<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trendmicro application identified as &amp;quot;ssl&amp;quot; despite of proper SNI, CN, SAN. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/trendmicro-application-identified-as-quot-ssl-quot-despite-of/m-p/1251019#M126199</link>
    <description>&lt;P&gt;Palo alto incorporated the request and released a fix through the content updates.&lt;/P&gt;</description>
    <pubDate>Thu, 26 Mar 2026 14:26:15 GMT</pubDate>
    <dc:creator>V.Sambath</dc:creator>
    <dc:date>2026-03-26T14:26:15Z</dc:date>
    <item>
      <title>Trendmicro application identified as "ssl" despite of proper SNI, CN, SAN.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trendmicro-application-identified-as-quot-ssl-quot-despite-of/m-p/1242359#M125528</link>
      <description>&lt;UL&gt;
&lt;LI data-start="72" data-end="446"&gt;We have the Trend Micro agent installed on the endpoints, and it is running smoothly. However, the application is still being identified as &lt;STRONG data-start="239" data-end="248"&gt;"ssl"&lt;/STRONG&gt;, even though the packet captures show the correct SNI value in the Client Hello. In the Server Hello, both the SAN and CN fields contain multiple wildcard entries ending with &lt;STRONG data-start="424" data-end="445"&gt;*.trendmicro.com&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI data-start="448" data-end="514"&gt;
&lt;P data-start="450" data-end="514"&gt;The URL category is successfully identified as &lt;STRONG data-start="497" data-end="514"&gt;“Trendmicro.”&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="516" data-end="695"&gt;We filtered for the Server Hello packets and confirmed that the certificate includes the Common Name and SAN fields with multiple wildcard entries ending in &lt;STRONG data-start="673" data-end="694"&gt;*.trendmicro.com&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;ARTICLE class="text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;amp;:has([data-writing-block])&amp;gt;*]:pointer-events-auto [content-visibility:auto] supports-[content-visibility:auto]:[contain-intrinsic-size:auto_100lvh] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn-id="request-691dbe43-6550-832e-b9f0-6f4ae9b10d36-2" data-testid="conversation-turn-32" data-scroll-anchor="true" data-turn="assistant"&gt;
&lt;DIV class="text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] thread-sm:[--thread-content-margin:--spacing(6)] thread-lg:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)"&gt;
&lt;DIV class="[--thread-content-max-width:40rem] thread-lg:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn" tabindex="-1"&gt;
&lt;DIV class="flex max-w-full flex-col grow"&gt;
&lt;DIV class="min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;amp;]:mt-1" dir="auto" data-message-author-role="assistant" data-message-id="9b1cefe4-a0c9-4cb0-801a-298f34fa27dc" data-message-model-slug="gpt-5-1"&gt;
&lt;DIV class="flex w-full flex-col gap-1 empty:hidden first:pt-[1px]"&gt;
&lt;DIV class="markdown prose dark:prose-invert w-full break-words light markdown-new-styling"&gt;
&lt;P data-start="32" data-end="200" data-is-last-node="" data-is-only-node=""&gt;&lt;STRONG data-start="32" data-end="200" data-is-last-node=""&gt;We are not opting for App Override or creating a custom application because the other firewalls are able to identify this traffic correctly even without decryption.&lt;/STRONG&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/ARTICLE&gt;</description>
      <pubDate>Fri, 21 Nov 2025 06:54:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trendmicro-application-identified-as-quot-ssl-quot-despite-of/m-p/1242359#M125528</guid>
      <dc:creator>V.Sambath</dc:creator>
      <dc:date>2025-11-21T06:54:11Z</dc:date>
    </item>
    <item>
      <title>Re: Trendmicro application identified as "ssl" despite of proper SNI, CN, SAN.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trendmicro-application-identified-as-quot-ssl-quot-despite-of/m-p/1242501#M125555</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/788658209"&gt;@V.Sambath&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do all endpoints behind this firewall experience the same misclassification or is it from a single client? Also,&amp;nbsp;whatis the App-ID content version on the firewall vs. the other firewalls that identify it correctly?&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2025 23:27:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trendmicro-application-identified-as-quot-ssl-quot-despite-of/m-p/1242501#M125555</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2025-11-24T23:27:17Z</dc:date>
    </item>
    <item>
      <title>Re: Trendmicro application identified as "ssl" despite of proper SNI, CN, SAN.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trendmicro-application-identified-as-quot-ssl-quot-despite-of/m-p/1242590#M125571</link>
      <description>&lt;P&gt;app-id does not solely rely on SNI to identify some applications which may be the case here. have you enabled ssl decryption so the content/payload can be identified by app-id?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Nov 2025 16:50:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trendmicro-application-identified-as-quot-ssl-quot-despite-of/m-p/1242590#M125571</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2025-11-25T16:50:57Z</dc:date>
    </item>
    <item>
      <title>Re: Trendmicro application identified as "ssl" despite of proper SNI, CN, SAN.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trendmicro-application-identified-as-quot-ssl-quot-despite-of/m-p/1242726#M125588</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/220841"&gt;@JayGolf&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;- On all endpoints where Trend Micro is installed, the traffic is being detected only as “ssl"&lt;BR /&gt;- The PA firewalls have the latest content updates installed. When I mentioned “other firewalls,” I was referring to the Fortinet firewalls.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Nov 2025 10:56:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trendmicro-application-identified-as-quot-ssl-quot-despite-of/m-p/1242726#M125588</guid>
      <dc:creator>V.Sambath</dc:creator>
      <dc:date>2025-11-27T10:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: Trendmicro application identified as "ssl" despite of proper SNI, CN, SAN.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trendmicro-application-identified-as-quot-ssl-quot-despite-of/m-p/1242730#M125589</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;ARTICLE class="text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;amp;:has([data-writing-block])&amp;gt;*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn-id="request-6926abea-7d5c-8331-8cba-037d1b54a69e-3" data-testid="conversation-turn-28" data-scroll-anchor="true" data-turn="assistant"&gt;
&lt;DIV class="text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] thread-sm:[--thread-content-margin:--spacing(6)] thread-lg:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)"&gt;
&lt;DIV class="[--thread-content-max-width:40rem] thread-lg:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn" tabindex="-1"&gt;
&lt;DIV class="flex max-w-full flex-col grow"&gt;
&lt;DIV class="min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;amp;]:mt-1" dir="auto" data-message-author-role="assistant" data-message-id="5792bca3-bfcf-49be-be76-775694115b3a" data-message-model-slug="gpt-5-1"&gt;
&lt;DIV class="flex w-full flex-col gap-1 empty:hidden first:pt-[1px]"&gt;
&lt;DIV class="markdown prose dark:prose-invert w-full break-words light markdown-new-styling"&gt;
&lt;P data-start="49" data-end="427" data-is-last-node="" data-is-only-node=""&gt;I am confident that enabling SSL decryption might help here. However, I also have Fortinet firewalls where the SSL Deep Inspection profile is &lt;STRONG data-start="203" data-end="210"&gt;not&lt;/STRONG&gt; enabled, and those firewalls are still able to identify the application "trendmicro" without decryption. Since Trend Micro is a well-known application, I’m a bit surprised that PAs does not appear to have signatures for it.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/ARTICLE&gt;</description>
      <pubDate>Thu, 27 Nov 2025 11:15:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trendmicro-application-identified-as-quot-ssl-quot-despite-of/m-p/1242730#M125589</guid>
      <dc:creator>V.Sambath</dc:creator>
      <dc:date>2025-11-27T11:15:14Z</dc:date>
    </item>
    <item>
      <title>Re: Trendmicro application identified as "ssl" despite of proper SNI, CN, SAN.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trendmicro-application-identified-as-quot-ssl-quot-despite-of/m-p/1243364#M125661</link>
      <description>&lt;P&gt;that's where a choice actually pops up:&lt;/P&gt;
&lt;P&gt;since this is ssl encryoted traffic, there can't be a 'signature' to identify it and the only identifier is the SNI on the certificate&lt;/P&gt;
&lt;P&gt;maybe forti chose to blanket all the traffic using the sni whereas palo identifies this as a web category but not necessarily an application&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can easily create a custom app for an SNI by the way&lt;/P&gt;</description>
      <pubDate>Mon, 08 Dec 2025 16:17:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trendmicro-application-identified-as-quot-ssl-quot-despite-of/m-p/1243364#M125661</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2025-12-08T16:17:22Z</dc:date>
    </item>
    <item>
      <title>Re: Trendmicro application identified as "ssl" despite of proper SNI, CN, SAN.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trendmicro-application-identified-as-quot-ssl-quot-despite-of/m-p/1251019#M126199</link>
      <description>&lt;P&gt;Palo alto incorporated the request and released a fix through the content updates.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2026 14:26:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trendmicro-application-identified-as-quot-ssl-quot-despite-of/m-p/1251019#M126199</guid>
      <dc:creator>V.Sambath</dc:creator>
      <dc:date>2026-03-26T14:26:15Z</dc:date>
    </item>
  </channel>
</rss>

