<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filter-List in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/filter-list/m-p/170861#M54123</link>
    <description>&lt;P&gt;One of my favorite filters is to find blocked traffic. &amp;nbsp;In the UNIFIED LOG, try this filter:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(addr in 1.1.1.1) and (action neq allow) and (action neq alert)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That will show you blocked traffic for 1.1.1.1, from any of the features/functions in the Firewall, including AV, WildFire, IPS, C2, Data Filter/File Blocking, URL Filtering, etc. &amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 09 Aug 2017 20:51:19 GMT</pubDate>
    <dc:creator>jvalentine</dc:creator>
    <dc:date>2017-08-09T20:51:19Z</dc:date>
    <item>
      <title>Filter-List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/filter-list/m-p/170193#M53995</link>
      <description>&lt;P&gt;Hello everyone!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any one has list of safed filters that could help a lot and&amp;nbsp; saves our time&lt;/P&gt;</description>
      <pubDate>Sun, 06 Aug 2017 08:56:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/filter-list/m-p/170193#M53995</guid>
      <dc:creator>aziz_paloalto</dc:creator>
      <dc:date>2017-08-06T08:56:54Z</dc:date>
    </item>
    <item>
      <title>Re: Filter-List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/filter-list/m-p/170216#M54003</link>
      <description>&lt;P&gt;Hey what exactly you mean?&lt;/P&gt;&lt;P&gt;Are you referring to reccomended ruleset or traffic log filter to search for anomalies or something else?&lt;/P&gt;</description>
      <pubDate>Sun, 06 Aug 2017 18:13:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/filter-list/m-p/170216#M54003</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-08-06T18:13:13Z</dc:date>
    </item>
    <item>
      <title>Re: Filter-List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/filter-list/m-p/170356#M54035</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/69439"&gt;@aziz_paloalto&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Most filters are going to be specific to that persons enviroment and therefore wouldn't do a lot of good without having to heavily modify that filter. If you need help building out a specific filter we could probably help with that.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2017 18:16:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/filter-list/m-p/170356#M54035</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-08-07T18:16:12Z</dc:date>
    </item>
    <item>
      <title>Re: Filter-List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/filter-list/m-p/170709#M54081</link>
      <description>I mean the traffic log filter , data filtiring , url filtiring etc&lt;BR /&gt;&lt;BR /&gt;I mean the common filter that i could save to the filters</description>
      <pubDate>Wed, 09 Aug 2017 09:54:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/filter-list/m-p/170709#M54081</guid>
      <dc:creator>aziz_paloalto</dc:creator>
      <dc:date>2017-08-09T09:54:57Z</dc:date>
    </item>
    <item>
      <title>Re: Filter-List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/filter-list/m-p/170710#M54082</link>
      <description>I really appreciate it and that would be helpful&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 09 Aug 2017 09:56:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/filter-list/m-p/170710#M54082</guid>
      <dc:creator>aziz_paloalto</dc:creator>
      <dc:date>2017-08-09T09:56:03Z</dc:date>
    </item>
    <item>
      <title>Re: Filter-List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/filter-list/m-p/170767#M54106</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/69439"&gt;@aziz_paloalto&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I don't think I understand exactly what you are asking for. Do you mean your to filter results? There really isn't a 'common filter' that I have in my enviroment that would work in yours as filters generally specify at the very least IP ranges that you are looking at. I've listed some of the most common filters below that may help you if that's what you're asking for? Any filter you build is going to be dependent on what you are looking for, and truthfully I don't often find myself saving filters. If you find yourself running the same query over and over again it's probably easier to just build that query into a custom report that you can run.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;( addr in&amp;nbsp;&lt;EM&gt;address&amp;nbsp;&lt;/EM&gt;)&lt;/P&gt;&lt;P&gt;( addr.src in&amp;nbsp;&lt;EM&gt;address&lt;/EM&gt; )&lt;/P&gt;&lt;P&gt;( addr.dst in&amp;nbsp;&lt;EM&gt;address )&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;( zone.dst in&amp;nbsp;&lt;EM&gt;zone )&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;( zone.src in&amp;nbsp;&lt;EM&gt;zone )&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;( rule eq '&lt;EM&gt;rule' )&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;( action eq&amp;nbsp;&lt;EM&gt;action )&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;( user.src eq&amp;nbsp;&lt;EM&gt;user )&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;( user.dst eq&amp;nbsp;&lt;EM&gt;user )&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;( app eq&amp;nbsp;&lt;EM&gt;application )&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;( port.dst eq&amp;nbsp;&lt;EM&gt;port )&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;( port.src eq&amp;nbsp;&lt;EM&gt;port )&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;( severity eq&lt;EM&gt; severity&amp;nbsp;&lt;/EM&gt;)&lt;/P&gt;&lt;P&gt;You don't have to specify eq here for equals, you could easily do a geq or a leq instead. For example generally I'll have a ( severity geq medium ) filter when I look in the threat log or I'll just filter out the information ones by a ' not ( severity eq informational )' filter&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any of these can be tied together with an 'and', 'or', 'and not', 'or not' and similar. Addresses can be specified as either a sole address such as 10.191.16.61 or as 10.191.16.0/24 or 10.191.0.0/16. So one of my traffic query's may be&amp;nbsp;&lt;/P&gt;&lt;P&gt;(( addr.src in 10.191.0.0/16 ) and ( zone.dst eq untrust )) and (rule eq 'LAB Users).&lt;/P&gt;&lt;P&gt;Likewise a URL Filtering filter that I commonly do is (category eq adult) or switch out adult for block-list.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Because of the differences in policy and enviroments I can't really say if any of these filters really works for you as I presented them in my examples; I would be less worried about saving filters as generally you wouldn't run a filter that's actually that long as regardless of platform it takes a while to actually process the longer your filter gets. For example ( addr in 10.191.16.61 ) generates really quickly. A more detailed filter of ' ( addr.src in 10.191.0.0/16 ) and (( zone.dst eq untrust ) and ( rule eq 'Alert on Unknown Users')) and not (( addr.dst in 8.8.8.8 ) or (addr.dst in 8.8.4.4 ) or ( addr.dst in 206.145.187.198 ) or ( addr.dst in 206.145.187.201 ))' is going to take a lot longer to process as it has to evaluate all of the criteria that you specified and find the logs that still apply with your filter specified.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hopefully something like this is what you were looking for.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Aug 2017 13:10:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/filter-list/m-p/170767#M54106</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-08-09T13:10:16Z</dc:date>
    </item>
    <item>
      <title>Re: Filter-List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/filter-list/m-p/170861#M54123</link>
      <description>&lt;P&gt;One of my favorite filters is to find blocked traffic. &amp;nbsp;In the UNIFIED LOG, try this filter:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(addr in 1.1.1.1) and (action neq allow) and (action neq alert)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That will show you blocked traffic for 1.1.1.1, from any of the features/functions in the Firewall, including AV, WildFire, IPS, C2, Data Filter/File Blocking, URL Filtering, etc. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Aug 2017 20:51:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/filter-list/m-p/170861#M54123</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2017-08-09T20:51:19Z</dc:date>
    </item>
    <item>
      <title>Re: Filter-List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/filter-list/m-p/170926#M54129</link>
      <description>&lt;P&gt;mostlly you've covered everything needed for what I meant&lt;/P&gt;&lt;P&gt;and gave good summary that could help others too.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Aug 2017 06:10:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/filter-list/m-p/170926#M54129</guid>
      <dc:creator>aziz_paloalto</dc:creator>
      <dc:date>2017-08-10T06:10:53Z</dc:date>
    </item>
  </channel>
</rss>

