<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Threat blocked by Palo Alto: Is there anything else to do? in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-blocked-by-palo-alto-is-there-anything-else-to-do/m-p/228366#M383</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When the Palo Alto blocks a communication that is flags as a threat (ie: SQL Injection, XSS, etc.), should we investigate the target IP to make sure that the threat was blocked? The reason I'm asking is that whenever the Palo Alto blocks an attack from an IP address (Session End Reason is "threat"), if we go in the "Traffic" view, we can see that not all the communications with that offending IP were terminated with a "threat" reason. Some of them are terminated by "tcp-rst-from-client" or "tcp-rst-both". In that case, I'm wondering if part of the attack (or payload) could have gone through to the destination IP before the Palo Alto stopped it. Are these connections expected and there should be nothing to worry about, or should we still investigate?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
    <pubDate>Mon, 27 Aug 2018 14:15:01 GMT</pubDate>
    <dc:creator>yschinck</dc:creator>
    <dc:date>2018-08-27T14:15:01Z</dc:date>
    <item>
      <title>Threat blocked by Palo Alto: Is there anything else to do?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-blocked-by-palo-alto-is-there-anything-else-to-do/m-p/228366#M383</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When the Palo Alto blocks a communication that is flags as a threat (ie: SQL Injection, XSS, etc.), should we investigate the target IP to make sure that the threat was blocked? The reason I'm asking is that whenever the Palo Alto blocks an attack from an IP address (Session End Reason is "threat"), if we go in the "Traffic" view, we can see that not all the communications with that offending IP were terminated with a "threat" reason. Some of them are terminated by "tcp-rst-from-client" or "tcp-rst-both". In that case, I'm wondering if part of the attack (or payload) could have gone through to the destination IP before the Palo Alto stopped it. Are these connections expected and there should be nothing to worry about, or should we still investigate?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Aug 2018 14:15:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-blocked-by-palo-alto-is-there-anything-else-to-do/m-p/228366#M383</guid>
      <dc:creator>yschinck</dc:creator>
      <dc:date>2018-08-27T14:15:01Z</dc:date>
    </item>
    <item>
      <title>Re: Threat blocked by Palo Alto: Is there anything else to do?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-blocked-by-palo-alto-is-there-anything-else-to-do/m-p/231211#M408</link>
      <description>&lt;P&gt;Bump.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Should I just create a ticket and ask that question to the support directly...?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 12:48:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-blocked-by-palo-alto-is-there-anything-else-to-do/m-p/231211#M408</guid>
      <dc:creator>yschinck</dc:creator>
      <dc:date>2018-09-18T12:48:43Z</dc:date>
    </item>
    <item>
      <title>Re: Threat blocked by Palo Alto: Is there anything else to do?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-blocked-by-palo-alto-is-there-anything-else-to-do/m-p/231223#M409</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I would investigate, but it doesnt mean that thigns were compromised. It could have just been a scan and some of the traffic was allowed and some got blocked. While not always a good indicator, you have to look at all the traffic holistically, I look at the amount of data transferred, was it a large amount or small.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 14:15:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/threat-blocked-by-palo-alto-is-there-anything-else-to-do/m-p/231223#M409</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-09-18T14:15:08Z</dc:date>
    </item>
  </channel>
</rss>

