<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tracking an infected computer in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/tracking-an-infected-computer/m-p/46986#M34534</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Todd,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any related information pops up under Monitor &amp;gt; Threat logs...?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also please apply below mentioned command to stop suppressing repetitive logs on PAN FW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;# set &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFATWARE_spelling" style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;deviceconfig&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt; setting logging log-suppression no&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Thanks&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 03 Jan 2014 21:28:36 GMT</pubDate>
    <dc:creator>HULK</dc:creator>
    <dc:date>2014-01-03T21:28:36Z</dc:date>
    <item>
      <title>Tracking an infected computer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tracking-an-infected-computer/m-p/46985#M34533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I got a notice from my ISP that we have a Conficker infected system (&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif';"&gt;downadup&lt;/SPAN&gt;) but I am coming up with nothing when I try to find it.&amp;nbsp; The less than helpful info I recieve is the first octet of the target IP (38) and source port &lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif';"&gt;61494&lt;/SPAN&gt;, which map to hundreds of system.&amp;nbsp; I also have a destination port of 80, again very helpful.&amp;nbsp; The firewall is NATing for about 2000 systems.&amp;nbsp; Has anyone used their panos box to track a system before and if so what did you do?&amp;nbsp; We have ESET deployed for anti-virus and it is not showing anything right now.&amp;nbsp; We could be missing a system though.&amp;nbsp; I am still fairly new to my PA-3020 box so use small words please.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been using the threat log and tried the pre-built reports.&amp;nbsp; The Monitor Logs are amazing but I can't seem to narrow the search enough to find the problem.&amp;nbsp; I only have the URL filter and threat prevention license on 5.0.9&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Todd&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Jan 2014 20:18:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tracking-an-infected-computer/m-p/46985#M34533</guid>
      <dc:creator>ToddJohnsen</dc:creator>
      <dc:date>2014-01-03T20:18:22Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking an infected computer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tracking-an-infected-computer/m-p/46986#M34534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Todd,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any related information pops up under Monitor &amp;gt; Threat logs...?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also please apply below mentioned command to stop suppressing repetitive logs on PAN FW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;# set &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFATWARE_spelling" style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;deviceconfig&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt; setting logging log-suppression no&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Thanks&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Jan 2014 21:28:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tracking-an-infected-computer/m-p/46986#M34534</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-01-03T21:28:36Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking an infected computer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tracking-an-infected-computer/m-p/46987#M34535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Todd&lt;/P&gt;&lt;P&gt;The simplest way is to make a filter in Thread log&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2014-01-04_182054.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/10600_2014-01-04_182054.png" style="width: 620px; height: 105px;" /&gt;&lt;/P&gt;&lt;P&gt;I'm not sure that every variant of Conficker has 12544 id, so You can remove "and ( threatid eq 12544 )"&lt;/P&gt;&lt;P&gt;Of course You mast have Thret prevention profile added to security rule that is allowing traffic from You networks to Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;SLawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 Jan 2014 17:23:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tracking-an-infected-computer/m-p/46987#M34535</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2014-01-04T17:23:56Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking an infected computer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tracking-an-infected-computer/m-p/46988#M34536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks SLawek,&lt;/P&gt;&lt;P&gt;I finally figured it out with your help.&amp;nbsp; I ran the Threats report and found all the Suspicious DNS Query results I had been unable to find before.&amp;nbsp; Each one has a different ID code that I was able to search for in the Threat log as you describe with great success.&amp;nbsp; Looks like I should be able to trace this after all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="ThreatIDs.PNG.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/10668_ThreatIDs.PNG.png" style="width: 620px; height: 199px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Todd&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Jan 2014 19:55:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tracking-an-infected-computer/m-p/46988#M34536</guid>
      <dc:creator>ToddJohnsen</dc:creator>
      <dc:date>2014-01-07T19:55:59Z</dc:date>
    </item>
  </channel>
</rss>

