Background Information How to understand ExclusionsĪn exclusion set is a list of directories, file extensions, or threat names that you do not want the Secure Endpoint Connector to scan or convict. If your network is live, ensure that you understand the potential impact of any command. All of the devices used in this document started with a cleared (default) configuration. The information in this document was created from the devices in a specific lab environment. The information in this document is based on Windows, Linux and MacOS operating systems. A working knowledge of the customer environment.Prerequisites RequirementsĬisco recommends that you have knowledge of these topics: This document describes the best practices to locate and create exclusions on the Secure Endpoint Connectors.Ĭontributed by Caly Hess, Mathew Huynh and Matthew Franks, Cisco Engineers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |