<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Outbound blocking of incomplete applications in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/outbound-blocking-of-incomplete-applications/m-p/614525#M4856</link>
    <description>&lt;P&gt;I have security rules in place to block applications such as 'msrpc-base' and 'ms-rdp' from exiting the network.&amp;nbsp; However, I still see logs showing traffic egressing to ports 135 and 3389 with the application being listed as 'incomplete' and session end reason as 'aged-out'.&amp;nbsp; Is this a concern?&amp;nbsp; Should I be creating rules to block the protocol/port combo instead?&lt;/P&gt;</description>
    <pubDate>Thu, 24 Oct 2024 21:26:33 GMT</pubDate>
    <dc:creator>CastawayKid</dc:creator>
    <dc:date>2024-10-24T21:26:33Z</dc:date>
    <item>
      <title>Outbound blocking of incomplete applications</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/outbound-blocking-of-incomplete-applications/m-p/614525#M4856</link>
      <description>&lt;P&gt;I have security rules in place to block applications such as 'msrpc-base' and 'ms-rdp' from exiting the network.&amp;nbsp; However, I still see logs showing traffic egressing to ports 135 and 3389 with the application being listed as 'incomplete' and session end reason as 'aged-out'.&amp;nbsp; Is this a concern?&amp;nbsp; Should I be creating rules to block the protocol/port combo instead?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 21:26:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/outbound-blocking-of-incomplete-applications/m-p/614525#M4856</guid>
      <dc:creator>CastawayKid</dc:creator>
      <dc:date>2024-10-24T21:26:33Z</dc:date>
    </item>
    <item>
      <title>Re: Outbound blocking of incomplete applications</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/outbound-blocking-of-incomplete-applications/m-p/614526#M4857</link>
      <description>&lt;P&gt;If you want a complete block from the start on well-known services, yes block by the Service (aka protocol/port). The application filters can not categorize packets until a sufficient amount of traffic has passed in the session, so packets will continue until the application can be ID'd and rules re-evaluated. The application filters can be handy for ID'ing traffic on non-standard ports (assuming you do not have "application-default" turned on in the service), or traffic which changes after establishing, but they don't automatically assume new port based traffic matches.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 21:37:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/outbound-blocking-of-incomplete-applications/m-p/614526#M4857</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2024-10-24T21:37:32Z</dc:date>
    </item>
  </channel>
</rss>

