<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: More granular with Vulnerability Exceptions? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/more-granular-with-vulnerability-exceptions/m-p/7208#M5335</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;we would appreciate if you could consider this as a feature request or something to add in the future.&lt;/P&gt;&lt;P&gt;Every IPS solution has this possibility and granularity and we'd like to see it in PAN also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be useful if the exception could be activated also by right-clicking on the interested log entry (as many vendor does)...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 17 Nov 2010 14:09:06 GMT</pubDate>
    <dc:creator>migration</dc:creator>
    <dc:date>2010-11-17T14:09:06Z</dc:date>
    <item>
      <title>More granular with Vulnerability Exceptions?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/more-granular-with-vulnerability-exceptions/m-p/7206#M5333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When adding a Vulnerability Exception, is there any way to make the exception more granular? (being able to add the exception along with an IP host or range, source or destination IP, zones, or virtual systems.)&amp;nbsp; For example, If I wanted to ignore a certain vulnerability that is causing false positives and is coming from the inside of the network, I would have to add that vulnerability to the exceptions list.&amp;nbsp; But by adding it to the list, I am also ignoring that vulnerability completely.&amp;nbsp; I would like Palo Alto to still be able to monitor for that vulnerability, just not within certain parameters.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Nov 2010 18:42:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/more-granular-with-vulnerability-exceptions/m-p/7206#M5333</guid>
      <dc:creator>jambulo</dc:creator>
      <dc:date>2010-11-16T18:42:49Z</dc:date>
    </item>
    <item>
      <title>Re: More granular with Vulnerability Exceptions?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/more-granular-with-vulnerability-exceptions/m-p/7207#M5334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jambulo,&lt;/P&gt;&lt;P&gt;the only way to do this is to create another vulnerability profile, add the desired exception, then create another policy that details your desired granularity (source ip, destination ip, etc..) and add that new vulnerability profile to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Stephen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Nov 2010 22:13:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/more-granular-with-vulnerability-exceptions/m-p/7207#M5334</guid>
      <dc:creator>swhyte</dc:creator>
      <dc:date>2010-11-16T22:13:48Z</dc:date>
    </item>
    <item>
      <title>Re: More granular with Vulnerability Exceptions?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/more-granular-with-vulnerability-exceptions/m-p/7208#M5335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;we would appreciate if you could consider this as a feature request or something to add in the future.&lt;/P&gt;&lt;P&gt;Every IPS solution has this possibility and granularity and we'd like to see it in PAN also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be useful if the exception could be activated also by right-clicking on the interested log entry (as many vendor does)...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2010 14:09:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/more-granular-with-vulnerability-exceptions/m-p/7208#M5335</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2010-11-17T14:09:06Z</dc:date>
    </item>
    <item>
      <title>Re: More granular with Vulnerability Exceptions?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/more-granular-with-vulnerability-exceptions/m-p/7209#M5336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;swhyte wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hello Jambulo,&lt;/P&gt;&lt;P&gt;the only way to do this is to create another vulnerability profile, add the desired exception, then create another policy that details your desired granularity (source ip, destination ip, etc..) and add that new vulnerability profile to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Stephen&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the tip...I tried it and it works, but have 2 concerns...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) When I create a new policy that includes a specific IP address and the new vulnerability profile, it does work correctly at ignoring the vulnerability.&amp;nbsp; BUT, ANYTHING that comes through with the IP address stated in the new policy, gets labeled as using the "rule" for that new policy.&amp;nbsp; It looks like the policies are using a Bolean OR operator, when it should be using AND.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) If I had to create multiple policies for multiple exceptions, would it create a lot of exta load? Since it scans through all the vulnerabilities minus the exception in Policy 1, then scans through all the vulnerabilities minus the exception in Policy 2, and so on...(I have Packet Capture on too)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2010 18:53:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/more-granular-with-vulnerability-exceptions/m-p/7209#M5336</guid>
      <dc:creator>jambulo</dc:creator>
      <dc:date>2010-11-17T18:53:57Z</dc:date>
    </item>
  </channel>
</rss>

