<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Custom Report - Maximum Limits in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/custom-report-maximum-limits/m-p/119093#M45748</link>
    <description>&lt;P&gt;I'm currently trying to produce a custom report and i'm hitting a few walls trying to generate useful data - I'm hoping someone here might have some creative ideas, or even point out the obvious ones I may have missed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We currently have a blacklist of source IP's which relate to brute&amp;nbsp;force threats which we use in a threat rule, as we see new 'attacks' we add the sources to this&amp;nbsp;list. However as a lot of these sources can indeed be legitimate hosts or gateways, we don't want to block them indefinitely.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What we want to do is run a report on a specific threat rule every 24 hours and create a list of source IP's (with duplicates removed). We'd then compare this to our blacklist and if we see a particular source ip is no longer a potential threat we would then remove that source from our black list to avoid blocking any legitimate&amp;nbsp;traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The current problem is any way I try to run the report and export data we easily surpass&amp;nbsp;the maximum&amp;nbsp;logged events in a 24 hour period - however most of these will be the same source for a 10,000+ events&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there ANY way I can create a report for a threat rule, just showing unique source ip's and removing duplicates? If that makes sense. I just want to know there were 800 unique sources trying to brutforce and this is the list of IP's.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've tried filtering and calving up the data by subnet range but that's getting too messy and time consuming.. everything else either hits the sort by 500 limit or the 1,000,000+ maximum row CSV limit.. ALL&amp;nbsp;are still&amp;nbsp;filled&amp;nbsp;with hundreds of duplicate source ips&amp;nbsp;so I don't get all the data regardless.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm at a bit of a loss so any advice&amp;nbsp;or pointing in the right direction would be great.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Thu, 13 Oct 2016 15:46:11 GMT</pubDate>
    <dc:creator>Jason.Hill</dc:creator>
    <dc:date>2016-10-13T15:46:11Z</dc:date>
    <item>
      <title>Custom Report - Maximum Limits</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-report-maximum-limits/m-p/119093#M45748</link>
      <description>&lt;P&gt;I'm currently trying to produce a custom report and i'm hitting a few walls trying to generate useful data - I'm hoping someone here might have some creative ideas, or even point out the obvious ones I may have missed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We currently have a blacklist of source IP's which relate to brute&amp;nbsp;force threats which we use in a threat rule, as we see new 'attacks' we add the sources to this&amp;nbsp;list. However as a lot of these sources can indeed be legitimate hosts or gateways, we don't want to block them indefinitely.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What we want to do is run a report on a specific threat rule every 24 hours and create a list of source IP's (with duplicates removed). We'd then compare this to our blacklist and if we see a particular source ip is no longer a potential threat we would then remove that source from our black list to avoid blocking any legitimate&amp;nbsp;traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The current problem is any way I try to run the report and export data we easily surpass&amp;nbsp;the maximum&amp;nbsp;logged events in a 24 hour period - however most of these will be the same source for a 10,000+ events&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there ANY way I can create a report for a threat rule, just showing unique source ip's and removing duplicates? If that makes sense. I just want to know there were 800 unique sources trying to brutforce and this is the list of IP's.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've tried filtering and calving up the data by subnet range but that's getting too messy and time consuming.. everything else either hits the sort by 500 limit or the 1,000,000+ maximum row CSV limit.. ALL&amp;nbsp;are still&amp;nbsp;filled&amp;nbsp;with hundreds of duplicate source ips&amp;nbsp;so I don't get all the data regardless.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm at a bit of a loss so any advice&amp;nbsp;or pointing in the right direction would be great.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2016 15:46:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-report-maximum-limits/m-p/119093#M45748</guid>
      <dc:creator>Jason.Hill</dc:creator>
      <dc:date>2016-10-13T15:46:11Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Report - Maximum Limits</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-report-maximum-limits/m-p/119107#M45756</link>
      <description>&lt;P&gt;There's no getting around the on-box 500 limit today. &amp;nbsp;If you want more than 500, you should contact your Palo Alto Networks SE and ask for a feature request. &amp;nbsp;For more than 500, you'll need to go off-box. &amp;nbsp;More on that later. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can aggregate the source-IPs in custom reporting. &amp;nbsp;I don't have much in the way of brute-forcing, so my custom report query is looking for threat type scan... but you can use (threatid eq xxxxx) if there's a particular IPS signature you're interested in, or some other variable that works for you. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Make a new custom report, use the Threat Summary database, make sure Selected Columns have only Source address and Count. &amp;nbsp;Pick a short timeframe first (15 minutes, 1 hour, etc.) just to make sure it looks like what you're expecting. &amp;nbsp;(I expanded mine to 30-days because a single day's scan traffic is underwhelming). &amp;nbsp;Modify the query to your environment. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="report2.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/5897i940599C3AEB5F3B9/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="report2.png" alt="report2.png" /&gt;&lt;/span&gt;﻿&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="report3.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/5898i4FAF517140B73DF6/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="report3.png" alt="report3.png" /&gt;&lt;/span&gt;﻿&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As you can see, the firewall de-duplicates and then provides a count for each source address. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the 500-limit is interferring with your ability to address this requirement, I suggest looking into the free MineMeld (&lt;A href="https://live.paloaltonetworks.com/t5/MineMeld/ct-p/MineMeld" target="_self"&gt;https://live.paloaltonetworks.com/t5/MineMeld/ct-p/MineMeld&lt;/A&gt;) tool. &amp;nbsp;It should be able to ingest threat syslogs from your firewall, look for certain events, populate the offender into a dynamic address object group (which is already referenced in your security policy with a "deny" action), and then remove the offender after a configurable time limit. &amp;nbsp;It'll require some legwork, but probably not anywhere near as much as trying to automate the report, ingest the report, build the object group, etc. from scratch. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2016 19:39:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-report-maximum-limits/m-p/119107#M45756</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2016-10-13T19:39:47Z</dc:date>
    </item>
  </channel>
</rss>

