<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Network blocking and detecting capabilities in case of similar abnormal symptoms traffic in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/network-blocking-and-detecting-capabilities-in-case-of-similar/m-p/541500#M110990</link>
    <description>&lt;P&gt;Hello all,&lt;BR /&gt;&lt;BR /&gt;Hope you are doing well.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Our customer who is using PA3220 experienced external public IP blockage due to abnormal symptoms traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Upon investigation, it was found that a test Linux server installed internally attempted SSH brute force attacks against an unspecified number of external public IPs.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;We would like to know if the PaloAlto PA device has any network blocking and detecting capabilities in case of similar abnormal symptoms traffic.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Although it seems that PaloAlto can sufficiently detect abnormal traffic if one client attempts to SSH connect (attack) to an unspecified number of others, we cannot find any logs or alarms related to the symptoms.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 09 May 2023 02:48:02 GMT</pubDate>
    <dc:creator>JoHyeonJae</dc:creator>
    <dc:date>2023-05-09T02:48:02Z</dc:date>
    <item>
      <title>Network blocking and detecting capabilities in case of similar abnormal symptoms traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/network-blocking-and-detecting-capabilities-in-case-of-similar/m-p/541500#M110990</link>
      <description>&lt;P&gt;Hello all,&lt;BR /&gt;&lt;BR /&gt;Hope you are doing well.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Our customer who is using PA3220 experienced external public IP blockage due to abnormal symptoms traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Upon investigation, it was found that a test Linux server installed internally attempted SSH brute force attacks against an unspecified number of external public IPs.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;We would like to know if the PaloAlto PA device has any network blocking and detecting capabilities in case of similar abnormal symptoms traffic.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Although it seems that PaloAlto can sufficiently detect abnormal traffic if one client attempts to SSH connect (attack) to an unspecified number of others, we cannot find any logs or alarms related to the symptoms.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2023 02:48:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/network-blocking-and-detecting-capabilities-in-case-of-similar/m-p/541500#M110990</guid>
      <dc:creator>JoHyeonJae</dc:creator>
      <dc:date>2023-05-09T02:48:02Z</dc:date>
    </item>
    <item>
      <title>Re: Network blocking and detecting capabilities in case of similar abnormal symptoms traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/network-blocking-and-detecting-capabilities-in-case-of-similar/m-p/541529#M110994</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/208779"&gt;@JoHyeonJae&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To enforce protection against &lt;STRONG&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/threat-prevention/prevent-brute-force-attacks" target="_blank" rel="noopener"&gt;brute force attacks&lt;/A&gt; &lt;/STRONG&gt;make sure to attach the Vulnerability Protection profile to a Security policy rule.&lt;/P&gt;
&lt;P&gt;See &lt;STRONG&gt;&lt;A class="xref" title="" href="https://docs.paloaltonetworks.com/content/techdocs/en_US/pan-os/10-1/pan-os-admin/threat-prevention/set-up-antivirus-anti-spyware-and-vulnerability-protection.html#ide9a94a55-0498-4b2e-806b-6e95899510ac" target="_self" data-scope="local" data-format="dita" data-type=""&gt;Set Up Antivirus, Anti-Spyware, and Vulnerability Protection&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV style="display: inline;"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV style="display: inline;"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV style="display: inline;"&gt;Install content updates that include new signatures to protect against emerging threats. See &lt;STRONG&gt;&lt;A class="xref" title="" href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-upgrade/software-and-content-updates/install-content-and-software-updates.html" target="_blank" rel="noopener" data-scope="external" data-format="html" data-type=""&gt;Install Content and Software Updates&lt;/A&gt;.&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV style="display: inline;"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can have all the security profiles in the world... if you don't apply them to your policy they won't protect you (also make sure that you log appropriately).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="kiwi_0-1683621798318.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/50051i02B924778468936D/image-size/large?v=v2&amp;amp;px=999" role="button" title="kiwi_0-1683621798318.png" alt="kiwi_0-1683621798318.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;-Kiwi.&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2023 08:44:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/network-blocking-and-detecting-capabilities-in-case-of-similar/m-p/541529#M110994</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2023-05-09T08:44:04Z</dc:date>
    </item>
    <item>
      <title>RE: Network blocking and detecting capabilities in case of similar abnormal symptoms traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/network-blocking-and-detecting-capabilities-in-case-of-similar/m-p/541630#M111005</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN&gt;Thank you for your response. The customer is already using the Vulnerability Protection Profile. In this case, could you please advise what actions need to be taken for blocking?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2023 00:45:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/network-blocking-and-detecting-capabilities-in-case-of-similar/m-p/541630#M111005</guid>
      <dc:creator>JoHyeonJae</dc:creator>
      <dc:date>2023-05-10T00:45:44Z</dc:date>
    </item>
    <item>
      <title>RE: Network blocking and detecting capabilities in case of similar abnormal symptoms traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/network-blocking-and-detecting-capabilities-in-case-of-similar/m-p/541642#M111007</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I have a few questions while setting up the Vulnerability Protection Rule.&lt;/P&gt;
&lt;P&gt;What does the Duration value mean in the Vulnerability Protection Rule, and what criteria are used to detect and block/detect abnormal traffic?&lt;/P&gt;
&lt;P&gt;If the Duration is set to 3600, does the PA device analyze all traffic generated by the Vulnerability Protection Profile during the one-hour period and block the Source IP suspected of brute-force attacks?&lt;/P&gt;
&lt;P&gt;Can you explain what criteria the PA device uses to identify traffic suspected of brute-force attacks?&lt;BR /&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2023 02:14:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/network-blocking-and-detecting-capabilities-in-case-of-similar/m-p/541642#M111007</guid>
      <dc:creator>JoHyeonJae</dc:creator>
      <dc:date>2023-05-10T02:14:41Z</dc:date>
    </item>
  </channel>
</rss>

