<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dynamic User Group Auto Remediation configuration in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/dynamic-user-group-auto-remediation-configuration/m-p/577001#M2632</link>
    <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_0-1707731434750.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57591i65A64A932F4D5B37/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_0-1707731434750.png" alt="rmeddane_0-1707731434750.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Zero Trust architecture is the new trend of Security Philosophy based on the principe, never trust and continuously verify trust, which means even if the user is authenticated and permitted to access corporate resources with least privileges using RBAC, he is continuously tracked and monitored to detect any malicious activity, anomalous behavior, or if the posture is not changed, if this occurs, an automatic action and response is required to quarantine the host or to suppress the initial permission.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One important layer of Zero Trust is to perform continuous monitoring and analysis which leads to the "Continuously Trust Concept" in the Zero Trust Architecture. This layer is used to detect any malicious or anomalous activity such as data hoarding, data exfiltration or any connection to CnC server from a compromised host. And if a violation occurs or a malicious activity is detected, an action to quarantine the host is applied. One of these tools is Dynamic User Group. DUG is used to dynamically put an infected host for example in a Dynamic Group that will be used in the security policy to limit or to deny access.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The idea behind the DUG feature is to perform automatic remediation when the presence of threat is detected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To do this, the Log Forwarding Profile is responsible to first tag the user based on the criteria you define inside this profile, an example of a criteria is Sinkhole for any connection to malicious domains (the User-ID feature must be enabled before). If the criteria Sinkhole matches any threat log entry for a specific user, then the Log Forwarding Profile will assign a TAG to the user.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once the user is tagged with a specific TAG, the firewall registers the user into the Dynamic User Group, the DUG must be configured with the same TAG you define in the Log Forwarding Profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Finally, you need to define a Security Policy Rule with the Source user "the Dynamic User Group you created previously" as a condition and an action DENY to quarantine the host.&lt;/P&gt;
&lt;P&gt;In this example, we have an EDL with a list of malicious domains in the server &lt;STRONG&gt;10.1.6.20&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_1-1707731434762.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57593iF0134A95AC37D2B4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_1-1707731434762.png" alt="rmeddane_1-1707731434762.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Create the External Dynamic Lists object.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_2-1707731434765.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57592i02EA8E8D4069882A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_2-1707731434765.jpeg" alt="rmeddane_2-1707731434765.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Create a Dynamic User Group and assign the TAG &lt;STRONG&gt;Sinkhole&lt;/STRONG&gt; as a Match Criteria.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_3-1707731434767.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57594i2F76295E3620F4A1/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_3-1707731434767.jpeg" alt="rmeddane_3-1707731434767.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Create a Log Forwarding Profile with &lt;STRONG&gt;Log Type threat&lt;/STRONG&gt; and define an action the Firewall will take if a threat is detected in the Logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The action is to add the tag &lt;STRONG&gt;Sinkhole&lt;/STRONG&gt; (the same tag assigned to the Dynamic User Group) for any user detected in the Threat Logs with DNS sinkholed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_4-1707731434773.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57595i1813732488F556CF/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_4-1707731434773.jpeg" alt="rmeddane_4-1707731434773.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_5-1707731434781.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57596i6EE5EC7BF7D333C5/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_5-1707731434781.jpeg" alt="rmeddane_5-1707731434781.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_6-1707731434785.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57597i575AEE00F258482B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_6-1707731434785.jpeg" alt="rmeddane_6-1707731434785.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Create an Anti Spyware profile and define the action &lt;STRONG&gt;sinkhole&lt;/STRONG&gt; for the EDL created previously.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_7-1707731434795.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57599i50AA1E06D9509E10/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_7-1707731434795.jpeg" alt="rmeddane_7-1707731434795.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Edit the Security Policy Rule that allow access to INTERNET, associate the Anti Spyware and Log Forwarding Profiles.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_8-1707731434799.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57598iA3CA7751BCAA3F24/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_8-1707731434799.jpeg" alt="rmeddane_8-1707731434799.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_9-1707731434807.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57602i9D694BBAC4D4C62F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_9-1707731434807.jpeg" alt="rmeddane_9-1707731434807.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Configure a Security Policy Rule named &lt;STRONG&gt;Sinkhole-Rule-User&lt;/STRONG&gt; for auto remediation. In the Source User select the Dynamic User Group and the action &lt;STRONG&gt;Deny&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_10-1707731434810.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57600i825CD0891860E2E4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_10-1707731434810.jpeg" alt="rmeddane_10-1707731434810.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_11-1707731434813.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57601iF050A4422E55F1CE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_11-1707731434813.jpeg" alt="rmeddane_11-1707731434813.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_12-1707731434816.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57604i6FCBAAE486A2B675/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_12-1707731434816.jpeg" alt="rmeddane_12-1707731434816.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_13-1707731434821.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57605iAA1D5EBEB073C1DD/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_13-1707731434821.jpeg" alt="rmeddane_13-1707731434821.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Login to the Internal PC using the AD user credentials.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_14-1707731434824.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57603iAF02CD176E5A01FC/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_14-1707731434824.jpeg" alt="rmeddane_14-1707731434824.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Access any website that does not belong to the External Domain Lists. The connection should be successful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_15-1707731434836.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57606i0A48F0175A158E57/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_15-1707731434836.jpeg" alt="rmeddane_15-1707731434836.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When the user tries to access the &lt;A href="http://www.eicar.org" target="_blank"&gt;&lt;STRONG&gt;www.eicar.org&lt;/STRONG&gt;&lt;/A&gt; website, the Firewall intercept the DNS request and applies the &lt;STRONG&gt;Sinkhole&lt;/STRONG&gt; action defined in the Anti Spyware profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the Threat Logs, we can see the sinkhole action for the user &lt;STRONG&gt;maradona&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_16-1707731434843.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57607i1736A2839BAB204C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_16-1707731434843.jpeg" alt="rmeddane_16-1707731434843.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The firewall adds automatically the user &lt;STRONG&gt;maradona&lt;/STRONG&gt; in the Dynamic User Group.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_17-1707731434846.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57608iD8E4781ADB3792E5/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_17-1707731434846.jpeg" alt="rmeddane_17-1707731434846.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Because now the user is added to the Dynamic User Group, internet traffic is denied by the Security Policy Rule &lt;STRONG&gt;Sinkhole-Rule-User&lt;/STRONG&gt; as shown in the Traffic Logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_18-1707731434848.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57609i7D4862C8140FA75F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_18-1707731434848.png" alt="rmeddane_18-1707731434848.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_19-1707731434858.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57610i09CE3F01618CE33A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_19-1707731434858.jpeg" alt="rmeddane_19-1707731434858.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 12 Feb 2024 09:57:40 GMT</pubDate>
    <dc:creator>rmeddane</dc:creator>
    <dc:date>2024-02-12T09:57:40Z</dc:date>
    <item>
      <title>Dynamic User Group Auto Remediation configuration</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/dynamic-user-group-auto-remediation-configuration/m-p/577001#M2632</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_0-1707731434750.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57591i65A64A932F4D5B37/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_0-1707731434750.png" alt="rmeddane_0-1707731434750.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Zero Trust architecture is the new trend of Security Philosophy based on the principe, never trust and continuously verify trust, which means even if the user is authenticated and permitted to access corporate resources with least privileges using RBAC, he is continuously tracked and monitored to detect any malicious activity, anomalous behavior, or if the posture is not changed, if this occurs, an automatic action and response is required to quarantine the host or to suppress the initial permission.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One important layer of Zero Trust is to perform continuous monitoring and analysis which leads to the "Continuously Trust Concept" in the Zero Trust Architecture. This layer is used to detect any malicious or anomalous activity such as data hoarding, data exfiltration or any connection to CnC server from a compromised host. And if a violation occurs or a malicious activity is detected, an action to quarantine the host is applied. One of these tools is Dynamic User Group. DUG is used to dynamically put an infected host for example in a Dynamic Group that will be used in the security policy to limit or to deny access.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The idea behind the DUG feature is to perform automatic remediation when the presence of threat is detected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To do this, the Log Forwarding Profile is responsible to first tag the user based on the criteria you define inside this profile, an example of a criteria is Sinkhole for any connection to malicious domains (the User-ID feature must be enabled before). If the criteria Sinkhole matches any threat log entry for a specific user, then the Log Forwarding Profile will assign a TAG to the user.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once the user is tagged with a specific TAG, the firewall registers the user into the Dynamic User Group, the DUG must be configured with the same TAG you define in the Log Forwarding Profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Finally, you need to define a Security Policy Rule with the Source user "the Dynamic User Group you created previously" as a condition and an action DENY to quarantine the host.&lt;/P&gt;
&lt;P&gt;In this example, we have an EDL with a list of malicious domains in the server &lt;STRONG&gt;10.1.6.20&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_1-1707731434762.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57593iF0134A95AC37D2B4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_1-1707731434762.png" alt="rmeddane_1-1707731434762.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Create the External Dynamic Lists object.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_2-1707731434765.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57592i02EA8E8D4069882A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_2-1707731434765.jpeg" alt="rmeddane_2-1707731434765.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Create a Dynamic User Group and assign the TAG &lt;STRONG&gt;Sinkhole&lt;/STRONG&gt; as a Match Criteria.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_3-1707731434767.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57594i2F76295E3620F4A1/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_3-1707731434767.jpeg" alt="rmeddane_3-1707731434767.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Create a Log Forwarding Profile with &lt;STRONG&gt;Log Type threat&lt;/STRONG&gt; and define an action the Firewall will take if a threat is detected in the Logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The action is to add the tag &lt;STRONG&gt;Sinkhole&lt;/STRONG&gt; (the same tag assigned to the Dynamic User Group) for any user detected in the Threat Logs with DNS sinkholed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_4-1707731434773.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57595i1813732488F556CF/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_4-1707731434773.jpeg" alt="rmeddane_4-1707731434773.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_5-1707731434781.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57596i6EE5EC7BF7D333C5/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_5-1707731434781.jpeg" alt="rmeddane_5-1707731434781.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_6-1707731434785.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57597i575AEE00F258482B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_6-1707731434785.jpeg" alt="rmeddane_6-1707731434785.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Create an Anti Spyware profile and define the action &lt;STRONG&gt;sinkhole&lt;/STRONG&gt; for the EDL created previously.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_7-1707731434795.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57599i50AA1E06D9509E10/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_7-1707731434795.jpeg" alt="rmeddane_7-1707731434795.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Edit the Security Policy Rule that allow access to INTERNET, associate the Anti Spyware and Log Forwarding Profiles.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_8-1707731434799.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57598iA3CA7751BCAA3F24/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_8-1707731434799.jpeg" alt="rmeddane_8-1707731434799.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_9-1707731434807.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57602i9D694BBAC4D4C62F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_9-1707731434807.jpeg" alt="rmeddane_9-1707731434807.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Configure a Security Policy Rule named &lt;STRONG&gt;Sinkhole-Rule-User&lt;/STRONG&gt; for auto remediation. In the Source User select the Dynamic User Group and the action &lt;STRONG&gt;Deny&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_10-1707731434810.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57600i825CD0891860E2E4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_10-1707731434810.jpeg" alt="rmeddane_10-1707731434810.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_11-1707731434813.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57601iF050A4422E55F1CE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_11-1707731434813.jpeg" alt="rmeddane_11-1707731434813.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_12-1707731434816.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57604i6FCBAAE486A2B675/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_12-1707731434816.jpeg" alt="rmeddane_12-1707731434816.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_13-1707731434821.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57605iAA1D5EBEB073C1DD/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_13-1707731434821.jpeg" alt="rmeddane_13-1707731434821.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Login to the Internal PC using the AD user credentials.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_14-1707731434824.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57603iAF02CD176E5A01FC/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_14-1707731434824.jpeg" alt="rmeddane_14-1707731434824.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Access any website that does not belong to the External Domain Lists. The connection should be successful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_15-1707731434836.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57606i0A48F0175A158E57/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_15-1707731434836.jpeg" alt="rmeddane_15-1707731434836.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When the user tries to access the &lt;A href="http://www.eicar.org" target="_blank"&gt;&lt;STRONG&gt;www.eicar.org&lt;/STRONG&gt;&lt;/A&gt; website, the Firewall intercept the DNS request and applies the &lt;STRONG&gt;Sinkhole&lt;/STRONG&gt; action defined in the Anti Spyware profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the Threat Logs, we can see the sinkhole action for the user &lt;STRONG&gt;maradona&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_16-1707731434843.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57607i1736A2839BAB204C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_16-1707731434843.jpeg" alt="rmeddane_16-1707731434843.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The firewall adds automatically the user &lt;STRONG&gt;maradona&lt;/STRONG&gt; in the Dynamic User Group.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_17-1707731434846.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57608iD8E4781ADB3792E5/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_17-1707731434846.jpeg" alt="rmeddane_17-1707731434846.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Because now the user is added to the Dynamic User Group, internet traffic is denied by the Security Policy Rule &lt;STRONG&gt;Sinkhole-Rule-User&lt;/STRONG&gt; as shown in the Traffic Logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_18-1707731434848.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57609i7D4862C8140FA75F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_18-1707731434848.png" alt="rmeddane_18-1707731434848.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_19-1707731434858.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57610i09CE3F01618CE33A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_19-1707731434858.jpeg" alt="rmeddane_19-1707731434858.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Feb 2024 09:57:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/dynamic-user-group-auto-remediation-configuration/m-p/577001#M2632</guid>
      <dc:creator>rmeddane</dc:creator>
      <dc:date>2024-02-12T09:57:40Z</dc:date>
    </item>
  </channel>
</rss>

