<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: POODLE BITES Vulnerability in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/poodle-bites-and-other-informational-vulnerabilities/m-p/69638#M40350</link>
    <description>&lt;P&gt;Any suggestions from the table?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or do I take it from the silence that others don't have a hard and fast rule for dealing with informational threats?&lt;/P&gt;</description>
    <pubDate>Fri, 18 Dec 2015 11:57:20 GMT</pubDate>
    <dc:creator>JRussell</dc:creator>
    <dc:date>2015-12-18T11:57:20Z</dc:date>
    <item>
      <title>POODLE BITES  (and other Informational Vulnerabilities )</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/poodle-bites-and-other-informational-vulnerabilities/m-p/69544#M40331</link>
      <description>&lt;P&gt;Just wanted to gauge what others are doing with regards to this particular vulnerability if anything.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Historically this has been set to reset-both on this vulnerability. Which, by and large doesn't seem to cause that much of a problem on most sites, but I suppose the question I was asking is, is this something I should be blocking/resetting, or just logging instances for this and it is something I can allow through?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And I suppose the same goes for other "informational" vulnerabilities. How are others dealing with these?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2015 12:58:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/poodle-bites-and-other-informational-vulnerabilities/m-p/69544#M40331</guid>
      <dc:creator>JRussell</dc:creator>
      <dc:date>2015-12-17T12:58:20Z</dc:date>
    </item>
    <item>
      <title>Re: POODLE BITES Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/poodle-bites-and-other-informational-vulnerabilities/m-p/69569#M40338</link>
      <description>&lt;P&gt;I am also think that it is informational.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2015 01:22:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/poodle-bites-and-other-informational-vulnerabilities/m-p/69569#M40338</guid>
      <dc:creator>gombodorj</dc:creator>
      <dc:date>2015-12-17T01:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: POODLE BITES Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/poodle-bites-and-other-informational-vulnerabilities/m-p/69584#M40340</link>
      <description>&lt;P&gt;Yes. They are both "informational" threats. Just wanting to see how others treat these? Do you not bother with them at all and allow them all through? Or do you reset them? Or only in high risk (finance) pcs?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2015 09:41:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/poodle-bites-and-other-informational-vulnerabilities/m-p/69584#M40340</guid>
      <dc:creator>JRussell</dc:creator>
      <dc:date>2015-12-17T09:41:28Z</dc:date>
    </item>
    <item>
      <title>Re: POODLE BITES Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/poodle-bites-and-other-informational-vulnerabilities/m-p/69638#M40350</link>
      <description>&lt;P&gt;Any suggestions from the table?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or do I take it from the silence that others don't have a hard and fast rule for dealing with informational threats?&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2015 11:57:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/poodle-bites-and-other-informational-vulnerabilities/m-p/69638#M40350</guid>
      <dc:creator>JRussell</dc:creator>
      <dc:date>2015-12-18T11:57:20Z</dc:date>
    </item>
    <item>
      <title>Re: POODLE BITES Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/poodle-bites-and-other-informational-vulnerabilities/m-p/69639#M40351</link>
      <description>&lt;P&gt;Informational vulnerabilities are usually either low threat to benign and very uncommon in the wild. It's good to have logging up so you can monitor in case it does pop up&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;tom&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2015 12:21:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/poodle-bites-and-other-informational-vulnerabilities/m-p/69639#M40351</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2015-12-18T12:21:08Z</dc:date>
    </item>
  </channel>
</rss>

