<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS traffic identified as sophos-live-protection in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/121437#M46044</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If that is the case then I would advise you open a case with TAC to get the traffic investigated, could be legimate or mis-identification. Your best bet is to run a packet capture to see what the query is that is trigging this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Take a look here on how to run a capture:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-Packet-Capture/ta-p/72069" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-Packet-Capture/ta-p/72069&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
    <pubDate>Wed, 26 Oct 2016 10:45:33 GMT</pubDate>
    <dc:creator>bmorris1</dc:creator>
    <dc:date>2016-10-26T10:45:33Z</dc:date>
    <item>
      <title>DNS traffic identified as sophos-live-protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/121426#M46041</link>
      <description>&lt;P&gt;Some DNS traffic is classified as sophos-live-protection in our traffic logs. Has anyone else seen this? I only have logs 5 days back in time, so I cannot say when this started but it wasn't with the latest apps update. Our firewall is PA-5050 running PAN-OS 6.1.14.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Oct 2016 10:28:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/121426#M46041</guid>
      <dc:creator>LCMember1959</dc:creator>
      <dc:date>2016-10-26T10:28:31Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic identified as sophos-live-protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/121428#M46042</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;UDP 53 is one of the standard ports used in the sophos-live-protection app signature. If you run a packet capture, check the queries to see if they are going towards sophos. Sophos uses specially crafted DNS packets to function, I believe this is how it does the live lookup functionality.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hope this helps,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Wed, 26 Oct 2016 10:39:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/121428#M46042</guid>
      <dc:creator>bmorris1</dc:creator>
      <dc:date>2016-10-26T10:39:37Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic identified as sophos-live-protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/121431#M46043</link>
      <description>&lt;P&gt;Some of this traffic is coming from our domain controllers (to external DNS servers), and they have no Sophos installed. To my knowledge we don't use any Sophos software whatsoever in our network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Oct 2016 10:42:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/121431#M46043</guid>
      <dc:creator>LCMember1959</dc:creator>
      <dc:date>2016-10-26T10:42:10Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic identified as sophos-live-protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/121437#M46044</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If that is the case then I would advise you open a case with TAC to get the traffic investigated, could be legimate or mis-identification. Your best bet is to run a packet capture to see what the query is that is trigging this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Take a look here on how to run a capture:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-Packet-Capture/ta-p/72069" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-Packet-Capture/ta-p/72069&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Wed, 26 Oct 2016 10:45:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/121437#M46044</guid>
      <dc:creator>bmorris1</dc:creator>
      <dc:date>2016-10-26T10:45:33Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic identified as sophos-live-protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/121441#M46045</link>
      <description>&lt;P&gt;Agreed with Borris. This is the&amp;nbsp;way Sophos works .I did a some research, and please find bellow one explication why some DNS queries can be identified as Sophos&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;Sophos has an endpoint product (Sophos Endpoint) which does web control (web access control, live protection from and blocking access to malicious website, etc).&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;It does this by making use of what is called SXL (Sophos Extensible List). This is basically making queries to Sophos servers over the DNS/HTTP/HTTPS protocol (mostly DNS). These look like typical DNS packets, except that the DNS query field payload is very long, and in a certain format. An example:&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;3.1o18sr00n61snno1p37507pqr8n37np4ss2452r34ssn879r45q336649r69p43.278por741os37393648s22q137o1159n2539961nq023n1n0q44035s4s9o86qp.rs184r9428sop6747559os0897962s08nrs30q417ns31n.408qr9on9r75nor4.i.07.s.sophosxl.net: type TXT, class IN&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Oct 2016 11:42:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/121441#M46045</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-10-26T11:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic identified as sophos-live-protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/121466#M46048</link>
      <description>&lt;P&gt;Thanks for the feedback. I see this problem in DNS queries from our domain controllers to the DNS servers of our ISP, and neither we nor our ISP use Sophos in any way, shape or form. So I will open a TAC case on this.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Oct 2016 13:07:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/121466#M46048</guid>
      <dc:creator>LCMember1959</dc:creator>
      <dc:date>2016-10-26T13:07:44Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic identified as sophos-live-protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/121747#M46084</link>
      <description>&lt;P&gt;After talking to TAC we found that it was indeed DNS queries from BYOD clients using Sophos Live Protection. I guess we could use some kind of application override to force this traffic to be identified as DNS, but instead we will just block sophos-live-protection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2016 14:36:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/121747#M46084</guid>
      <dc:creator>LCMember1959</dc:creator>
      <dc:date>2016-10-27T14:36:48Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic identified as sophos-live-protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/134201#M47312</link>
      <description>&lt;P&gt;Hi Terje,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am seeing this on my network but I still think this is a mis-classification.&amp;nbsp; If it was genuine live update traffic, surely it would not be routed via our DNS servers but instead would go directly from the client to sophos?&amp;nbsp;&amp;nbsp; Did you manage to confirm that genuine sophos live update traffic is still routed through the client's DNS servers?&amp;nbsp; If so, this is bad because it is putting a lot of extra load on our domain controllers and BIND servers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 09:28:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/134201#M47312</guid>
      <dc:creator>djr</dc:creator>
      <dc:date>2016-12-22T09:28:06Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic identified as sophos-live-protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/134207#M47315</link>
      <description>&lt;P&gt;Hi David.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We concluded that the traffic is a genuine DNS request, but that the Sophos client adds a lot of content to the request and this makes PA change the appid from dns to sophos-live-protection. Here is the full reply I got from PA support:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's not a situation I've come across before, and I can't think of anything other than Sophos live protection that may trigger this, but it's entirely possible there are other similar solutions that utilize DNS in this way that could result in a session having it's appid shifted from DNS to something that's effectively tunneling within DNS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since the Sophos application is working within the DNS queries, the identification isn't really wrong, but obviously it does result in the whole session being misleadingly categorised, which is made worse in this situation - since it's a session between your internal DNS servers and ISP's servers, the session contains hundreds or more DNS lookups that are totally unrelated to Sophos live.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you'd like to avoid this happening completely I would think you could use an Application Override rule to force all UDP connections between your internal and external DNS servers on port 53 to be categorised as DNS, which should avoid any application shifting occurring.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 10:43:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/134207#M47315</guid>
      <dc:creator>TerjeLundbo</dc:creator>
      <dc:date>2016-12-22T10:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic identified as sophos-live-protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/134215#M47317</link>
      <description>&lt;P&gt;Terje,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I looked into this a while back but I didn't actually look closely at the traffic content.&amp;nbsp; I don't think this is mis-categorised, sophos admit they use port 53 for their updates but don't mention that they actually tunnel it in DNS requests so I presumed the traffic was going directly between our clients and sophos until I noticed the flows were coming from our DNS server this morning.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think I need to do some more digging because from what I can see each session transfers around 600kB, so if that means the actual signature updates are passed through the DNS servers, it may be a good reason to move away from sophos.&amp;nbsp; If they just check to see if they need updates that way, it would be less of an issue, but 600kB seems a lot just for that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 10:57:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/134215#M47317</guid>
      <dc:creator>djr</dc:creator>
      <dc:date>2016-12-22T10:57:01Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic identified as sophos-live-protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/149830#M49838</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are seeing this also on PAN 8.0.1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2017 05:52:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-traffic-identified-as-sophos-live-protection/m-p/149830#M49838</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2017-03-28T05:52:54Z</dc:date>
    </item>
  </channel>
</rss>

