<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS Security and Untrust to Untrust Alerts in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-security-and-untrust-to-untrust-alerts/m-p/429326#M1279</link>
    <description>&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;So I have been running Palo Alto just shy of a year now, and as I look at my logging it occurs to me that aside from testing against EICARS I have never seen Wildfire or AV trigger "in the wild".&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;My organization has full endpoint protection and the firewall has enough policies including SSL decryption that it should be protecting my users from ending up at places where they would get bad things. In addition we have a reasonably solid cyber security training program in place.&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Still I find it somewhat unbelievable this thing has never triggered. In fact not even an AV alert either. Plenty of traffic based alerts and actions though coming from the untrust zone.... but no AV alerts, no Wildfire uploads...&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Whats your experience?&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 27 Aug 2021 17:53:57 GMT</pubDate>
    <dc:creator>Balistrerifd</dc:creator>
    <dc:date>2021-08-27T17:53:57Z</dc:date>
    <item>
      <title>DNS Security and Untrust to Untrust Alerts</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-security-and-untrust-to-untrust-alerts/m-p/422849#M1254</link>
      <description>&lt;P&gt;We are currently doing a trial of the DNS Security license on our firewalls.&amp;nbsp; After enabling I am seeing a decent amount of alerts coming into XDR for DNS Tunneling. However when looking at the alerts they are all coming in from the Intrazone Untrust rule.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can we put an exclusion on these alerts or do we have a potential issue that we need to address, and if so how?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JasonPeterson_0-1627517057874.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/35305iBBB46066A06448EA/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="JasonPeterson_0-1627517057874.png" alt="JasonPeterson_0-1627517057874.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JasonPeterson_1-1627517130124.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/35306iA99EB4A153C5B8FE/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="JasonPeterson_1-1627517130124.png" alt="JasonPeterson_1-1627517130124.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 00:06:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-security-and-untrust-to-untrust-alerts/m-p/422849#M1254</guid>
      <dc:creator>JasonPeterson</dc:creator>
      <dc:date>2021-07-29T00:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Security and Untrust to Untrust Alerts</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-security-and-untrust-to-untrust-alerts/m-p/429326#M1279</link>
      <description>&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;So I have been running Palo Alto just shy of a year now, and as I look at my logging it occurs to me that aside from testing against EICARS I have never seen Wildfire or AV trigger "in the wild".&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;My organization has full endpoint protection and the firewall has enough policies including SSL decryption that it should be protecting my users from ending up at places where they would get bad things. In addition we have a reasonably solid cyber security training program in place.&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Still I find it somewhat unbelievable this thing has never triggered. In fact not even an AV alert either. Plenty of traffic based alerts and actions though coming from the untrust zone.... but no AV alerts, no Wildfire uploads...&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Whats your experience?&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Aug 2021 17:53:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-security-and-untrust-to-untrust-alerts/m-p/429326#M1279</guid>
      <dc:creator>Balistrerifd</dc:creator>
      <dc:date>2021-08-27T17:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Security and Untrust to Untrust Alerts</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-security-and-untrust-to-untrust-alerts/m-p/429572#M1280</link>
      <description>&lt;P&gt;If you don't have wildfire uploads sounds like it might not be configured.&amp;nbsp; What are the settings on your wildfire analysis profile and is that applied to your rules?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Aug 2021 22:40:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-security-and-untrust-to-untrust-alerts/m-p/429572#M1280</guid>
      <dc:creator>JasonPeterson</dc:creator>
      <dc:date>2021-08-26T22:40:32Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Security and Untrust to Untrust Alerts</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-security-and-untrust-to-untrust-alerts/m-p/429581#M1281</link>
      <description>&lt;P&gt;Alerts triggered by DNS security are part of the actions defined in your anti-spyware profile, hence following a logic that those are typically triggered by traffic coming from the intrazone (trust) to Untrust. I'd recommend investigating those alerts with TAC (open a case) before adding an exception. That could be the case of a False Positive in which case the signature triggered is modified or removed and you don't need to do anything in XDR; or could be the case of a true detection in which case the system is protecting you by blocking the access to a potentially malicious domain. In your screenshot, I can see those packets are being sinkholed so unless you are getting complaints that benign traffic is being dropped I'd consider a further investigation and discard infected hosts.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Aug 2021 23:17:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-security-and-untrust-to-untrust-alerts/m-p/429581#M1281</guid>
      <dc:creator>yblancovar</dc:creator>
      <dc:date>2021-08-26T23:17:12Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Security and Untrust to Untrust Alerts</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-security-and-untrust-to-untrust-alerts/m-p/429582#M1282</link>
      <description>&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/176599"&gt;@JasonPeterson&lt;/a&gt;. Antivirus and Wildfire detection capabilities are focused on file analysis. So it could be that the current configuration might not be analyzing every file type supported or the firewall is not uploading samples for Wildfire analysis. If I don't see Wildfire uploads I'd have a case opened. You can also test by enabling the reports of benign samples (Device--&amp;gt;Wildfire--&amp;gt;General Settings--&amp;gt;Report Bening Files)&amp;nbsp; in which case you'd confirm that all files are analyzed.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Aug 2021 23:41:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-security-and-untrust-to-untrust-alerts/m-p/429582#M1282</guid>
      <dc:creator>yblancovar</dc:creator>
      <dc:date>2021-08-26T23:41:01Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Security and Untrust to Untrust Alerts</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-security-and-untrust-to-untrust-alerts/m-p/429669#M1283</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/176599"&gt;@JasonPeterson&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;If you don't have wildfire uploads sounds like it might not be configured.&amp;nbsp; What are the settings on your wildfire analysis profile and is that applied to your rules?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Exactly, I also agreed with&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/176599"&gt;@JasonPeterson&lt;/a&gt;&amp;nbsp;thanks for response.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Aug 2021 11:27:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-security-and-untrust-to-untrust-alerts/m-p/429669#M1283</guid>
      <dc:creator>alexander84</dc:creator>
      <dc:date>2021-08-27T11:27:45Z</dc:date>
    </item>
  </channel>
</rss>

