<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Where to check Threat IDs? in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/where-to-check-threat-ids/m-p/996993#M5182</link>
    <description>&lt;P&gt;The Apps&amp;amp;Threats signatures generally show up under your Anti-Virus, Anti-Spyware, or Vulnerability Protection profiles (depending on the threat type), if your have a Threat Prevention license.&amp;nbsp;You can also check the type and default status from Threat Vault (&lt;A href="https://threatvault.paloaltonetworks.com/" target="_blank"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Go to Objects -&amp;gt; Security Profiles -&amp;gt; Vulnerability Protection and select the profile that you are using for filtering traffic (must be applied under Actions of the Security Policies you are using to filter inbound/outbound traffic). Click the Exceptions tab and then check the 'Show all signatures" box at the bottom (only exceptions to default signatures show by default). Scroll or use the filter box to find the relevant signature.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that not all the indicated signatures are block by default as they may be more generic in detection. &amp;nbsp;Default settings:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;ID&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - Severity/Action&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;95746 - Low/Alert&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;95747 - Critical/Reset-server&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;95752 - Critical/Reset-server&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;95753 - Medium/Alert&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;95759 - Critical/Reset-server&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;95763 - Critical/Reset-server&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To change a signature action under a profile, select the signature in the Exceptions tab and click the "Enable" box. Enter an exempt IP, change the Action, or change the Packet Capture settings to your desired setting and click OK/Commit. If you have multiple Security Profiles for different Security Policies, you will have to change each relevant one.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 06 Dec 2024 16:43:55 GMT</pubDate>
    <dc:creator>Adrian_Jensen</dc:creator>
    <dc:date>2024-12-06T16:43:55Z</dc:date>
    <item>
      <title>Where to check Threat IDs?</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/where-to-check-threat-ids/m-p/996980#M5181</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was reading this article&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-0012/" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2024-0012.&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Per the article, '&lt;SPAN&gt;&lt;EM&gt;Additionally, if you have a Threat Prevention subscription, you can block these attacks using Threat IDs 95746, 95747, 95752, 95753, 95759, and 95763 (available in Applications and Threats content version 8915-9075 and later). For these Threat IDs to protect against attacks for this vulnerability&lt;/EM&gt;,'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have Threat Prevention subscription. Where do I check Threat IDs&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;95746, 95747, 95752, 95753, 95759, and 95763 to see if they're set to block mode?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;How do I set them to block mode if they aren't set to block mode?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Dec 2024 15:34:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/where-to-check-threat-ids/m-p/996980#M5181</guid>
      <dc:creator>tinhnho</dc:creator>
      <dc:date>2024-12-06T15:34:24Z</dc:date>
    </item>
    <item>
      <title>Re: Where to check Threat IDs?</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/where-to-check-threat-ids/m-p/996993#M5182</link>
      <description>&lt;P&gt;The Apps&amp;amp;Threats signatures generally show up under your Anti-Virus, Anti-Spyware, or Vulnerability Protection profiles (depending on the threat type), if your have a Threat Prevention license.&amp;nbsp;You can also check the type and default status from Threat Vault (&lt;A href="https://threatvault.paloaltonetworks.com/" target="_blank"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Go to Objects -&amp;gt; Security Profiles -&amp;gt; Vulnerability Protection and select the profile that you are using for filtering traffic (must be applied under Actions of the Security Policies you are using to filter inbound/outbound traffic). Click the Exceptions tab and then check the 'Show all signatures" box at the bottom (only exceptions to default signatures show by default). Scroll or use the filter box to find the relevant signature.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that not all the indicated signatures are block by default as they may be more generic in detection. &amp;nbsp;Default settings:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;ID&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - Severity/Action&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;95746 - Low/Alert&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;95747 - Critical/Reset-server&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;95752 - Critical/Reset-server&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;95753 - Medium/Alert&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;95759 - Critical/Reset-server&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;95763 - Critical/Reset-server&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To change a signature action under a profile, select the signature in the Exceptions tab and click the "Enable" box. Enter an exempt IP, change the Action, or change the Packet Capture settings to your desired setting and click OK/Commit. If you have multiple Security Profiles for different Security Policies, you will have to change each relevant one.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Dec 2024 16:43:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/where-to-check-threat-ids/m-p/996993#M5182</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2024-12-06T16:43:55Z</dc:date>
    </item>
    <item>
      <title>Re: Where to check Threat IDs?</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/where-to-check-threat-ids/m-p/997808#M5211</link>
      <description>&lt;P&gt;Hi, Thanks for the comment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the ID &lt;SPAN&gt;95746 (low/alert)&amp;nbsp;&lt;/SPAN&gt;, under 'IP Address Exemptions', what IP address do i need to put there?&lt;/P&gt;&lt;P&gt;Since the default is alert, what action do I need here? Drop?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tinhnho_0-1733939581653.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/64627iAB4811D01D39E12F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="tinhnho_0-1733939581653.png" alt="tinhnho_0-1733939581653.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2024 17:54:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/where-to-check-threat-ids/m-p/997808#M5211</guid>
      <dc:creator>tinhnho</dc:creator>
      <dc:date>2024-12-11T17:54:38Z</dc:date>
    </item>
    <item>
      <title>Re: Where to check Threat IDs?</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/where-to-check-threat-ids/m-p/997821#M5212</link>
      <description>&lt;P&gt;If you put any IPs in the "IP Address Exemptions" list (click the empty box to enter), those IPs will be excluded from that signature detection and will not trigger (either source or destination). So, for example, if you had a server that regularly triggered a false positive for a ColdFusion exploit signature (when your server didn't even have ColdFusion installed) and you want to ignore that, but not disable the signature for other devices, you could enter the server IP under Exemptions. That particular server would no long trip that signature, but all other devices still would.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The 95746 signature is more generic (may trigger on far more than just CV-2024-0012), so PA has decided to make it low-severity and alert only. If you want to change it to immediately kill the connection, you can change the action to any of the following:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Reset Server - Sends a TCP reset to the server to kill the session&lt;/LI&gt;
&lt;LI&gt;Rest Client - Sends a TCP reset the the client to kill the session&lt;/LI&gt;
&lt;LI&gt;Reset Both - Sends TCP resets to both sides of the session&lt;/LI&gt;
&lt;LI&gt;Drop - Drops all further packets in the session&lt;/LI&gt;
&lt;LI&gt;Block - Blocks further packets from the source/destination (*don't really know anything about this, never seen it used)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;You would probably want to Reset Both or Reset Server to ensure the existing session is cancelled and the server does not try to parse a partial packet reception. See the documentation on the various options here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-web-interface-help/objects/objects-security-profiles/actions-in-security-profiles" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-web-interface-help/objects/objects-security-profiles/actions-in-security-profiles&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2024 18:35:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/where-to-check-threat-ids/m-p/997821#M5212</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2024-12-11T18:35:59Z</dc:date>
    </item>
  </channel>
</rss>

