<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Executable blocking on a network drive in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/executable-blocking-on-a-network-drive/m-p/589913#M2235</link>
    <description>&lt;P&gt;The directory path is: c:\server_services\shared\buy.exe.&lt;/P&gt;</description>
    <pubDate>Wed, 19 Jun 2024 15:07:55 GMT</pubDate>
    <dc:creator>aalfaro</dc:creator>
    <dc:date>2024-06-19T15:07:55Z</dc:date>
    <item>
      <title>Executable blocking on a network drive</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/executable-blocking-on-a-network-drive/m-p/589730#M2234</link>
      <description>&lt;P&gt;Cordial greetings&lt;/P&gt;
&lt;P&gt;Team&lt;/P&gt;
&lt;P&gt;Currently some users are trying to download an .exe file located in a server directory path.&lt;/P&gt;
&lt;P&gt;As I mentioned, the download is using the ms-ds-smbv3 protocol and is being stopped by the File-Blocking profile. We have performed the exclusion by creating a Category url (assuming the download was done by querying a URL) but evidently it did not work, as the location is on a network share c:\server_services_shared_drive.exe.&lt;/P&gt;
&lt;P&gt;How could the exclusion of this file only be done, as, I could do an eclusion by signature id 52020 but by doing this I am leaving a very large gap of excluding any .exe and we don't want that.&lt;/P&gt;
&lt;P&gt;I look forward to your comments and/or possible solutions.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 20:25:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/executable-blocking-on-a-network-drive/m-p/589730#M2234</guid>
      <dc:creator>aalfaro</dc:creator>
      <dc:date>2024-06-17T20:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: Executable blocking on a network drive</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/executable-blocking-on-a-network-drive/m-p/589913#M2235</link>
      <description>&lt;P&gt;The directory path is: c:\server_services\shared\buy.exe.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2024 15:07:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/executable-blocking-on-a-network-drive/m-p/589913#M2235</guid>
      <dc:creator>aalfaro</dc:creator>
      <dc:date>2024-06-19T15:07:55Z</dc:date>
    </item>
  </channel>
</rss>

