<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Threat Prevention - Qualys PCI in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/476662#M103607</link>
    <description>&lt;P&gt;Has there been any updates to this problem? Seems to still be an issue in 2022. How do we create a security policy that:&lt;BR /&gt;1) bypasses the IPS functions on the PAs&lt;BR /&gt;2) maintains the firewall functions without exposing additional internal address space or ports&lt;BR /&gt;3) without creating an exception for every IDS rule&lt;/P&gt;</description>
    <pubDate>Tue, 29 Mar 2022 19:07:04 GMT</pubDate>
    <dc:creator>johnlewis</dc:creator>
    <dc:date>2022-03-29T19:07:04Z</dc:date>
    <item>
      <title>Threat Prevention - Qualys PCI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/100219#M44247</link>
      <description>&lt;P&gt;Hi all, I have a bit of a dilema here and hoping somebody may have some ideas....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;We have threat prevention profiles applied to security policies relating to traffic entering our DMZ from the internet.&lt;/LI&gt;&lt;LI&gt;We have PCI obligations and use Qualys' PCI scanning services.&lt;/LI&gt;&lt;LI&gt;We are receiving a PCI fail during the scanning process due to the threat prevention profiles doing their job (blocking the attempts)&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We've been told that if we wish for our scans to become compliant we need to whitelist their IP addresses so that their scanners are not interfeared with.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately I can only see three options, neither of which is viable due to the management overhead...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Adding IP exclusions against every threat signature, or&lt;/LI&gt;&lt;LI&gt;Duplicating every security policy - for each of the duplicated policies adding Qualys' IP addresses to the source address list, removing the threat prevention profile and ensuring it's ordered such that it is processed before the rule containing the threat prevention profile.&lt;/LI&gt;&lt;LI&gt;Disabling the threat prevention profiles on each rule during the scan.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Anybody got any tricks up their sleeves?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Luke&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2016 08:17:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/100219#M44247</guid>
      <dc:creator>GMHBA</dc:creator>
      <dc:date>2016-07-26T08:17:00Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Prevention - Qualys PCI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/100427#M44252</link>
      <description>&lt;P&gt;Those scans are really strange.&lt;/P&gt;&lt;P&gt;If firewall blocks then result is "interference".&lt;/P&gt;&lt;P&gt;If firewall does not block then result is "unneeded open services" (we use 1-to-1 static nat mapping).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One option is to push scan in 2 steps.&lt;/P&gt;&lt;P&gt;First without specific rules in place to see what regular internet users see and second scan with top rule that permits anything from Qualys IP's during scan period. Security profile "log only" for this traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also you have to set zone protection profile to log only during scan period. For second scan if you do it in 2 steps.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2016 15:00:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/100427#M44252</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2016-07-26T15:00:52Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Prevention - Qualys PCI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/100626#M44268</link>
      <description>&lt;P&gt;Thanks Raido, to clarify though they have no issues with ports being closed. Their issue is with the traffic on open ports being interfeared with by the threat prevention profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did think about a single policy for all traffic from Qualys and have it operating on a sechedule, however as you say that will show unnecessary ports being opened.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Guess I just need to stick to the manual process and hope that PA release some sort of 'whitelisting' capability in a future release.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2016 01:29:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/100626#M44268</guid>
      <dc:creator>GMHBA</dc:creator>
      <dc:date>2016-07-27T01:29:52Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Prevention - Qualys PCI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/100771#M44285</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I ran into this as well, here is what I did to work around the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I created a policy above all the other polices that sourced from the Qualys IP range to my external IP's and disabled threat profiles.&lt;/P&gt;&lt;P&gt;&lt;A href="https://pci.qualys.com/static/help/merchant/getting_started/check_scanner_ip_addresses.htm" target="_blank"&gt;https://pci.qualys.com/static/help/merchant/getting_started/check_scanner_ip_addresses.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This way the scans can happen, are only from the vendors IP range and are not interfered with.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2016 23:05:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/100771#M44285</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2016-07-27T23:05:52Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Prevention - Qualys PCI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/100908#M44314</link>
      <description>&lt;P&gt;I did think of that Otakar, although I would then have to deal with the old "unnecessary ports open" issue as ports would be open to servers that dont necessarily need it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not sure why it's so hard for PA to provide a whitelisting option like a traditional IPS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Luke&lt;/P&gt;</description>
      <pubDate>Sat, 30 Jul 2016 04:19:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/100908#M44314</guid>
      <dc:creator>GMHBA</dc:creator>
      <dc:date>2016-07-30T04:19:06Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Prevention - Qualys PCI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/287010#M76672</link>
      <description>&lt;P&gt;We are trying to find a solution to this as well.&amp;nbsp; &amp;nbsp; How to whitelist the Qualys Scanner Ip's without opening up additional ports.&amp;nbsp;&lt;/P&gt;&lt;P&gt;There has to be an easy way to just whitelist different IP ranges, without doing a&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source : QUalys,&amp;nbsp; destination:&amp;nbsp; Any:&amp;nbsp; &amp;nbsp;Port : Any,&amp;nbsp; &amp;nbsp; Action Allow:&amp;nbsp; &amp;nbsp; Which would in effect open up all the ports which is not what we want to do, just whitelist the Scanner so it doesn't alert for existing open ports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2019 16:11:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/287010#M76672</guid>
      <dc:creator>Ecaballero</dc:creator>
      <dc:date>2019-09-06T16:11:46Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Prevention - Qualys PCI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/476662#M103607</link>
      <description>&lt;P&gt;Has there been any updates to this problem? Seems to still be an issue in 2022. How do we create a security policy that:&lt;BR /&gt;1) bypasses the IPS functions on the PAs&lt;BR /&gt;2) maintains the firewall functions without exposing additional internal address space or ports&lt;BR /&gt;3) without creating an exception for every IDS rule&lt;/P&gt;</description>
      <pubDate>Tue, 29 Mar 2022 19:07:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/476662#M103607</guid>
      <dc:creator>johnlewis</dc:creator>
      <dc:date>2022-03-29T19:07:04Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Prevention - Qualys PCI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/591715#M117828</link>
      <description>&lt;P&gt;Hi, we have the same problem, anyone found a solution without rewriting security rules specific for Qualys or other external scanner subnets?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 14:53:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/591715#M117828</guid>
      <dc:creator>Stefano-iQera</dc:creator>
      <dc:date>2024-07-11T14:53:42Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Prevention - Qualys PCI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/591716#M117829</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I created a policy above all the other polices that sourced from the Qualys IP range to my external IP's and disabled threat profiles.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://pci.qualys.com/static/help/merchant/getting_started/check_scanner_ip_addresses.htm" target="_blank" rel="nofollow noopener noreferrer"&gt;https://pci.qualys.com/static/help/merchant/getting_started/check_scanner_ip_addresses.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://success.qualys.com/support/s/article/000003528" target="_blank"&gt;https://success.qualys.com/support/s/article/000003528&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Should look something like:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Source Address = Qualys IP ranges, destination Address = &amp;lt;Your External IP Ranges&amp;gt;, Allow everything, no filtering, log at session end&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This way the scans can happen, are only from the vendors IP range and are not interfered with.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 15:03:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/591716#M117829</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-07-11T15:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Prevention - Qualys PCI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/594012#M118226</link>
      <description>&lt;P&gt;Ok thanks but if you have bidirectional natted servers or &lt;SPAN&gt;1-to-1 static nats&lt;/SPAN&gt;, secured by policy rules, you'll expose all the ports of those servers to Qualys.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2024 12:50:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/594012#M118226</guid>
      <dc:creator>Stefano-iQera</dc:creator>
      <dc:date>2024-08-05T12:50:23Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Prevention - Qualys PCI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/594374#M118299</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;You are correct. Hence the reason for the whitelisting and blocking all others etc.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2024 14:59:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-qualys-pci/m-p/594374#M118299</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-08-08T14:59:31Z</dc:date>
    </item>
  </channel>
</rss>

