<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to test DNS Security Properly? in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-test-dns-security-properly/m-p/272782#M593</link>
    <description>&lt;P&gt;In reading up on DNS Security I found that URL's provided for testing in the following document,&amp;nbsp;&lt;A title="Enabling DNS Security" href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/dns-security/enable-dns-security" target="_self"&gt;Enabling DNS Security,&lt;/A&gt;&amp;nbsp;do not accurately ensure DNS Security feature license is installed and configured. A very accurate indicator of this is that all of those URL's are adequately blocked on a firewall running PAN-OS 8.1.x due to the PAN-DB URL filtering policies most companies would have enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the suggested testing method from the above URL:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN class="ph cmd"&gt;Test that the policy action is enforced.&lt;/SPAN&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN class="ph cmd"&gt;Access the following test domains to verify that the policy action for a given threat type is being enforced:&lt;/SPAN&gt;&lt;DIV class="itemgroup info"&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV class="p"&gt;Malware—&lt;A title="" href="http://test-malware.testpanw.com/" target="_blank" rel="noopener"&gt;test-malware.testpanw.com&lt;/A&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="p"&gt;C2—&lt;A title="" href="http://test-c2.testpanw.com/" target="_blank" rel="noopener"&gt;test-c2.testpanw.com&lt;/A&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="p"&gt;DGA—&lt;A title="" href="http://test-dga.testpanw.com/" target="_blank" rel="noopener"&gt;test-dga.testpanw.com&lt;/A&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="p"&gt;DNS Tunneling—&lt;A title="" href="http://test-dnstun.testpanw.com/" target="_blank" rel="noopener"&gt;test-dnstun.testpanw.com&lt;/A&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;So this leads me to the questions...&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;How DO you accurately test that DNS Security is blocking DGA, DNS Tunneling, etc.?&lt;/LI&gt;&lt;LI&gt;Can the Administrator Guide please be updated to accurately describe the process ensuring proper enablement of the DNS Security advanced feature?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;BTW, @PANW -&amp;nbsp;Why is the Oilrig signature default action "alert" instead of blocking it? Using a strict profile is pretty essential.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have a successful test plan for DNS Security implementation please comment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Mon, 24 Jun 2019 21:01:47 GMT</pubDate>
    <dc:creator>bspilde</dc:creator>
    <dc:date>2019-06-24T21:01:47Z</dc:date>
    <item>
      <title>How to test DNS Security Properly?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-test-dns-security-properly/m-p/272782#M593</link>
      <description>&lt;P&gt;In reading up on DNS Security I found that URL's provided for testing in the following document,&amp;nbsp;&lt;A title="Enabling DNS Security" href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/dns-security/enable-dns-security" target="_self"&gt;Enabling DNS Security,&lt;/A&gt;&amp;nbsp;do not accurately ensure DNS Security feature license is installed and configured. A very accurate indicator of this is that all of those URL's are adequately blocked on a firewall running PAN-OS 8.1.x due to the PAN-DB URL filtering policies most companies would have enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the suggested testing method from the above URL:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN class="ph cmd"&gt;Test that the policy action is enforced.&lt;/SPAN&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN class="ph cmd"&gt;Access the following test domains to verify that the policy action for a given threat type is being enforced:&lt;/SPAN&gt;&lt;DIV class="itemgroup info"&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV class="p"&gt;Malware—&lt;A title="" href="http://test-malware.testpanw.com/" target="_blank" rel="noopener"&gt;test-malware.testpanw.com&lt;/A&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="p"&gt;C2—&lt;A title="" href="http://test-c2.testpanw.com/" target="_blank" rel="noopener"&gt;test-c2.testpanw.com&lt;/A&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="p"&gt;DGA—&lt;A title="" href="http://test-dga.testpanw.com/" target="_blank" rel="noopener"&gt;test-dga.testpanw.com&lt;/A&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="p"&gt;DNS Tunneling—&lt;A title="" href="http://test-dnstun.testpanw.com/" target="_blank" rel="noopener"&gt;test-dnstun.testpanw.com&lt;/A&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;So this leads me to the questions...&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;How DO you accurately test that DNS Security is blocking DGA, DNS Tunneling, etc.?&lt;/LI&gt;&lt;LI&gt;Can the Administrator Guide please be updated to accurately describe the process ensuring proper enablement of the DNS Security advanced feature?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;BTW, @PANW -&amp;nbsp;Why is the Oilrig signature default action "alert" instead of blocking it? Using a strict profile is pretty essential.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have a successful test plan for DNS Security implementation please comment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jun 2019 21:01:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-test-dns-security-properly/m-p/272782#M593</guid>
      <dc:creator>bspilde</dc:creator>
      <dc:date>2019-06-24T21:01:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to test DNS Security Properly?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-test-dns-security-properly/m-p/273942#M602</link>
      <description>&lt;P&gt;The steps provided were to show you that the DNS Sinkhole functionality was being actioned/"hit on".&lt;/P&gt;&lt;P&gt;While I agree that these same sites are probably used in the Content Profile for URL Categorization, testing was done to provide confirmation that DNS sinkhole was working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I enabled the Spyware profile to use the licensed DNS security feature.&lt;/P&gt;&lt;P&gt;But, instead of using the default sinkhole.paloaltonetworks.com FQDN, I used a bogus 9.9.9.9 as my sinkhole.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then I tested the 4 sites.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My traffic was blocked, not because of the URL.&amp;nbsp; In looking at the threat logs, I see the action of sinkhole against the IP of my device.&lt;/P&gt;&lt;P&gt;For confirmation, I filtered on the Traffic log, and saw 4 hits on a destination IP of 9.9.9.9, which were not there, prior to my testing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Therefore, the DNS Security feature, along with sinkholing to a different IP, shows/provides me confidence that the DNS security feature worked, before the URL filtering profile (which may well have those 4 sites listed), but Spyware profile is what was triggered.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jun 2019 19:35:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-test-dns-security-properly/m-p/273942#M602</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2019-06-28T19:35:24Z</dc:date>
    </item>
  </channel>
</rss>

