMP architecture to quickly share information about a file, enabling the see it once, block it everywhere capability.
File hashing is the easiest form of malware recognition.
Files presenting a SHA hash have likely been polymorphically encrypted in transit, and should immediately be presented to Threat Grid for dynamic analysis.
AMPEs Spero engine can inspect SHAencrypted files for malware detection.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
