<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Exceptions aggregation criteria in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exceptions-aggregation-criteria/m-p/233814#M424</link>
    <description>&lt;P&gt;You are referring to the options that pop up when you click on select Vulnerability signatures that do have a 'Pencil and Paper' icon at the left of the Threat Name entry.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These are special 'Combination' signatures, the way they work is you have a parent and a child signature. Some people refer to them as a witness (for the parent) and event (for the child) signatures.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The idea is that the event(child) based signature is tracking events that by themselves&amp;nbsp;(as isolated events), are not malicious in nature - i.e., login attempts to an SSH server,&amp;nbsp;however, if you see a big number&amp;nbsp;of these events in a very short time, it can be an indication of a brute force attempt.&amp;nbsp;The key concept is the time component. The witness(parent) signature is tracking the n-ocurrences of the event(child) in a specified time window.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Event(Child) signatures do not need to write entries to the Threat logs to be counted by Witness(Parent) signatures. This means that the Parent signature will count ocurrences of the Child signature, even if it is not logging to the Threat Logs (action allow).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The source or source-and-destination aggregation criteria refers to definition of what the witness is counting as events in a given time-window. Going back to our example, if the same source is attempting to log-in using SSH to multiple different destination IP's within the specified time window, and your aggregation criteria is only source, then these events&amp;nbsp;will all count toward the trigger condition of the witness signature, however, if you define it as source-and-destination, you define additional granularity and you'd be instantiating multiple time-windows where the trigger condition that is counted is the n-number of instances where a single source goes to a *specific* destination.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can read additional details in our "&lt;SPAN&gt;Creating&amp;nbsp;custom application&amp;nbsp;and threat signatures"&amp;nbsp;&lt;/SPAN&gt;document available at&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClOFCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClOFCA0&lt;/A&gt; (See Combination Signatures in Page 65).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is also additional information on Brute Force signatures available at&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClmpCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClmpCAC&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 03 Oct 2018 23:19:28 GMT</pubDate>
    <dc:creator>mivaldi</dc:creator>
    <dc:date>2018-10-03T23:19:28Z</dc:date>
    <item>
      <title>Exceptions aggregation criteria</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exceptions-aggregation-criteria/m-p/232061#M416</link>
      <description>&lt;P&gt;What does these options for aggregation criteria actually mean when creating exceptions in vulerabilit profile - source&lt;SPAN&gt;,&amp;nbsp;&lt;/SPAN&gt;destination&lt;SPAN&gt;&amp;nbsp;or by&amp;nbsp;&lt;/SPAN&gt;source and destination&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;And also track by IP source and IP source destination&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Sep 2018 14:33:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exceptions-aggregation-criteria/m-p/232061#M416</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2018-09-24T14:33:14Z</dc:date>
    </item>
    <item>
      <title>Re: Exceptions aggregation criteria</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exceptions-aggregation-criteria/m-p/233814#M424</link>
      <description>&lt;P&gt;You are referring to the options that pop up when you click on select Vulnerability signatures that do have a 'Pencil and Paper' icon at the left of the Threat Name entry.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These are special 'Combination' signatures, the way they work is you have a parent and a child signature. Some people refer to them as a witness (for the parent) and event (for the child) signatures.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The idea is that the event(child) based signature is tracking events that by themselves&amp;nbsp;(as isolated events), are not malicious in nature - i.e., login attempts to an SSH server,&amp;nbsp;however, if you see a big number&amp;nbsp;of these events in a very short time, it can be an indication of a brute force attempt.&amp;nbsp;The key concept is the time component. The witness(parent) signature is tracking the n-ocurrences of the event(child) in a specified time window.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Event(Child) signatures do not need to write entries to the Threat logs to be counted by Witness(Parent) signatures. This means that the Parent signature will count ocurrences of the Child signature, even if it is not logging to the Threat Logs (action allow).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The source or source-and-destination aggregation criteria refers to definition of what the witness is counting as events in a given time-window. Going back to our example, if the same source is attempting to log-in using SSH to multiple different destination IP's within the specified time window, and your aggregation criteria is only source, then these events&amp;nbsp;will all count toward the trigger condition of the witness signature, however, if you define it as source-and-destination, you define additional granularity and you'd be instantiating multiple time-windows where the trigger condition that is counted is the n-number of instances where a single source goes to a *specific* destination.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can read additional details in our "&lt;SPAN&gt;Creating&amp;nbsp;custom application&amp;nbsp;and threat signatures"&amp;nbsp;&lt;/SPAN&gt;document available at&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClOFCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClOFCA0&lt;/A&gt; (See Combination Signatures in Page 65).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is also additional information on Brute Force signatures available at&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClmpCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClmpCAC&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 23:19:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exceptions-aggregation-criteria/m-p/233814#M424</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2018-10-03T23:19:28Z</dc:date>
    </item>
    <item>
      <title>Re: Exceptions aggregation criteria</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exceptions-aggregation-criteria/m-p/233994#M425</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/34186"&gt;@mivaldi&lt;/a&gt;&amp;nbsp;That's a nice explanation. So isn't chosing by source only better than selecting source and destination. As doing by source &amp;amp; destiantion it will miss out on the threat if it trying to&amp;nbsp;ssh multiple destinations within that short period and can remain hidden.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And what about destinantion only, which source IP would&amp;nbsp;firewall choose to block.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Oct 2018 19:05:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exceptions-aggregation-criteria/m-p/233994#M425</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2018-10-04T19:05:26Z</dc:date>
    </item>
  </channel>
</rss>

