<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Vulnerability: Microsoft Windows RPC Encrypted Data Detected Mean??? in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-microsoft-windows-rpc-encrypted-data-detected-mean/m-p/469029#M1521</link>
    <description>&lt;P&gt;hi;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to remove this message:&amp;nbsp;Microsoft Windows RPC Encrypted Data Detected from a windows 10 computer that palo alto always report this type of thread???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Whats mean&amp;nbsp;Microsoft Windows RPC Encrypted Data Detected???&lt;/P&gt;</description>
    <pubDate>Sun, 27 Feb 2022 13:18:43 GMT</pubDate>
    <dc:creator>ALEX_RCM</dc:creator>
    <dc:date>2022-02-27T13:18:43Z</dc:date>
    <item>
      <title>Vulnerability: Microsoft Windows RPC Encrypted Data Detected Mean???</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-microsoft-windows-rpc-encrypted-data-detected-mean/m-p/469029#M1521</link>
      <description>&lt;P&gt;hi;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to remove this message:&amp;nbsp;Microsoft Windows RPC Encrypted Data Detected from a windows 10 computer that palo alto always report this type of thread???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Whats mean&amp;nbsp;Microsoft Windows RPC Encrypted Data Detected???&lt;/P&gt;</description>
      <pubDate>Sun, 27 Feb 2022 13:18:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-microsoft-windows-rpc-encrypted-data-detected-mean/m-p/469029#M1521</guid>
      <dc:creator>ALEX_RCM</dc:creator>
      <dc:date>2022-02-27T13:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability: Microsoft Windows RPC Encrypted Data Detected Mean???</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-microsoft-windows-rpc-encrypted-data-detected-mean/m-p/509244#M1704</link>
      <description>&lt;P&gt;In addition to the explanation that Rodgerfoster provided above, I add some comments here.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;This signature triggers when it sees encrypted MSRPC traffic, which can be used for evasion but also can be used legitimately. Thus, the severity is 'low' and the default action set to 'alert'.&lt;/P&gt;
&lt;P&gt;Here's the description of the signature.&lt;BR /&gt;&lt;A href="https://threatvault.paloaltonetworks.com/?query=33836&amp;amp;type=" target="_self"&gt;https://threatvault.paloaltonetworks.com/?query=33836&amp;amp;type=&lt;/A&gt;&lt;BR /&gt;&lt;EM&gt;"This signature indicates that encrypted MSRPC data is seen. Though, encrypted traffic is sometimes used, it is also seen in cases of evasion. Attackers could use the technique to evade IPS boxes and thus sneak MSRPC exploits."&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;With this type of signature, I'd suggest to review the traffic (traffic log, etc) to see if it's known traffic. If you think that your traffic is legitimate, you can add a threat exception for this signature 33836.&lt;/P&gt;
&lt;P&gt;References:&lt;BR /&gt;HOW TO CREATE A VULNERABILITY EXCEPTION&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm4yCAC" target="_self"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm4yCAC&lt;/A&gt;&lt;BR /&gt;WHAT IS THE BEHAVIOR WHEN IP ADDRESS/S ARE ADDED UNDER "IP-ADDRESS-EXEMPTIONS" FOR SPYWARE/THREAT EXCEPTION?&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UscCAE" target="_self"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UscCAE&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are unsure if the traffic is legitimate or not, you can collect some data and check with Palo Alto Networks support.&lt;BR /&gt;HOW TO SUBMIT A VULNERABILITY SIGNATURE FALSE POSITIVE&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSBCA0" target="_self"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSBCA0&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2022 02:01:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-microsoft-windows-rpc-encrypted-data-detected-mean/m-p/509244#M1704</guid>
      <dc:creator>ymiyashita</dc:creator>
      <dc:date>2022-07-19T02:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability: Microsoft Windows RPC Encrypted Data Detected Mean???</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-microsoft-windows-rpc-encrypted-data-detected-mean/m-p/524231#M1809</link>
      <description>&lt;P&gt;Was a proper secure solution ever found? Creating an exclusion when the destination is your domain controllers isn't really safe.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2022 14:41:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-microsoft-windows-rpc-encrypted-data-detected-mean/m-p/524231#M1809</guid>
      <dc:creator>eumbach</dc:creator>
      <dc:date>2022-12-15T14:41:08Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability: Microsoft Windows RPC Encrypted Data Detected Mean???</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-microsoft-windows-rpc-encrypted-data-detected-mean/m-p/524865#M1815</link>
      <description>&lt;P&gt;"&lt;SPAN&gt;Though, encrypted traffic is sometimes used"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Like Clients talking to a Domain Controller?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are there any recommended exclusions? Known False Positives?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Right now, we are looking to have to disable this on the Client VPN and all East/West Traffic to DC's which seems pretty large.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2022 14:49:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-microsoft-windows-rpc-encrypted-data-detected-mean/m-p/524865#M1815</guid>
      <dc:creator>eumbach</dc:creator>
      <dc:date>2022-12-22T14:49:45Z</dc:date>
    </item>
  </channel>
</rss>

