<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Host sweep alert from an iPad in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/host-sweep-alert-from-an-ipad/m-p/400519#M1127</link>
    <description>&lt;P&gt;Host sweep will detect whenever a source attempts to hit different IP addresses on the same destination port, which if you think of it is by definition internet activity (multiple IP's hit on port 443 and 80). This means that if you enable this protection on an internal Zone with internet access, it is highly likely to trigger FP's continuously for public IP's on the internet on regular internet ports (most frequently 443 and 80).&lt;/P&gt;</description>
    <pubDate>Tue, 20 Apr 2021 15:08:12 GMT</pubDate>
    <dc:creator>mivaldi</dc:creator>
    <dc:date>2021-04-20T15:08:12Z</dc:date>
    <item>
      <title>Host sweep alert from an iPad</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/host-sweep-alert-from-an-ipad/m-p/398608#M1121</link>
      <description>&lt;P&gt;We have an iPad that is triggering our scan block policy as a host sweep. The iPad is attempting to connect to one external (Internet) IP over port 443. It's happened for the past few days to a different external IP each time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Threat vault info.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="show-detail"&gt;Name: SCAN: Host Sweep&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;Unique Threat ID: 8002&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone else seen this behavior?&lt;/P&gt;&lt;P&gt;What are the thresholds for this threat?&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Apr 2021 15:02:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/host-sweep-alert-from-an-ipad/m-p/398608#M1121</guid>
      <dc:creator>MikeSangray2019</dc:creator>
      <dc:date>2021-04-15T15:02:11Z</dc:date>
    </item>
    <item>
      <title>Re: Host sweep alert from an iPad</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/host-sweep-alert-from-an-ipad/m-p/400322#M1124</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;This could just be the way the iPad is communication outbound. Collect a pcap and see if you can find anything within it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 19 Apr 2021 21:33:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/host-sweep-alert-from-an-ipad/m-p/400322#M1124</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-04-19T21:33:20Z</dc:date>
    </item>
    <item>
      <title>Re: Host sweep alert from an iPad</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/host-sweep-alert-from-an-ipad/m-p/400507#M1126</link>
      <description>&lt;P&gt;It looks like it's more than just an iPad. It's both iOS and Android devices. They are triggering the host sweep alert when communicating with Internet addresses which appear legitimate, so this is either OS or app traffic. I do know that if it's not successful (blocked by the firewall) the device may not function correctly as it can't confirm an Internet connection.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 14:37:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/host-sweep-alert-from-an-ipad/m-p/400507#M1126</guid>
      <dc:creator>MikeSangray2019</dc:creator>
      <dc:date>2021-04-20T14:37:37Z</dc:date>
    </item>
    <item>
      <title>Re: Host sweep alert from an iPad</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/host-sweep-alert-from-an-ipad/m-p/400519#M1127</link>
      <description>&lt;P&gt;Host sweep will detect whenever a source attempts to hit different IP addresses on the same destination port, which if you think of it is by definition internet activity (multiple IP's hit on port 443 and 80). This means that if you enable this protection on an internal Zone with internet access, it is highly likely to trigger FP's continuously for public IP's on the internet on regular internet ports (most frequently 443 and 80).&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 15:08:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/host-sweep-alert-from-an-ipad/m-p/400519#M1127</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2021-04-20T15:08:12Z</dc:date>
    </item>
  </channel>
</rss>

