<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic UltraSurf 18.02 in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ultrasurf-18-02/m-p/215542#M337</link>
    <description>&lt;P&gt;Hi, I´m getting some trouble trying to block ultrasurf. First i blocked it with App-ID and everything was ok, until some users of the internal network downloaded a new version to avoid URL-filtering.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Summary of log&lt;/P&gt;&lt;P&gt;Application:SSL&lt;/P&gt;&lt;P&gt;Category:Unknown&lt;/P&gt;&lt;P&gt;NAT Port: 443&lt;/P&gt;&lt;P&gt;IP protocol: tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can´t block SSL or Unknown category because we have an active GlobalProtect VPN,&amp;nbsp; our exchange server and our DVR´s share the same category.&lt;/P&gt;&lt;P&gt;The traffic is detected as Suspicious TLS Evasion found, is using the same ID (threatid eq 14978) our exchange Active Sync server is using and we can´t lose that service. Is there any other way of block it using palo alto? I was thinking in using QoS but that would affect our GlobalProtect users, they often need to transfer big files to the internal network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;</description>
    <pubDate>Fri, 25 May 2018 23:02:29 GMT</pubDate>
    <dc:creator>Sanoviv_Medicis</dc:creator>
    <dc:date>2018-05-25T23:02:29Z</dc:date>
    <item>
      <title>UltraSurf 18.02</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ultrasurf-18-02/m-p/215542#M337</link>
      <description>&lt;P&gt;Hi, I´m getting some trouble trying to block ultrasurf. First i blocked it with App-ID and everything was ok, until some users of the internal network downloaded a new version to avoid URL-filtering.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Summary of log&lt;/P&gt;&lt;P&gt;Application:SSL&lt;/P&gt;&lt;P&gt;Category:Unknown&lt;/P&gt;&lt;P&gt;NAT Port: 443&lt;/P&gt;&lt;P&gt;IP protocol: tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can´t block SSL or Unknown category because we have an active GlobalProtect VPN,&amp;nbsp; our exchange server and our DVR´s share the same category.&lt;/P&gt;&lt;P&gt;The traffic is detected as Suspicious TLS Evasion found, is using the same ID (threatid eq 14978) our exchange Active Sync server is using and we can´t lose that service. Is there any other way of block it using palo alto? I was thinking in using QoS but that would affect our GlobalProtect users, they often need to transfer big files to the internal network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;</description>
      <pubDate>Fri, 25 May 2018 23:02:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ultrasurf-18-02/m-p/215542#M337</guid>
      <dc:creator>Sanoviv_Medicis</dc:creator>
      <dc:date>2018-05-25T23:02:29Z</dc:date>
    </item>
    <item>
      <title>Re: UltraSurf 18.02</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ultrasurf-18-02/m-p/216131#M342</link>
      <description>&lt;P&gt;Please open a case with Support, we can work with our developers to ensure that our App-ID signature is updated.&lt;/P&gt;</description>
      <pubDate>Thu, 31 May 2018 16:29:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ultrasurf-18-02/m-p/216131#M342</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2018-05-31T16:29:46Z</dc:date>
    </item>
    <item>
      <title>Re: UltraSurf 18.02</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ultrasurf-18-02/m-p/223611#M366</link>
      <description>&lt;P&gt;I found another way to block it. In the domain controller, at group policy managment in software restriction Policies had to block a RND extension. Ultrasurf create a PUTTY.RND in the profile of the user in C:\Users\USERNAME . If you block that file the program stop working.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 00:23:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ultrasurf-18-02/m-p/223611#M366</guid>
      <dc:creator>Sanoviv_Medicis</dc:creator>
      <dc:date>2018-07-26T00:23:19Z</dc:date>
    </item>
  </channel>
</rss>

