<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect - bruteforce - limit user/password guessing in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-bruteforce-limit-user-password-guessing/m-p/1205412#M6400</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/264421"&gt;@LukaKrizman&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;This isn't a possibility in PAN-OS at the moment. PAN-OS will always attempt to authenticate the user provided and then validates that user against the allow list &lt;EM&gt;if &lt;/EM&gt;the authentication was successful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could automate blocking any IP address that attempts to login with an invalid username easily before waiting for a bruteforce to actually be identified. I'd personally have some logic to validate that the IP address isn't in the list of the current or previous users for the gateways prior to blocking it though; people have sausage fingers and you'd need a bit of logic to prevent blocking legitimate users who just mistype their username.&lt;/P&gt;</description>
    <pubDate>Sun, 26 Jan 2025 04:52:06 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2025-01-26T04:52:06Z</dc:date>
    <item>
      <title>GlobalProtect - bruteforce - limit user/password guessing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-bruteforce-limit-user-password-guessing/m-p/1205314#M6392</link>
      <description>&lt;P&gt;I now that this topics was discussed 100X times about GlobalProtect bruteforce.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is possible po setup GlobalProtect policy in a way, if a user is not part of any AD group, than no AD/LDAP authentication is beeing trigered to internal AD.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are seeing bruteforce attempt with non-existing AD users&amp;nbsp; and we want to limit this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Br, Luka&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 09:23:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-bruteforce-limit-user-password-guessing/m-p/1205314#M6392</guid>
      <dc:creator>LukaKrizman</dc:creator>
      <dc:date>2025-01-24T09:23:52Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect - bruteforce - limit user/password guessing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-bruteforce-limit-user-password-guessing/m-p/1205412#M6400</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/264421"&gt;@LukaKrizman&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;This isn't a possibility in PAN-OS at the moment. PAN-OS will always attempt to authenticate the user provided and then validates that user against the allow list &lt;EM&gt;if &lt;/EM&gt;the authentication was successful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could automate blocking any IP address that attempts to login with an invalid username easily before waiting for a bruteforce to actually be identified. I'd personally have some logic to validate that the IP address isn't in the list of the current or previous users for the gateways prior to blocking it though; people have sausage fingers and you'd need a bit of logic to prevent blocking legitimate users who just mistype their username.&lt;/P&gt;</description>
      <pubDate>Sun, 26 Jan 2025 04:52:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-bruteforce-limit-user-password-guessing/m-p/1205412#M6400</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-01-26T04:52:06Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect - bruteforce - limit user/password guessing</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-bruteforce-limit-user-password-guessing/m-p/1205459#M6403</link>
      <description>&lt;P&gt;Is there any chance to push this feature into development? Does anybody knows how to report to PA to do it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 08:15:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-bruteforce-limit-user-password-guessing/m-p/1205459#M6403</guid>
      <dc:creator>LukaKrizman</dc:creator>
      <dc:date>2025-01-27T08:15:46Z</dc:date>
    </item>
  </channel>
</rss>

