<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Host Sweep in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/host-sweep/m-p/454736#M1438</link>
    <description>&lt;P&gt;Yes I agree with the&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/8083"&gt;@ymiyashita&lt;/a&gt;&amp;nbsp;it is tricky to get the right balance when applying the zone protection to any trusted zones, especially ones that have user internet traffic behind them as often applications will be trying to connect to any number of endpoints and normally the health of these is decided by pinging a port or an IP,&lt;/P&gt;&lt;P&gt;For instance PIA or private internet access pings pretty much all it's endpoints constantly to check if they are available and does this even if it is not switched on.&lt;/P&gt;&lt;P&gt;The only way to apply this is to, over time adjust the levels to the point where you have a baseline of normal volumes and then you can allow for anomalies&amp;nbsp; to activate the protections.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
    <pubDate>Tue, 21 Dec 2021 15:53:11 GMT</pubDate>
    <dc:creator>laurence64</dc:creator>
    <dc:date>2021-12-21T15:53:11Z</dc:date>
    <item>
      <title>Host Sweep</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/host-sweep/m-p/454370#M1434</link>
      <description>&lt;P&gt;Our &lt;STRONG&gt;Zone Protection | Hoist Sweep&lt;/STRONG&gt; configuration was blocking Internet connections on some local hosts due to enabled &lt;STRONG&gt;"News and Interests" Windows 10 Toolbar&lt;/STRONG&gt;.&amp;nbsp; I hope this helps with troubleshooting.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 13:05:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/host-sweep/m-p/454370#M1434</guid>
      <dc:creator>tdevic</dc:creator>
      <dc:date>2021-12-20T13:05:05Z</dc:date>
    </item>
    <item>
      <title>Re: Host Sweep</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/host-sweep/m-p/454591#M1436</link>
      <description>&lt;P&gt;It would depend on how the zone protection is configured. For the traffic from Trust to Untrust, it shouldn't be too strict especially when it's configured with "Block IP" action.&lt;BR /&gt;I'd also suggest to check the traffic log or sessions to see what kind traffic is matching with the condition. You may also want to capture packets on the Windows 10 machine with/without "News and Interests" toolbar enabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For your reference:&lt;BR /&gt;How do I analyze alerts for SCAN: Host Sweep (8002)?&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HBioCAG" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HBioCAG&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Dec 2021 01:10:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/host-sweep/m-p/454591#M1436</guid>
      <dc:creator>ymiyashita</dc:creator>
      <dc:date>2021-12-21T01:10:11Z</dc:date>
    </item>
    <item>
      <title>Re: Host Sweep</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/host-sweep/m-p/454736#M1438</link>
      <description>&lt;P&gt;Yes I agree with the&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/8083"&gt;@ymiyashita&lt;/a&gt;&amp;nbsp;it is tricky to get the right balance when applying the zone protection to any trusted zones, especially ones that have user internet traffic behind them as often applications will be trying to connect to any number of endpoints and normally the health of these is decided by pinging a port or an IP,&lt;/P&gt;&lt;P&gt;For instance PIA or private internet access pings pretty much all it's endpoints constantly to check if they are available and does this even if it is not switched on.&lt;/P&gt;&lt;P&gt;The only way to apply this is to, over time adjust the levels to the point where you have a baseline of normal volumes and then you can allow for anomalies&amp;nbsp; to activate the protections.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Dec 2021 15:53:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/host-sweep/m-p/454736#M1438</guid>
      <dc:creator>laurence64</dc:creator>
      <dc:date>2021-12-21T15:53:11Z</dc:date>
    </item>
  </channel>
</rss>

