<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Connection to self.events.data.microsoft.com/OneCollector/1.0/ is flagged as log4j in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/connection-to-self-events-data-microsoft-com-onecollector-1-0-is/m-p/464056#M1490</link>
    <description>&lt;P&gt;Thank you so so much. This answer was very very useful to me.&lt;/P&gt;&lt;P class="lia-align-right"&gt;&lt;A href="https://friday-nightfunkin.com" target="_self"&gt;&lt;FONT size="1 2 3 4 5 6 7" color="#FFFFFF"&gt;friday night funkin&lt;/FONT&gt;&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 08 Feb 2022 03:25:43 GMT</pubDate>
    <dc:creator>mikalozano</dc:creator>
    <dc:date>2022-02-08T03:25:43Z</dc:date>
    <item>
      <title>Connection to self.events.data.microsoft.com/OneCollector/1.0/ is flagged as log4j</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/connection-to-self-events-data-microsoft-com-onecollector-1-0-is/m-p/458167#M1460</link>
      <description>&lt;P data-unlink="true"&gt;Hi, anybody knows why connection to&amp;nbsp;&lt;STRONG&gt;self.events.data.microsoft.com/OneCollector/1.0/&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;is being flagged as log4j by Palo Alto firewall?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Threat:&amp;nbsp;Apache Log4j Remote Code Execution Vulnerability(92004)&lt;/P&gt;&lt;P&gt;Threat ID:&amp;nbsp;92004&lt;/P&gt;&lt;P&gt;Threat Category: code-execution&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe this is telemetry from Microsoft products, probably MS Office. Appreciate if anybody can help to explain.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jan 2022 05:28:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/connection-to-self-events-data-microsoft-com-onecollector-1-0-is/m-p/458167#M1460</guid>
      <dc:creator>Zakuan</dc:creator>
      <dc:date>2022-01-12T05:28:53Z</dc:date>
    </item>
    <item>
      <title>Re: Connection to self.events.data.microsoft.com/OneCollector/1.0/ is flagged as log4j</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/connection-to-self-events-data-microsoft-com-onecollector-1-0-is/m-p/458717#M1462</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Palo will just be recognising a certain pattern of traffic leaving the device to an untrusted network, this traffic obviously matches that and it is flagging, according to Alienvault here&amp;nbsp;&lt;A href="https://otx.alienvault.com/indicator/hostname/self.events.data.microsoft.com" target="_blank" rel="noopener"&gt;https://otx.alienvault.com/indicator/hostname/self.events.data.microsoft.com&lt;/A&gt;&amp;nbsp;you are correct and this is a benign site, if this is causing you issues with logging or indeed connectivity, you could bypass that url as a trusted entity.&lt;/P&gt;&lt;P&gt;However I should also say that although it is whitelisted, you should check further to confirm that the hosts the traffic is coming from are expected, not Linux servers for instance, and then only tune it out for those hosts if you are completely sure that is the best thing to do, Alienvault also shows that some malicious files have been seen on that URL and this is fairly normal for telemetry URL's as hacker will always try and get stuff across "trusted" or default connectivity.&lt;/P&gt;&lt;P&gt;As always don't whitelist anything like this unless you are sure, I am not aware of your environment and so would never say to do it on my say so!&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 09:08:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/connection-to-self-events-data-microsoft-com-onecollector-1-0-is/m-p/458717#M1462</guid>
      <dc:creator>laurence64</dc:creator>
      <dc:date>2022-01-14T09:08:55Z</dc:date>
    </item>
    <item>
      <title>Re: Connection to self.events.data.microsoft.com/OneCollector/1.0/ is flagged as log4j</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/connection-to-self-events-data-microsoft-com-onecollector-1-0-is/m-p/464056#M1490</link>
      <description>&lt;P&gt;Thank you so so much. This answer was very very useful to me.&lt;/P&gt;&lt;P class="lia-align-right"&gt;&lt;A href="https://friday-nightfunkin.com" target="_self"&gt;&lt;FONT size="1 2 3 4 5 6 7" color="#FFFFFF"&gt;friday night funkin&lt;/FONT&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 03:25:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/connection-to-self-events-data-microsoft-com-onecollector-1-0-is/m-p/464056#M1490</guid>
      <dc:creator>mikalozano</dc:creator>
      <dc:date>2022-02-08T03:25:43Z</dc:date>
    </item>
  </channel>
</rss>

