<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto Updates Detected as a Threat in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-updates-detected-as-a-threat/m-p/517721#M107422</link>
    <description>&lt;P&gt;after some troubleshooting, there is no log on threat log, i see on url filtering that show category not-resolved that the action is block.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;first i see the connection from firewall management to palo alto cloud is disconnect. so firewall cant identify the app traffic from internal to extenal since the connection is broke. so the firewall make all the traffic into category not-resolved with the block action, the&amp;nbsp;internal traffic is getting block to external.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i have whitelist *.paloaltonetworks.com in url category , then make policy with alert security profile/remote this security profile from the policy than it will works.&lt;/P&gt;
&lt;P&gt;still dont know why the connection from firewall to palo alto cloud is broke, but i assume that theres was a issue with the dns.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 13 Oct 2022 02:59:22 GMT</pubDate>
    <dc:creator>DennyChanditya</dc:creator>
    <dc:date>2022-10-13T02:59:22Z</dc:date>
    <item>
      <title>Palo Alto Updates Detected as a Threat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-updates-detected-as-a-threat/m-p/517552#M107404</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;
&lt;P&gt;im using content update&amp;nbsp;app and threat 8628-7631 and antivirus 4233-4746 on this day.&lt;/P&gt;
&lt;P&gt;is there any url database update on&amp;nbsp;&amp;nbsp;app and threat 8628-7631 and antivirus 4233-4746?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i have a problem on firewall palo alto, that firewall detected palo alto updates as a threat.&amp;nbsp;the management traffic is traverse the firewall.&lt;/P&gt;
&lt;P&gt;i have policy to allow the paloalto updates app. when i check the log it show palo alto updates detected as a threat&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.jpeg" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/44595iA4235E3F22024BF5/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="2.jpeg" alt="2.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;i check using command show dns-proxy dns-signature info and shows SSL Connect Error&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/44593i527C4A1A11F406DC/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;i take a sample log on updates to wildfire, thereis no threat vault information&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DennyChanditya_1-1665547623985.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/44597iD113B0D20DC6CA9D/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="DennyChanditya_1-1665547623985.png" alt="DennyChanditya_1-1665547623985.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After i whitelist the url *.paloaltonetworks.com, im getting Good Result, but sometimes the updates still detected as a threat in traffic log.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DennyChanditya_0-1665546592673.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/44594i4278410151B0D17A/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="DennyChanditya_0-1665546592673.png" alt="DennyChanditya_0-1665546592673.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;second option is, the traffic from management to the palo alto updates i change the security profile to alert only(before it was strict)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Denny&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2022 04:09:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-updates-detected-as-a-threat/m-p/517552#M107404</guid>
      <dc:creator>DennyChanditya</dc:creator>
      <dc:date>2022-10-12T04:09:27Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Updates Detected as a Threat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-updates-detected-as-a-threat/m-p/517603#M107408</link>
      <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/187777"&gt;@DennyChanditya&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;What threat log you see for the above corresponding traffic logs?&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2022 12:20:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-updates-detected-as-a-threat/m-p/517603#M107408</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-10-12T12:20:56Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Updates Detected as a Threat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-updates-detected-as-a-threat/m-p/517691#M107420</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Its best practice to not inspect the palo alto updates with any service including ssl decryption.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2022 20:38:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-updates-detected-as-a-threat/m-p/517691#M107420</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-10-12T20:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Updates Detected as a Threat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-updates-detected-as-a-threat/m-p/517721#M107422</link>
      <description>&lt;P&gt;after some troubleshooting, there is no log on threat log, i see on url filtering that show category not-resolved that the action is block.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;first i see the connection from firewall management to palo alto cloud is disconnect. so firewall cant identify the app traffic from internal to extenal since the connection is broke. so the firewall make all the traffic into category not-resolved with the block action, the&amp;nbsp;internal traffic is getting block to external.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i have whitelist *.paloaltonetworks.com in url category , then make policy with alert security profile/remote this security profile from the policy than it will works.&lt;/P&gt;
&lt;P&gt;still dont know why the connection from firewall to palo alto cloud is broke, but i assume that theres was a issue with the dns.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2022 02:59:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-updates-detected-as-a-threat/m-p/517721#M107422</guid>
      <dc:creator>DennyChanditya</dc:creator>
      <dc:date>2022-10-13T02:59:22Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Updates Detected as a Threat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-updates-detected-as-a-threat/m-p/517725#M107424</link>
      <description>&lt;P&gt;Thanks otakar, i didn't about this best practice.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for some reason our users dont want a policy that dont have any security profile, but in this case i attach the security profile but with alert only. we dont use the ssl decryption on the firewall.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2022 03:08:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-updates-detected-as-a-threat/m-p/517725#M107424</guid>
      <dc:creator>DennyChanditya</dc:creator>
      <dc:date>2022-10-13T03:08:49Z</dc:date>
    </item>
  </channel>
</rss>

