<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: best way to add folders to malware whitelist in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/best-way-to-add-folders-to-malware-whitelist/m-p/519469#M107710</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/242931"&gt;@jeperjes&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Keep in mind what you're actually wildcarding.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;C:\WINDOWS\System32\DNS\*.dns - This would allow anything in that fold path with a .dns extension.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;*\*.dns - This would allow literally anything with a .dns extension.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;C:\Program Files\Microsoft SQL Server\*\Shared\SQLDumper.exe - This allows anything within that folder path but that one&amp;nbsp;wild carded portion doesn't matter. So C:\Program Files\Microsoft SQL Server\Bob\Shared\SQLDumper.exe would work fine, but C:\Program Files\Microsoft SQL Server\Billy\Bob\Shared\SQLDumper.exe would not.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;*.\sqldumper.exe - Again your allowing this executable&amp;nbsp;&lt;EM&gt;name&amp;nbsp;&lt;/EM&gt;to run from anywhere.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I'd be&amp;nbsp;&lt;STRONG&gt;very&amp;nbsp;&lt;/STRONG&gt;careful about wildcarding entire paths and executable names outside of the specified path as required. You can't get around this completely without excluding a bunch of hashes, but any exception should be as&amp;nbsp;&lt;EM&gt;specific as possible&lt;/EM&gt; when being created. I absolutely refuse to exclude entire extensions or just the executable name itself, both open up pretty large exception holes in your environment.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 27 Oct 2022 22:38:14 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2022-10-27T22:38:14Z</dc:date>
    <item>
      <title>best way to add folders to malware whitelist</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-way-to-add-folders-to-malware-whitelist/m-p/519390#M107693</link>
      <description>&lt;P&gt;having read the document "Add a New Malware Security Profile", I am not clear as to best and properly entering a path to a folder properly.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this is a paragraph pulled out of the of the webpage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;+Add a file or folder.&lt;BR /&gt;Enter the path and press Enter or click the check mark when done. You can also use a wildcard to match files and folders containing a partial name. Use ? to match a single character or * to match any string of characters. To match a folder, you must terminate the path with * to match all files in the folder (for example, c:\temp\*).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My question and concerns are should all paths end with an asterisk (*)?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So this is how i am adding paths into the whitelist.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this correct the way or the wrong way to add this path&amp;nbsp; C:\WINDOWS\SYSVOL\staging\? OR&amp;nbsp; should it have an * at end.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;C:\WINDOWS\System32\DNS\*.dns&amp;nbsp; &amp;nbsp; OR should it be *\*.dns&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;C:\Program Files\Microsoft SQL Server\*\Shared\SQLDumper.exe OR should it be *.\sqldumper.exe&amp;nbsp; &amp;nbsp;or does it not matter?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is the appropriate way to enter files and folders into the malware list.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This C:\Users\*\AppData\Local\Microsoft\OneDrive\ OR&amp;nbsp; that C:\Users\*\AppData\Local\Microsoft\OneDrive\*&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This C:\WINDOWS\System32\LogFiles\&amp;nbsp; OR That C:\WINDOWS\System32\LogFiles\*&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This C:\Windows\Veeam\&amp;nbsp; &amp;nbsp; &amp;nbsp;OR This&amp;nbsp; &amp;nbsp;C:\Windows\Veeam\*&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*****Also, does anyone know how to copy all the files/folders in the malware list out of where it is being added into?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jeperjes_0-1666877018593.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/44936i19C6D5FF5EC8FF6D/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="jeperjes_0-1666877018593.png" alt="jeperjes_0-1666877018593.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2022 13:24:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-way-to-add-folders-to-malware-whitelist/m-p/519390#M107693</guid>
      <dc:creator>jeperjes</dc:creator>
      <dc:date>2022-10-27T13:24:19Z</dc:date>
    </item>
    <item>
      <title>Re: best way to add folders to malware whitelist</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-way-to-add-folders-to-malware-whitelist/m-p/519469#M107710</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/242931"&gt;@jeperjes&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Keep in mind what you're actually wildcarding.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;C:\WINDOWS\System32\DNS\*.dns - This would allow anything in that fold path with a .dns extension.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;*\*.dns - This would allow literally anything with a .dns extension.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;C:\Program Files\Microsoft SQL Server\*\Shared\SQLDumper.exe - This allows anything within that folder path but that one&amp;nbsp;wild carded portion doesn't matter. So C:\Program Files\Microsoft SQL Server\Bob\Shared\SQLDumper.exe would work fine, but C:\Program Files\Microsoft SQL Server\Billy\Bob\Shared\SQLDumper.exe would not.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;*.\sqldumper.exe - Again your allowing this executable&amp;nbsp;&lt;EM&gt;name&amp;nbsp;&lt;/EM&gt;to run from anywhere.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I'd be&amp;nbsp;&lt;STRONG&gt;very&amp;nbsp;&lt;/STRONG&gt;careful about wildcarding entire paths and executable names outside of the specified path as required. You can't get around this completely without excluding a bunch of hashes, but any exception should be as&amp;nbsp;&lt;EM&gt;specific as possible&lt;/EM&gt; when being created. I absolutely refuse to exclude entire extensions or just the executable name itself, both open up pretty large exception holes in your environment.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2022 22:38:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-way-to-add-folders-to-malware-whitelist/m-p/519469#M107710</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-10-27T22:38:14Z</dc:date>
    </item>
    <item>
      <title>Re: best way to add folders to malware whitelist</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-way-to-add-folders-to-malware-whitelist/m-p/519530#M107718</link>
      <description>So should I remove all the exclusions and let Cortex intelligence determine&lt;BR /&gt;which paths, files dictate whitelisting?&lt;BR /&gt;</description>
      <pubDate>Fri, 28 Oct 2022 12:09:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-way-to-add-folders-to-malware-whitelist/m-p/519530#M107718</guid>
      <dc:creator>jeperjes</dc:creator>
      <dc:date>2022-10-28T12:09:57Z</dc:date>
    </item>
    <item>
      <title>Re: best way to add folders to malware whitelist</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-way-to-add-folders-to-malware-whitelist/m-p/519571#M107722</link>
      <description>&lt;P&gt;So if anyone can explain this observation for me, I would appreciate it.&amp;nbsp; With Cisco AMP, it has the ability to disable AV from running at the running apps by the clock.&amp;nbsp; With Cortex, you have to run cytool disable service reboot . to enable the icon for cortex you do cytool enable service and reboot the computer or server.&amp;nbsp; Anyone know a better way? The reason I ask this is with Cisco AMP, we had anomolies with an upgrade installation of software on 5 of our servers to where i had to goto 20 computers and disable the tray icon for Cisco AMP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2022 18:48:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-way-to-add-folders-to-malware-whitelist/m-p/519571#M107722</guid>
      <dc:creator>jeperjes</dc:creator>
      <dc:date>2022-10-28T18:48:17Z</dc:date>
    </item>
  </channel>
</rss>

