<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can the Palo Alto Firewall autoguarantine users based on the number of violations they have made for a particular time? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/can-the-palo-alto-firewall-autoguarantine-users-based-on-the/m-p/535383#M110131</link>
    <description>&lt;P&gt;Hello to All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can the Palo Alto Firewall autoguarantine users based on the number of violations they have made for a particular time?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know that palo alto can add the users or ip addresses to and dynamic group using auto taging with tags (&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-new-features/user-id-features/dynamic-user-groups" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-new-features/user-id-features/dynamic-user-groups&lt;/A&gt; ) but I do but when I tried to make a Log Filter for the Log Profile I do not see the exact options as to say if a user does 5 threat violations for 60 seconds then to add the tag that will match the dynamic user group that will be added to the security policy to a blocking rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Log-filter-bad-user.PNG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48952i72D26B5326F3F36E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Log-filter-bad-user.PNG" alt="Log-filter-bad-user.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With Cortex XSOAR I know that using the SIEM logs this can be done but I think there is notive firewall function to do this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=X3YLLNv1kpg" target="_blank"&gt;https://www.youtube.com/watch?v=X3YLLNv1kpg&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 22 Mar 2023 11:08:15 GMT</pubDate>
    <dc:creator>nikoolayy1</dc:creator>
    <dc:date>2023-03-22T11:08:15Z</dc:date>
    <item>
      <title>Can the Palo Alto Firewall autoguarantine users based on the number of violations they have made for a particular time?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/can-the-palo-alto-firewall-autoguarantine-users-based-on-the/m-p/535383#M110131</link>
      <description>&lt;P&gt;Hello to All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can the Palo Alto Firewall autoguarantine users based on the number of violations they have made for a particular time?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know that palo alto can add the users or ip addresses to and dynamic group using auto taging with tags (&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-new-features/user-id-features/dynamic-user-groups" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-new-features/user-id-features/dynamic-user-groups&lt;/A&gt; ) but I do but when I tried to make a Log Filter for the Log Profile I do not see the exact options as to say if a user does 5 threat violations for 60 seconds then to add the tag that will match the dynamic user group that will be added to the security policy to a blocking rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Log-filter-bad-user.PNG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48952i72D26B5326F3F36E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Log-filter-bad-user.PNG" alt="Log-filter-bad-user.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With Cortex XSOAR I know that using the SIEM logs this can be done but I think there is notive firewall function to do this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=X3YLLNv1kpg" target="_blank"&gt;https://www.youtube.com/watch?v=X3YLLNv1kpg&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2023 11:08:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/can-the-palo-alto-firewall-autoguarantine-users-based-on-the/m-p/535383#M110131</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2023-03-22T11:08:15Z</dc:date>
    </item>
    <item>
      <title>Re: Can the Palo Alto Firewall autoguarantine users based on the number of violations they have made for a particular time?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/can-the-palo-alto-firewall-autoguarantine-users-based-on-the/m-p/535527#M110150</link>
      <description>&lt;P&gt;This may work with profiles that are already time bound like brute-force ((category-of-threatid eq brute-force)), but tracking 'random' threats will require an external SIEM or XSOAR&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 08:34:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/can-the-palo-alto-firewall-autoguarantine-users-based-on-the/m-p/535527#M110150</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2023-03-23T08:34:25Z</dc:date>
    </item>
    <item>
      <title>Re: Can the Palo Alto Firewall autoguarantine users based on the number of violations they have made for a particular time?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/can-the-palo-alto-firewall-autoguarantine-users-based-on-the/m-p/535533#M110155</link>
      <description>&lt;P&gt;For Brute Force protection also a custom &lt;SPAN&gt; &lt;EM&gt;combination signature with "number of hits"&lt;/EM&gt;&lt;/SPAN&gt; can do the job by matching the parameters but it seems for violations better use external automation. Still nowadays many users are behind the same IP address, so better do Brute Force Protection on other dedicated WAF devices that fingerprint the source device than using the NGFW firewall for this job.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am at the moment doing that but without an XSOAR solution as it was not available.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am trying the splunk SIEM to trigger a bash script when a custom alert based on a user triggering too many violations for 60 seconds &lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/latest/Alert/Configuringscriptedalerts" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/SplunkCloud/latest/Alert/Configuringscriptedalerts&lt;/A&gt; that has ansible playbook in it and passing parameters to it as users that need the good tag (to block them) &lt;A href="http://api-lab.paloaltonetworks.com/registered-user.html" target="_blank" rel="noopener"&gt;http://api-lab.paloaltonetworks.com/registered-user.html&lt;/A&gt; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Edit:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now I seem to see that Ansible does not have a module for DUG (dynamic user group) just DAG (dynamic address group),&amp;nbsp; so either the Ansible URI module I will have to use to script it or just the bash script can use curl with a for loop to send the bad users that need to be tagged. Probably no one decided to make Ansible module for DUG which is what it is.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://ansible-pan.readthedocs.io/en/latest/modules/panos_dag_tags_module.html" target="_blank"&gt;https://ansible-pan.readthedocs.io/en/latest/modules/panos_dag_tags_module.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 10:07:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/can-the-palo-alto-firewall-autoguarantine-users-based-on-the/m-p/535533#M110155</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2023-03-23T10:07:38Z</dc:date>
    </item>
  </channel>
</rss>

