<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: reconnaissance protection alert search in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/reconnaissance-protection-alert-search/m-p/613429#M121133</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/144255"&gt;@Jameslee20&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for post!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can use this filter:&amp;nbsp;( subtype eq 'scan' ) in Threat logs.&lt;/P&gt;
&lt;P&gt;It includes&amp;nbsp;Host Sweep (ID 8002), TCP Port Scan(ID 8001) and UDP Port Scan (ID 8003).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
    <pubDate>Wed, 23 Oct 2024 05:48:12 GMT</pubDate>
    <dc:creator>PavelK</dc:creator>
    <dc:date>2024-10-23T05:48:12Z</dc:date>
    <item>
      <title>reconnaissance protection alert search</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/reconnaissance-protection-alert-search/m-p/612472#M120947</link>
      <description>&lt;P&gt;reconnaissance protection alert search&lt;/P&gt;
&lt;P&gt;We have alerts set up but I need to search for the alerts but what is the search string&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 16:23:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/reconnaissance-protection-alert-search/m-p/612472#M120947</guid>
      <dc:creator>Jameslee20</dc:creator>
      <dc:date>2024-10-22T16:23:56Z</dc:date>
    </item>
    <item>
      <title>Re: reconnaissance protection alert search</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/reconnaissance-protection-alert-search/m-p/613429#M121133</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/144255"&gt;@Jameslee20&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for post!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can use this filter:&amp;nbsp;( subtype eq 'scan' ) in Threat logs.&lt;/P&gt;
&lt;P&gt;It includes&amp;nbsp;Host Sweep (ID 8002), TCP Port Scan(ID 8001) and UDP Port Scan (ID 8003).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2024 05:48:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/reconnaissance-protection-alert-search/m-p/613429#M121133</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2024-10-23T05:48:12Z</dc:date>
    </item>
    <item>
      <title>Re: reconnaissance protection alert search</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/reconnaissance-protection-alert-search/m-p/615568#M121821</link>
      <description>&lt;P&gt;nothing pop is there another scan&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 11:43:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/reconnaissance-protection-alert-search/m-p/615568#M121821</guid>
      <dc:creator>Jameslee20</dc:creator>
      <dc:date>2024-10-29T11:43:04Z</dc:date>
    </item>
    <item>
      <title>Re: reconnaissance protection alert search</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/reconnaissance-protection-alert-search/m-p/615650#M121834</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/144255"&gt;@Jameslee20&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thank you for reply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The filter &lt;SPAN&gt;( subtype eq 'scan' ) is a Threat type filter that will display all types of scanning events. Since nothing shows up in logs in your case, could you confirm below points:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;- &lt;/SPAN&gt;Did you enable "Log Setting" under zone where zone protection is enabled? Please refer to this KB:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClHICA0" target="_self"&gt;Difference between Log Forwarding for a Zone and Security Policy Log Forwarding&lt;/A&gt;&amp;nbsp;(Scroll down to section "Zone Log Forwarding").&lt;/P&gt;
&lt;P&gt;- Could you review this KB:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClbCCAS" target="_self"&gt;Zone Protection Profile Not Generating Logs During Penetration Scan&lt;/A&gt;?&amp;nbsp;There are no threat logs if there is "deny" action in security policy.&lt;/P&gt;
&lt;P&gt;- Could you review this KB:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000oM5ICAU" target="_self"&gt;How to investigate "SCAN: TCP Port Scan" alerts&lt;/A&gt;? The scanning event will be generated only when scan exceeds the&amp;nbsp;Threshold (Events) within the Interval (Sec) defined in the Zone Protection profile applied to the ingress Zone for TCP Port Scan.&lt;/P&gt;
&lt;P&gt;- Could you make sure that traffic you are investigating is not included in the exception list (source address exclusion)?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 23:11:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/reconnaissance-protection-alert-search/m-p/615650#M121834</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2024-10-29T23:11:01Z</dc:date>
    </item>
  </channel>
</rss>

