<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA blocks spyware - identify compromised computer in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-blocks-spyware-identify-compromised-computer/m-p/14050#M10322</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the update.&amp;nbsp; Sink hole has been on my list to get rolled out for a while.&amp;nbsp; I need to get this setup.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 22 Jun 2015 22:36:50 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2015-06-22T22:36:50Z</dc:date>
    <item>
      <title>PA blocks spyware - identify compromised computer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-blocks-spyware-identify-compromised-computer/m-p/14044#M10316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we're running the following setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;trusted zone | DC zone | Internet&lt;/P&gt;&lt;P&gt;Client/Proxy/some old DNS Server| DNS Server| Internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see that the PA is blocking malware traffic (app DNS). But the attacker is either the proxy, asking the DNS in the DC zone, or the old DNS server, asking DNS servers in the Internet.&lt;/P&gt;&lt;P&gt;Unforunately that way I don't get the compromised machine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you guys have in place to identify such computers? Put the proxy and the old DNS in a different zone? Or is the DNS sinkhole the way to go?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your suggestions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Sven&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jun 2015 07:04:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-blocks-spyware-identify-compromised-computer/m-p/14044#M10316</guid>
      <dc:creator>Sven_Lieckfeldt</dc:creator>
      <dc:date>2015-06-17T07:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: PA blocks spyware - identify compromised computer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-blocks-spyware-identify-compromised-computer/m-p/14045#M10317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In order for the PA to identify the computer the traffic would have to cross the PA from the computer to the DNS server or from the computer to the proxy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the proxy server requests I would check the proxy logs for the DNS record and see if it logs that site as visited by a user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the DNS server if you did put this into its own dmz like zone then all traffic to the DNS would get seen and logged.&amp;nbsp; But be careful what you ask for.&amp;nbsp; This will generate a LOT of logs and will thus shorten the time frame of available logs on the PA.&amp;nbsp; DNS is used very frequently on a modern network.&amp;nbsp; A single page load can generate 10 dns requests easily.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jun 2015 10:32:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-blocks-spyware-identify-compromised-computer/m-p/14045#M10317</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-06-17T10:32:58Z</dc:date>
    </item>
    <item>
      <title>Re: PA blocks spyware - identify compromised computer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-blocks-spyware-identify-compromised-computer/m-p/14046#M10318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Steven,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for your answer!&lt;/P&gt;&lt;P&gt;We're not logging allowed traffic to avoid logs blowing our firewall. So that would be fine.&lt;/P&gt;&lt;P&gt;So I've the following options:&lt;/P&gt;&lt;P&gt;- put proxy's into another zone&lt;/P&gt;&lt;P&gt;- scan the proxy logs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Sven&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jun 2015 14:47:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-blocks-spyware-identify-compromised-computer/m-p/14046#M10318</guid>
      <dc:creator>Sven_Lieckfeldt</dc:creator>
      <dc:date>2015-06-18T14:47:48Z</dc:date>
    </item>
    <item>
      <title>Re: PA blocks spyware - identify compromised computer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-blocks-spyware-identify-compromised-computer/m-p/14047#M10319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sven,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would using the sinkhole feature within your Anti-spyware Profile help?&amp;nbsp;&amp;nbsp; We have a situation where the user to DNS server communication does not traverse the firewall.&amp;nbsp; By using the sinkhole response on DNS signatures you can see who is going to the sinkhole IP address (because you define it and force the traffic to it to traverse the firewall ).&amp;nbsp; Certainly this is useful in helping you to look a bit more closely at specific source IP addresses on your network.&amp;nbsp; DNS sinkhole is one of those red flags to help you identify unusual or suspicious traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jun 2015 19:27:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-blocks-spyware-identify-compromised-computer/m-p/14047#M10319</guid>
      <dc:creator>HITSSEC</dc:creator>
      <dc:date>2015-06-18T19:27:03Z</dc:date>
    </item>
    <item>
      <title>Re: PA blocks spyware - identify compromised computer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-blocks-spyware-identify-compromised-computer/m-p/14048#M10320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was wondering the same thing. (DNS Sinkhole)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm getting ready to implement it on our firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Jun 2015 20:07:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-blocks-spyware-identify-compromised-computer/m-p/14048#M10320</guid>
      <dc:creator>rkoenig</dc:creator>
      <dc:date>2015-06-21T20:07:21Z</dc:date>
    </item>
    <item>
      <title>Re: PA blocks spyware - identify compromised computer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-blocks-spyware-identify-compromised-computer/m-p/14049#M10321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have implemented SinkHole and it works awesome.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jun 2015 15:48:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-blocks-spyware-identify-compromised-computer/m-p/14049#M10321</guid>
      <dc:creator>scantwell</dc:creator>
      <dc:date>2015-06-22T15:48:16Z</dc:date>
    </item>
    <item>
      <title>Re: PA blocks spyware - identify compromised computer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-blocks-spyware-identify-compromised-computer/m-p/14050#M10322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the update.&amp;nbsp; Sink hole has been on my list to get rolled out for a while.&amp;nbsp; I need to get this setup.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jun 2015 22:36:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-blocks-spyware-identify-compromised-computer/m-p/14050#M10322</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-06-22T22:36:50Z</dc:date>
    </item>
  </channel>
</rss>

