Introduction to Advanced Malware Protection (AMP)Role of the AMP CloudDoing Security DifferentlyThe Prevention FrameworkOne-to-One SignaturesEthos EngineSpero EngineIndicators of CompromiseDevice Flow CorrelationAdvanced AnalyticsDynamic Analysis with Threat GridThe Retrospective FrameworkThe CloudPrivate CloudCloud Proxy ModeAir Gap ModeThreat GridThreat Grid CloudThreat Grid ApplianceThe Clean InterfaceThe Administrative InterfaceThe Dirty InterfaceComparing Public and Private DeploymentsAMP for NetworksWhat Is That Manager Called?Form Factors for AMP for NetworksWhat AMP for Networks DoesWhere Are the AMP Policies?File RulesAdvancedAMP for EndpointsWhat Is AMP for Endpoints?Connections to the AMP CloudU.S. and North American CloudEuropean Union CloudAsia Pacific, Japan, and Greater China CloudOutbreak ControlCustom DetectionsSimple Custom DetectionsAdvanced Custom DetectionsAndroid Custom DetectionsNetwork IP Blacklists and WhitelistsApplication ControlExclusionsThe Many Faces of AMP for EndpointsAMP for WindowsWindows PoliciesThe General TabThe File TabThe Network TabAMP for macOSMac PoliciesThe General TabThe File TabThe Network TabAMP for LinuxLinux PoliciesThe General TabThe File TabThe Network TabAMP for AndroidInstalling AMP for EndpointsGroups, Groups, and More GroupsThe Download Connector ScreenDistributing via Cisco AnyConnectInstalling AMP for WindowsInstalling AMP for MacInstalling AMP for LinuxInstalling AMP for AndroidAndroid Activation CodesDeploying the AMP for Android ConnectorProxy ComplicationsProxy Server AutodetectionIncompatible Proxy Security ConfigurationsAMP for Content SecurityContent Security ConnectorsConfiguring AMP for Content Security AppliancesConfiguring the Web Security Appliance (WSA) DevicesConfiguring the Email Security Appliance (ESA) DevicesAMP ReportsSummary