<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Office 365 - Poodle Vunerabilties in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/office-365-poodle-vunerabilties/m-p/176818#M72</link>
    <description>&lt;P&gt;Threat ID - 37144&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question or insight about Microsoft practices with not hardening against poodle.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why am I still getting alerts for these vulnerabilities, is it because I don't have proper SSL forward proxy yet enabled? Or is it because my Office 365 tenancy is hosted out of UK which is often 5 steps backwards in ramping up and fixing vulns? I have been outside the sysadmin wintel space for nearly a decade is there a tenant setting that my teams operaters can do to ensure Crypto at the TLS level is greater than 1.0 ? Maybe its that way since TLS 1.0 is very popular interms of the footprint of devices in that region of the world, who knows.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I mean really -&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE-2014-8730&lt;/SPAN&gt;&lt;SPAN&gt; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;since 2014&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 15 Sep 2017 21:09:32 GMT</pubDate>
    <dc:creator>CZaloba</dc:creator>
    <dc:date>2017-09-15T21:09:32Z</dc:date>
    <item>
      <title>Office 365 - Poodle Vunerabilties</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/office-365-poodle-vunerabilties/m-p/176818#M72</link>
      <description>&lt;P&gt;Threat ID - 37144&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question or insight about Microsoft practices with not hardening against poodle.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why am I still getting alerts for these vulnerabilities, is it because I don't have proper SSL forward proxy yet enabled? Or is it because my Office 365 tenancy is hosted out of UK which is often 5 steps backwards in ramping up and fixing vulns? I have been outside the sysadmin wintel space for nearly a decade is there a tenant setting that my teams operaters can do to ensure Crypto at the TLS level is greater than 1.0 ? Maybe its that way since TLS 1.0 is very popular interms of the footprint of devices in that region of the world, who knows.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I mean really -&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE-2014-8730&lt;/SPAN&gt;&lt;SPAN&gt; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;since 2014&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2017 21:09:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/office-365-poodle-vunerabilties/m-p/176818#M72</guid>
      <dc:creator>CZaloba</dc:creator>
      <dc:date>2017-09-15T21:09:32Z</dc:date>
    </item>
  </channel>
</rss>

