<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help with Threat log SCAN: Host Sweep in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/347950#M934</link>
    <description>&lt;P&gt;I am sorry, no I do not have any packet captures from those events.&amp;nbsp; I did some digging at checked out a few machines. At that time I did not find any compromised machines.&amp;nbsp; It may be a good time to look at those threats again.&lt;/P&gt;</description>
    <pubDate>Wed, 09 Sep 2020 18:59:37 GMT</pubDate>
    <dc:creator>hattracker</dc:creator>
    <dc:date>2020-09-09T18:59:37Z</dc:date>
    <item>
      <title>Help with Threat log SCAN: Host Sweep</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/306949#M724</link>
      <description>&lt;P&gt;I am looking for assistance interpreting a report that shows “SCAN Host sweep traffic” in my threat log. There are multiple internal sources scanning multiple destination IP addresses that I do not own. The daily number of scans detected from each source is between 2 and 10. The source machine rarely scans the same destination. Is this a low level attack trying to stay under the radar or is there an explanation that does not indicate a problem on my network? I appreciate any feedback.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Type: Scan&lt;BR /&gt;Name: SCAN: Host Sweep&lt;BR /&gt;From Zone: Inside&lt;BR /&gt;To Zone: Outside&lt;BR /&gt;Source address: Internal IP address owned by me&lt;BR /&gt;Destination Address: various external addresses not owned by me.&lt;BR /&gt;Port; 99% of the time 443. Occasionally port 80 or 22222&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This screen shot show traffic during one time frame. I see various Source and Destination addresses.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sample date.PNG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/23486iAC6586F5219D61F0/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="sample date.PNG" alt="sample date.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;This screen shot is filtered by destination address. This destination address is scanned various times from different Source addresses over the course of several days.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sample destination.PNG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/23485i240EDF2ACAA2E607/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="sample destination.PNG" alt="sample destination.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2020 16:47:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/306949#M724</guid>
      <dc:creator>hattracker</dc:creator>
      <dc:date>2020-01-16T16:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Threat log SCAN: Host Sweep</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/307952#M735</link>
      <description>&lt;P&gt;I see 100 views but no comments.&amp;nbsp; Is there additional information I can add to help refine my question?&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2020 21:23:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/307952#M735</guid>
      <dc:creator>hattracker</dc:creator>
      <dc:date>2020-01-24T21:23:36Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Threat log SCAN: Host Sweep</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/307954#M736</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Could be something attempting to beacon out. I would check the hosts for compromise and keep making sure the PAN blocks the traffic for now.&lt;/P&gt;&lt;P&gt;Also check the destination IP's, if they are something that your systems are supposed to be reaching out to.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2020 22:09:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/307954#M736</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-01-24T22:09:54Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Threat log SCAN: Host Sweep</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/308504#M738</link>
      <description>&lt;P&gt;Thank you for replying.&amp;nbsp; I am concerned because those addresses are not relevant to our daily business, but each machine is performing only a few sweeps a day.&amp;nbsp;&amp;nbsp; I am concerned at this traffic, but wondering if I am just being paranoid?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2020 14:57:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/308504#M738</guid>
      <dc:creator>hattracker</dc:creator>
      <dc:date>2020-01-29T14:57:37Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Threat log SCAN: Host Sweep</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/308507#M739</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;A little paranoia is OK especially if you dont have a baseline. I would investigate the hosts and see what is actually causing the traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2020 15:12:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/308507#M739</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-01-29T15:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Threat log SCAN: Host Sweep</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/309627#M742</link>
      <description>&lt;P&gt;Hello Hattracker,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Please check your zone protection setting, what is the threshold is set for it?&lt;/P&gt;
&lt;P&gt;2. Have you applied for the zone protection on the internal/ trust interface?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3, Please scan one of the clients with host-based IPS and AV, see if any ports are open.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;BR /&gt;Himani&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 19:01:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/309627#M742</guid>
      <dc:creator>hisingh</dc:creator>
      <dc:date>2020-02-05T19:01:35Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Threat log SCAN: Host Sweep</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/347949#M933</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been seeing the same and it is awful lot of traffic. I checked the destination IPs and most of them are Microsoft IPs in my case. However, I did notice some other IPs too which are flagged by some of the threat detection engines.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The traffic has application 'not-applicable' which tells me there is no real data over the network but it more sort of probing with a packet or two.&lt;/P&gt;&lt;P&gt;I noticed most traffic going out over ports 443/80.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you done any packet captures?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2020 18:29:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/347949#M933</guid>
      <dc:creator>prashant.sharma</dc:creator>
      <dc:date>2020-09-09T18:29:42Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Threat log SCAN: Host Sweep</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/347950#M934</link>
      <description>&lt;P&gt;I am sorry, no I do not have any packet captures from those events.&amp;nbsp; I did some digging at checked out a few machines. At that time I did not find any compromised machines.&amp;nbsp; It may be a good time to look at those threats again.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2020 18:59:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/347950#M934</guid>
      <dc:creator>hattracker</dc:creator>
      <dc:date>2020-09-09T18:59:37Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Threat log SCAN: Host Sweep</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/347951#M935</link>
      <description>&lt;P&gt;Yes, see if you can get some captures. I would do that myself too but I do not have the approval to do the captures on the target machines. I am running some on FW though as the time of this writing. Will let you now if find something interesting.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2020 19:07:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/347951#M935</guid>
      <dc:creator>prashant.sharma</dc:creator>
      <dc:date>2020-09-09T19:07:03Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Threat log SCAN: Host Sweep</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/347968#M936</link>
      <description>&lt;P&gt;Found a lot of out-of-order and re-transmitted packets.&lt;/P&gt;&lt;P&gt;For me, some of the traffic is going to Microsoft servers with unrecognized text in XML and some other traffic going to some hosted servers which are apparently similar to the line of business. Did not find anything too concerning.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2020 20:28:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/347968#M936</guid>
      <dc:creator>prashant.sharma</dc:creator>
      <dc:date>2020-09-09T20:28:33Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Threat log SCAN: Host Sweep</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/348405#M937</link>
      <description>&lt;P&gt;I'd recommend opening a Support ticket for this.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 20:59:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/348405#M937</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2020-09-10T20:59:03Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Threat log SCAN: Host Sweep</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/396641#M1104</link>
      <description>&lt;P&gt;I have seen these logs too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not been able to figure this, but, I wonder if the alert logs are generated due to &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClZhCAK" target="_self"&gt;source IP meeting the interval and event threshold instead of tracking it per unique source-destination IP&lt;/A&gt; pair when configured to alert on the &lt;SPAN&gt;Reconnaissance Protection tab&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;Ideally one gets to pick and choose the tracking mechanism when you block but not for alert.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did anyone make progress with support on this? What did they have to say?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Apr 2021 18:36:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/396641#M1104</guid>
      <dc:creator>DelvinC</dc:creator>
      <dc:date>2021-04-08T18:36:07Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Threat log SCAN: Host Sweep</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/408831#M1161</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Host sweep will detect whenever a source attempts to hit different IP addresses on the same destination port, which if you think of it is by definition internet activity (multiple IP's hit on port 443 and 80). This means that if you enable this protection on an internal Zone with internet access, it is highly likely to trigger FP's continuously for public IP's on the internet on regular internet ports (most frequently 443 and 80).&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 May 2021 22:47:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/408831#M1161</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2021-05-24T22:47:08Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Threat log SCAN: Host Sweep</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/437321#M1329</link>
      <description>&lt;P&gt;I had to reduce the interval and increase the threshold (2 secs and 1000 IPs worked for me and should be good for most scenarios). This way you won't drop normal traffic, but anything firing up more than 500 connections per second to different servers using the same port will get dropped.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Sep 2021 10:26:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-threat-log-scan-host-sweep/m-p/437321#M1329</guid>
      <dc:creator>trevor_debeer</dc:creator>
      <dc:date>2021-09-29T10:26:00Z</dc:date>
    </item>
  </channel>
</rss>

