<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: App-IDs, PCAPs and Custom Signatures in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/app-ids-pcaps-and-custom-signatures/m-p/147078#M49317</link>
    <description>&lt;P&gt;there's no fileblocking file type for .jsp , but there are for .jar , .exe , .msi and .dmg (the actual installers)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can also create a custom threat to block the installed8.jsp file if you like : &lt;A title="Tutorial: Custom Vulnerability" href="https://live.paloaltonetworks.com/t5/Featured-Articles/Custom-Vulnerability/ta-p/72355" target="_blank"&gt;Tutorial: Custom Vulnerability&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 10 Mar 2017 12:55:52 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2017-03-10T12:55:52Z</dc:date>
    <item>
      <title>App-IDs, PCAPs and Custom Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-ids-pcaps-and-custom-signatures/m-p/147040#M49312</link>
      <description>&lt;P&gt;Is there is any way to block&amp;nbsp;flash player and java based application via App ID.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2017 07:19:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-ids-pcaps-and-custom-signatures/m-p/147040#M49312</guid>
      <dc:creator>Rahimbhamani</dc:creator>
      <dc:date>2017-03-10T07:19:32Z</dc:date>
    </item>
    <item>
      <title>Re: App-IDs, PCAPs and Custom Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-ids-pcaps-and-custom-signatures/m-p/147071#M49315</link>
      <description>&lt;P&gt;file block profile?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/Blockable-File-Types-and-Their-Associated-Programs/ta-p/56119" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/Blockable-File-Types-and-Their-Associated-Programs/ta-p/56119&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;would require SSL decryption for full visibility however&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2017 11:18:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-ids-pcaps-and-custom-signatures/m-p/147071#M49315</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-03-10T11:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: App-IDs, PCAPs and Custom Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-ids-pcaps-and-custom-signatures/m-p/147075#M49316</link>
      <description>&lt;P&gt;Well example if user open the website&amp;nbsp;&lt;A href="https://www.java.com/en/download/installed8.jsp" target="_blank"&gt;https://www.java.com/en/download/installed8.jsp&lt;/A&gt; to verify the java. the palo alto will be blocked by palo alto is it possbile?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Java verfication" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8090i263B14D146912C27/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="java1.JPG" alt="Java verfication" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Java verfication&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2017 12:04:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-ids-pcaps-and-custom-signatures/m-p/147075#M49316</guid>
      <dc:creator>Rahimbhamani</dc:creator>
      <dc:date>2017-03-10T12:04:43Z</dc:date>
    </item>
    <item>
      <title>Re: App-IDs, PCAPs and Custom Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-ids-pcaps-and-custom-signatures/m-p/147078#M49317</link>
      <description>&lt;P&gt;there's no fileblocking file type for .jsp , but there are for .jar , .exe , .msi and .dmg (the actual installers)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can also create a custom threat to block the installed8.jsp file if you like : &lt;A title="Tutorial: Custom Vulnerability" href="https://live.paloaltonetworks.com/t5/Featured-Articles/Custom-Vulnerability/ta-p/72355" target="_blank"&gt;Tutorial: Custom Vulnerability&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2017 12:55:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-ids-pcaps-and-custom-signatures/m-p/147078#M49317</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-03-10T12:55:52Z</dc:date>
    </item>
  </channel>
</rss>

