<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Threat Log False Positives in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-log-false-positives/m-p/440904#M1342</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;The generic ones are the hardest to prove one way or another. If possible I would suggest you send them to wildfire for analysis and hope that PAN comes out with a signature. Or you can open a case and have then do the same thing that way.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Thu, 14 Oct 2021 17:07:57 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2021-10-14T17:07:57Z</dc:date>
    <item>
      <title>Threat Log False Positives</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-log-false-positives/m-p/440716#M1341</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In short - I'm looking to a way to identify false positives.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My organisation's anti virus profiles within our Palo NGFWs are detecting multiple generic threats of a 'medium' level and blocking them. I'm trying to determine whether any of these are false positives, and if they should remain blocked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The threat names all follow the same format:&amp;nbsp;Virus/Win32.WGeneric.######, with the last 6 digits varying for each threat. When I check the threat vault, there is no further information provided as to the nature of the threat, other than a list of hashes associated with it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've entered these hashes into VirusTotal.com and also AlienVault to see if any record of these as a malicious activity exists, but I've been unable to find any matches for the 30 or so hashes I've checked so far.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone know what these hashes actually are? Are they the hash of the file being transferred, or the type of threat itself? We've gone to the source device where the threat was generated and there is no record of the hash that the threat corresponds to in Palo's Threat Vault.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 05:57:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-log-false-positives/m-p/440716#M1341</guid>
      <dc:creator>ShaneMcG</dc:creator>
      <dc:date>2021-10-14T05:57:14Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Log False Positives</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-log-false-positives/m-p/440904#M1342</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;The generic ones are the hardest to prove one way or another. If possible I would suggest you send them to wildfire for analysis and hope that PAN comes out with a signature. Or you can open a case and have then do the same thing that way.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 17:07:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-log-false-positives/m-p/440904#M1342</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-10-14T17:07:57Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Log False Positives</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-log-false-positives/m-p/440950#M1343</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/155946"&gt;@ShaneMcG&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you query for an AV signature name or Signature ID in Threatvault, the sha256 hashes reported in Threatvault are the sha256 hashes of files for which this signature was generated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;e.g. If you search for the following:&lt;/P&gt;
&lt;P&gt;Name: Virus/Win32.WGeneric.brwesg &lt;BR /&gt;Sig id: 438164772&lt;/P&gt;
&lt;P&gt;Threatvault shows 318f37ae7d23f954c51f3aef2d06edaaec60e01639131f2efb801cbab7168fec as one of the sample SHA256 hashes for this signature. This sample 318f3.. was deemed to be malware in the WildFire sandbox and thus the signature shows the association as coverage for this sample.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, if the file transfer that triggered a signature was not for one of the hashes listed or no other malware was found, as &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;suggested, please report this via a case and a support expert can help with next steps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 18:17:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-log-false-positives/m-p/440950#M1343</guid>
      <dc:creator>goku123</dc:creator>
      <dc:date>2021-10-14T18:17:22Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Log False Positives</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-log-false-positives/m-p/461280#M1467</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We have this problem too. I already excluded more than 50 of these WGeneric virusses :(. A few times we reported the false positive to TAC through our partner, but we have to follow article &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm3aCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm3aCAC&lt;/A&gt; . It just takes too much time to collect the data, start a case, .... And this on top of the case I have with my end user. It would be a great relief if we could exclude this entire category of viruses (at least the new signatures in this category), because it triggers too much false positives.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jan 2022 23:16:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-log-false-positives/m-p/461280#M1467</guid>
      <dc:creator>KdG-Netadmin</dc:creator>
      <dc:date>2022-01-26T23:16:07Z</dc:date>
    </item>
  </channel>
</rss>

