<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ポートスキャンのアノマリ検知について in Prisma Cloud Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/%E3%83%9D%E3%83%BC%E3%83%88%E3%82%B9%E3%82%AD%E3%83%A3%E3%83%B3%E3%81%AE%E3%82%A2%E3%83%8E%E3%83%9E%E3%83%AA%E6%A4%9C%E7%9F%A5%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6/m-p/1227767#M1474</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Hello!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Ensure your cloud account has network flow logs set up.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs.prismacloud.io/en/enterprise-edition/content-collections/connect/connect-cloud-accounts/onboard-aws/configure-flow-logs" target="_blank"&gt;https://docs.prismacloud.io/en/enterprise-edition/content-collections/connect/connect-cloud-accounts/onboard-aws/configure-flow-logs&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Here is a quick summary of the basic steps required to configure a cloud environment to generate port scan activity that will be detected by Prisma Cloud:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Create two cloud instances within the same virtual network and subnet.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Configure the security group of the instances to allow the network traffic in the virtual network to be captured correctly.&amp;nbsp;&lt;STRONG&gt;&lt;I&gt;It is critical that the security group only has inbound rules that allow specific services (ports) and it is not set with the too permissive ACCEPT ALL rule.&lt;/I&gt;&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Connect to one of the cloud instances, which will be used to generate the port scan, to install the Network Mapper (NMAP) tool.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-04-30 at 10.10.53 AM.png" style="width: 227px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67361iBC4799712043D4BF/image-dimensions/227x26?v=v2" width="227" height="26" role="button" title="Screenshot 2025-04-30 at 10.10.53 AM.png" alt="Screenshot 2025-04-30 at 10.10.53 AM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Run the NMAP tool to generate the necessary network traffic.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-04-30 at 10.06.42 AM.png" style="width: 270px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67360i7419D5B1794A57E1/image-dimensions/270x34?v=v2" width="270" height="34" role="button" title="Screenshot 2025-04-30 at 10.06.42 AM.png" alt="Screenshot 2025-04-30 at 10.06.42 AM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Access the monitoring service to confirm that the network flow logs from running NMAP have been generated successfully. In AWS, monitoring is provided through the CloudWatch service.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Confirm that the corresponding alerts have been generated in Prisma Cloud.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;</description>
    <pubDate>Wed, 30 Apr 2025 14:11:43 GMT</pubDate>
    <dc:creator>LMegrelis</dc:creator>
    <dc:date>2025-04-30T14:11:43Z</dc:date>
    <item>
      <title>ポートスキャンのアノマリ検知について</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/%E3%83%9D%E3%83%BC%E3%83%88%E3%82%B9%E3%82%AD%E3%83%A3%E3%83%B3%E3%81%AE%E3%82%A2%E3%83%8E%E3%83%9E%E3%83%AA%E6%A4%9C%E7%9F%A5%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6/m-p/1227291#M1468</link>
      <description>&lt;P&gt;PrismaCloudの機能確認として、監視対象のAWSサーバに対して、外部のパブリックIPアドレスを持つサーバから50以上のポートを対象にポートスキャンしましたが、アノマリ検知アラートが上がりません。&lt;BR /&gt;アノマリ、アラートの設定の見直しは行っており、使用開始してから1ケ月以上の時間もたっているので機械学習なども特に影響はないと考えています。&lt;/P&gt;</description>
      <pubDate>Thu, 24 Apr 2025 04:42:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/%E3%83%9D%E3%83%BC%E3%83%88%E3%82%B9%E3%82%AD%E3%83%A3%E3%83%B3%E3%81%AE%E3%82%A2%E3%83%8E%E3%83%9E%E3%83%AA%E6%A4%9C%E7%9F%A5%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6/m-p/1227291#M1468</guid>
      <dc:creator>rnakamura1</dc:creator>
      <dc:date>2025-04-24T04:42:24Z</dc:date>
    </item>
    <item>
      <title>Re: ポートスキャンのアノマリ検知について</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/%E3%83%9D%E3%83%BC%E3%83%88%E3%82%B9%E3%82%AD%E3%83%A3%E3%83%B3%E3%81%AE%E3%82%A2%E3%83%8E%E3%83%9E%E3%83%AA%E6%A4%9C%E7%9F%A5%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6/m-p/1227366#M1471</link>
      <description>&lt;P&gt;Hello!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would recommend setting your anomaly policy threshold as per our documentation.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.prismacloud.io/en/enterprise-edition/content-collections/administration/anomalies/anomaly-thresholds" target="_blank"&gt;https://docs.prismacloud.io/en/enterprise-edition/content-collections/administration/anomalies/anomaly-thresholds&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also an important factor to consider is&amp;nbsp;&lt;STRONG&gt;&lt;SPAN&gt;A condition for the port scan policies to work, is that it should find REJECTED traffic.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This documentation below gives further context into the policy's behavior.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000saJbCAI" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000saJbCAI&lt;/A&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Apr 2025 15:22:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/%E3%83%9D%E3%83%BC%E3%83%88%E3%82%B9%E3%82%AD%E3%83%A3%E3%83%B3%E3%81%AE%E3%82%A2%E3%83%8E%E3%83%9E%E3%83%AA%E6%A4%9C%E7%9F%A5%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6/m-p/1227366#M1471</guid>
      <dc:creator>LMegrelis</dc:creator>
      <dc:date>2025-04-24T15:22:40Z</dc:date>
    </item>
    <item>
      <title>Re: ポートスキャンのアノマリ検知について</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/%E3%83%9D%E3%83%BC%E3%83%88%E3%82%B9%E3%82%AD%E3%83%A3%E3%83%B3%E3%81%AE%E3%82%A2%E3%83%8E%E3%83%9E%E3%83%AA%E6%A4%9C%E7%9F%A5%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6/m-p/1227718#M1473</link>
      <description>&lt;P&gt;ご返信ありがとうございます。&lt;BR /&gt;案内いただいたドキュメントも確認しましたが、やはり検知を確認できません。&lt;BR /&gt;&lt;BR /&gt;ポートスキャンの検知を行うには、異常とみなされるためにポートスキャンの種類(TCP,UDPなど)やスキャン元のリージョン(USなど)、スキャンの方法(Masscanなど)など、50以上のポートをスキャンすること以外にも制約があるのでしょうか。&lt;BR /&gt;&lt;BR /&gt;ポートスキャンの検知のテストができないと、リリース判定が通りません。&lt;BR /&gt;自分で意図的にポートスキャンの検知を行うには具体的にどうすればよいかお教えいただきたいです。&lt;BR /&gt;宜しくお願い致します。&lt;/P&gt;</description>
      <pubDate>Wed, 30 Apr 2025 01:01:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/%E3%83%9D%E3%83%BC%E3%83%88%E3%82%B9%E3%82%AD%E3%83%A3%E3%83%B3%E3%81%AE%E3%82%A2%E3%83%8E%E3%83%9E%E3%83%AA%E6%A4%9C%E7%9F%A5%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6/m-p/1227718#M1473</guid>
      <dc:creator>rnakamura1</dc:creator>
      <dc:date>2025-04-30T01:01:43Z</dc:date>
    </item>
    <item>
      <title>Re: ポートスキャンのアノマリ検知について</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/%E3%83%9D%E3%83%BC%E3%83%88%E3%82%B9%E3%82%AD%E3%83%A3%E3%83%B3%E3%81%AE%E3%82%A2%E3%83%8E%E3%83%9E%E3%83%AA%E6%A4%9C%E7%9F%A5%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6/m-p/1227767#M1474</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Ensure your cloud account has network flow logs set up.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs.prismacloud.io/en/enterprise-edition/content-collections/connect/connect-cloud-accounts/onboard-aws/configure-flow-logs" target="_blank"&gt;https://docs.prismacloud.io/en/enterprise-edition/content-collections/connect/connect-cloud-accounts/onboard-aws/configure-flow-logs&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Here is a quick summary of the basic steps required to configure a cloud environment to generate port scan activity that will be detected by Prisma Cloud:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Create two cloud instances within the same virtual network and subnet.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Configure the security group of the instances to allow the network traffic in the virtual network to be captured correctly.&amp;nbsp;&lt;STRONG&gt;&lt;I&gt;It is critical that the security group only has inbound rules that allow specific services (ports) and it is not set with the too permissive ACCEPT ALL rule.&lt;/I&gt;&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Connect to one of the cloud instances, which will be used to generate the port scan, to install the Network Mapper (NMAP) tool.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-04-30 at 10.10.53 AM.png" style="width: 227px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67361iBC4799712043D4BF/image-dimensions/227x26?v=v2" width="227" height="26" role="button" title="Screenshot 2025-04-30 at 10.10.53 AM.png" alt="Screenshot 2025-04-30 at 10.10.53 AM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Run the NMAP tool to generate the necessary network traffic.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-04-30 at 10.06.42 AM.png" style="width: 270px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67360i7419D5B1794A57E1/image-dimensions/270x34?v=v2" width="270" height="34" role="button" title="Screenshot 2025-04-30 at 10.06.42 AM.png" alt="Screenshot 2025-04-30 at 10.06.42 AM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Access the monitoring service to confirm that the network flow logs from running NMAP have been generated successfully. In AWS, monitoring is provided through the CloudWatch service.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Confirm that the corresponding alerts have been generated in Prisma Cloud.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Wed, 30 Apr 2025 14:11:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/%E3%83%9D%E3%83%BC%E3%83%88%E3%82%B9%E3%82%AD%E3%83%A3%E3%83%B3%E3%81%AE%E3%82%A2%E3%83%8E%E3%83%9E%E3%83%AA%E6%A4%9C%E7%9F%A5%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6/m-p/1227767#M1474</guid>
      <dc:creator>LMegrelis</dc:creator>
      <dc:date>2025-04-30T14:11:43Z</dc:date>
    </item>
  </channel>
</rss>

