<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How vulnerability profiles work in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-vulnerability-profiles-work/m-p/181501#M56055</link>
    <description>&lt;P&gt;Security policies are evaluated top to down.&amp;nbsp;&lt;/P&gt;&lt;P&gt;First policy that matches traffic will be used to either allow or deny traffic.&lt;/P&gt;&lt;P&gt;If traffic is denied/dropped then no other policy is checked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Security profiles are checked only if security policy permitted traffic. So yes you need to add all profiles to all security policies with "Allow" action.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AppID can change during single session (incomplete &amp;gt; web-browsing &amp;gt; sharepoint-base &amp;gt; sharepoint-admin etc) so single session can match to different security policies but only one policy at the time.&lt;/P&gt;</description>
    <pubDate>Thu, 12 Oct 2017 14:19:48 GMT</pubDate>
    <dc:creator>Raido_Rattameister</dc:creator>
    <dc:date>2017-10-12T14:19:48Z</dc:date>
    <item>
      <title>How vulnerability profiles work</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-vulnerability-profiles-work/m-p/180599#M55887</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;Please need your supprt in understanding how&amp;nbsp; vulnerability profiles work or in general how security profiles work.&lt;/P&gt;&lt;P&gt;I have done a lot of studying in this regard and all they say is that it works on the basis of signatures.Below is my understanding.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Signatures:Its like any specific pattern or a behaviour in the traffic ,payload etc,please correct me if i am wrong.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So if the PA sees any such it will apply the rules defined in the security profile,is this&amp;nbsp; correct..?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In addition how to understand the client/server critical etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2017 19:27:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-vulnerability-profiles-work/m-p/180599#M55887</guid>
      <dc:creator>mahmoodm</dc:creator>
      <dc:date>2017-10-06T19:27:51Z</dc:date>
    </item>
    <item>
      <title>Re: How vulnerability profiles work</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-vulnerability-profiles-work/m-p/180823#M55915</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2017 14:14:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-vulnerability-profiles-work/m-p/180823#M55915</guid>
      <dc:creator>mahmoodm</dc:creator>
      <dc:date>2017-10-09T14:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: How vulnerability profiles work</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-vulnerability-profiles-work/m-p/180937#M55950</link>
      <description>&lt;P&gt;hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/73281"&gt;@mahmoodm&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;yes, signatures are used to identify threats. a signature is a specifc patern in a packet or series of packets&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;first off a session needs to match a specific security policy before it can match a security profile&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so for example you have a client making an http connection out to a webserver and matches your browsing policy&lt;/P&gt;
&lt;P&gt;if this policy contains security profiles, these will be active throughout the session and scan for suspicious packets/payload/signatures&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if the client tries to send a malicious payload, like for example a header overflow, that is intended to crash the webbrowser, this will be the 'server' host (because the server is being attacked)&lt;/P&gt;
&lt;P&gt;if the server tries to send something malicous to the client to try and run scripts on the client (cross site scripting), this is the 'client' host&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;vulnerability is determined based on the potential impact of a threat&lt;/P&gt;
&lt;P&gt;informational, low and medium are usually threats that have very limited impact or a patch has been made available for a long time already, high and critical are dangerous and could cause serious harm to your systems&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2017 07:10:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-vulnerability-profiles-work/m-p/180937#M55950</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-10-10T07:10:32Z</dc:date>
    </item>
    <item>
      <title>Re: How vulnerability profiles work</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-vulnerability-profiles-work/m-p/181026#M55965</link>
      <description>&lt;P&gt;Hi reaper,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the response and it clears most of the doubts.&lt;/P&gt;&lt;P&gt;Please can you explain whether the file blocking profiles work the same way i.e the session is scanned for all the traffic to look for signatures of the files which are to be blocked/allowed etc..?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And one more confusion is that why do we need to have both the wildfire and file blocking profile applied to the same security rule while if we define the file blocking profile to block certain files then why would we want them to be send to wildfire for analysis.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2017 06:31:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-vulnerability-profiles-work/m-p/181026#M55965</guid>
      <dc:creator>mahmoodm</dc:creator>
      <dc:date>2017-10-10T06:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: How vulnerability profiles work</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-vulnerability-profiles-work/m-p/181040#M55968</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/73281"&gt;@mahmoodm&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, the fileblocking profiles work mostly the same way by verifying payload (threat looks at the entire session while fileblocking is only interested in payload) for and looking if a specific type of file is being transferred. It looks at the type of file, and not just the extention (so hiding an .exe by changing extention to .txt does not work)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;wildfire will only send allowed files out for analysis, so if you block PE files, these will not be forwarded.&lt;/P&gt;
&lt;P&gt;- if a file is blocked it will cut off the tcp session early on and the 'rest' (payload) of the file will not be received, rendering the file unuseable for forwarding&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2017 07:20:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-vulnerability-profiles-work/m-p/181040#M55968</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-10-10T07:20:15Z</dc:date>
    </item>
    <item>
      <title>Re: How vulnerability profiles work</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-vulnerability-profiles-work/m-p/181138#M55976</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks a lot for great clarification.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So is it recommended to have the wildfire profile and file blocking profile on the same security rule or what is the best practice.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or we need to segregate the rules for separate profiles.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2017 19:23:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-vulnerability-profiles-work/m-p/181138#M55976</guid>
      <dc:creator>mahmoodm</dc:creator>
      <dc:date>2017-10-10T19:23:05Z</dc:date>
    </item>
    <item>
      <title>Re: How vulnerability profiles work</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-vulnerability-profiles-work/m-p/181501#M56055</link>
      <description>&lt;P&gt;Security policies are evaluated top to down.&amp;nbsp;&lt;/P&gt;&lt;P&gt;First policy that matches traffic will be used to either allow or deny traffic.&lt;/P&gt;&lt;P&gt;If traffic is denied/dropped then no other policy is checked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Security profiles are checked only if security policy permitted traffic. So yes you need to add all profiles to all security policies with "Allow" action.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AppID can change during single session (incomplete &amp;gt; web-browsing &amp;gt; sharepoint-base &amp;gt; sharepoint-admin etc) so single session can match to different security policies but only one policy at the time.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2017 14:19:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-vulnerability-profiles-work/m-p/181501#M56055</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-10-12T14:19:48Z</dc:date>
    </item>
  </channel>
</rss>

