<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IP blcoking on ip scan in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ip-blcoking-on-ip-scan/m-p/200569#M232</link>
    <description>&lt;P&gt;Some Threat IDs such as Brute Force related signatures do block based on time attributes.&amp;nbsp; Multiple examples are listed in the following article.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Threat-Vulnerability-Articles/Brute-Force-Signature-and-Related-Trigger-Conditions/ta-p/52284" target="_self"&gt;https://live.paloaltonetworks.com/t5/Threat-Vulnerability-Articles/Brute-Force-Signature-and-Related-Trigger-Conditions/ta-p/52284&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, the Reconnaisance Protection section of a Zone Protection profile can enforce blocking based on scan activity as can DoS Protection as well.&amp;nbsp; More info can be found here.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Tech-Note-Articles/Understanding-DoS-Protection/ta-p/54562?attachment-id=1085" target="_self"&gt;https://live.paloaltonetworks.com/t5/Tech-Note-Articles/Understanding-DoS-Protection/ta-p/54562?attachment-id=1085&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 14 Feb 2018 22:27:28 GMT</pubDate>
    <dc:creator>bvandivier</dc:creator>
    <dc:date>2018-02-14T22:27:28Z</dc:date>
    <item>
      <title>IP blcoking on ip scan</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ip-blcoking-on-ip-scan/m-p/200568#M231</link>
      <description>&lt;P&gt;I wonder if there is dynamic blocking IP if on short period of time that IP did ip scan or try the same vulnerability attack on our IP range, becuse the attack was once on each policy rule it doesn't reach the vulnerability protection limit for blocking the IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So if the monitor logs show the same IP on diffrerent policy rules in short period it will do IP block for 30/60 min.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;maybe I miss something or it is something they can think about on new versions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;SShnap&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2018 22:15:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ip-blcoking-on-ip-scan/m-p/200568#M231</guid>
      <dc:creator>SShnap</dc:creator>
      <dc:date>2018-02-14T22:15:39Z</dc:date>
    </item>
    <item>
      <title>Re: IP blcoking on ip scan</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ip-blcoking-on-ip-scan/m-p/200569#M232</link>
      <description>&lt;P&gt;Some Threat IDs such as Brute Force related signatures do block based on time attributes.&amp;nbsp; Multiple examples are listed in the following article.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Threat-Vulnerability-Articles/Brute-Force-Signature-and-Related-Trigger-Conditions/ta-p/52284" target="_self"&gt;https://live.paloaltonetworks.com/t5/Threat-Vulnerability-Articles/Brute-Force-Signature-and-Related-Trigger-Conditions/ta-p/52284&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, the Reconnaisance Protection section of a Zone Protection profile can enforce blocking based on scan activity as can DoS Protection as well.&amp;nbsp; More info can be found here.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Tech-Note-Articles/Understanding-DoS-Protection/ta-p/54562?attachment-id=1085" target="_self"&gt;https://live.paloaltonetworks.com/t5/Tech-Note-Articles/Understanding-DoS-Protection/ta-p/54562?attachment-id=1085&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2018 22:27:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ip-blcoking-on-ip-scan/m-p/200569#M232</guid>
      <dc:creator>bvandivier</dc:creator>
      <dc:date>2018-02-14T22:27:28Z</dc:date>
    </item>
    <item>
      <title>Re: IP blcoking on ip scan</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ip-blcoking-on-ip-scan/m-p/200579#M233</link>
      <description>&lt;P&gt;Depending on how the scan was performed, it could have also triggered Host Sweep, TCP Port Scan or UDP Port Scan Reconnaissance protections in Zone Protection. Check the Threat Logs for any entries related to type (if i remember correctly) 'scan'.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the activity triggered a Network Flood protection you would find Threat Log entries with log type 'flood'.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2018 23:08:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ip-blcoking-on-ip-scan/m-p/200579#M233</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2018-02-14T23:08:42Z</dc:date>
    </item>
    <item>
      <title>Re: IP blcoking on ip scan</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ip-blcoking-on-ip-scan/m-p/200580#M234</link>
      <description>&lt;P&gt;thank you for the reply&lt;/P&gt;&lt;P&gt;I'm femilier with "&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;SPAN class="lia-link-navigation blog-article-link lia-link-disabled"&gt;Brute Force Signature&lt;/SPAN&gt;" but it only block IP when they hit the same policy rule or same destination according to out you configure (10 times for 60 sec).&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;It's not working when attacker is doing the same attack on IP range so he hits one or twice on each IP and the rule isn't sense that traffic to alert or block.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2018 23:09:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ip-blcoking-on-ip-scan/m-p/200580#M234</guid>
      <dc:creator>SShnap</dc:creator>
      <dc:date>2018-02-14T23:09:48Z</dc:date>
    </item>
    <item>
      <title>Re: IP blcoking on ip scan</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ip-blcoking-on-ip-scan/m-p/200724#M235</link>
      <description>&lt;P&gt;Understood, in which case Zone Protection and/or DoS Protection would be the appropriate features to leverage.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Feb 2018 16:04:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ip-blcoking-on-ip-scan/m-p/200724#M235</guid>
      <dc:creator>bvandivier</dc:creator>
      <dc:date>2018-02-15T16:04:24Z</dc:date>
    </item>
    <item>
      <title>Re: IP blcoking on ip scan</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ip-blcoking-on-ip-scan/m-p/200735#M236</link>
      <description>&lt;P&gt;OK I will try to enable the zone protection on the DMZ and track the logs.&lt;/P&gt;&lt;P&gt;I enable flood protection SYN, ICMP, UDP, Other IP, increase the activate threshold so I can get alerting without activating the drop action.&lt;/P&gt;&lt;P&gt;Under Reconnaissance protection I enable all three and set the action to alert.&lt;/P&gt;&lt;P&gt;I also enable the packet based attack protection as best practice followed:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/threat-prevention/best-practices-for-securing-your-network-from-layer-4-and-layer-7-evasions" target="_self"&gt;https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/threat-prevention/best-practices-for-securing-your-network-from-layer-4-and-layer-7-evasions&lt;/A&gt;&lt;/P&gt;&lt;P&gt;hope to see result after tuning.&lt;/P&gt;&lt;P&gt;Thank you all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Feb 2018 16:53:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ip-blcoking-on-ip-scan/m-p/200735#M236</guid>
      <dc:creator>SShnap</dc:creator>
      <dc:date>2018-02-15T16:53:31Z</dc:date>
    </item>
  </channel>
</rss>

