<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PRISMA vulnerability false postives in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-vulnerability-false-postives/m-p/998430#M1038</link>
    <description>&lt;P&gt;We seem to get alot of false positives triggered in PRISMA , using the default Security profiles .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example, "Brute force attacks"&amp;nbsp; from Microsoft outlook clients accessing exchange online , im not even sure who the victim is, and who the threat actor is in that situation .&amp;nbsp; &amp;nbsp;Seems like Microsoft attacking itself , so not sure why PRISMA is blocking it ,&amp;nbsp; if we werent using PRISMA, Microsoft seems fine with the traffic .&lt;/P&gt;
&lt;P&gt;Another public site , has a bunch of pictures but PRISMA is flagging them as&amp;nbsp;&amp;nbsp;'HTTP Directory Traversal Request Attempt'&amp;nbsp; , and blocks them ,&amp;nbsp; Again not sure if its blocking them on basis that we are attacking that site , or blocking them as they think those pictures are a threat to us .&amp;nbsp; Whats weird is those same pictures are available else where on that site , where they dont trigger ! .&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;I dont want to submit the site/pictures to have them bypassed , its someone elses content .&amp;nbsp; What i would like is an easy way to exempt false positives directly in the console for sites / content we know are not risks .&amp;nbsp; Hopefully without having to create a new rule for each site.&lt;/P&gt;</description>
    <pubDate>Mon, 16 Dec 2024 02:59:08 GMT</pubDate>
    <dc:creator>M.Bathgate</dc:creator>
    <dc:date>2024-12-16T02:59:08Z</dc:date>
    <item>
      <title>PRISMA vulnerability false postives</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-vulnerability-false-postives/m-p/998430#M1038</link>
      <description>&lt;P&gt;We seem to get alot of false positives triggered in PRISMA , using the default Security profiles .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example, "Brute force attacks"&amp;nbsp; from Microsoft outlook clients accessing exchange online , im not even sure who the victim is, and who the threat actor is in that situation .&amp;nbsp; &amp;nbsp;Seems like Microsoft attacking itself , so not sure why PRISMA is blocking it ,&amp;nbsp; if we werent using PRISMA, Microsoft seems fine with the traffic .&lt;/P&gt;
&lt;P&gt;Another public site , has a bunch of pictures but PRISMA is flagging them as&amp;nbsp;&amp;nbsp;'HTTP Directory Traversal Request Attempt'&amp;nbsp; , and blocks them ,&amp;nbsp; Again not sure if its blocking them on basis that we are attacking that site , or blocking them as they think those pictures are a threat to us .&amp;nbsp; Whats weird is those same pictures are available else where on that site , where they dont trigger ! .&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;I dont want to submit the site/pictures to have them bypassed , its someone elses content .&amp;nbsp; What i would like is an easy way to exempt false positives directly in the console for sites / content we know are not risks .&amp;nbsp; Hopefully without having to create a new rule for each site.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 02:59:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-vulnerability-false-postives/m-p/998430#M1038</guid>
      <dc:creator>M.Bathgate</dc:creator>
      <dc:date>2024-12-16T02:59:08Z</dc:date>
    </item>
    <item>
      <title>Re: PRISMA vulnerability false postives</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-vulnerability-false-postives/m-p/1219846#M1085</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/222803057"&gt;@M.Bathgate&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;We seem to get alot of false positives triggered in PRISMA , using the default Security profiles .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example, "Brute force attacks"&amp;nbsp; from Microsoft outlook clients accessing exchange online , im not even sure who the victim is, and who the threat actor is in that situation .&amp;nbsp; &amp;nbsp;Seems like Microsoft attacking itself , so not sure why PRISMA is blocking it ,&amp;nbsp; if we werent using PRISMA, Microsoft seems fine with the traffic .&lt;/P&gt;
&lt;P&gt;Another public site , has a bunch of pictures but PRISMA is flagging them as&amp;nbsp;&amp;nbsp;'HTTP Directory Traversal Request Attempt'&amp;nbsp; , and blocks them ,&amp;nbsp; Again not sure if its blocking them on basis that we are attacking that site , or blocking them as they think those pictures are a threat to us .&amp;nbsp; Whats weird is those same pictures are available else where on that site , where they dont trigger ! .&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;I dont want to submit the site/pictures to have them bypassed , its someone elses content .&amp;nbsp; What i would like is an easy way to exempt false positives directly in the console for sites / content we know are not risks .&amp;nbsp; Hopefully without having to create a new rule for each site.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/222803057"&gt;@M.Bathgate&lt;/a&gt;&amp;nbsp;, if you have an account team Paloalto representative, I would recommend to share this feedback with them so they can be review the situation with you and also provide feedback to the relevant product team if any changes is required.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Feb 2025 02:22:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-vulnerability-false-postives/m-p/1219846#M1085</guid>
      <dc:creator>Vickynet</dc:creator>
      <dc:date>2025-02-09T02:22:32Z</dc:date>
    </item>
    <item>
      <title>Re: PRISMA vulnerability false postives</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-vulnerability-false-postives/m-p/1219961#M1087</link>
      <description>&lt;P&gt;Thanks , yes previously mentioned to our PA representative, and cases raised etc .&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Response was that we cant exclude from individual sites , but we can exclude from all . Issue is that its only false for the sites you know its false for , applying to all would weaken the security posture .&amp;nbsp; Was expecting to be able to just a tickbox against a entry to say allow for the site / threat combination (which other vendors have) , but alas that doesnt seem an option .&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;The alerting is basically weaking our security , as given there are 1000's of alerts they are now just auto filed , thus if there was a "real" alert its likly to be missed&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2025 01:13:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-vulnerability-false-postives/m-p/1219961#M1087</guid>
      <dc:creator>M.Bathgate</dc:creator>
      <dc:date>2025-02-11T01:13:59Z</dc:date>
    </item>
  </channel>
</rss>

