<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Masscan Port Scanning Tool Detection' in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/masscan-port-scanning-tool-detection/m-p/297248#M694</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hows it going? As always you have many good suggestions. I decided to change the action to drop. I currently don't have mine meld and doesn't that cost?&amp;nbsp; I currently do not have a SIEM setup yet I may need to look into that&lt;/P&gt;</description>
    <pubDate>Fri, 08 Nov 2019 14:12:11 GMT</pubDate>
    <dc:creator>jdprovine</dc:creator>
    <dc:date>2019-11-08T14:12:11Z</dc:date>
    <item>
      <title>Masscan Port Scanning Tool Detection'</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/masscan-port-scanning-tool-detection/m-p/297081#M692</link>
      <description>&lt;P&gt;I am getting this alert&amp;nbsp;Masscan Port Scanning Tool Detection' what can I do that will stop the scanning, I would think I would need to do more that alert and when I check the threat database it didn't really offer much&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 17:14:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/masscan-port-scanning-tool-detection/m-p/297081#M692</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2019-11-07T17:14:18Z</dc:date>
    </item>
    <item>
      <title>Re: Masscan Port Scanning Tool Detection'</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/masscan-port-scanning-tool-detection/m-p/297150#M693</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;The default action for this is simply to alert. As is, I generally set it so anything coming from external resources with a severity great-or-equal to medium gets reset, regardless of default action. You might want to look at making the same modification to the threat profile utilized on your external security entries.&amp;nbsp;&lt;/P&gt;&lt;P&gt;One of the thing you might want to look at is the firewalls built-in block-ip option that can limit the source-ip from connecting for a set duration. You can also setup MineMeld to pull indicators from the threat logs (either through log-forwarding to a SIEM or directly through the API) so you can feed these into a block-list so to speak by utilizing the EDL functionality.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2019 03:46:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/masscan-port-scanning-tool-detection/m-p/297150#M693</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-11-08T03:46:39Z</dc:date>
    </item>
    <item>
      <title>Re: Masscan Port Scanning Tool Detection'</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/masscan-port-scanning-tool-detection/m-p/297248#M694</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hows it going? As always you have many good suggestions. I decided to change the action to drop. I currently don't have mine meld and doesn't that cost?&amp;nbsp; I currently do not have a SIEM setup yet I may need to look into that&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2019 14:12:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/masscan-port-scanning-tool-detection/m-p/297248#M694</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2019-11-08T14:12:11Z</dc:date>
    </item>
    <item>
      <title>Re: Masscan Port Scanning Tool Detection'</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/masscan-port-scanning-tool-detection/m-p/297349#M695</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;The product is included with AutoFocus which does have a cost associated with it that has caused a fair amount of confusion; MineMeld itself however is open-source and can be installed by itself without any cost associated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can get the indicators added automatically to MineMeld using some scripts to pull a custom report through the API, and feeding the indicators into a file that gets fed into MineMeld as an indicator list. I might write a post about that one of these days.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2019 17:45:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/masscan-port-scanning-tool-detection/m-p/297349#M695</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-11-08T17:45:49Z</dc:date>
    </item>
  </channel>
</rss>

