Cisco Cisco FirePOWER Appliance 7030
5-34
FireSIGHT System User Guide
Chapter 5 Managing Reusable Objects
Working with File Lists
Step 3
Click the edit icon (
) next to the file list where you want to add values from a source file.
The File List pop-up window appears.
Step 4
Select
List of SHAs
from the
Add by
field.
The pop-up window updates to include new fields.
Step 5
Optionally, enter a description of the source file in the
Description
field.
If you do not enter a description, the system uses the file name.
Step 6
Click
Browse
to browse to the source file, then click
Upload and Add List
to add the list.
The source file is added to the file list. The SHA-256 column lists how many SHA-256 values the file
contains.
contains.
Step 7
Click
Save
.
Step 8
Reapply all access control policies with file policies that use the file list.
After the policies apply, the system no longer performs malware cloud lookups on files in the file list.
Uploading an Individual File to a File List
License:
Malware
Supported Devices:
Series 3, Virtual, X-Series, ASA FirePOWER
Supported Defense Centers:
Any except DC500
If you have a copy of the file you want to add to a file list, you can upload the file to the Defense Center
for analysis; the system calculates the file’s SHA-256 value and adds the file to the list. The system does
not enforce a limit on the size of files for SHA-256 calculation.
for analysis; the system calculates the file’s SHA-256 value and adds the file to the list. The system does
not enforce a limit on the size of files for SHA-256 calculation.
To add a file by having the Defense Center calculate its SHA-256 value:
Access:
Admin/Network Admin
Step 1
On the object manager’s File List page, click the edit icon (
) next to the clean list or custom detection
list where you want to add a file.
The File List pop-up window appears.
Step 2
Select
Calculate SHA
from the
Add by
field.
The pop-up window updates to include new fields.
Step 3
Optionally, enter a description of the file in the
Description
field.
If you do not enter a description, the file name is used for the description on upload.
Step 4
Click
Browse
to browse to the source file, then click
Calculate and Add SHA
to add the list.
The file is added to the file list.
Step 5
Click
Save
.
Step 6
Reapply all access control policies with file policies that use the file list.
After the policies apply, the system no longer performs malware cloud lookups on files in the file list.