<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: category malware with action allowed in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/category-malware-with-action-allowed/m-p/466156#M102657</link>
    <description>&lt;P&gt;We have&amp;nbsp; a lot of devices sending logfiles to splunk but we&amp;nbsp;&lt;SPAN&gt;differentiate&lt;/SPAN&gt;&amp;nbsp; the logfiles by source and the source is 100% from Palo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fact is the IP "&lt;SPAN&gt;72.5.65.111" changed in 07 Jul 21 from Hostname v10.events.data.microsoft.com &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;to (PAN) Category Malware on 14 Jul 21 I guess this alone is strange.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is there a way to import logfiles to a Palo Device Virtual/Hardware? Cause we export our logfiles every day so I have the original Logfile. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 16 Feb 2022 11:43:12 GMT</pubDate>
    <dc:creator>hnasshoven</dc:creator>
    <dc:date>2022-02-16T11:43:12Z</dc:date>
    <item>
      <title>category malware with action allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/category-malware-with-action-allowed/m-p/464473#M102512</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;we use Splunk.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We tried following searchstring: &lt;FONT color="#FF0000"&gt;http_category=malware | timechart count BY vendor_action&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We find out that we get back action allowed with category malware.&lt;/P&gt;
&lt;P&gt;Is there a failure in the search?&amp;nbsp;The action in our URL security profil for malware is block.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there someone with same environment and same results ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;best regards&lt;/P&gt;
&lt;P&gt;holger&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 12:44:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/category-malware-with-action-allowed/m-p/464473#M102512</guid>
      <dc:creator>hnasshoven</dc:creator>
      <dc:date>2022-02-09T12:44:08Z</dc:date>
    </item>
    <item>
      <title>Re: category malware with action allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/category-malware-with-action-allowed/m-p/464629#M102517</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10783"&gt;@hnasshoven&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;I think you'd really need to look at the logs on the firewall side of things in regards to these entries and actually see what's up. A snapshot of the query results doesn't present much data for troubleshooting. If you're blocking all malware sites I wouldn't expect to see any allow logs recorded, so something definitely seems odd at this point.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 20:45:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/category-malware-with-action-allowed/m-p/464629#M102517</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-02-09T20:45:03Z</dc:date>
    </item>
    <item>
      <title>Re: category malware with action allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/category-malware-with-action-allowed/m-p/464771#M102533</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp; that`s my problem, the logfiles on the device don`t catch the event anymore.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 06:58:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/category-malware-with-action-allowed/m-p/464771#M102533</guid>
      <dc:creator>hnasshoven</dc:creator>
      <dc:date>2022-02-10T06:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: category malware with action allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/category-malware-with-action-allowed/m-p/466108#M102651</link>
      <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10783"&gt;@hnasshoven&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;Looking at the date of those logs it has been almost an year so really depending on the volume of traffic your firewalls are processing, I am almost certain that your traffic log quota on the firewall is not able to keep traffic for such long period. You can check you retention under CLI with: &amp;gt; show system logdb-quota&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"http_category" is field for logs of type url. And url log should be generated only when the URL match category with action, alert, block, or continue. Action allow will not generate url log entry.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is also strange that in your graph you see actions "deny" and "reset-both", which are not action from url type logs.&lt;/P&gt;
&lt;P&gt;So it looks like your query is returning mixture of different log types and I am wondering if some of them are not threat logs or something else.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt; suggested you need to looks in the detailed logs to better understand what are those. If they are no longer present on the firewall, you need to query your Splunk and review detailed or raw logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On other hand...Nothing in your query is&amp;nbsp; filtering by vendor, or by device. Are you sure the result is only from Palo Alto firewall logs? Are there any other security devices that are sending logs to your Splunk?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 09:38:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/category-malware-with-action-allowed/m-p/466108#M102651</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-02-16T09:38:08Z</dc:date>
    </item>
    <item>
      <title>Re: category malware with action allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/category-malware-with-action-allowed/m-p/466156#M102657</link>
      <description>&lt;P&gt;We have&amp;nbsp; a lot of devices sending logfiles to splunk but we&amp;nbsp;&lt;SPAN&gt;differentiate&lt;/SPAN&gt;&amp;nbsp; the logfiles by source and the source is 100% from Palo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fact is the IP "&lt;SPAN&gt;72.5.65.111" changed in 07 Jul 21 from Hostname v10.events.data.microsoft.com &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;to (PAN) Category Malware on 14 Jul 21 I guess this alone is strange.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is there a way to import logfiles to a Palo Device Virtual/Hardware? Cause we export our logfiles every day so I have the original Logfile. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 11:43:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/category-malware-with-action-allowed/m-p/466156#M102657</guid>
      <dc:creator>hnasshoven</dc:creator>
      <dc:date>2022-02-16T11:43:12Z</dc:date>
    </item>
  </channel>
</rss>

