<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to properly configure POP3 AV and malware inspection in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-properly-configure-pop3-av-and-malware-inspection/m-p/75500#M42003</link>
    <description>&lt;P&gt;Dear Live Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was wondering how I have ro configure pop3 traffic inspection in order to protect my network from malware and viruses in mails sent to me. My Linux server pulls various mail servers in the internet using fetchmail every couple of minutes. The connection is tcp/995 POP3S. The PAN is working in virtual wire mode between my main switch and the DSL router. I have wildfir&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've configured a decryption profile for the POP3 servers and from certification validation errors in fetchmail in the beginning I can see that the decryption is actually taking place &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; (problem fixed in the meantime).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've now added a rule in my security polic:&lt;/P&gt;
&lt;P&gt;From trust (internal) zone to POP3 servers in the untrust (Internet) zone, adresses: all POP3 servers referenced via IP, application: pop3 and ssl, services: pop3 and pop3s (tcp\110, tcp\995), Policy: "allow", Activated inspection profiles: AV, Vuln protection, Anti-Spyware, URL Filtering, File Blocking, WildFire. Settings in the profiles: Mostly default or alert. From what I've read, the "ssl" application should not be necessary, as the application is just "pop3" when the session is decrypted but nevertheless...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So far I've not received a single alert for malware in one of the emails, but have received quite a couple of mails with malicious attachments (e.g. Locky ransomware). These attachments fortunately were filtered by my endpoint AV product.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What am I missing? Why isn't the PAN blocking these attachments?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 30 Mar 2016 19:44:57 GMT</pubDate>
    <dc:creator>daubsi</dc:creator>
    <dc:date>2016-03-30T19:44:57Z</dc:date>
    <item>
      <title>How to properly configure POP3 AV and malware inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-properly-configure-pop3-av-and-malware-inspection/m-p/75500#M42003</link>
      <description>&lt;P&gt;Dear Live Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was wondering how I have ro configure pop3 traffic inspection in order to protect my network from malware and viruses in mails sent to me. My Linux server pulls various mail servers in the internet using fetchmail every couple of minutes. The connection is tcp/995 POP3S. The PAN is working in virtual wire mode between my main switch and the DSL router. I have wildfir&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've configured a decryption profile for the POP3 servers and from certification validation errors in fetchmail in the beginning I can see that the decryption is actually taking place &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; (problem fixed in the meantime).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've now added a rule in my security polic:&lt;/P&gt;
&lt;P&gt;From trust (internal) zone to POP3 servers in the untrust (Internet) zone, adresses: all POP3 servers referenced via IP, application: pop3 and ssl, services: pop3 and pop3s (tcp\110, tcp\995), Policy: "allow", Activated inspection profiles: AV, Vuln protection, Anti-Spyware, URL Filtering, File Blocking, WildFire. Settings in the profiles: Mostly default or alert. From what I've read, the "ssl" application should not be necessary, as the application is just "pop3" when the session is decrypted but nevertheless...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So far I've not received a single alert for malware in one of the emails, but have received quite a couple of mails with malicious attachments (e.g. Locky ransomware). These attachments fortunately were filtered by my endpoint AV product.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What am I missing? Why isn't the PAN blocking these attachments?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 19:44:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-properly-configure-pop3-av-and-malware-inspection/m-p/75500#M42003</guid>
      <dc:creator>daubsi</dc:creator>
      <dc:date>2016-03-30T19:44:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to properly configure POP3 AV and malware inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-properly-configure-pop3-av-and-malware-inspection/m-p/75501#M42004</link>
      <description>&lt;P&gt;And another question comes to my mind: How would the FW actually block the malicious content?&lt;/P&gt;
&lt;P&gt;I've seen blog posts where the FW interferes with a SMTP transfer and sends an Error 541 to the sending MTA, so the mail is actually not transfered to the protected ressources, but how will it be with POP3?&lt;/P&gt;
&lt;P&gt;The malicious mail is already at my provider and when I retrieve the mails using POP3, what will be transfered if malicious content is identified in 1 out of 10 messages on the server? Nothing? 9 mails? All 10 mails? Will the blocked mail stay on the POP3 server and will be transferred on every sync again and again?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 19:54:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-properly-configure-pop3-av-and-malware-inspection/m-p/75501#M42004</guid>
      <dc:creator>daubsi</dc:creator>
      <dc:date>2016-03-30T19:54:26Z</dc:date>
    </item>
  </channel>
</rss>

