<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Microsoft Directory Services/ms-ds-smbv3 - Virus/Win32.WGeneric.yurld in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/microsoft-directory-services-ms-ds-smbv3-virus-win32-wgeneric/m-p/254374#M510</link>
    <description>&lt;P&gt;In the interim, I will open a PAN support case...&lt;/P&gt;</description>
    <pubDate>Wed, 20 Mar 2019 13:32:22 GMT</pubDate>
    <dc:creator>LeeSeeman</dc:creator>
    <dc:date>2019-03-20T13:32:22Z</dc:date>
    <item>
      <title>Microsoft Directory Services/ms-ds-smbv3 - Virus/Win32.WGeneric.yurld</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/microsoft-directory-services-ms-ds-smbv3-virus-win32-wgeneric/m-p/254372#M509</link>
      <description>&lt;P&gt;We are see numerous alarms from our SIEM from our Palo Alto firewall. Here is a copy of a scrubbed log message below. When asking the user about their activity, they only RDP'ed into various servers from their laptop via the Globalprotect VPN for remote admin work and ran a batch file that re-maps drives. Additionally they noted browsing to \\&amp;lt;dcserver&amp;gt;\netlogon and that it seem to take long to enumerate directory. Also full AV endpoint scans show clean. Is this s false-positive?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;"03 18 2019 09:21:11 10.100.100.5 &amp;lt;USER:WARN&amp;gt; Mar 18 09:21:11 &amp;lt;FWname&amp;gt; 1,2019/03/18 09:21:11,001701011085,THREAT,virus,2049,2019/03/18 09:21:11,192.168.201.217,10.5.5.3,0.0.0.0,0.0.0.0,GPVPN to Inside Always_byApp,&amp;lt;domainname&amp;gt;, &amp;lt;username&amp;gt;,ms-ds-smbv3,vsys1,SSLVPN,Inside,tunnel.99,ethernet1/1,SIEM,2019/03/18 09:21:11,238186,1,51009,445,0,0,0x2000,tcp,drop,"",Virus/Win32.WGeneric.yurld(258226020),any,medium,server-to-client,55139558,0x2000000000000000,192.168.0.0-192.168.255.255,10.0.0.0-10.255.255.255,0,,0,,,0,,,,,,,,0,0,0,0,0,,sc-fw-pan-01,,,,,0,,0,,N/A,pe,Antivirus-2921-3431,0x0,0,4294967295,"&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Wed, 20 Mar 2019 13:24:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/microsoft-directory-services-ms-ds-smbv3-virus-win32-wgeneric/m-p/254372#M509</guid>
      <dc:creator>LeeSeeman</dc:creator>
      <dc:date>2019-03-20T13:24:58Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Directory Services/ms-ds-smbv3 - Virus/Win32.WGeneric.yurld</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/microsoft-directory-services-ms-ds-smbv3-virus-win32-wgeneric/m-p/254374#M510</link>
      <description>&lt;P&gt;In the interim, I will open a PAN support case...&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 13:32:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/microsoft-directory-services-ms-ds-smbv3-virus-win32-wgeneric/m-p/254374#M510</guid>
      <dc:creator>LeeSeeman</dc:creator>
      <dc:date>2019-03-20T13:32:22Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Directory Services/ms-ds-smbv3 - Virus/Win32.WGeneric.yurld</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/microsoft-directory-services-ms-ds-smbv3-virus-win32-wgeneric/m-p/255961#M531</link>
      <description>&lt;P&gt;This was an FP and it has been resolved.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2019 18:15:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/microsoft-directory-services-ms-ds-smbv3-virus-win32-wgeneric/m-p/255961#M531</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2019-04-03T18:15:23Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Directory Services/ms-ds-smbv3 - Virus/Win32.WGeneric.yurld</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/microsoft-directory-services-ms-ds-smbv3-virus-win32-wgeneric/m-p/333409#M852</link>
      <description>&lt;P&gt;What is FP meaning?&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 10:22:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/microsoft-directory-services-ms-ds-smbv3-virus-win32-wgeneric/m-p/333409#M852</guid>
      <dc:creator>Phearak.Sem</dc:creator>
      <dc:date>2020-06-15T10:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Directory Services/ms-ds-smbv3 - Virus/Win32.WGeneric.yurld</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/microsoft-directory-services-ms-ds-smbv3-virus-win32-wgeneric/m-p/333531#M854</link>
      <description>&lt;P&gt;FP means False Positive.&lt;/P&gt;
&lt;P&gt;A False Positive happens when a signature triggers for benign traffic.&lt;/P&gt;
&lt;P&gt;For Palo Alto Networks firewalls there are three common types of False Positives.&lt;/P&gt;
&lt;P&gt;1) WildFire False Positive: WildFire arrives at an incorrect verdict, assigning a malicious verdict to a benign file. The general resolution is to identify what caused the incorrect verdict, then flip it to Benign.&lt;/P&gt;
&lt;P&gt;2) Antivirus Collision with False Positive: This happens when a Benign file triggers a signature that was created for a file that WildFire assigned an incorrect malicious verdict (as described in #1). The reason for this is that the digital patterns that the Palo Alto Networks parses to identify a Malicious sample coincide in those found in the Benign sample. The general resolution is to identify what is the original sample that created the signature and identify what caused the incorrect verdict, then flip it to Benign.&lt;/P&gt;
&lt;P&gt;3) Antivirus Collision with True Positive: This happens when a Benign file triggers a signature that was created for a file that WildFire correctly identified as malicious.&amp;nbsp;The reason for this is that the digital patterns that the Palo Alto Networks parses to identify a Malicious sample coincide in those found in the Benign sample. The general resolution for these is to place an Antivirus Exception.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 20:53:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/microsoft-directory-services-ms-ds-smbv3-virus-win32-wgeneric/m-p/333531#M854</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2020-06-15T20:53:04Z</dc:date>
    </item>
  </channel>
</rss>

