<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dynamic IP List import now failed in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/198886#M210</link>
    <description>&lt;P&gt;I am looking for more information and found the following for DNS, this is good stuff.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Threat-Vulnerability-Articles/What-are-suspicious-DNS-queries/ta-p/71454" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Threat-Vulnerability-Articles/What-are-suspicious-DNS-queries/ta-p/71454&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1)&amp;nbsp; The DNS list comes out daily and the IP lists come out daily - is there any overlap or is this IP list specifically only the things out there that do not have a DNS or Domain Name.&lt;/P&gt;&lt;P&gt;2) What are the High Risk IP Address List ? I see the note on the description is that just a IP addresses from other lists that are not in your Malicious list. I am trying to decide if it should be blocked. We will assume the Known Malicious IP Addresses are bad and block those.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a good detailed list of links I can look at for DNS ( AV and Wildfire) as well as the IP lists?&lt;/P&gt;</description>
    <pubDate>Mon, 05 Feb 2018 21:30:24 GMT</pubDate>
    <dc:creator>Retired Member</dc:creator>
    <dc:date>2018-02-05T21:30:24Z</dc:date>
    <item>
      <title>Dynamic IP List import now failed</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/198534#M203</link>
      <description>&lt;P&gt;I just have the two default PA dynamic IP lists, but they each only have roughly 100 IPs.&amp;nbsp; I would think there would be more than that but when I try to hit 'import now' it just fails.&amp;nbsp; Anyone shed some light on how these two lists work and how often they are updated.&amp;nbsp; And where can I verify that they have been being updated? I have active threat protection licenses.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 15:04:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/198534#M203</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2018-02-02T15:04:46Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IP List import now failed</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/198577#M204</link>
      <description>&lt;P&gt;Hello, the 'import now' failure for your pre-defined lists is an expected behavior.&amp;nbsp; These lists are not updated through a manual import now action.&amp;nbsp; The following can be found within the WebUI help pages of a PAN-OS device.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A name="ID0EORAQ" target="_blank"&gt;&lt;/A&gt;With an active Threat Prevention license, Palo Alto Networks® provides two Dynamic IP Lists: Palo Alto Networks - High risk IP addresses and Palo Alto Networks - Known malicious IP addresses. These feeds both contain malicious IP address entries, which you can use to block traffic from malicious hosts. The firewall receives daily updates for these feeds through antivirus content updates.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please also note that you cannot edit, delete, or clone these predefined lists.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We carefully evaluate what IP addresses should be included on a daily basis.&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;Due to the sharing and recycling of IP address, it is very hard to conclude that an IP address is malicious in all aspects. So for IP Blocklists, we only release those that have been manually verified.&amp;nbsp; We believe these have achieved reasonably good coverage.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 16:41:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/198577#M204</guid>
      <dc:creator>bvandivier</dc:creator>
      <dc:date>2018-02-02T16:41:12Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IP List import now failed</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/198578#M205</link>
      <description>&lt;P&gt;Thanks, so its safe to assume that the 100 or so IPs I currently have on that list is what PA currently believes to be malicious?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 16:43:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/198578#M205</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2018-02-02T16:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IP List import now failed</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/198579#M206</link>
      <description>&lt;P&gt;That is correct.&amp;nbsp; Other coverage for&amp;nbsp;&lt;SPAN&gt;malicious domains/IPs/URLs&lt;/SPAN&gt; is provided in the form of&amp;nbsp;&lt;SPAN&gt;Antivirus DNS signatures, Wildfire DNS signatures,&amp;nbsp;as well as PAN-DB URL Filtering malware, phishing, and command-and-control categories.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 16:49:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/198579#M206</guid>
      <dc:creator>bvandivier</dc:creator>
      <dc:date>2018-02-02T16:49:04Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IP List import now failed</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/198582#M207</link>
      <description>&lt;P&gt;I can get a list of the IPs on the dynamic list by running these two commands from the cli:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;request system external-list show type predefined-ip name panw-highrisk-ip-list&lt;/P&gt;&lt;P&gt;request system external-list show type predefined-ip name panw-known-ip-list&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is there a way to get a list of the URLs/IPS being blocked by the other PA policies?&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 17:09:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/198582#M207</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2018-02-02T17:09:18Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IP List import now failed</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/198584#M208</link>
      <description>&lt;P&gt;Q: I can get a list of the IPs on the dynamic list by running these two commands from the cli:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;request system external-list show type predefined-ip name panw-highrisk-ip-list&lt;/P&gt;
&lt;P&gt;request system external-list show type predefined-ip name panw-known-ip-list&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A: Yes, you can.&amp;nbsp; You can also click on each list within the WebUI from Objects &amp;gt; External Dynamic Lists &amp;gt; List Entries and Exceptions to view list entries.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Q: is there a way to get a list of the URLs/IPS being blocked by the other PA policies?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A: If by "other PA policies" you are referring to URLs/IPs blocked by other features such as AV DNS signatures, etc there is no single aggregated list.&amp;nbsp; Your best resource would be the Threat Vault&amp;nbsp;@ &lt;A href="https://threatvault.paloaltonetworks.com/" target="_self"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 17:25:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/198584#M208</guid>
      <dc:creator>bvandivier</dc:creator>
      <dc:date>2018-02-02T17:25:43Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IP List import now failed</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/198886#M210</link>
      <description>&lt;P&gt;I am looking for more information and found the following for DNS, this is good stuff.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Threat-Vulnerability-Articles/What-are-suspicious-DNS-queries/ta-p/71454" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Threat-Vulnerability-Articles/What-are-suspicious-DNS-queries/ta-p/71454&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1)&amp;nbsp; The DNS list comes out daily and the IP lists come out daily - is there any overlap or is this IP list specifically only the things out there that do not have a DNS or Domain Name.&lt;/P&gt;&lt;P&gt;2) What are the High Risk IP Address List ? I see the note on the description is that just a IP addresses from other lists that are not in your Malicious list. I am trying to decide if it should be blocked. We will assume the Known Malicious IP Addresses are bad and block those.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a good detailed list of links I can look at for DNS ( AV and Wildfire) as well as the IP lists?&lt;/P&gt;</description>
      <pubDate>Mon, 05 Feb 2018 21:30:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/198886#M210</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2018-02-05T21:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IP List import now failed</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/198888#M212</link>
      <description>&lt;P&gt;Hello, please see answers in line.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1)&amp;nbsp; The DNS list comes out daily and the IP lists come out daily - is there any overlap or is this IP list specifically only the things out there that do not have a DNS or Domain Name.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A: There should not be overlap between DNS signatures and IP lists.&amp;nbsp; DNS signatures are part of the daily Antivirus content releases.&amp;nbsp; You can review a list of new Spyware DNS C2 signatures by reviewing the release notes either from your firewall via Device &amp;gt; Dynamic Updates &amp;gt; Antirivus &amp;gt; release notes or via our Threat Vault&amp;nbsp;@ &lt;A href="https://threatvault.paloaltonetworks.com" target="_self"&gt;https://threatvault.paloaltonetworks.com&lt;/A&gt;.&amp;nbsp; You may also access release notes from the Dynamic Updates section of &lt;A href="https://support.paloaltonetworks.com" target="_self"&gt;https://support.paloaltonetworks.com&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) What are the High Risk IP Address List ? I see the note on the description is that just a IP addresses from other lists that are not in your Malicious list. I am trying to decide if it should be blocked. We will assume the Known Malicious IP Addresses are bad and block those.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Featured-Articles/PAN-OS-8-0-IP-Block-List-Feeds/ta-p/129616" target="_self"&gt;A:&amp;nbsp;https://live.paloaltonetworks.com/t5/Featured-Articles/PAN-OS-8-0-IP-Block-List-Feeds/ta-p/129616&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Palo Alto Networks - High-risk IP addresses:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;This list includes IP addresses that have recently been featured in threat activity advisories distributed by high-trust organizations; however Palo Alto Networks does not have direct evidence of maliciousness.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a good detailed list of links I can look at for DNS ( AV and Wildfire) as well as the IP lists?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A: I recommend using content (AV and Wildfire) release notes as well as our Threat Vault as previously mentioned.&amp;nbsp; The IP lists can be viewed from your device using the commands previously discussed in this thread.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Feb 2018 21:44:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/198888#M212</guid>
      <dc:creator>bvandivier</dc:creator>
      <dc:date>2018-02-05T21:44:17Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IP List import now failed</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/199459#M224</link>
      <description>&lt;P&gt;Can someone tell me the best way to use these feeds from PA?&amp;nbsp; Should I have a specifc outbound rule referrencing these lists as destination addresses and deny'ing all traffic outbond ?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Like so:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pa-denylist.JPG" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13698i0E02259249631374/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="pa-denylist.JPG" alt="pa-denylist.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 21:55:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/199459#M224</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2018-02-07T21:55:16Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IP List import now failed</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/199467#M225</link>
      <description>&lt;P&gt;Our recommendations are detailed in the PAN-OS 8.0 new feature guide.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/newfeaturesguide/content-inspection-features/palo-alto-networks-malicious-ip-address-feeds#id254cbc8e-9c61-42f6-a0f1-91bd2c8f74f9" target="_self"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/newfeaturesguide/content-inspection-features/palo-alto-networks-malicious-ip-address-feeds#id254cbc8e-9c61-42f6-a0f1-91bd2c8f74f9&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 21:58:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/199467#M225</guid>
      <dc:creator>bvandivier</dc:creator>
      <dc:date>2018-02-07T21:58:38Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IP List import now failed</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/199468#M226</link>
      <description>&lt;P&gt;The recommendation is to use EDL's&amp;nbsp;in two separate rules.&lt;/P&gt;
&lt;P&gt;One to cover connections going out to the bad IP's&lt;/P&gt;
&lt;P&gt;One to cover connections coming from the bad IP's.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 22:06:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/199468#M226</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2018-02-07T22:06:14Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IP List import now failed</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/199470#M227</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ok, so I add another rule and will end up with 2 rules:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. trust to untrust w/those 2 lists as destination&lt;/P&gt;&lt;P&gt;2. untrust to trust w/those 2 lists as source&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 22:12:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/199470#M227</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2018-02-07T22:12:15Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IP List import now failed</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/199759#M228</link>
      <description>&lt;P&gt;Next question, can someone help me create report to referrence these two policies?&amp;nbsp; I just want to know if its getting hits and if so from where, how many, time, etc..&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2018 15:08:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/199759#M228</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2018-02-09T15:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IP List import now failed</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/199788#M229</link>
      <description>&lt;P&gt;Assuming you will be doing this locally on your firewall (not Panorama) the steps are somewhat straightforward.&amp;nbsp; There are several community articles and videos on the subject.&amp;nbsp; Of course, you will also need to enable logging on the relevant security policy rules as well before you will have any log data to run reports against.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Tutorials/Getting-Started-Custom-Reports/ta-p/69951" target="_self"&gt;https://live.paloaltonetworks.com/t5/Tutorials/Getting-Started-Custom-Reports/ta-p/69951&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/Create-a-Custom-Report/ta-p/55143" target="_self"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/Create-a-Custom-Report/ta-p/55143&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Create-and-Schedule-a-Custom-Report/ta-p/57442" target="_self"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Create-and-Schedule-a-Custom-Report/ta-p/57442&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You'll want to build something similar to the example report below but you will need to play with it until you're capturing exactly what you'd like.&amp;nbsp; Please be sure to include a query&amp;nbsp;to match on the relevant security policy rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-02-09 at 10.04.21 AM.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13759i9AA0291929D8E298/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-02-09 at 10.04.21 AM.png" alt="Screen Shot 2018-02-09 at 10.04.21 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are the set commands from my example report:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;set shared reports IPBL-Report type traffic sortby repeatcnt&lt;BR /&gt;set shared reports IPBL-Report type traffic group-by day-of-receive_time&lt;BR /&gt;set shared reports IPBL-Report type traffic aggregate-by [ rule from src sport srcloc to dst dport dstloc action ]&lt;BR /&gt;set shared reports IPBL-Report type traffic values repeatcnt&lt;BR /&gt;set shared reports IPBL-Report period last-24-hrs&lt;BR /&gt;set shared reports IPBL-Report topn 100&lt;BR /&gt;set shared reports IPBL-Report topm 50&lt;BR /&gt;set shared reports IPBL-Report caption IPBL-Report&lt;BR /&gt;set shared reports IPBL-Report query "(rule eq 'example IPBL rule 1') or (rule eq 'example IPBL rule 2')"&lt;BR /&gt;set shared reports IPBL-Report description "PAN Dynamic IP Lists"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And the XML:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;reports {&lt;BR /&gt; IPBL-Report {&lt;BR /&gt; type {&lt;BR /&gt; traffic {&lt;BR /&gt; sortby repeatcnt;&lt;BR /&gt; group-by day-of-receive_time;&lt;BR /&gt; aggregate-by [ rule from src sport srcloc to dst dport dstloc action];&lt;BR /&gt; values repeatcnt;&lt;BR /&gt; }&lt;BR /&gt; }&lt;BR /&gt; period last-24-hrs;&lt;BR /&gt; topn 100;&lt;BR /&gt; topm 50;&lt;BR /&gt; caption IPBL-Report;&lt;BR /&gt; query "(rule eq 'example IPBL rule 1') or (rule eq 'example IPBL rule 2')";&lt;BR /&gt; description "PAN Dynamic IP Lists";&lt;BR /&gt; }&lt;BR /&gt;}&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2018 16:16:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/199788#M229</guid>
      <dc:creator>bvandivier</dc:creator>
      <dc:date>2018-02-09T16:16:56Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IP List import now failed</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/205463#M274</link>
      <description>&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I created the report locally on an HA pair that has the two rules configured and ran it for the past 24 hours but got 'No matching records.'&amp;nbsp; &amp;nbsp;So to test I sent some traffic to one of the IPs on the list and ran the report again and it worked:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;Day Received	Rule	Source Zone	Source address	Source Host Name	Source Port	Source Country	Destination Zone	Destination address	Destination Host Name	Destination Country	Destination Port	Action
Wed, Mar 14, 2018	outbound-PA-dynamic-BLOCK	trust	10.102.20.55	*******	0	10.0.0.0-10.255.255.255	untrust	183.81.171.242	183.81.171.242	Mongolia	0	deny&lt;/PRE&gt;&lt;P&gt;Thanks a ton bvandivier!&amp;nbsp; One last question, where can I grab the XML of those reports so I can load into another PA?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Mar 2018 20:27:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/205463#M274</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2018-03-14T20:27:32Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic IP List import now failed</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/205830#M277</link>
      <description>&lt;P&gt;"&lt;STRONG&gt;Palo Alto Networks - High-risk IP addresses:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;This list includes IP addresses that have recently been featured in threat activity advisories distributed by high-trust organizations"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is there a list of these high-trust organizations available?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Mar 2018 04:20:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dynamic-ip-list-import-now-failed/m-p/205830#M277</guid>
      <dc:creator>JimMcGrady</dc:creator>
      <dc:date>2018-03-16T04:20:04Z</dc:date>
    </item>
  </channel>
</rss>

