<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multiple malicious scans from the same source address - can I block IP automatically in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/168876#M53723</link>
    <description>&lt;P&gt;Hi vsys_remo,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are on 7.1.11. &amp;nbsp;Ban would be OK, preferable to no action. &amp;nbsp;I end up putting those addresses in our internal EDL first chance I get, but that does not happen automatically, of course.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 28 Jul 2017 14:47:39 GMT</pubDate>
    <dc:creator>LucaMarchiori</dc:creator>
    <dc:date>2017-07-28T14:47:39Z</dc:date>
    <item>
      <title>Multiple malicious scans from the same source address - can I block IP automatically</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/168868#M53721</link>
      <description>&lt;P&gt;Occasionally, I notice that the firewall has been blocking tens or even hundreds of attempts from a single source address for multiple threats. &amp;nbsp;In a case like this, it seems obvious, for someone looking at the logs, that that source IP should have been temporarily blocked and possibly banned, but that does not happen automatically. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We do have some exception in our vulnerability profile that change the action from reset to block-IP, for instance, but this only applies to a specific TID. &amp;nbsp;When you have a host combining say 5 or 10 different exploits in one minute, is there a way to configure the&amp;nbsp;firewall to automatically block the offending IP?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Luca&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jul 2017 14:39:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/168868#M53721</guid>
      <dc:creator>LucaMarchiori</dc:creator>
      <dc:date>2017-07-28T14:39:37Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple malicious scans from the same source address - can I block IP automatically</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/168875#M53722</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28602"&gt;@LucaMarchiori&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you already on PAN-OS 8 and is a temporary block required or is it ok to ban such source IP's?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jul 2017 14:45:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/168875#M53722</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-07-28T14:45:15Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple malicious scans from the same source address - can I block IP automatically</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/168876#M53723</link>
      <description>&lt;P&gt;Hi vsys_remo,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are on 7.1.11. &amp;nbsp;Ban would be OK, preferable to no action. &amp;nbsp;I end up putting those addresses in our internal EDL first chance I get, but that does not happen automatically, of course.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jul 2017 14:47:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/168876#M53723</guid>
      <dc:creator>LucaMarchiori</dc:creator>
      <dc:date>2017-07-28T14:47:39Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple malicious scans from the same source address - can I block IP automatically</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/168880#M53725</link>
      <description>&lt;P&gt;Few things.&lt;/P&gt;&lt;P&gt;1) Have you looked into DoS profiles for things such as session limits, pps limits, and stuff like that. This tends to help in situations like this as if the profiles were set correctly it would likely have crossed the threshold.&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) How much do you love the API and how good is your scripting ability. All of this can be done automatically with the proper scripts and log processing, essentially making a SIEM without having to purchase anything and the IPs would be listing in something MineMeld can grab and you can control directly if needed, but it also gives you that automated response.&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) In your Vulnerability Protection Profile&amp;nbsp;you can setup Rules for stuff like this with a 'Block IP' option. Here you can specify the Block IP action, host type, category, CVE, and Vendor ID options so that the Rule doesn't trip on something you don't want to. You just have to be careful that you don't unintentially start blocking something because of a false postive; depending on your SLAs that may be acceptable or it might not.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jul 2017 15:10:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/168880#M53725</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-07-28T15:10:02Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple malicious scans from the same source address - can I block IP automatically</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/168885#M53727</link>
      <description>&lt;P&gt;Hi BPry,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a Zone Protection Profile, but apparently is enabled for the WAN zone only...?&amp;nbsp; This latest attack, for instance, was targetting a host residing in the DMZ (most are). &amp;nbsp;On this one host, all ports 1 to 10,000 were scanned in less than 2 minutes. &amp;nbsp;I'm thinking I should add&amp;nbsp;the Zone protection profile to the DMZ zone, right?&amp;nbsp;&amp;nbsp;Unfortunately, I would not know were to start&amp;nbsp;to script something myself, I was hoping a feature&amp;nbsp;along those lines already existed .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Luca&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jul 2017 16:04:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/168885#M53727</guid>
      <dc:creator>LucaMarchiori</dc:creator>
      <dc:date>2017-07-28T16:04:35Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple malicious scans from the same source address - can I block IP automatically</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/168897#M53729</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28602"&gt;@LucaMarchiori&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I'm assuming that the hosts in your DMZ are internet facing through NAT correct? I would both recommend a Zone Protection Profile on the DMZ along with individual DoS profiles for anything that you have public facing. The DoS profiles could have prevented this type of situation as it gives you similar protections as the Zone Protection Profile, but limits it to the actual hosts that you specify. This allows you to baseline a normal PSS and resource limits that one would expect from normal traffic and drop the traffic such as this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kiwi put together a pretty good document that you can find here&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Tutorials/How-to-Set-Up-DoS-Protection/ta-p/71164" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Tutorials/How-to-Set-Up-DoS-Protection/ta-p/71164&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know if you need additional help on the DoS profiles; but I would seriously consider setting up both a DoS profile for the services you have facing the public and putting a Zone Protection Profile on your DMZ zone.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jul 2017 17:38:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/168897#M53729</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-07-28T17:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple malicious scans from the same source address - can I block IP automatically</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/168935#M53733</link>
      <description>&lt;P&gt;Hi BPry,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hosts in our DMZ are using public addresses. &amp;nbsp;I'll definitely look into setting up a DoS profile to cover these hosts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Luca&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jul 2017 20:16:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/168935#M53733</guid>
      <dc:creator>LucaMarchiori</dc:creator>
      <dc:date>2017-07-28T20:16:26Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple malicious scans from the same source address - can I block IP automatically</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/168950#M53736</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28602"&gt;@LucaMarchiori&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This will be definately a good idea to set this up as proposed by &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;In addition to that there are many creative ways to block attacking IPs after the first attempt. In PAN-OS 8 you could tag attacking IPs based on specific filters (for example when a critical vulnerability was blocked or even one specific vulnerability). With this tag you are then able to create a dynamic addressgroup and use this group in your policy to drop connections from there completely. At least I think this is a very nice feature to lock out these attackers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is also possible to send syslog messages to a Minemeld installation and created extended dynamic lists based on informations in these syslog messages. The advantage of using this method is, that you can automatically remove ips from the lists after (for example) 30 days. And of course with Minemeld you have quite a few other possibilities &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But to block port scans, the easiest way to block them remains the Zone Protection / DoS Rules even if a simple port scan is probably not too worrysome...&lt;/P&gt;</description>
      <pubDate>Sat, 29 Jul 2017 17:55:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/168950#M53736</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-07-29T17:55:42Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple malicious scans from the same source address - can I block IP automatically</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/169056#M53759</link>
      <description>&lt;P&gt;Hi vsys_remo,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I implemented zone protection for the DMZ. &amp;nbsp;Any drawbacks to expanding ZP to the LAN interface as well?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have had MineMeld in place for a few months, but I'm just using the HC feed. &amp;nbsp;How complicated woud be to create a feed based on syslog data&amp;nbsp;- any examples I can look at?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Luca&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;edit: this new feature you mention for PanOS 8.x sounds pretty much what I was hoping for. &amp;nbsp;We'll not be moving&amp;nbsp;to ver. &amp;nbsp;8 for some time though.&lt;/P&gt;</description>
      <pubDate>Mon, 31 Jul 2017 15:04:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/169056#M53759</guid>
      <dc:creator>LucaMarchiori</dc:creator>
      <dc:date>2017-07-31T15:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple malicious scans from the same source address - can I block IP automatically</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/169236#M53789</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28602"&gt;@LucaMarchiori&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you configure the PPS values not too aggressive there should be no drawback. Of course some packet based attack protections could sometimes be problematic for specific applications, but this unfortunately is something you simply have to test.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding minemeld and the syslog miner: just type "minemeld syslog" to the search bar and you should find the informations you need to do this.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 08:24:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/169236#M53789</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-01T08:24:55Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple malicious scans from the same source address - can I block IP automatically</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/169352#M53816</link>
      <description>&lt;P&gt;Hi vsys_remo,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've cloned syslogMiner node in MineMeld, and added (rigth after our Splunk server) the MMeld server to the syslog profile, port UDP 13514. &amp;nbsp;It seems that the new node is not receiving any data. &amp;nbsp;Also attempted creating a separate syslog server profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've been following instructions contained in this doc:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/MineMeld-Articles/Using-the-syslog-Miner/ta-p/77262" target="_blank"&gt;https://live.paloaltonetworks.com/t5/MineMeld-Articles/Using-the-syslog-Miner/ta-p/77262&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Luca&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 16:42:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/169352#M53816</guid>
      <dc:creator>LucaMarchiori</dc:creator>
      <dc:date>2017-08-01T16:42:46Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple malicious scans from the same source address - can I block IP automatically</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/169364#M53820</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28602"&gt;@LucaMarchiori&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This now more and more belongs into the minemeld forum;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You also configured the local firewall (iptables) to allow this traffic and if needed edited the rsyslog.conf file?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sounds like something similar as in this topic:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/MineMeld-Discussions/MineMeld-need-help-importing-and-processing-syslog-data/m-p/101312#M247" target="_blank"&gt;https://live.paloaltonetworks.com/t5/MineMeld-Discussions/MineMeld-need-help-importing-and-processing-syslog-data/m-p/101312#M247&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 17:30:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/169364#M53820</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-01T17:30:51Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple malicious scans from the same source address - can I block IP automatically</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/169366#M53821</link>
      <description>&lt;P&gt;Hi vsys_remo,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I agree. &amp;nbsp;I'll post this in the MineMeld forum, if needed. &amp;nbsp;I'd like to thank you and BPry for your help thus far.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Luca&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;edit: the port was already opened on the ubuntu server, but it's using port TCP 13514, not UDP 13514. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;TCP clearly shows in the doc I linked, I simply missed that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 20:53:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/169366#M53821</guid>
      <dc:creator>LucaMarchiori</dc:creator>
      <dc:date>2017-08-01T20:53:53Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple malicious scans from the same source address - can I block IP automatically</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/260948#M73977</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;could you please explain how the following can be implemented:&amp;nbsp;&lt;/P&gt;&lt;P&gt;"In PAN-OS 8 you could tag attacking IPs based on specific filters (for example when a critical vulnerability was blocked or even one specific vulnerability). With this tag you are then able to create a dynamic addressgroup and use this group in your policy to drop connections from there completely. "&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Ho&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2019 16:36:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/260948#M73977</guid>
      <dc:creator>ash83</dc:creator>
      <dc:date>2019-05-14T16:36:43Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple malicious scans from the same source address - can I block IP automatically</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/261087#M74009</link>
      <description>&lt;P&gt;Anyone know how to&amp;nbsp;&lt;SPAN&gt;tag attacking IPs based on specific filters (for example when a critical vulnerability was blocked or even one specific vulnerability). With this tag you are then able to create a dynamic addressgroup and use this group in your policy to drop connections from there completely.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Ho&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2019 09:23:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/261087#M74009</guid>
      <dc:creator>ash83</dc:creator>
      <dc:date>2019-05-15T09:23:27Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple malicious scans from the same source address - can I block IP automatically</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/261256#M74059</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/57857"&gt;@ash83&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You need to start with a log forwarding profile, there you define a specific filter for the threatlogs (you either filter on the severity or on specific threat ID or something completely different). As action you then choose to tag the source or destination IP (depending on your filter) and assign a Tag to these IPs. After that you create a dynamic address group with the criteria the tag you created for that. From this point you can use the address group in your policy to block connections from or to these IPs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2019 21:43:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-malicious-scans-from-the-same-source-address-can-i/m-p/261256#M74059</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2019-05-15T21:43:04Z</dc:date>
    </item>
  </channel>
</rss>

