<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic GlobalProtect - Autoblock/kick users when vulnerability exploit is detected? in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-autoblock-kick-users-when-vulnerability-exploit-is/m-p/431168#M1681</link>
    <description>&lt;P&gt;I'm curious if anyone has crafted either a vulnerability profile or security policy that would disconnect or auto-block a user if their a vulnerability exploit is attempted while they are connected via Globalprotect. We've set up event logging that can flag and email my team whenever a user starts displaying malicious or compromised behavior when connected via Globalprotect, but we'd like to take it a step further and auto-block and/or disconnect a suspicious user.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;</description>
    <pubDate>Thu, 02 Sep 2021 18:39:18 GMT</pubDate>
    <dc:creator>DougSirek107</dc:creator>
    <dc:date>2021-09-02T18:39:18Z</dc:date>
    <item>
      <title>GlobalProtect - Autoblock/kick users when vulnerability exploit is detected?</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-autoblock-kick-users-when-vulnerability-exploit-is/m-p/431168#M1681</link>
      <description>&lt;P&gt;I'm curious if anyone has crafted either a vulnerability profile or security policy that would disconnect or auto-block a user if their a vulnerability exploit is attempted while they are connected via Globalprotect. We've set up event logging that can flag and email my team whenever a user starts displaying malicious or compromised behavior when connected via Globalprotect, but we'd like to take it a step further and auto-block and/or disconnect a suspicious user.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Sep 2021 18:39:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-autoblock-kick-users-when-vulnerability-exploit-is/m-p/431168#M1681</guid>
      <dc:creator>DougSirek107</dc:creator>
      <dc:date>2021-09-02T18:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect - Autoblock/kick users when vulnerability exploit is detected?</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-autoblock-kick-users-when-vulnerability-exploit-is/m-p/431564#M1684</link>
      <description>&lt;P&gt;How about dynamic IP tagging based on info from threat logs?&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/policy/use-auto-tagging-to-automate-security-actions.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/policy/use-auto-tagging-to-automate-security-actions.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In a nutshell, you have a log forwarding profile that hits on whatever threats you want (medium and higher, etc.), and it can do several things: forwards to syslog/panorama/datalake, sends admin an email alert, sends SNMP trap, &lt;STRONG&gt;tags the IP. &lt;/STRONG&gt;You will make an address group based on this tag and create a security rule that blocks this traffic, sends to an alert page, etc. The duration of block is determined in the log fwd profile.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Sep 2021 22:57:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-autoblock-kick-users-when-vulnerability-exploit-is/m-p/431564#M1684</guid>
      <dc:creator>BenKnorr2</dc:creator>
      <dc:date>2021-09-03T22:57:25Z</dc:date>
    </item>
  </channel>
</rss>

