<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking SMB Traffic in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/213454#M328</link>
    <description>&lt;P&gt;They are not mutually exclusive. You can do both. Just leave the rule where you define application SMB, set to application 'any', so if SMB is used evasively through different ports, it can also be blocked.&lt;/P&gt;</description>
    <pubDate>Mon, 07 May 2018 18:15:33 GMT</pubDate>
    <dc:creator>mivaldi</dc:creator>
    <dc:date>2018-05-07T18:15:33Z</dc:date>
    <item>
      <title>Blocking SMB Traffic</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/213356#M327</link>
      <description>&lt;P&gt;I was doing a review of some firewall policies and noticed the company I am consulting for is allowing all applications risk 1 through 3 from their trust to untrust zones.&amp;nbsp; Not sure why it's setup that way yet, but in doing so, SMB traffic is alllowed out.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to immediately put a control in that blocks SMB traffic outbound. Is it recommended to create the policy using only ports, tcp/udp port 445, or should I block via SMB application?&amp;nbsp; &amp;nbsp;My thought is block via ports, but I'll do whatever is the recommended way.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What about tcp/udp port 137 and 139?&amp;nbsp; Should these also be added to the blocked 'from trust to untrust' rule?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm curious to what you all are doing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 03:43:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/213356#M327</guid>
      <dc:creator>ce1028</dc:creator>
      <dc:date>2018-05-07T03:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking SMB Traffic</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/213454#M328</link>
      <description>&lt;P&gt;They are not mutually exclusive. You can do both. Just leave the rule where you define application SMB, set to application 'any', so if SMB is used evasively through different ports, it can also be blocked.&lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 18:15:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/213454#M328</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2018-05-07T18:15:33Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking SMB Traffic</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/213499#M329</link>
      <description>&lt;P&gt;Not sure I'm following your response. Do you mean if you choose SMB for application, set the Service to Any?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it common practice to create multiple rules to block SMB?&lt;/P&gt;</description>
      <pubDate>Tue, 08 May 2018 00:05:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/213499#M329</guid>
      <dc:creator>ce1028</dc:creator>
      <dc:date>2018-05-08T00:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking SMB Traffic</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/213500#M330</link>
      <description>&lt;P&gt;Yes, SMB for application, Service to Any.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not sure what common practice is, but some environments require that *no* packets leave out on specific ports.&lt;/P&gt;
&lt;P&gt;The app-id engine needs to allow a few packets through before it identifies the application, so if you go solely with an app-id rule, a few packets will always leave the firewall before there's a block action enforced.&lt;/P&gt;</description>
      <pubDate>Tue, 08 May 2018 00:09:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/213500#M330</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2018-05-08T00:09:25Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking SMB Traffic</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/213825#M331</link>
      <description>&lt;P&gt;thanks. what method do you use on your firewalls (if you don't mind me asking)&lt;/P&gt;</description>
      <pubDate>Wed, 09 May 2018 22:44:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/213825#M331</guid>
      <dc:creator>ce1028</dc:creator>
      <dc:date>2018-05-09T22:44:54Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking SMB Traffic</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/213836#M332</link>
      <description>&lt;P&gt;I'm with Palo Alto Networks Support, so I will allow other members of the community to provide&amp;nbsp;that answer.&lt;/P&gt;</description>
      <pubDate>Wed, 09 May 2018 23:52:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/213836#M332</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2018-05-09T23:52:43Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking SMB Traffic</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/213946#M333</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We have a strict deny all allow by exception policy at our company. So we only allow appplications/ports/urls etc., based on approval from the executives. If you are looking to block traffic, start with the logs and see what is being allowed out and start blocking on it. The ACC tab can help you with this as well.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for writing policies, I try to use applications rather than actual ports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 17:41:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/213946#M333</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-05-10T17:41:39Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking SMB Traffic</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/214094#M334</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The&amp;nbsp;deny all, allow by exception would be ideal. Possibly can convince that for the future.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Right now, I want to focus only on blocking SMB&lt;/P&gt;</description>
      <pubDate>Sat, 12 May 2018 18:59:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/214094#M334</guid>
      <dc:creator>ce1028</dc:creator>
      <dc:date>2018-05-12T18:59:33Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking SMB Traffic</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/217234#M345</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Risk 1 through 3 from their trust to untrust zones is not a great way to allow traffic to the Internet.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;There are 58 pages of applications when I look at this on my firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I found this out the hard way when someone set this up for our guest networks and we had a big netbios attacks launch from a rogue machine on our network.&amp;nbsp; &amp;nbsp;Whittle it down to what you actually need.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jun 2018 19:48:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/blocking-smb-traffic/m-p/217234#M345</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2018-06-08T19:48:30Z</dc:date>
    </item>
  </channel>
</rss>

