<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ConnectWise Control connection getting reset in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/connectwise-control-connection-getting-reset/m-p/484587#M104438</link>
    <description>&lt;P&gt;Latest spyware signatures appear to be blocking legitimate connections to ConnectWise control. The 5/2 AppThreat-8564-7375 update categorizes the connection/file (GetSessionDetails) as threat&amp;nbsp;Generic PHP Webshell File Detection.&lt;/P&gt;&lt;P&gt;Produces "unknown error" on the ConnectWise portal page.&lt;/P&gt;&lt;P&gt;The only way I can get around it is to exclude the connectwise site from forward decryption.&amp;nbsp;We have been using this product for years. Trying to figure out what went wrong here.&amp;nbsp; Is it possible PA signature update is flawed?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 03 May 2022 18:06:40 GMT</pubDate>
    <dc:creator>dkordyban</dc:creator>
    <dc:date>2022-05-03T18:06:40Z</dc:date>
    <item>
      <title>ConnectWise Control connection getting reset</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/connectwise-control-connection-getting-reset/m-p/484587#M104438</link>
      <description>&lt;P&gt;Latest spyware signatures appear to be blocking legitimate connections to ConnectWise control. The 5/2 AppThreat-8564-7375 update categorizes the connection/file (GetSessionDetails) as threat&amp;nbsp;Generic PHP Webshell File Detection.&lt;/P&gt;&lt;P&gt;Produces "unknown error" on the ConnectWise portal page.&lt;/P&gt;&lt;P&gt;The only way I can get around it is to exclude the connectwise site from forward decryption.&amp;nbsp;We have been using this product for years. Trying to figure out what went wrong here.&amp;nbsp; Is it possible PA signature update is flawed?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 May 2022 18:06:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/connectwise-control-connection-getting-reset/m-p/484587#M104438</guid>
      <dc:creator>dkordyban</dc:creator>
      <dc:date>2022-05-03T18:06:40Z</dc:date>
    </item>
    <item>
      <title>Re: ConnectWise Control connection getting reset</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/connectwise-control-connection-getting-reset/m-p/484643#M104440</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/32225"&gt;@dkordyban&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;There's been multiple reported issues with the new threat signatures sent out last night. I'd just roll that update back for the time being and wait for PAN to push out an update. Seems that its also triggering for some legitimate M365 traffic and some Bing traffic.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 May 2022 20:19:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/connectwise-control-connection-getting-reset/m-p/484643#M104440</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-05-03T20:19:24Z</dc:date>
    </item>
  </channel>
</rss>

