CCNA CyberOps SECOPS – Objective 4.5

Reading Time: 1 minute

Describe the retrospective analysis method to find a malicious file, provided file analysis report

Implementing Cisco Cybersecurity Operations (210-255)
A screenshot of a Cisco Firepower Management Center (FMC) Network File Trajectory.
Example of a Firepower Management Center (FMC) Network File Trajectory

The above image is a screenshot from a Cisco Firepower Management Center. In particular, it is a Network File Trajectory. In this case, it’s not overly interesting since the file was only seen going from one Internet host to one internal host. In a more complex scenario, FMC would be coupled with AMP for Endpoints. This would allow an analyst to see how a file has traversed from host to host as the infection was spread.

You can also see when a new file was originally marked clean or unknown and later marked as malicious. This type of event is known as a retrospective event.