We got a false detection from Adaptive Threat Protection when one of our engineers ran a PIVOT Tool PowerShell Script from the CC\Scriptstore (or Microsoft Configuration Manager).
The quesiton is what is the best way to deal with this?
Should we present this to Support for a Suppression of those scripts from detection or should we create a special exclusion rule in ePO/ENS Policies?
Or should we exclude automated reporting for "Would Clean"
Here is a sample of the detecion Alert we recieve when hit.
McAfee Endpoint Security
Adaptive Threat Protection Would Clean
Real Protect-PSL!bf63b3ffbeee
True
C:\WINDOWS\CCM\ScriptStore\7DC6B6F1-E7F6-43C1-96E0-E1D16BC25C14_c1b6b8aece88cf30fff1fd35bee1461e34f4799eff1406890e079bb2c7bfb9e5.ps1
Any help is appreciated.
Its better to get a case open with the Support team.
Thanks
Hi @User27605043 ,
Please open a support ticket with the following details.
Reference KB - https://kc.mcafee.com/corporate/index?page=content&id=KB91459
Thanks
Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!
I get all that, but this is very frustrating.
The specific issue is related to a known (WELL KNOWN) Microsoft Product.
In this case Microsoft SCCM, Configuration Manager Pivot tool (ConfigMgr CMPivot) for collection of client data.
Personally, I would think that would already be known and allowed and not be flagged as a potential threat.
Also, I did as you suggested on an earlier case and submitted DELLs SupportAssistLauncher.exe to be excluded from detection. I was told this had been addressed, it should no longer be dected. And it still is being detected. (4-22882824541). So, going through those hoops seem a waste of time
Corporate Headquarters
6220 America Center Drive
San Jose, CA 95002 USA