<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic default action = alert? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/default-action-alert/m-p/42911#M31494</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In browsing through the default actions for vulnerabilities, spyware and AV I see that the a lot of the actions for HIGH and CRITICAL severity events is just Alert.&amp;nbsp; I expected a lot more blocking, dropping, and resetting.&amp;nbsp;&amp;nbsp; (half of High and &amp;gt;10% of Critical Vulnerabilities and the vast majority of High and Critical anti-spyware are Alert only)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why just Alert?&amp;nbsp; False positives, overly cautious, angry mobs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 09 Jul 2012 19:12:21 GMT</pubDate>
    <dc:creator>schaleg2</dc:creator>
    <dc:date>2012-07-09T19:12:21Z</dc:date>
    <item>
      <title>default action = alert?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/default-action-alert/m-p/42911#M31494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In browsing through the default actions for vulnerabilities, spyware and AV I see that the a lot of the actions for HIGH and CRITICAL severity events is just Alert.&amp;nbsp; I expected a lot more blocking, dropping, and resetting.&amp;nbsp;&amp;nbsp; (half of High and &amp;gt;10% of Critical Vulnerabilities and the vast majority of High and Critical anti-spyware are Alert only)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why just Alert?&amp;nbsp; False positives, overly cautious, angry mobs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jul 2012 19:12:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/default-action-alert/m-p/42911#M31494</guid>
      <dc:creator>schaleg2</dc:creator>
      <dc:date>2012-07-09T19:12:21Z</dc:date>
    </item>
    <item>
      <title>Re: default action = alert?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/default-action-alert/m-p/42912#M31495</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I cant answer your specific question but when using the recommended setup of:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Critical: block&lt;/P&gt;&lt;P&gt;High: block&lt;/P&gt;&lt;P&gt;Medium: block&lt;/P&gt;&lt;P&gt;Low: default&lt;/P&gt;&lt;P&gt;Informational: default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the threats classified as critical, high or medium will then be blocked no matter what their default action is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My guess is that the risk of false positives is a major factor of why not more critical and high threats have block as their default action. This becomes more obvious when you look at the low and informational threats. One of them is a signature for url's in pdf's. I mean - pretty common these days but also common for pdf's containing exploits. So if you would block such pdf's you would most likely get shitloads of false positives which then would hide the true threats (pdf's who are actually infected). But on the other hand if you know that for example one of your fileservers (which you wish to protect with a PA) never would contain such pdfs you could use this threatid without any false positives.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2012 06:21:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/default-action-alert/m-p/42912#M31495</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-07-10T06:21:07Z</dc:date>
    </item>
  </channel>
</rss>

