<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Clientless VPN Portal Brute Forcing in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/559258#M4421</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;we have an explicit drop policy and so far we can only block RU. If I had my way about it we would also block the region of China among others. Most of our malicious traffic seemingly originates in Russian for reasons without explanation. Of course, Russia, Iran, and China are our top threats from state sponsored APTs but no traffic from Iran as of yet.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp;Thanks for the input!!! That could actually be an option... Disabling the outward facing vpn portal... If the number of individuals who use clentless vpn access is minimal then that may be enough for me to work with to gain approval for blocking it. Ideally, having both would be optimal but it it could prevent initial access from a Threat Actor or APT then I am a supporter!!&lt;BR /&gt;&lt;BR /&gt;So far, no futher brute force attempts on the clientless VPN portal but I am monitoring the situation. And will provide updates, there's always someone knocking on our firewall's door. Lol!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;David B.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 24 Sep 2023 21:08:58 GMT</pubDate>
    <dc:creator>David_Burton</dc:creator>
    <dc:date>2023-09-24T21:08:58Z</dc:date>
    <item>
      <title>Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/558120#M4383</link>
      <description>&lt;P&gt;Hi all,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have an issue with a single/multiple threat actors attempting to brute force or clientless vpn portal. They are switching IP's with each attempt and they occur 3-7 time per hour. They use the most ridiculous dictionaries for user names but regardless, they change periodically and I would like to put a stop to it but am finding it quite difficult.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyone have any advice for blocking these attempts? I've read so very much on this but cannot seem to find a solution for my particular situation. Any help or suggestions would be greatly appreciated.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many thanks in advance!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DB&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2023 12:40:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/558120#M4383</guid>
      <dc:creator>David_Burton</dc:creator>
      <dc:date>2023-09-15T12:40:02Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/558196#M4385</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;How doe the Palo Alto see the traffic? Anything in the Threat logs? If you see something there, you can put policies in place to prevent this. A Zone Protection applied both internal and external (separate policies) might help. However if there is something in the traffic that can be recognized a custom AntiVirus or Vulnerability protection profile could help. Another way would be to send the logs to a SIEM and somehow block the IP's that are attempting to perform this.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2023 20:56:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/558196#M4385</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-09-15T20:56:26Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/558199#M4386</link>
      <description>&lt;P&gt;Another thing might be to limit what IP's can access your portal, eg only traffic from the US, however if they are coming from the US this doesnt work. But also drop traffic that match the builtin EDL's and not from friendly nations:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OtakarKlier_0-1694811558109.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53776i7B84D25758659BB6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="OtakarKlier_0-1694811558109.png" alt="OtakarKlier_0-1694811558109.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2023 20:59:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/558199#M4386</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-09-15T20:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/558378#M4391</link>
      <description>&lt;P&gt;OtakarKlier,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for responding... I was actually updating our firewalls over the weekend and had little time to respond.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am going through the threat logs now to see if there may be anything of interest. Also, creating a custom AntiVirus and Vulnerability protection profile may be the way to go. Let me dig into this over the day and I'll be back with some info which may be helpful.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Sadly, the rate at which the IP's are changing may prove to be difficult to deal with and this is one of the reasons I decided to create this thread. Again, however, let me dig into this and see what I can discover.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you so much for your advice my friend!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;David B.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 13:54:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/558378#M4391</guid>
      <dc:creator>David_Burton</dc:creator>
      <dc:date>2023-09-18T13:54:42Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/558641#M4406</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;This one might be a tough one to track down. However setting up the EDL blocks as well as Zone Protection profiles might help. Also might help to send telemetry back to Palo Alto, if they see something they can write something to help block it for everyone.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 20:38:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/558641#M4406</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-09-19T20:38:23Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/558645#M4408</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I just found this while looking for something else:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClJ2CAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClJ2CAK&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Maybe worth a try as well.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 20:45:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/558645#M4408</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-09-19T20:45:48Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/558851#M4412</link>
      <description>&lt;P&gt;Your advice is much appreciated my friend, I am about to read the KB you linked earlier...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, nothing coming up in the threat logs regarding the attempts but I have adopted the tedious task of filtering out the IP's the threat actor is using more than once or twice and adding them to our Explicit IP Drop Policy. I have done this in the past but it seemed hopeless.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This time, however, the attempts at brute forcing our clientless vpn portal have ceased as of 9/16. I'm hoping I covered most of the actors IP pool but I'm continuing to monitor the situation. I just updated our firewalls and may need to make some changes to send out telemetry data but that's a great suggestion which I will follow through with.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Again, thank you for your time and advice sir.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;David B.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 18:00:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/558851#M4412</guid>
      <dc:creator>David_Burton</dc:creator>
      <dc:date>2023-09-20T18:00:56Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/558873#M4413</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/213216"&gt;@David_Burton&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;EDIT:&amp;nbsp; You clearly said clientless!&amp;nbsp; You can't disable the portal then.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you do not need to roll out new GP clients, disabling the portal login page under Network &amp;gt; GlobalProtect &amp;gt; Portals &amp;gt; [edit portal] &amp;gt; General will stop 99% of those attempts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TomYoung_0-1695243211058.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53891i3D0B99CBF6ED3C08/image-size/medium?v=v2&amp;amp;px=400" role="button" title="TomYoung_0-1695243211058.png" alt="TomYoung_0-1695243211058.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Like &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt; , I also limit the countries that can connect to my portal via security policy rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 01:01:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/558873#M4413</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-09-21T01:01:04Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/559258#M4421</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;we have an explicit drop policy and so far we can only block RU. If I had my way about it we would also block the region of China among others. Most of our malicious traffic seemingly originates in Russian for reasons without explanation. Of course, Russia, Iran, and China are our top threats from state sponsored APTs but no traffic from Iran as of yet.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp;Thanks for the input!!! That could actually be an option... Disabling the outward facing vpn portal... If the number of individuals who use clentless vpn access is minimal then that may be enough for me to work with to gain approval for blocking it. Ideally, having both would be optimal but it it could prevent initial access from a Threat Actor or APT then I am a supporter!!&lt;BR /&gt;&lt;BR /&gt;So far, no futher brute force attempts on the clientless VPN portal but I am monitoring the situation. And will provide updates, there's always someone knocking on our firewall's door. Lol!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;David B.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Sep 2023 21:08:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/559258#M4421</guid>
      <dc:creator>David_Burton</dc:creator>
      <dc:date>2023-09-24T21:08:58Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/559380#M4424</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Interesting that the powers at be not allowing more blocking, etc. Maybe a SIEM alert for some of the following:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Impossible travel, a user logs in from say the US and Africa within like a few hours&lt;/LI&gt;
&lt;LI&gt;An authentication failure followed by success from the same country/region&lt;/LI&gt;
&lt;LI&gt;Different patterns, say a user usually logs in from Dallas, but all of a sudden logs in from another city
&lt;UL&gt;
&lt;LI&gt;Yes there could be false positives, but still worth an investigation&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Things of this nature. I'm sure there are more that I didnt list that others are doing as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 25 Sep 2023 14:52:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/559380#M4424</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-09-25T14:52:37Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/560108#M4457</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Agreed!!! Each of those points make perfect sense and I only wish we had that ability... &lt;BR /&gt;&lt;BR /&gt;And fun fact: The threat actor(s) have started up again... Same ip hopping per login attempt and still only using 5-7 user names. Recon is one thing, but at this point, the threat actor likely knows what hardware we are using and seems to be making no further attempts to improve his odds at actually running a successful brute forcing campaign. It doesn't make one bit of sense at this point...&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;The biggest issue I've discovered when it comes to this/these types of threat actors which are using simplistic "brute forcing" methods. Almost on a "script kiddie" level taking me back to the days. of "NetBrute" if you will, but I digress&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The thing is, PAN-OS allows for you to block authentication attempts via user name but ONLY when using LDAP. You cannot simply add a user name to an explicit ip drop (or other policy) that does not exist within your AD environment. Of course, you COULD create that user within your OU but noone wishes to create users accounts in AD such as sslvpn, admin, root, or testuser simply for the purposes of having the ability to block access attempts from individuals using these usernames.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Not to mention the additional security issues that are accompanied by doing such. But let us just say that if I could drop ip's explicitly and block them based on the user name that was used in the portal then problem solved!!! Why has Palo Alto refrained from incorporating such a feature??&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":thinking_face:"&gt;🤔&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DB&lt;/P&gt;</description>
      <pubDate>Sat, 30 Sep 2023 18:12:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/560108#M4457</guid>
      <dc:creator>David_Burton</dc:creator>
      <dc:date>2023-09-30T18:12:38Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/560110#M4458</link>
      <description>&lt;P&gt;This is what I'm talking about... Occasionally, there will be a "new" username that is used but for the most part they are repetitive.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Again, for purposes of recon...maybe, or testing our respone to such an "attack", but really seems pointless from the threat actor's point of view.\&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Screenshot 2023-09-30 at 2.19.55 PM.png" style="width: 146px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/54079i3D9069D4D691BF94/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-09-30 at 2.19.55 PM.png" alt="Screenshot 2023-09-30 at 2.19.55 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Sep 2023 18:22:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/560110#M4458</guid>
      <dc:creator>David_Burton</dc:creator>
      <dc:date>2023-09-30T18:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/573519#M4845</link>
      <description>&lt;P&gt;I have the same problem as David but I already have the portal/gateway only allowing US and the portal/clientless vpn functionality is disabled.&amp;nbsp; Each attempt has a different IP and different username and they come in at the rate of 1 attempt/minute.&amp;nbsp; Sometimes it lasts for an hour or sometimes many hours and I get hundreds of "authentication failed" emails.&amp;nbsp; We're using SSO with 2FA but the attempts continue to happen.&amp;nbsp; What I discovered recently is that in the monitor logs of global protect is the "version" column and all of these attempts say "browser" which makes me believe that it's trying to use the clientless vpn even though the portal logon page is disabled and clientless vpn is not enabled-how can that be the case???&amp;nbsp; I have a whole slew of EDL block lists and they fly right by that and the only unique thing about all of them is the host name of "mypc".&amp;nbsp; From what I can tell the HIP info isn't collected until after a successful login I cannot do anything with it....&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 18:45:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/573519#M4845</guid>
      <dc:creator>stevemg7</dc:creator>
      <dc:date>2024-01-18T18:45:26Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/574096#M4864</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/29152"&gt;@stevemg7&lt;/a&gt;&lt;BR /&gt;Sorry to hear that you are having the same issue... I know just how frustrating it can be, even more interesting is that the clientless vpn portal has been disabled but the traffic continues. One thing I have done in order to minimize there attempts is to modify your authentication profile. If the actor(s) are making an attempt every second then you could setup your criteria to block a user name after "x" failed attempts for "yy" minutes. I believe we chose 7 login attempts before the user is blocked for YY minutes. May drop it to 6... If a user ends up blocked you can easily unblock them with a single click.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Now, since your clientless vpn portal has been deactivated I'm unsure how this would work. If the brute force attempts are still occurring and you're seeing failed authentication via your RADIUS server in your GP/System logs you may still be able to leverage this method to aid in this uphill battle.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Let me know if you are able to completely stop these attempts, I would LOVE to know how you did it. Lol!&lt;BR /&gt;&lt;BR /&gt;Best,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;DB&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 15:19:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/574096#M4864</guid>
      <dc:creator>David_Burton</dc:creator>
      <dc:date>2024-01-23T15:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/574725#M4894</link>
      <description>&lt;P&gt;I am seeing the exactly the same thing. Though the attacks in my case are directed explicity at my gateways. I could look at region blocking with policies but the attacks are distributed globally. They are low and slow even with the KB mentioned here, in order to be effective would more likely impact users than deter this.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TilRando_0-1706527834134.png" style="width: 513px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56905i2A4FB241494943F7/image-dimensions/513x225/is-moderation-mode/true?v=v2" width="513" height="225" role="button" title="TilRando_0-1706527834134.png" alt="TilRando_0-1706527834134.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 11:35:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/574725#M4894</guid>
      <dc:creator>TilRando</dc:creator>
      <dc:date>2024-01-29T11:35:42Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/574768#M4901</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Use country codes to block access from where you know you wont have connections. Example, if your people are located in the US, block everything but the US. Another thing would be to use some form of multi factor auth so that its that much difficult for the bad actors.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One thing I do is enable telemetry and send it to PAN for research and analysis. This way they can write global indicators and that way everyone with a PAN will get the updates.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 17:44:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/574768#M4901</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-01-29T17:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/574771#M4902</link>
      <description>&lt;P&gt;I think utilising regions within your policies for hosted services is a really good practise but it does start to become meaningless depending on your org, especially if they operate at a global level in every region. We really need more granularity during the auth stage and within threat ID:&lt;SPAN&gt;40017&lt;/SPAN&gt; and ID:&lt;SPAN&gt;32256&lt;/SPAN&gt; it is only good for fast and hard brute-force attempts. It really needs an additional condition like username and result:success/fail. The only way currently I can see resolving this issue is by utilsing a SIEM solution with a custom Query that when triggered updates an EDL within a block policy.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 18:08:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/574771#M4902</guid>
      <dc:creator>TilRando</dc:creator>
      <dc:date>2024-01-29T18:08:19Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/574776#M4903</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/120020"&gt;@TilRando&lt;/a&gt; i am with you 100%.&amp;nbsp; I just closed my support case the other day because they were of no help.&amp;nbsp; We already have it set to US only and the attempts are low and slow meaning about 1 attempt/minute and for each attempt it's a different user and source IP.&amp;nbsp; We do have 2FA and the web portal disabled but they are still generating logs which trigger an e-mail to me.&amp;nbsp; I wish PA had a more glandular way to handle this.&amp;nbsp; There are ways to control things using HIP and other things but that is only after a successful authentication so it's useless to me.&amp;nbsp; My scenario is that the hostname is always "mypc" which I'd love to be a criteria to be able to block by but that currently does not exist.&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 19:01:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/574776#M4903</guid>
      <dc:creator>stevemg7</dc:creator>
      <dc:date>2024-01-29T19:01:23Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/574897#M4905</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/29152"&gt;@stevemg7&lt;/a&gt;&amp;nbsp;wouldn't that be nice if you could stick some regex in there. Just an update for anyone else had a new vector from a different OS client but this was from a single IP but could be new tooling.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TilRando_1-1706607825351.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56955iBC87D89DDDFC944C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="TilRando_1-1706607825351.png" alt="TilRando_1-1706607825351.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 09:44:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/574897#M4905</guid>
      <dc:creator>TilRando</dc:creator>
      <dc:date>2024-01-30T09:44:26Z</dc:date>
    </item>
    <item>
      <title>Re: Clientless VPN Portal Brute Forcing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/575289#M4931</link>
      <description>&lt;P&gt;We've spotted this problem and I've run through the article here but it still doesn't appear to be blocking the IPs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any suggestions?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2024 11:25:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/clientless-vpn-portal-brute-forcing/m-p/575289#M4931</guid>
      <dc:creator>LloydHopes</dc:creator>
      <dc:date>2024-02-01T11:25:59Z</dc:date>
    </item>
  </channel>
</rss>

