<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Where is Prima Access ser Behavior Analytics (UBA) configured? in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/where-is-prima-access-ser-behavior-analytics-uba-configured/m-p/630870#M1016</link>
    <description>&lt;P&gt;As mentioned in&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/community-blogs/new-features-introduced-in-prisma-access-3-2/ba-p/512990" target="_blank" rel="noopener"&gt;New Features in Prisma Access 3.2 | Palo Alto Networks&lt;/A&gt;&amp;nbsp;now Prisma Access should be able to even automatically block or lock bad users with UBA that do too many violations but there is no more info about this feature anywhere&amp;nbsp;‌‌&lt;span class="lia-unicode-emoji" title=":thinking_face:"&gt;🤔&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know&amp;nbsp; that with XSOAR you can make a playbook based on the number of threat logs generated for a given time to block bad source ip or user but what about without it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also auto tagging is not an option as you can't say if 10 threat logs are seen for 1 minute from a user add tag and making a custom brute force signature that is triggered based of the number of requests ( &lt;A href="https://docs.paloaltonetworks.com/advanced-threat-prevention/administration/configure-threat-prevention/customize-the-action-and-trigger-conditions-for-a-brute-force-signature" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/advanced-threat-prevention/administration/configure-threat-prevention/customize-the-action-and-trigger-conditions-for-a-brute-force-signature&lt;/A&gt; ) is not for this as this will work only if the attacker does the same attack over and over again.&lt;/P&gt;</description>
    <pubDate>Wed, 20 Nov 2024 08:21:59 GMT</pubDate>
    <dc:creator>nikoolayy1</dc:creator>
    <dc:date>2024-11-20T08:21:59Z</dc:date>
    <item>
      <title>Where is Prima Access ser Behavior Analytics (UBA) configured?</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/where-is-prima-access-ser-behavior-analytics-uba-configured/m-p/630870#M1016</link>
      <description>&lt;P&gt;As mentioned in&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/community-blogs/new-features-introduced-in-prisma-access-3-2/ba-p/512990" target="_blank" rel="noopener"&gt;New Features in Prisma Access 3.2 | Palo Alto Networks&lt;/A&gt;&amp;nbsp;now Prisma Access should be able to even automatically block or lock bad users with UBA that do too many violations but there is no more info about this feature anywhere&amp;nbsp;‌‌&lt;span class="lia-unicode-emoji" title=":thinking_face:"&gt;🤔&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know&amp;nbsp; that with XSOAR you can make a playbook based on the number of threat logs generated for a given time to block bad source ip or user but what about without it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also auto tagging is not an option as you can't say if 10 threat logs are seen for 1 minute from a user add tag and making a custom brute force signature that is triggered based of the number of requests ( &lt;A href="https://docs.paloaltonetworks.com/advanced-threat-prevention/administration/configure-threat-prevention/customize-the-action-and-trigger-conditions-for-a-brute-force-signature" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/advanced-threat-prevention/administration/configure-threat-prevention/customize-the-action-and-trigger-conditions-for-a-brute-force-signature&lt;/A&gt; ) is not for this as this will work only if the attacker does the same attack over and over again.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 08:21:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/where-is-prima-access-ser-behavior-analytics-uba-configured/m-p/630870#M1016</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2024-11-20T08:21:59Z</dc:date>
    </item>
    <item>
      <title>Re: Where is Prima Access ser Behavior Analytics (UBA) configured?</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/where-is-prima-access-ser-behavior-analytics-uba-configured/m-p/639411#M1020</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1358622799"&gt;@Robert344Humphries&lt;/a&gt;&amp;nbsp; &amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the reply, so "You can configure auto-tagging to tag users or IP addresses based on specific criteria, such as the number of threat logs generated within a certain timeframe." you mean that this functionality is in Prisma Access the latest version as before on the NGFW, where you could have matched on a single log entry but not the number of log entries for a period of time ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As shown in the below link what should the filter criteria look like to match couple of times (for example if there are 10 logs in 5 minutes) the threat log by source ip or user id?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/network-security/security-policy/administration/objects/auto-tag-action/use-auto-tagging-to-automate-security-actions-cloud-management" target="_blank"&gt;https://docs.paloaltonetworks.com/network-security/security-policy/administration/objects/auto-tag-action/use-auto-tagging-to-automate-security-actions-cloud-management&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 10:42:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/where-is-prima-access-ser-behavior-analytics-uba-configured/m-p/639411#M1020</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2024-11-20T10:42:49Z</dc:date>
    </item>
  </channel>
</rss>

