I've placed Exploit Prevention rule 6182 - CVE_2020_1472 Zerologon attack, into report mode and immediately I'm seeing hits against "C:\WINDOWS\system32\drivers\MfeEpNfcp.sys" and "C:\WINDOWS\SYSTEM32\SPOOLSV.EXE". I'm fairly sure these are false positives but do I white list them in the Exploit Prevent exclusions, which excludes them from all rules?
Hi @cybercop
Thanks for reaching out to community.
If these are false detections, I request you to open an SR with point product as MALWARE and description as "Exploit Prevention False positive" and we can escalate to our labs and get this addressed.
This needs to be addressed by our Content Team and white list accordingly.
Was my reply helpful?
If yes, please give me kudo. If I have answered your query, please mark this as solution and together we help other community members.
i am experiencing the same thing. should i exclude this file?
Thank you for posting in community forum. Could you please provide more details on when and how you started seeing these events in your environment?
I would suggest to raise a Service Request with McAfee Support and provide details of the event received along with logs to check this event further.
Kind Regards,
Was my reply helpful?
If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?
i run a threat report every 24 hours. i have been seeing this from the beginning.
the network intrusion prevention system is blocking this file. what should i do? should i just put in a ticket with McAfee?
Blocked
Network
Intrusion
Prevention
System
C:\Windows\system32\drivers\MfeEpNfcp.sys
Corporate Headquarters
6220 America Center Drive
San Jose, CA 95002 USA