<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Would Traps be able to detect and kill this file on the host without requiring any manual remediation? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/would-traps-be-able-to-detect-and-kill-this-file-on-the-host/m-p/30930#M22640</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Emma,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It depends on the policy pushed to the client machine whether word process is protected or not.&lt;/P&gt;&lt;P&gt;If it is then yes, Traps will detect the exploit and won't display the file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hari Yadavalli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 06 Mar 2015 15:36:43 GMT</pubDate>
    <dc:creator>hyadavalli</dc:creator>
    <dc:date>2015-03-06T15:36:43Z</dc:date>
    <item>
      <title>Would Traps be able to detect and kill this file on the host without requiring any manual remediation?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/would-traps-be-able-to-detect-and-kill-this-file-on-the-host/m-p/30929#M22639</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A customer is seeing infected word files with macro in their network. The firewall is not able to block this file because the macro keeps changing file hash, even with WildFire enabled.&lt;/P&gt;&lt;P&gt;Would Traps be able to detect and kill this file on the host without requiring any manual remediation?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Mar 2015 01:45:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/would-traps-be-able-to-detect-and-kill-this-file-on-the-host/m-p/30929#M22639</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2015-03-06T01:45:50Z</dc:date>
    </item>
    <item>
      <title>Re: Would Traps be able to detect and kill this file on the host without requiring any manual remediation?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/would-traps-be-able-to-detect-and-kill-this-file-on-the-host/m-p/30930#M22640</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Emma,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It depends on the policy pushed to the client machine whether word process is protected or not.&lt;/P&gt;&lt;P&gt;If it is then yes, Traps will detect the exploit and won't display the file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hari Yadavalli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Mar 2015 15:36:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/would-traps-be-able-to-detect-and-kill-this-file-on-the-host/m-p/30930#M22640</guid>
      <dc:creator>hyadavalli</dc:creator>
      <dc:date>2015-03-06T15:36:43Z</dc:date>
    </item>
    <item>
      <title>Re: Would Traps be able to detect and kill this file on the host without requiring any manual remediation?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/would-traps-be-able-to-detect-and-kill-this-file-on-the-host/m-p/30931#M22641</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Note that TRAPS works in a completely different way than current AV products.&amp;nbsp; AV using signatures that are evaded by the technique you note.&amp;nbsp; TRAPS watches the actual behavior against exploit behavior and stops the action or logs the activity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/31/endpoint/endpoint-admin-guide/advanced-endpoint-protection-overview/advanced-endpoint-protection-overview.html#38578" title="https://www.paloaltonetworks.com/documentation/31/endpoint/endpoint-admin-guide/advanced-endpoint-protection-overview/advanced-endpoint-protection-overview.html#38578"&gt;Advanced Endpoint Protection Overview&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Mar 2015 12:52:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/would-traps-be-able-to-detect-and-kill-this-file-on-the-host/m-p/30931#M22641</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-03-07T12:52:49Z</dc:date>
    </item>
    <item>
      <title>Re: Would Traps be able to detect and kill this file on the host without requiring any manual remediation?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/would-traps-be-able-to-detect-and-kill-this-file-on-the-host/m-p/30932#M22642</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As already said, if the macro is malicious (exploit vulnerabilty on the endpoint) then most probably Traps will stop it from happening. I made a short video to demo Traps preventing an endpoint from being exploited by a vuln. in Adobe Flash just to give an idea.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=uD12Bh9RuwU" title="https://www.youtube.com/watch?v=uD12Bh9RuwU"&gt;Traps - Advanced Endpoint Protection by Palo Alto Networks - YouTube&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One of the key advantages of Traps is that it does not require any remediation after prevention, although the malicious files should get deleted/quarantined on the endpoint once a legacy AV solution has a signature....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Mar 2015 14:37:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/would-traps-be-able-to-detect-and-kill-this-file-on-the-host/m-p/30932#M22642</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2015-03-10T14:37:51Z</dc:date>
    </item>
  </channel>
</rss>

