<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Continuous Threat Logs Showing Management Server IP as Source in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/continuous-threat-logs-showing-management-server-ip-as-source/m-p/1250717#M6786</link>
    <description>&lt;P&gt;Hi&amp;nbsp;Raido&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The domain vikingindustries.in is an intenal know domain and additionally i will try to setup the dns sinkhole and look into this. Additionally why only these logs are coming ony after the PAN OS upgrade because the domian vikingindustries.in in the internal networks for more than 1 year and the domain is also got categoriezed as malware in the paloalto.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Satya Kalyan&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 23 Mar 2026 12:35:57 GMT</pubDate>
    <dc:creator>Satyak</dc:creator>
    <dc:date>2026-03-23T12:35:57Z</dc:date>
    <item>
      <title>Continuous Threat Logs Showing Management Server IP as Source</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/continuous-threat-logs-showing-management-server-ip-as-source/m-p/1250582#M6779</link>
      <description>&lt;P&gt;Hi Friends,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am facing an issue with my PA-440 firewall after the recent update to 11.1.13 i have been encountring an continous threat logs generation for the threat id :&amp;nbsp;765344918 with the threat type as :&amp;nbsp;spyware and the threat id name as :&amp;nbsp;generic:vikingindustries.in and the destinations as : 8.8.8.8 / 4.2.2.2 respectively&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The service route is configured as use management interface only. so be default all the services in the firewall will use management interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These threat logs are coming under dns-base category and these are getting generated every minute even though the action is set to drop but i&amp;nbsp; want to understand why these are specifically getting generated from the firewalls management ip is it an exepected behaviour or do i need to make any changes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Looking forward for your suggestions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Satya Kalyan&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2026 19:43:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/continuous-threat-logs-showing-management-server-ip-as-source/m-p/1250582#M6779</guid>
      <dc:creator>Satyak</dc:creator>
      <dc:date>2026-03-19T19:43:15Z</dc:date>
    </item>
    <item>
      <title>Re: Continuous Threat Logs Showing Management Server IP as Source</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/continuous-threat-logs-showing-management-server-ip-as-source/m-p/1250628#M6782</link>
      <description>&lt;P&gt;Something in your network is trying to resolve&amp;nbsp;&lt;SPAN&gt;vikingindustries.in to IP.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Are you using DNS Proxy feature in the firewall?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Set up DNS sinkhole and see what internal machines try to access sinkhole IP.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This allows you to identify which internal machine is responsible for connections to&amp;nbsp;vikingindustries.in&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2026 13:42:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/continuous-threat-logs-showing-management-server-ip-as-source/m-p/1250628#M6782</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2026-03-20T13:42:40Z</dc:date>
    </item>
    <item>
      <title>Re: Continuous Threat Logs Showing Management Server IP as Source</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/continuous-threat-logs-showing-management-server-ip-as-source/m-p/1250717#M6786</link>
      <description>&lt;P&gt;Hi&amp;nbsp;Raido&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The domain vikingindustries.in is an intenal know domain and additionally i will try to setup the dns sinkhole and look into this. Additionally why only these logs are coming ony after the PAN OS upgrade because the domian vikingindustries.in in the internal networks for more than 1 year and the domain is also got categoriezed as malware in the paloalto.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Satya Kalyan&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2026 12:35:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/continuous-threat-logs-showing-management-server-ip-as-source/m-p/1250717#M6786</guid>
      <dc:creator>Satyak</dc:creator>
      <dc:date>2026-03-23T12:35:57Z</dc:date>
    </item>
    <item>
      <title>Re: Continuous Threat Logs Showing Management Server IP as Source</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/continuous-threat-logs-showing-management-server-ip-as-source/m-p/1251183#M6805</link>
      <description>&lt;P&gt;Maybe your firewall upgrade happened to be around same time when threat id&amp;nbsp;765344918 was created and that is why suddenly started seeing it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Raido_Rattameister_0-1774879108605.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71069iBA52347E20535002/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Raido_Rattameister_0-1774879108605.png" alt="Raido_Rattameister_0-1774879108605.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If it is internally used domain and you are not responsible for public one, then you can add exception.&lt;/P&gt;
&lt;P&gt;Objects / Security Profiles / Anti-Spyware / &amp;lt;Anti-Spyware Profile&amp;gt; / DNS Exceptions&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2026 14:02:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/continuous-threat-logs-showing-management-server-ip-as-source/m-p/1251183#M6805</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2026-03-30T14:02:06Z</dc:date>
    </item>
  </channel>
</rss>

