<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Submit a New Threat in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/submit-a-new-threat/m-p/68978#M29</link>
    <description>&lt;P&gt;Bkluth:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This forum is for custom signature creation; for official content requests for PAN supported content coverage, please open a support case through the traditional process and provide all data gathered.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you're interested in a custom signature creation for this type of traffic, you can provide it here.&lt;/P&gt;</description>
    <pubDate>Thu, 03 Dec 2015 18:51:00 GMT</pubDate>
    <dc:creator>rcole</dc:creator>
    <dc:date>2015-12-03T18:51:00Z</dc:date>
    <item>
      <title>Submit a New Threat</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/submit-a-new-threat/m-p/68977#M28</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My IDS has detected a new Angler signature on my network and it was allowed by my PA firewall. The traffic was allowed being the IDS is not inline. How do I submit packets for a threat update/addition?&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 18:46:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/submit-a-new-threat/m-p/68977#M28</guid>
      <dc:creator>bkluth</dc:creator>
      <dc:date>2015-12-03T18:46:20Z</dc:date>
    </item>
    <item>
      <title>Re: Submit a New Threat</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/submit-a-new-threat/m-p/68978#M29</link>
      <description>&lt;P&gt;Bkluth:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This forum is for custom signature creation; for official content requests for PAN supported content coverage, please open a support case through the traditional process and provide all data gathered.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you're interested in a custom signature creation for this type of traffic, you can provide it here.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 18:51:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/submit-a-new-threat/m-p/68978#M29</guid>
      <dc:creator>rcole</dc:creator>
      <dc:date>2015-12-03T18:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: Submit a New Threat</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/submit-a-new-threat/m-p/68981#M30</link>
      <description>&lt;P&gt;Ok. Thank you for the clarification, although I cannot select a device to receive support for after selecting, "new case." There isn't a streamlined way to submit new threats? That's odd.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 19:32:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/submit-a-new-threat/m-p/68981#M30</guid>
      <dc:creator>bkluth</dc:creator>
      <dc:date>2015-12-03T19:32:38Z</dc:date>
    </item>
    <item>
      <title>Re: Submit a New Threat</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/submit-a-new-threat/m-p/68983#M31</link>
      <description>&lt;P&gt;Bkluth:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The current method for reporting new threats and missed detection is to have a support case opened and ask to work with a threat specialist, where we will triage the issue and work with our research and development team to assist you in every way possible to close any gaps in coverage, provided that actionable data is available.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are automated methods for submitting URL recategorization for malware sites, but currently working with the threat speciailist division of the support team designed to assist you is the most effective&amp;nbsp;avenue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are having trouble creating a case,&amp;nbsp;Support &amp;lt;Support@paloaltonetworks.com&amp;gt; can assist you with this process, as our CSR folks are very experienced at addressing support accessibility issues.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 19:37:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/submit-a-new-threat/m-p/68983#M31</guid>
      <dc:creator>rcole</dc:creator>
      <dc:date>2015-12-03T19:37:54Z</dc:date>
    </item>
    <item>
      <title>Re: Submit a New Threat</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/submit-a-new-threat/m-p/68986#M32</link>
      <description>&lt;P&gt;bkluth,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a best practice we put all IP addresses hosting an exploit kit (Angler, Rig or Nuclear) &amp;nbsp;on a dynamic blocklist we do this upon notification of the IPS log event. &amp;nbsp;Looking at all traffic going to the site that is hosting the exploit kit sometimes shows other users going there. &amp;nbsp;The Impact to them is not known as there is sometimes no IPS event, no&amp;nbsp;files coming down and sometimes no other network behaviors. &amp;nbsp;Our rationale is that there is nothing good at that IP address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phil&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 20:12:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/submit-a-new-threat/m-p/68986#M32</guid>
      <dc:creator>HITSSEC</dc:creator>
      <dc:date>2015-12-03T20:12:31Z</dc:date>
    </item>
  </channel>
</rss>

