<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows file replication in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135585#M47526</link>
    <description>&lt;P&gt;I see in the logs a threat (type - vulnerability) for Microsoft RPC Endpoint mapper using the msrpc application going to port 135 (action - alert). This is what Miscrosoft uses, with&amp;nbsp;randonly assigned ports above 1024, for replication across the WAN.&amp;nbsp;I'm using the default vulnerability protection security profile and it shows read only when I try to edit it. So would I clone this default profile and then edit the clone? If so, would I create a new rule of some sort or add an exception of some type? Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 03 Jan 2017 17:26:28 GMT</pubDate>
    <dc:creator>Ttiller</dc:creator>
    <dc:date>2017-01-03T17:26:28Z</dc:date>
    <item>
      <title>Windows file replication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135570#M47523</link>
      <description>&lt;P&gt;Just updated my PA 200's to version 7.1.0. Have two sites, both using the 200 in a virtual wire deployment. The windows file replication between the two sites (Windows 2012R2) quit working after the software update. Using security profiles so not sure if URL filtering or another security profile is casuing the problem. Or maybe a recent dynamic&amp;nbsp;update (antivirus, app. and threats) is&amp;nbsp;the problem. &amp;nbsp;&amp;nbsp;Any suggestions before I contact support for help? Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2017 16:47:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135570#M47523</guid>
      <dc:creator>Ttiller</dc:creator>
      <dc:date>2017-01-03T16:47:44Z</dc:date>
    </item>
    <item>
      <title>Re: Windows file replication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135578#M47524</link>
      <description>&lt;P&gt;Do you see anything in the logs that point towards the traffic being labled as a threat or running into a policy deny. That would be the first place to look.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2017 17:06:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135578#M47524</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-01-03T17:06:21Z</dc:date>
    </item>
    <item>
      <title>Re: Windows file replication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135585#M47526</link>
      <description>&lt;P&gt;I see in the logs a threat (type - vulnerability) for Microsoft RPC Endpoint mapper using the msrpc application going to port 135 (action - alert). This is what Miscrosoft uses, with&amp;nbsp;randonly assigned ports above 1024, for replication across the WAN.&amp;nbsp;I'm using the default vulnerability protection security profile and it shows read only when I try to edit it. So would I clone this default profile and then edit the clone? If so, would I create a new rule of some sort or add an exception of some type? Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2017 17:26:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135585#M47526</guid>
      <dc:creator>Ttiller</dc:creator>
      <dc:date>2017-01-03T17:26:28Z</dc:date>
    </item>
    <item>
      <title>Re: Windows file replication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135659#M47533</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Action 'alert' should not stop traffic fflowing. Check the traffic logs and see why it is getting denied. If you are using the default vulnerability setttings, they should not block this traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My guess would be an application is not enabled on the ruleset and blocking the traffic that way.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2017 22:52:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135659#M47533</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2017-01-03T22:52:28Z</dc:date>
    </item>
    <item>
      <title>Re: Windows file replication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135747#M47546</link>
      <description>&lt;P&gt;Thanks for the info. I guess I'm going to go ahead and go to the latest software version (7.1.6), retry it, then if it still is a problem, disable the default vulnerability protection. Test again and then try to figure out how to change the default to solve the issue. I also noticed that my Symantec client on that server is also&amp;nbsp;no longer communicating back to this site as well. So it&amp;nbsp;looks like it might be time to get tech support involved. Thanks again.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 13:39:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135747#M47546</guid>
      <dc:creator>Ttiller</dc:creator>
      <dc:date>2017-01-04T13:39:06Z</dc:date>
    </item>
    <item>
      <title>Re: Windows file replication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135750#M47547</link>
      <description>&lt;P&gt;I would suggest checking all (traffic, threat, url...) log files first for blocked events. Because&amp;nbsp;turning off security profiles is not a solution.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 14:03:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135750#M47547</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2017-01-04T14:03:58Z</dc:date>
    </item>
    <item>
      <title>Re: Windows file replication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135751#M47548</link>
      <description>&lt;P&gt;It would be only to make sure I'm on the right path to the problem. Again, I plan on calling support before this goes too far. Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 14:06:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135751#M47548</guid>
      <dc:creator>Ttiller</dc:creator>
      <dc:date>2017-01-04T14:06:33Z</dc:date>
    </item>
    <item>
      <title>Re: Windows file replication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135785#M47549</link>
      <description>&lt;P&gt;UPDATE: After update of software all traffic and apps working properly. Maybe the reboot after the update cleared the issue. Thanks for all the responses.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 16:34:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135785#M47549</guid>
      <dc:creator>Ttiller</dc:creator>
      <dc:date>2017-01-04T16:34:35Z</dc:date>
    </item>
    <item>
      <title>Re: Windows file replication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135815#M47553</link>
      <description>&lt;P&gt;Solution:&lt;/P&gt;&lt;P&gt;Had more than one issue going on. But the problem on my Symantec&amp;nbsp; Client (ver. 14) not communicating with the remote server turned out to be the App and threat software version 650. Once I rolled it back to 648 all was well. And it stands to reason, since the version 14 just came out. Servers me right for deploying so quickly. Thanks to Dante for all his help.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 22:12:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135815#M47553</guid>
      <dc:creator>Ttiller</dc:creator>
      <dc:date>2017-01-04T22:12:38Z</dc:date>
    </item>
    <item>
      <title>Re: Windows file replication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135903#M47557</link>
      <description>&lt;P&gt;Hmm, I wouldn't be satisfied with this solution. You need to have all your signatures up to date for PA to do its function of protecting your network properly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If it was some newly released threat (IPS, AV..) signature causing issues it's either a genuine threat or false positive. In first case you have to be aware of it in second case you need to make exception and keep on updating signatures.&lt;/P&gt;&lt;P&gt;If it was app signature causing issue you either have an application you aren't aware of in your network or there is some broken applicaion signature. Both situations can be dealt with by fine tunning your security policy.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jan 2017 07:04:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-file-replication/m-p/135903#M47557</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2017-01-05T07:04:56Z</dc:date>
    </item>
  </channel>
</rss>

