<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Anti-Spyware Behaviour and Inline Cloud Analysis in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-behaviour-and-inline-cloud-analysis/m-p/1231342#M124524</link>
    <description>&lt;P&gt;&lt;FONT size="4"&gt;Bittersweet Update&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to note that the DSRI theory can be discarded as the symptoms are prevalent on another HA pair on the same PAN-OS version where the matching security policy rule does &lt;STRONG&gt;&lt;EM&gt;not&lt;/EM&gt; &lt;/STRONG&gt;have this option enabled.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I opened a TAC case. Here are the findings:&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Analysis of the 'show dns-proxy dns-signature counters' cli command on both HA pairs indicated there were a small (but not insignificant) amount of DNS Security Cloud queries that were &lt;STRONG&gt;&lt;EM&gt;outside&lt;/EM&gt;&lt;/STRONG&gt; the DNS Signature Lookup Timer configuration. The breakdown of this can be found here:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000001Uc6CAE" target="_blank"&gt;How to do basic debugging for DNS Security before you open a su... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;The behaviour of such a scenario is outlined here:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000PQibCAG&amp;amp;lang=en_US" target="_blank"&gt;DNS Security Behaviour in PAN-OS when There Is Connectivity Iss... - Knowledge Base - Palo Alto Networks&lt;/A&gt;
&lt;UL&gt;
&lt;LI&gt;"When the DNS response is received within DNS signature lookup timeout and no cloud verdict is received (e.g. due to DNS Security cloud service connectivity issue).&lt;BR /&gt;DNS response will be dropped and PAN-OS will re-transmit the original DNS request (extra DNS request in the transmit stage).&lt;BR /&gt;If the next DNS response is received after DNS signature lookup timeout expired, DNS response will be forwarded to the client as the &lt;STRONG&gt;&lt;EM&gt;fail open&lt;/EM&gt; &lt;/STRONG&gt;mechanism."&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The behaviour above describes the symptoms perfectly. It was thought that perhaps there could be a bug, as there is one of a similar nature&amp;nbsp;&lt;/P&gt;
&lt;P&gt;outlined in&lt;SPAN&gt;&amp;nbsp;PAN-275077, however, that is specific to phishing domains.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Proving exactly when the fail open mechanism occurs, and when it does not is open to interpretation as this point. It was thought that perhaps System logs will be generated like the following screenshot:&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nohash4u_0-1749492984133.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67974iC8A27EC6BED700F3/image-size/medium?v=v2&amp;amp;px=400" role="button" title="nohash4u_0-1749492984133.png" alt="nohash4u_0-1749492984133.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;That being said, I was unable to match the event timestamps in the System logs with the event timestamps in the Threat logs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 09 Jun 2025 18:32:44 GMT</pubDate>
    <dc:creator>nohash4u</dc:creator>
    <dc:date>2025-06-09T18:32:44Z</dc:date>
    <item>
      <title>Anti-Spyware Behaviour and Inline Cloud Analysis</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-behaviour-and-inline-cloud-analysis/m-p/1228690#M124242</link>
      <description>&lt;P&gt;Hello All,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have run into some curious behaviour with Anti-Spyware. High severity threats tagged as threat type 'spyware' are coming through the firewall with an action of alert, despite all configurations pointing to an action that should either be &lt;EM&gt;reset-both&lt;/EM&gt;, or &lt;EM&gt;sinkhole&lt;/EM&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have confirmed the following:&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The security policy rule that matches the traffic does have the correct security profile group set.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;The security profile group set does reference the specific Anti-Spyware security profile.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Within the Anti-Spyware profile here is the breakdown:&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Signature Policies&amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;Severity medium, high, and critical all have an action of &lt;EM&gt;reset-both.&amp;nbsp;&lt;/EM&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Signature Exceptions&amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;None.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;DNS Policies&amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;All signature sources have a log severity set to high, and an action of &lt;EM&gt;sinkhole&lt;/EM&gt;.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;DNS Exceptions&amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;None.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Inline Cloud Analysis&amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;Enabled.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;The action for all models is set to &lt;EM&gt;alert&lt;/EM&gt;.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Could this behaviour be a result of inline cloud analysis?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a way to tell if the traffic flow has had inline cloud analysis applied to it? If so, I have not found a way to tell as of yet. I have checked the columns available in the threat logs, as well as the Detailed Log View, but to no avail.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to note that the threat ID is identified in each traffic flow. An example is&amp;nbsp;109010004.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As always: any insight is much appreciated!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 May 2025 20:35:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-behaviour-and-inline-cloud-analysis/m-p/1228690#M124242</guid>
      <dc:creator>nohash4u</dc:creator>
      <dc:date>2025-05-09T20:35:25Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spyware Behaviour and Inline Cloud Analysis</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-behaviour-and-inline-cloud-analysis/m-p/1228804#M124249</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/65137099"&gt;@nohash4u&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try enabling the threat category in the detailed threat logs (enable the column if needed).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Notice in my example screenshot how the &lt;STRONG&gt;inline-cloud-c2&lt;/STRONG&gt; category has the "alert" action for high severity threats indicating that the Inline Cloud engine took action as opposed to the anti-spyware engine (where the action would be reset-both).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kiwi_3-1747038617554.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67536iAAC041A1C40F249F/image-size/large?v=v2&amp;amp;px=999" role="button" title="kiwi_3-1747038617554.png" alt="kiwi_3-1747038617554.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Mon, 12 May 2025 08:31:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-behaviour-and-inline-cloud-analysis/m-p/1228804#M124249</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2025-05-12T08:31:13Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spyware Behaviour and Inline Cloud Analysis</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-behaviour-and-inline-cloud-analysis/m-p/1228858#M124253</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the great insight on how to determine if a threat is identified via Inline Cloud Analysis. In my case I have yet to see this appear under the threat category column.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is an example:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nohash4u_0-1747069459863.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67549i6FE6B0BE0F7F41B9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="nohash4u_0-1747069459863.png" alt="nohash4u_0-1747069459863.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On another thread - it is almost as if layer 7 inspection is not occurring or functioning properly. I did notice the security policy rule that matches these traffic flows has the 'Disable Server Response Inspection' option &lt;STRONG&gt;&lt;EM&gt;enabled.&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;Would this have an implication on DNS related traffic flows ? Even so, I find it interesting that the flow is marked with a certain severity, and yet the prescribed action is not enforced.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Lastly, could this be timeout related? I have noticed via the detailed log view that the flows start with an action of alert, and end 30 seconds later with an action of allow.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks again for your insight.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 May 2025 17:13:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-behaviour-and-inline-cloud-analysis/m-p/1228858#M124253</guid>
      <dc:creator>nohash4u</dc:creator>
      <dc:date>2025-05-12T17:13:13Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spyware Behaviour and Inline Cloud Analysis</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-behaviour-and-inline-cloud-analysis/m-p/1228861#M124254</link>
      <description>&lt;P&gt;Enabling "&lt;SPAN&gt;Disable Server Response Inspection" is very insecure practice because you will bypass whole server to client flow from inspection.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Could make sense only for incoming traffic towards web servers that you control and really trust that they are not hacked and don't host anything malicious and you really need to reduce load on the firewall.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 May 2025 19:10:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-behaviour-and-inline-cloud-analysis/m-p/1228861#M124254</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2025-05-12T19:10:21Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spyware Behaviour and Inline Cloud Analysis</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-behaviour-and-inline-cloud-analysis/m-p/1228876#M124258</link>
      <description>&lt;P&gt;Thanks for confirming. The documentation also strongly advises against enabling DSRI. I did not configure this device, but I will pass this along in my future discussions.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regardless, the main unknown is the action of alert for high severity DNS based threats being inconsistent with the configuration on the firewall.&amp;nbsp; Would enabling DSRI interfere with the enforcement behaviour? If so, why is the action alert with the threat ID identified as something that should be sinkholed, reset-both, etc?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More than happy to open a TAC case, but I thought I would ask here first!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 May 2025 22:50:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-behaviour-and-inline-cloud-analysis/m-p/1228876#M124258</guid>
      <dc:creator>nohash4u</dc:creator>
      <dc:date>2025-05-12T22:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spyware Behaviour and Inline Cloud Analysis</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-behaviour-and-inline-cloud-analysis/m-p/1230123#M124400</link>
      <description>&lt;P&gt;For those curious - I have opened a TAC case, and I will post the results here for future reference.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 May 2025 21:45:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-behaviour-and-inline-cloud-analysis/m-p/1230123#M124400</guid>
      <dc:creator>nohash4u</dc:creator>
      <dc:date>2025-05-26T21:45:21Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Spyware Behaviour and Inline Cloud Analysis</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-behaviour-and-inline-cloud-analysis/m-p/1231342#M124524</link>
      <description>&lt;P&gt;&lt;FONT size="4"&gt;Bittersweet Update&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to note that the DSRI theory can be discarded as the symptoms are prevalent on another HA pair on the same PAN-OS version where the matching security policy rule does &lt;STRONG&gt;&lt;EM&gt;not&lt;/EM&gt; &lt;/STRONG&gt;have this option enabled.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I opened a TAC case. Here are the findings:&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Analysis of the 'show dns-proxy dns-signature counters' cli command on both HA pairs indicated there were a small (but not insignificant) amount of DNS Security Cloud queries that were &lt;STRONG&gt;&lt;EM&gt;outside&lt;/EM&gt;&lt;/STRONG&gt; the DNS Signature Lookup Timer configuration. The breakdown of this can be found here:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000001Uc6CAE" target="_blank"&gt;How to do basic debugging for DNS Security before you open a su... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;The behaviour of such a scenario is outlined here:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000PQibCAG&amp;amp;lang=en_US" target="_blank"&gt;DNS Security Behaviour in PAN-OS when There Is Connectivity Iss... - Knowledge Base - Palo Alto Networks&lt;/A&gt;
&lt;UL&gt;
&lt;LI&gt;"When the DNS response is received within DNS signature lookup timeout and no cloud verdict is received (e.g. due to DNS Security cloud service connectivity issue).&lt;BR /&gt;DNS response will be dropped and PAN-OS will re-transmit the original DNS request (extra DNS request in the transmit stage).&lt;BR /&gt;If the next DNS response is received after DNS signature lookup timeout expired, DNS response will be forwarded to the client as the &lt;STRONG&gt;&lt;EM&gt;fail open&lt;/EM&gt; &lt;/STRONG&gt;mechanism."&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The behaviour above describes the symptoms perfectly. It was thought that perhaps there could be a bug, as there is one of a similar nature&amp;nbsp;&lt;/P&gt;
&lt;P&gt;outlined in&lt;SPAN&gt;&amp;nbsp;PAN-275077, however, that is specific to phishing domains.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Proving exactly when the fail open mechanism occurs, and when it does not is open to interpretation as this point. It was thought that perhaps System logs will be generated like the following screenshot:&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nohash4u_0-1749492984133.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67974iC8A27EC6BED700F3/image-size/medium?v=v2&amp;amp;px=400" role="button" title="nohash4u_0-1749492984133.png" alt="nohash4u_0-1749492984133.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;That being said, I was unable to match the event timestamps in the System logs with the event timestamps in the Threat logs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jun 2025 18:32:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/anti-spyware-behaviour-and-inline-cloud-analysis/m-p/1231342#M124524</guid>
      <dc:creator>nohash4u</dc:creator>
      <dc:date>2025-06-09T18:32:44Z</dc:date>
    </item>
  </channel>
</rss>

