<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Anti Spyware best practice in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-best-practice/m-p/469678#M102957</link>
    <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wonder what's best practice in oder to identify theats via the Anti Spyware function. Most of the connections today are encrypted, so using the Anti Spyware function without ssl/tls decryption seems not to be a big security improvement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So there come the following questions to me:&lt;/P&gt;&lt;P&gt;- is activation of ssl/tls encryption the only way?&lt;/P&gt;&lt;P&gt;- how will TLS 1.3 with cert pinning behave?&lt;/P&gt;&lt;P&gt;- is there a way to mirror encrypted (web) traffic in oder to decrypt it and test this function?&lt;/P&gt;</description>
    <pubDate>Wed, 02 Mar 2022 07:35:00 GMT</pubDate>
    <dc:creator>Netzer</dc:creator>
    <dc:date>2022-03-02T07:35:00Z</dc:date>
    <item>
      <title>Anti Spyware best practice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-best-practice/m-p/469678#M102957</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wonder what's best practice in oder to identify theats via the Anti Spyware function. Most of the connections today are encrypted, so using the Anti Spyware function without ssl/tls decryption seems not to be a big security improvement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So there come the following questions to me:&lt;/P&gt;&lt;P&gt;- is activation of ssl/tls encryption the only way?&lt;/P&gt;&lt;P&gt;- how will TLS 1.3 with cert pinning behave?&lt;/P&gt;&lt;P&gt;- is there a way to mirror encrypted (web) traffic in oder to decrypt it and test this function?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 07:35:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-best-practice/m-p/469678#M102957</guid>
      <dc:creator>Netzer</dc:creator>
      <dc:date>2022-03-02T07:35:00Z</dc:date>
    </item>
    <item>
      <title>Re: Anti Spyware best practice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-best-practice/m-p/469919#M102971</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/130557"&gt;@Netzer&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Best practice would still be to apply the profile to capture as much as you possibly can, even if you aren't decrypting traffic. You'll capture the unencrypted traffic still, and not all payload is delivered over encrypted connections (although the vast majority of it is, which is why you really should be decrypting traffic).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Websites and services that utilize certificate pinning will require decryption exceptions. The good thing about this is that you're going to be building the exceptions, so if someone is trying to hide behind certificate pinning a good decryption profile will prevent users from navigating to the site unless an exception has been made.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As to your mirroring question, you can of course mirror the traffic and offload it, however you aren't going to be able to decrypt that traffic after the fact. The best way to test something like this would be to put together a profile that simply has everything set to 'alert' so identified traffic isn't actioned.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 21:43:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-best-practice/m-p/469919#M102971</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-03-02T21:43:10Z</dc:date>
    </item>
  </channel>
</rss>

