<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to block command &amp;amp; control traffic on IP address in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/how-to-block-command-amp-control-traffic-on-ip-address/m-p/578586#M699</link>
    <description>&lt;P&gt;Abit disappointed that there hasn't been a reply , given its something fundamental in detection of zero day command and control , and something that competitor products have out of the box .&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 28 Feb 2024 03:38:22 GMT</pubDate>
    <dc:creator>M.Bathgate</dc:creator>
    <dc:date>2024-02-28T03:38:22Z</dc:date>
    <item>
      <title>How to block command &amp; control traffic on IP address</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/how-to-block-command-amp-control-traffic-on-ip-address/m-p/574669#M671</link>
      <description>&lt;P&gt;Targeted Command &amp;amp; control processes or nefarious data extractions primarily go outbound using a IP address rather than a FQDN for the URI.&lt;/P&gt;
&lt;P&gt;In PRISMA how can i create a rule to block all all outbound traffic directed at IP addresses (not preknown) , unless address is in an exception group ?&lt;/P&gt;
&lt;P&gt;Aware that IP directed requests like &lt;A href="https://1.2.3.4" target="_blank"&gt;https://1.2.3.4&lt;/A&gt; can be detected as medium risk,&amp;nbsp; category unknown , but applying a rule to that, blocks all traffic, as its applied at the HIP profile. I can apply to specific sites but that defeats the purpose, which is to auto block C&amp;amp;C activity or data extractions&amp;nbsp;as i don't know in advance where the attackers are going to direct traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If PRISMA is only getting the IP address, then is it possible to have a rule enforced client side by the agent maybe&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jan 2024 22:53:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/how-to-block-command-amp-control-traffic-on-ip-address/m-p/574669#M671</guid>
      <dc:creator>M.Bathgate</dc:creator>
      <dc:date>2024-01-28T22:53:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to block command &amp; control traffic on IP address</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/how-to-block-command-amp-control-traffic-on-ip-address/m-p/578586#M699</link>
      <description>&lt;P&gt;Abit disappointed that there hasn't been a reply , given its something fundamental in detection of zero day command and control , and something that competitor products have out of the box .&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2024 03:38:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/how-to-block-command-amp-control-traffic-on-ip-address/m-p/578586#M699</guid>
      <dc:creator>M.Bathgate</dc:creator>
      <dc:date>2024-02-28T03:38:22Z</dc:date>
    </item>
  </channel>
</rss>

