Cisco Cisco FirePOWER Appliance 8350

Pagina di 39
Version 5.2.0.9
Sourcefire 3D System Release Notes
31
Features Introduced in Previous Versions
The documentation does not reflect that, if you register a cluster, stack, or 
clustered stack of devices to a Defense Center, you may have to manually 
reapply the device configuration. (142411, 141602)
In some cases, if you generate a report from a report template, reports only 
display the IP address if the system cannot resolve the IP address to a host 
name. (142640)The documentation does not reflect that Lights-Out 
Management (LOM) users on 7100 Family devices must limit their 
password to 16 characters rather than 20 characters. (142752)
Features Introduced in Previous Versions
Functionality described in previous versions may be superseded by other new 
functionality or updated through resolved issues. 
5.2.x.x
No new features were introduced in Versions 5.2.0.1, 5.2.0.2, 5.2.0.3, 5.2.0.4, 
5.2.0.5, 5.2.0.6, 5.2.0.7, or 5.2.0.8.
5.2
The following new features and functionality were introduced in Version 5.2:
Advanced Malware Protection 
Version 5.2 adds two new features to enhance the malware protection 
capabilities of the Sourcefire 3D System: malware blocking and network file 
trajectory. 
Malware Blocking
The Sourcefire 3D System network-based advanced malware detection 
capabilities added in Version 5.1.1 identifies individual files as they enter your 
network, creates a fingerprint of each file, checks the fingerprint against the 
Sourcefire cloud to determine the disposition of the file, and alerts you to files 
identified as malware. 
With the addition of malware blocking in Version 5.2, the Sourcefire 3D System 
now provides advanced malware protection (AMP). You can now configure file 
policies to block transfer of known malware files.
Based on the disposition of each detected file and the rules you set in your file 
policies, the Defense Center instructs a managed device either to block the file or 
to allow its upload or download. To improve performance, if the system already 
knows the disposition for a file based on its SHA-256 hash value, the Defense 
Center uses a cached disposition rather than querying the Sourcefire cloud.