Cisco Cisco Firepower Management Center 4000 Release Notes

Page of 38
Version 5.2.0.2
Sourcefire 3D System Release Notes
31
Features Introduced in Previous Versions
Features Introduced in Previous Versions
No new features were introduced in Version 5.2.0.2. Functionality described in 
previous versions may be superseded by other new functionality or updated 
through resolved issues. 
5.2.x.x
No new features were introduced in Version 5.2.0.1.
5.2
The following new features and functionality were introduced in Version 5.2:
Advanced Malware Protection 
Version 5.2 adds two new features to enhance the malware protection 
capabilities of the Sourcefire 3D System: malware blocking and network file 
trajectory. 
Malware Blocking
The Sourcefire 3D System network-based advanced malware detection 
capabilities added in Version 5.1.1 identifies individual files as they enter your 
network, creates a fingerprint of each file, checks the fingerprint against the 
Sourcefire cloud to determine the disposition of the file, and alerts you to files 
identified as malware. 
With the addition of malware blocking in Version 5.2, the Sourcefire 3D System 
now provides advanced malware protection (AMP). You can now configure file 
policies to block transfer of known malware files.
Based on the disposition of each detected file and the rules you set in your file 
policies, the Defense Center instructs a managed device either to block the file or 
to allow its upload or download. To improve performance, if the system already 
knows the disposition for a file based on its SHA-256 hash value, the Defense 
Center uses a cached disposition rather than querying the Sourcefire cloud. 
If necessary, you can override dispositions from the cloud on a file-by-file basis 
with the global malware whitelist. If a file has a disposition in the cloud that you 
know to be incorrect, you can add the file’s SHA-256 value to the whitelist. When 
the system detects a file from the whitelist, it does not perform a malware lookup 
or block the file as malware. You can enable use of the global malware whitelist 
on a per-file-policy basis.
Several analysis tools let you track AMP events, including the Context Explorer, 
the dashboard, the event views, and the network file trajectory view. Connection, 
file, and malware events all reflect when a file is blocked because of malware.