Cisco Cisco Firepower Management Center 4000

Page of 1844
 
5-34
FireSIGHT System User Guide
 
Chapter 5      Managing Reusable Objects 
  Working with File Lists
Step 3
Click the edit icon (
) next to the file list where you want to add values from a source file.
The File List pop-up window appears.
Step 4
Select 
List of SHAs
 from the 
Add by
 field.
The pop-up window updates to include new fields.
Step 5
Optionally, enter a description of the source file in the 
Description
 field. 
If you do not enter a description, the system uses the file name.
Step 6
Click 
Browse
 to browse to the source file, then click 
Upload and Add List
 to add the list.
The source file is added to the file list. The SHA-256 column lists how many SHA-256 values the file 
contains.
Step 7
Click 
Save
Step 8
Reapply all access control policies with file policies that use the file list.
After the policies apply, the system no longer performs malware cloud lookups on files in the file list.
Uploading an Individual File to a File List
License: 
Malware
Supported Devices: 
Series 3, Virtual, X-Series, ASA FirePOWER
Supported Defense Centers: 
Any except DC500
If you have a copy of the file you want to add to a file list, you can upload the file to the Defense Center 
for analysis; the system calculates the file’s SHA-256 value and adds the file to the list. The system does 
not enforce a limit on the size of files for SHA-256 calculation. 
To add a file by having the Defense Center calculate its SHA-256 value:
Access: 
Admin/Network Admin
Step 1
On the object manager’s File List page, click the edit icon (
) next to the clean list or custom detection 
list where you want to add a file.
The File List pop-up window appears.
Step 2
Select 
Calculate SHA
 
from the 
Add by
 field.
The pop-up window updates to include new fields.
Step 3
Optionally, enter a description of the file in the 
Description
 field. 
If you do not enter a description, the file name is used for the description on upload.
Step 4
Click 
Browse
 to browse to the source file, then click 
Calculate and Add SHA 
to add the list.
The file is added to the file list.
Step 5
Click 
Save
Step 6
Reapply all access control policies with file policies that use the file list.
After the policies apply, the system no longer performs malware cloud lookups on files in the file list.