<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Suspicious DNS Query - conficker in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38431#M28154</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The traffic is in an isolated vlan which can only access the internet, not other internal subnets. A strict policy is in place to ensure this. I see no reason why this network should not be behind the main firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 30 Sep 2013 10:17:28 GMT</pubDate>
    <dc:creator>${userLoginName}</dc:creator>
    <dc:date>2013-09-30T10:17:28Z</dc:date>
    <item>
      <title>Suspicious DNS Query - conficker</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38422#M28145</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way for not letting conficker fill up the threat logs? Or an easy way to filter them out? I have 1000+ logs from 1 host on just a few hours and it is getting hard to see the other threats... Even in the ACC, I get a list full of conficker, nothing else. This is caused by every conficker URL being identified as a different threat ID.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Sep 2013 19:26:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38422#M28145</guid>
      <dc:creator>${userLoginName}</dc:creator>
      <dc:date>2013-09-21T19:26:55Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - conficker</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38423#M28146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the anti-spyware profile and add the exception for DNS queries not to be populated in the threat logs by choosing the action allow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="8510" alt="spyware.PNG.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/8510_spyware.PNG.png" style="width: 620px; height: 390px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Associate the profile to the rule which the traffic is hitting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Syed R Hasnain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Sep 2013 20:23:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38423#M28146</guid>
      <dc:creator>shasnain</dc:creator>
      <dc:date>2013-09-21T20:23:49Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - conficker</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38424#M28147</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So I would need to create a new rule above the one that allows it at the moment with source IP the infected clients (otherwise I would not know when other clients have it)?&lt;/P&gt;&lt;P&gt;Also, the conficker threat has a lot of threat ID's, so setting all DNS queries to all would make other threats not show up in the logs?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Sep 2013 21:23:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38424#M28147</guid>
      <dc:creator>${userLoginName}</dc:creator>
      <dc:date>2013-09-21T21:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - conficker</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38425#M28148</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Yes, you &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;need to create a new rule above the one that allows it&lt;/SPAN&gt; currently in order to apply the &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;anti-spyware profile&lt;/SPAN&gt; .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below mentioned discussion may help you&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/message/25883"&gt;Suspicious DNS Query - how to find source computer?&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Sep 2013 22:27:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38425#M28148</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2013-09-21T22:27:15Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - conficker</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38426#M28149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; You can use individual threat IDS and add them in the exception and set the action for them as allow as shown above in the snap shot..So in this way you will not be doing for all the threats but just for some individuals not to be populated in the threat logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Syed R Hasnain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Sep 2013 00:00:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38426#M28149</guid>
      <dc:creator>shasnain</dc:creator>
      <dc:date>2013-09-22T00:00:18Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - conficker</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38427#M28150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Using individual threat ID'is is not an option I believe, since conficker seems to have a lot of different threat ID's. I was trying to filter them out of my threat logs but after removing 20-30 of them, there were still a lot more that needed to be filtered out.&lt;/P&gt;&lt;P&gt;It seems there is no reasonable way to "group" the conficker threat and filter it out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since conficker uses a generic url and PA creates a different ID for each of them, the exception list would grow rapidly every day. I am not sure about this, but it seems logical.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Sep 2013 05:59:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38427#M28150</guid>
      <dc:creator>${userLoginName}</dc:creator>
      <dc:date>2013-09-27T05:59:22Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - conficker</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38428#M28151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmmm, sorry, but disconnecting the affected system from the network and cleaning it is what I would consider the right approach..... And as a side effect the log entries will go away....&lt;/P&gt;&lt;P&gt;We are talking IT security right &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Sep 2013 14:42:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38428#M28151</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2013-09-27T14:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - conficker</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38429#M28152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This was indeed the first thing that came to my mind, but in our case, hosts in the guest network are not controlled by our IT team.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 07:04:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38429#M28152</guid>
      <dc:creator>${userLoginName}</dc:creator>
      <dc:date>2013-09-30T07:04:29Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - conficker</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38430#M28153</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just for clarification. You are not responsible for the guest network, but the traffic from the guest network is traversing your firewall ?&lt;/P&gt;&lt;P&gt;I would never allow a guest which is malware infected to use my network or traverse my firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 09:23:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38430#M28153</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2013-09-30T09:23:47Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - conficker</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38431#M28154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The traffic is in an isolated vlan which can only access the internet, not other internal subnets. A strict policy is in place to ensure this. I see no reason why this network should not be behind the main firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 10:17:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38431#M28154</guid>
      <dc:creator>${userLoginName}</dc:creator>
      <dc:date>2013-09-30T10:17:28Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - conficker</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38432#M28155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Of course you should filter these clients aswell but one reason (to use a dedicated firewall for these clients that is) is to avoid a DDoS situation (from an infected client connected to this guest network).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 10:22:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38432#M28155</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-09-30T10:22:07Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - conficker</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38433#M28156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/u1/4124"&gt;gafrol&lt;/A&gt;: you have no idea where he works or what kind of network he's on. This is a common thing at universities, for example. The IT team isn't allowed to ride in on their high horse and grab a laptop, the most they can do is advise a student that they're infected.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 13:26:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38433#M28156</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-09-30T13:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - conficker</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38434#M28157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Even if it's a university, what could be against blocking malware traffic at the firewall level ?&lt;/P&gt;&lt;P&gt;I have made first hand experience with a university in Europe being disconnected from their Internet Link by the provider due to outbound malware traffic coming from the universities IP's....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 13:58:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38434#M28157</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2013-09-30T13:58:44Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query - conficker</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38435#M28158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had this issue a year ago and it was a pain to see logs filled with conficker. The way i resolved this matter is by blocking .dll files. After i did that i haven't seen any conficker on my logs. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Oct 2013 03:02:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-conficker/m-p/38435#M28158</guid>
      <dc:creator>Kali</dc:creator>
      <dc:date>2013-10-03T03:02:18Z</dc:date>
    </item>
  </channel>
</rss>

