<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Mass unsubscribe in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/201420#M242</link>
    <description>&lt;P&gt;Wildfire can perform e-mail link following for analysis purposes if the firewall is configured to detect e-mail links within SMTP sessions.&amp;nbsp; If there was an e-mail campaign and Wildfire picked up the links within these e-mails for analysis it may have followed those links (clicked them) thereby resulting in unsubscription.&amp;nbsp; Without additional data I am only speculating at this point.&lt;/P&gt;</description>
    <pubDate>Tue, 20 Feb 2018 18:27:12 GMT</pubDate>
    <dc:creator>bvandivier</dc:creator>
    <dc:date>2018-02-20T18:27:12Z</dc:date>
    <item>
      <title>Mass unsubscribe</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/200805#M237</link>
      <description>&lt;P&gt;I work for an email marketing company.&amp;nbsp; We have a sender who sent out 3 separate emails blast to over 1 million contacts.&amp;nbsp; &amp;nbsp;They had a very high unsubscribe rate.&amp;nbsp; After our engineering&amp;nbsp;team looked at the logs, we see that all the unsubscribes happened&amp;nbsp;seconds apart but were all different domains.&amp;nbsp; We noticed that they were coming from these IP's&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;74.217.90.250 and 10.4.34.203.&amp;nbsp; After looking up I see that 74.217.90.250 is pointing to Palo Alto&amp;nbsp;Networks.&amp;nbsp; My question to you is, would your system do a mass unsubscribe if a scan&amp;nbsp;picked up&amp;nbsp;a&amp;nbsp;url&amp;nbsp;in an email as malware?&amp;nbsp; Thank you.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2018 00:08:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/200805#M237</guid>
      <dc:creator>NoyesJ</dc:creator>
      <dc:date>2018-02-16T00:08:17Z</dc:date>
    </item>
    <item>
      <title>Re: Mass unsubscribe</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/200919#M238</link>
      <description>&lt;P&gt;This is possible if your firewall is performing Wildfire inspection of email links.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Threat-Vulnerability-Articles/How-does-WildFire-handle-links-within-emails/ta-p/72628" target="_self"&gt;https://live.paloaltonetworks.com/t5/Threat-Vulnerability-Articles/How-does-WildFire-handle-links-within-emails/ta-p/72628&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the Wildfire Cloud receives e-mail links for analysis it will reach out and attempt to analyze the link and the content presented by cicking that link.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2018 15:56:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/200919#M238</guid>
      <dc:creator>bvandivier</dc:creator>
      <dc:date>2018-02-16T15:56:04Z</dc:date>
    </item>
    <item>
      <title>Re: Mass unsubscribe</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/201416#M239</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Would you be able to lookup URLs containing verticalresponse.com, vresp.com, vrmailer3.com to see if they've listed VerticalResponse as a company hosting malicious/phishing content? Or is there a PAN site we can go to and lookup URLs ourselves?&amp;nbsp; We want to make sure our urls&amp;nbsp;are not blacklisted.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2018 18:10:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/201416#M239</guid>
      <dc:creator>NoyesJ</dc:creator>
      <dc:date>2018-02-20T18:10:40Z</dc:date>
    </item>
    <item>
      <title>Re: Mass unsubscribe</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/201417#M240</link>
      <description>&lt;P&gt;You can test URL categorization at the following site/link:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://urlfiltering.paloaltonetworks.com/" target="_self"&gt;https://urlfiltering.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2018 18:12:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/201417#M240</guid>
      <dc:creator>bvandivier</dc:creator>
      <dc:date>2018-02-20T18:12:15Z</dc:date>
    </item>
    <item>
      <title>Re: Mass unsubscribe</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/201419#M241</link>
      <description>&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I have added both our URL and the sender who is having the mass global unsubscribe issue and I do not see their site or our site being listed with any issues.&amp;nbsp; I am still at a loss how our customer who sent an email to 1million contacts had over 30k unsubscribe from different domains all around the same time?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2018 18:21:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/201419#M241</guid>
      <dc:creator>NoyesJ</dc:creator>
      <dc:date>2018-02-20T18:21:07Z</dc:date>
    </item>
    <item>
      <title>Re: Mass unsubscribe</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/201420#M242</link>
      <description>&lt;P&gt;Wildfire can perform e-mail link following for analysis purposes if the firewall is configured to detect e-mail links within SMTP sessions.&amp;nbsp; If there was an e-mail campaign and Wildfire picked up the links within these e-mails for analysis it may have followed those links (clicked them) thereby resulting in unsubscription.&amp;nbsp; Without additional data I am only speculating at this point.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2018 18:27:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/201420#M242</guid>
      <dc:creator>bvandivier</dc:creator>
      <dc:date>2018-02-20T18:27:12Z</dc:date>
    </item>
    <item>
      <title>Re: Mass unsubscribe</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/201431#M244</link>
      <description>&lt;P&gt;What&lt;SPAN&gt;&amp;nbsp;additional information can I provide you with to help figure out this issue?&amp;nbsp; Would you be able to tell me if you have blacklisted this URL?&amp;nbsp;&lt;A href="http://cts.vresp.com" target="_blank"&gt;http://cts.vresp.com&lt;/A&gt; this is part of our unsubscribe link and we are seeing it associated with PAN in our log files.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2018 19:35:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/201431#M244</guid>
      <dc:creator>NoyesJ</dc:creator>
      <dc:date>2018-02-20T19:35:31Z</dc:date>
    </item>
    <item>
      <title>Re: Mass unsubscribe</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/201452#M245</link>
      <description>&lt;P&gt;We have not blacklisted&amp;nbsp;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=http-3A__cts.vresp.com&amp;amp;d=DwMCaQ&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=EshB_9z6WSADHJPb6XmqrITXa7K3NSSLsEHovZO5NwM&amp;amp;m=ZNzzMw2fCCYe-nhXIQSeAt8zaOkSOCj4n9BRD5lYnvk&amp;amp;s=Z0Oj9RCFoLgYS_1Fy5XhvBWpsHy5oj4FWchWm5Vzy4c&amp;amp;e=" target="_blank" rel="nofollow noopener noreferrer"&gt;cts.vresp.com&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="editor-field"&gt;
&lt;TABLE class="fixed-pandora"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD align="right"&gt;&lt;LABEL for="URL"&gt;URL&lt;/LABEL&gt;&lt;/TD&gt;
&lt;TD&gt;cts.vresp.com&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;TABLE class="fixed-pandora"&gt;&lt;COLGROUP&gt;&lt;COL width="25%" /&gt;&lt;COL width="75%" /&gt;&lt;/COLGROUP&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD align="right"&gt;&lt;LABEL for="CategoryName"&gt;Category&lt;/LABEL&gt;&lt;/TD&gt;
&lt;TD&gt;Business and Economy&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD align="right"&gt;&lt;LABEL for="CategoryDesc"&gt;Description&lt;/LABEL&gt;&lt;/TD&gt;
&lt;TD&gt;Marketing, management, economics, and sites relating to entrepreneurship or running a business.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD align="right"&gt;&lt;LABEL for="CategoryExample"&gt;Example Sites&lt;/LABEL&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;A href="http://www.bothsidesofthetable.com/" target="_blank"&gt;www.bothsidesofthetable.com/&lt;/A&gt; , &lt;A href="http://www.ogilvy.com" target="_blank"&gt;www.ogilvy.com&lt;/A&gt; , &lt;A href="http://www.geisheker.com/" target="_blank"&gt;www.geisheker.com/&lt;/A&gt; , &lt;A href="http://www.imageworksstudio.com/" target="_blank"&gt;www.imageworksstudio.com/&lt;/A&gt; , &lt;A href="http://www.linearcreative.com/" target="_blank"&gt;www.linearcreative.com/&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD align="right"&gt;&lt;LABEL for="CategoryComment"&gt;Additional comments&lt;/LABEL&gt;&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Includes advertising and marketing firms. Should not include corporate websites as they should be categorized with their technology. Also shipping sites, such as fedex.com and ups.com.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suggest opening a support case with our TAC for deeper analysis of your issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2018 21:05:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/201452#M245</guid>
      <dc:creator>bvandivier</dc:creator>
      <dc:date>2018-02-20T21:05:13Z</dc:date>
    </item>
    <item>
      <title>Re: Mass unsubscribe</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/201478#M247</link>
      <description>&lt;P&gt;The problem may not be that it could have been blacklisted, but instead, it hasn't been whitelisted.&lt;/P&gt;
&lt;P&gt;It's possible the Palo Alto Networks firewall is extracting the elink and following it to test whether it's a safe link.&lt;/P&gt;
&lt;P&gt;The sole fact that it's following the link to test it is causing the unsubs. You should look into whitelisting the domain so that the firewalls' won't automatically follow your unsubs links. You can explore this option with Support.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2018 23:48:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mass-unsubscribe/m-p/201478#M247</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2018-02-20T23:48:43Z</dc:date>
    </item>
  </channel>
</rss>

