<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URL Filtering from Internet Traffic to Internal Websites in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-from-internet-traffic-to-internal-websites/m-p/155629#M51155</link>
    <description>&lt;P&gt;Well if you statically block ip then you have to manually go and change it when IP of this "attacker" changes.&lt;/P&gt;&lt;P&gt;You can configure Vulnerability profile action to be block IP if Palo identifies brute force.&lt;/P&gt;&lt;P&gt;Not perfect solution but unless you can talk to the person and ask to reconfigure his/her email client not much you can do as attack victim.&lt;/P&gt;&lt;P&gt;In vulnerability profile IP can be blocked for max 1 hour so you still get quite some events but much less than currently.&lt;/P&gt;</description>
    <pubDate>Mon, 08 May 2017 23:12:57 GMT</pubDate>
    <dc:creator>Raido_Rattameister</dc:creator>
    <dc:date>2017-05-08T23:12:57Z</dc:date>
    <item>
      <title>URL Filtering from Internet Traffic to Internal Websites</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-from-internet-traffic-to-internal-websites/m-p/155586#M51153</link>
      <description>&lt;P&gt;Been doing some searching but havn't come up with anybody doing this and if it has other problems / security ramifications I'm not aware of.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My problem:&lt;/P&gt;&lt;P&gt;We have an employee that is no longer working at our business but there personal computer at home is configured to our internal mail server. I can see the spam of authentication attempts from the user that no longer is here, which is caussing false alarms in security software. (Exchange activesync doing this)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Solution:&lt;/P&gt;&lt;P&gt;Block the IP address that these are coming from and let our help desk know if they get a call. However planning for future what happens if someone else gets that IP from the internet company&amp;nbsp;and tries to visit our mail OWA website, they will get blocked without any good information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Solution to the Solution:&lt;/P&gt;&lt;P&gt;Serve up a URL response page for that IP with URL filtering for the internal website.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I havn't tested this yet to see if it will work, I'm also unsure what security risks I'm taking on by serving up response pages to the internet. Of course I have no interest in serving up response pages to the nasty scanner IPs or other malicious traffic I find.&lt;/P&gt;</description>
      <pubDate>Mon, 08 May 2017 19:02:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-from-internet-traffic-to-internal-websites/m-p/155586#M51153</guid>
      <dc:creator>ryan_carroll</dc:creator>
      <dc:date>2017-05-08T19:02:51Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering from Internet Traffic to Internal Websites</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-from-internet-traffic-to-internal-websites/m-p/155629#M51155</link>
      <description>&lt;P&gt;Well if you statically block ip then you have to manually go and change it when IP of this "attacker" changes.&lt;/P&gt;&lt;P&gt;You can configure Vulnerability profile action to be block IP if Palo identifies brute force.&lt;/P&gt;&lt;P&gt;Not perfect solution but unless you can talk to the person and ask to reconfigure his/her email client not much you can do as attack victim.&lt;/P&gt;&lt;P&gt;In vulnerability profile IP can be blocked for max 1 hour so you still get quite some events but much less than currently.&lt;/P&gt;</description>
      <pubDate>Mon, 08 May 2017 23:12:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-from-internet-traffic-to-internal-websites/m-p/155629#M51155</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-05-08T23:12:57Z</dc:date>
    </item>
  </channel>
</rss>

