To resolve this issue, do one of the following:
- On version 4.6.7 and later, login to the Command Line Interface (CLI) as 'admin' and type:
exception_list disable
- On version 4.5.0, install patch 4.6.5-1. EDR must be on version 4.6.5 when applying this patch.
-
- If you have a high number of clients and a low number of Exception policies, perform Patch Method #1
NOTE: This method avoids the impact of un-enrolling and re-enrolling all SEP endpoints with EDR
- If you have a low number of clients or a high number of Exception policies, perform Patch Method #2
NOTE: This method avoids the need to manually edit exception policies within SEPM or manually edit the Deny List within EDR
Patch Method 1:
- (OPTIONAL) Within EDR UI, export the current Deny List
- Install patch 4.6.5-1 at the command line interface (CLI) of EDR
- In the SEPM Exceptions policy, click the Source column to sort exceptions by Source
- Click the top entry with a source that starts with "EDR"
- Scroll down to locate the bottom entry with a source that starts with "EDR"
- While holding the <SHIFT> key, click the bottom entry with a source that starts with "EDR"
- Below the list of exceptions, click the Delete button
- When the Delete Exception dialog box appears, click the Delete button on the Delete Exception dialog box.
- Repeat steps 3-8 for each Exception policy within SEPM
- Wait 24 hours and monitor to ensure high CPU stops and does not return
Patch Method 2:
- (OPTIONAL) Within EDR UI, export the current Deny List
- Remove the SEPM Controller connection
- Within SEPM, monitor Exception policies to confirm when the last of the SHA-256 entries from EDR are removed.
- Install patch 4.6.5-1 at the command line interface (CLI) of EDR
- Re-add the SEPM Controller connection, with a pilot group of endpoints
- Wait 24 hours and monitor the pilot group to ensure high CPU does not return
- Re-add the remaining endpoint groups
What does the patch do?
- Disable sending sha256 hashes to the Exception policies of SEPM.
As EDR will no longer send SHA256 hashes to Exception policies within SEPM, local blocking of previously blocked executable files may require entering md5 hashes for those files on the Deny List of EDR instead. EDR will not be able to block non-PE files.
To install patch 4.6.5-1
- At the admin CLI of EDR, type:
show -v
- If version is less than 4.6.5, then type:
update download
- If no errors occur during update download, type:
update install
- Updating the software version may require up to two reboots of EDR appliance before continuing.
- To confirm the installed patches, type:
patch list_installed
- If "atp-patch-4.6.5-1" appears in the output, the EDR appliance is already patched for this issue. No further action is needed for this particular EDR appliance.
- To check for the patch in the download repository, type:
patch list
- If "atp-patch-4.6.5-1" does not appear in the download repository, please contact support for further assistance and reference KB #. Also copy and paste the output from this command into the case comments.
- To download the patch, type:
patch download atp-patch-4.6.5-1
- If the last three lines from patch download are not as follows, create a support case and paste the output into the case comments.
atp-patch-4.6.5-1.x86_64.rpm | 718 kB 00:01 ETA
Download succeeded
Function: main returned success
- To install the patch, type:
patch install atp-patch-4.6.5-1
- If patch install does not include the following two lines, create a new support case and copy and paste the output from the patch install command into the comments.
Patch installation Success!
Function: do_install returned success