<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic threat generic:5llion.com generic:conti.news in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-generic-5llion-com-generic-conti-news/m-p/432193#M1302</link>
    <description>&lt;P&gt;How to block this&amp;nbsp;&lt;SPAN&gt;“unknown“ event to the customer that contains the threat &lt;/SPAN&gt;&lt;STRONG&gt;generic:5llion.com (408607164)&lt;/STRONG&gt;&lt;SPAN&gt;. Because this threat is categorized as DNS Signature, the event had the destination port 53&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 07 Sep 2021 10:05:12 GMT</pubDate>
    <dc:creator>NavidAlam</dc:creator>
    <dc:date>2021-09-07T10:05:12Z</dc:date>
    <item>
      <title>threat generic:5llion.com generic:conti.news</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-generic-5llion-com-generic-conti-news/m-p/432193#M1302</link>
      <description>&lt;P&gt;How to block this&amp;nbsp;&lt;SPAN&gt;“unknown“ event to the customer that contains the threat &lt;/SPAN&gt;&lt;STRONG&gt;generic:5llion.com (408607164)&lt;/STRONG&gt;&lt;SPAN&gt;. Because this threat is categorized as DNS Signature, the event had the destination port 53&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 10:05:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-generic-5llion-com-generic-conti-news/m-p/432193#M1302</guid>
      <dc:creator>NavidAlam</dc:creator>
      <dc:date>2021-09-07T10:05:12Z</dc:date>
    </item>
    <item>
      <title>Re: threat generic:5llion.com generic:conti.news</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-generic-5llion-com-generic-conti-news/m-p/432195#M1303</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2021-09-07_11-00-18.png" style="width: 952px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36187i0C61CEBE43191EEE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2021-09-07_11-00-18.png" alt="2021-09-07_11-00-18.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 10:05:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-generic-5llion-com-generic-conti-news/m-p/432195#M1303</guid>
      <dc:creator>NavidAlam</dc:creator>
      <dc:date>2021-09-07T10:05:47Z</dc:date>
    </item>
    <item>
      <title>Re: threat generic:5llion.com generic:conti.news</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-generic-5llion-com-generic-conti-news/m-p/432455#M1304</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/76136"&gt;@NavidAlam&lt;/a&gt;&amp;nbsp;thank you for posting question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you need to change action specifically for DNS Threat ID:&amp;nbsp;408607164 to action block? When it comes to DNS signatures the action is set for all signatures under Anti-Spyware Profile &amp;gt; DNS Signatures &amp;gt; Policies &amp;amp; Settings. The option for Exceptions per signature bases is only for excluding signature from enforcement. There is no other configuration option to change action based on signature. Based on screen shot you have provided, the action is already: sinkhole. I think in this case there is no action needed as this has been forged with sinkhole IP address. Have you configured a rule to block:&amp;nbsp;sinkhole.paloaltonetworks.com ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Pavel&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 22:53:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-generic-5llion-com-generic-conti-news/m-p/432455#M1304</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2021-09-07T22:53:07Z</dc:date>
    </item>
    <item>
      <title>Re: threat generic:5llion.com generic:conti.news</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-generic-5llion-com-generic-conti-news/m-p/432467#M1305</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/76136"&gt;@NavidAlam&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The final action for the DNS query is blocked as the action is a sinkhole. That means when a device will try to resolve the IP address for the known bad site, a sinkhole address ( dead end) is provided.&amp;nbsp;&lt;BR /&gt;That way you can identify if which device is trying to reach a bad site, and the connection is never successful.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sinkhole and block are parallel actions, not in sequence.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this helps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Himani&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 01:44:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-generic-5llion-com-generic-conti-news/m-p/432467#M1305</guid>
      <dc:creator>hisingh</dc:creator>
      <dc:date>2021-09-08T01:44:33Z</dc:date>
    </item>
  </channel>
</rss>

