CH 11 Flashcards
tools primarily focused on detecting and investigating
suspicious activities (and traces of such) other problems on hosts/endpoints
Endpoint Detection and Response (EDR)
The AMP cloud is able to provide a historical view of malware activity, segmented into two
activity types:
File trajectory and device trajectory
allows you to create lists that customize AMP for Endpoints to your
organization’s needs.
Outbreak Control
The custom detections used for outbreak control can also be used to prevent users from installing application unwanted by the organization, this is referred to as?
Application Control
What can you use to define IPv4 addresses that should not be blocked or flagged by
DFC (device flow correlation).
IP Whitelist
What do you use to create DFC detections?
IP Blacklist
a list of directories, file extensions, or even
threat names that you do not want the AMP agent to scan and subsequently not convict as
malware
Exclusion Set
List the 4 available exclusion types
Threat, Extension, Wildcard, Path
what are the three detection and protection “engines” in AMP for Endpoints
TETRA, Spero, Ethos
A full client-side antivirus solution which is disabled by default
TETRA
A machine learning–based technology that proactively identifies threats that
were previously unknown. It uses active heuristics to gather execution attributes, and
because the underlying algorithms come up with generic models, they can identify
malicious software based on its general appearance rather than basing identity on
specific patterns or signatures.
Spero
A “fuzzy fingerprinting” engine that uses static or passive heuristics.
Ethos