Hello, everyone.
I’m slowly making my way towards the end of ENCOR (I still have yet to cover WiFi, SDN & Automation) and I’m currently on the security chapter of the Official Cert Guide book and it’s… terrible to read.
There are over 50 pages of pure theory about technologies that I unfortunatelly cannot get my hands on or configure them in CML. This wouldn’t be so bad if there weren’t pages such as this:
The architecture of AMP can be broken down into the following components:
■ AMP Cloud (private or public)
■ AMP connectors
■ Cisco Secure Endpoint, formerly FireAMP or AMP for Endpoints—supported on
Microsoft Windows, macOS X, Google Android, Apple iOS, and Linux
■ Cisco Secure Email, formerly AMP for Email or Email Security Appliance (ESA)
■ Cisco Secure Web Appliance, formerly AMP for Web or Web Security Appliance
(WSA)
■ AMP for Networks—supported on Cisco Secure Firewall appliances and Cisco
AMP dedicated appliances
■ AMP for Meraki MX
■ Threat intelligence from Cisco Talos and Cisco Secure Malware Analytics
During an Attack
During an attack, the Secure Web Appliance uses security intelligence from cloud access
security broker (CASB) providers, Talos, and AMP for Networks to identify and block zero-
day threats that managed to infiltrate the network:
■ Cloud access security: The Cisco Secure Web Appliance can protect against hid-
den threats in cloud apps by partnering with leading CASB providers (such as Cisco
CloudLock) to monitor cloud app usage in real time to help combat evolving threats
through intelligent protection powered by data science.
■ Parallel antivirus (AV) scanning: The Cisco Secure Web Appliance enhances malware
defense coverage with multiple anti-malware scanning engines running in parallel on
a single appliance while maintaining high processing speeds and preventing traffic
bottlenecks.
■ Layer 4 traffic monitoring: The Cisco Secure Web Appliance scans all traffic, ports,
and protocols to detect and block spyware “phone-home” communications with an
integrated Layer 4 traffic monitor. Based on this scanning, it identifies infected clients
to help stop malware that attempts to bypass classic web security solutions.
■ File reputation and analysis with Cisco AMP: With the Secure Web Appliance, files
are assessed using the latest threat information from Cisco Talos, which, as mentioned
before, is updated every three to five minutes. The Cisco Secure Web Appliance cap-
tures a fingerprint of each file as it traverses the gateway and sends it to AMP Cloud
for a reputation verdict checked against zero-day exploits.
■ Data loss prevention (DLP): The Cisco Secure Web Appliance uses Internet Content
Adaptation Protocol (ICAP) to integrate with DLP solutions from leading third-party
DLP vendors. When all outbound traffic is directed to the third-party DLP appliance,
content is allowed or blocked based on the third-party rules and policies. Deep con-
tent inspection can be enabled for regulatory compliance and intellectual property
protection. Powerful engines inspect outbound traffic and analyze it for content mark-
ers, such as confidential files, credit card numbers, customer personal data, and so on
25From the Library of David Illes
Cisco Secure Email includes the following advanced threat protection capabilities that allow
it to detect, block, and remediate threats across the attack continuum:
■ Global threat intelligence: It leverages real-time threat intelligence from Cisco Talos
and Cisco Secure Malware Analytics.
■ Reputation filtering: Cisco Secure Email blocks unwanted email with reputation filter-
ing, which is based on threat intelligence from Talos.
■ Spam protection: Cisco Secure Email uses the Cisco Context Adaptive Scanning
Engine (CASE) to block spam emails; it delivers a spam catch rate greater than 99%,
with a false-positive rate of less than 1 in 1 million.
■ Forged email detection: Forged email detection protects high-value targets such as
executives against business email compromise (BEC) attacks.
■ Cisco Advanced Phishing Protection (CAPP): CAPP combines Cisco Talos threat
intelligence with local email intelligence and advanced machine learning techniques
to model trusted email behavior on the Internet, within organizations, and between
individuals. It uses this intelligence to stop identity deception–based attacks such as
fraudulent senders, social engineering, and BEC attacks.
■ Cisco Domain Protection (CDP): CDP for external email helps prevent phishing emails
from being sent using a customer domain.From the Library of David Illes
Chapter 25: Secure Network Access Control 749
■ Malware defense: Cisco Secure Email protects against malware.
■ Graymail detection and Safe Unsubscribe: Cisco Secure Email detects and classifies
graymail for an administrator to take action on it if necessary. Graymail consists of
marketing, social networking, and bulk messages (that is, mailing list emails). This type
of email typically comes with an unsubscribe link, which may be used for phishing.
Safe Unsubscribe protects against this type of phishing technique.
■ URL-related protection and control: Cisco Secure Email protects against malicious
URLs with URL filtering and scanning of URLs in attachments and shortened URLs.
■ Outbreak filters: Outbreak filters defend against emerging threats and blended attacks
by leveraging security intelligence information from Cisco Talos. Outbreak filters can
rewrite URLs included in suspicious email messages. When clicked, the new rewritten
URLs redirect the email recipient to the Secure Web Appliance. The website content is
then actively scanned, and outbreak filters display a block screen to the user if the site
contains malware.
■ Web interaction tracking: Cisco Secure Email generates reports that track the end
users who click on URLs that have been rewritten by the outbreak filters. The reports
include the following information:
■ Top users who clicked on malicious URLs
■ The top malicious URLs clicked by end users
■ Date and time, rewrite reason, and action taken on the URLs
■ Data security for sensitive content in outgoing emails: Confidential outbound mes-
sages that match one of the more than 100 expert policies included with Cisco Secure
Email are automatically protected by encryption, footers and disclaimers, blind carbon
copies (BCCs), notifications, and quarantining.
Cisco Secure Email is available as a hardware appliance or as a cloud offering called Cisco
Secure Email Threat Defense
I cannot of course post more of the book so here is just a snippet. They always bring up a Cisco technology like FirePOWER NGIPS and name 10 different features about it in bullet points. I am not really sure how to process all this information because a lot of this is just memorization which I am not a big fan of.
Do you guys have any tips on how to get through this chapter? How did you study security for the exam?
Thank you.
David