<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dealing with Threat Alerts? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/184888#M56647</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10387"&gt;@Tician&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Out of curiosity why would you want to close the client side by a reset? If you force the potential attacker to leave its connection open, but you close the servers connection, then you save resources on your end but cause the attacker to increase their resources.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 01 Nov 2017 12:43:44 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2017-11-01T12:43:44Z</dc:date>
    <item>
      <title>Dealing with Threat Alerts?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/183227#M56337</link>
      <description>&lt;P&gt;Hi Folks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have Critical Threat Alerts emailed to us and usually its every couple of days we get a few alerts,&amp;nbsp;mostly Apache Struts Jakarta.&amp;nbsp; But over the last 4-5 days there has been a significant increase in threat alerts.&amp;nbsp; 60-100 emails per day, same IP address in groups of ~10.&amp;nbsp; We are using default vulnerability protection profile and default action (reset-both).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since the increase in alerts, our management gets concerned asking if there is a problem.&amp;nbsp; I talked to support and assured me that firewall is doing its job, its just an increase in attack attempts, and is common.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've considered creating a new security rule at the top to keep a running list of source IP address with a deny action, but that sounds like a lot of manual administration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm curious if anyone in the community has comments about receiving alerts or how they handle an increase in attacks?&lt;/P&gt;&lt;P&gt;Is it common, just deal with it?&amp;nbsp; Do folks filter out certain threat emails or stop critical threat email alerts all together?&lt;/P&gt;</description>
      <pubDate>Mon, 23 Oct 2017 13:50:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/183227#M56337</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-10-23T13:50:49Z</dc:date>
    </item>
    <item>
      <title>Re: Dealing with Threat Alerts?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/183313#M56352</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;What we did was set the policies to block for the max time of 3600 seconds. That way the attacker takes a lot longer to figure out they are denied.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The other thing you could try is to set the policy to reset client. Since the attack is coming from the external "server", only your servers connection gets reset and theirs has to time out. Basically forcing their connection to stay open and bleeing their resources and not yours.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would also love to hear others thoughts on this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 23 Oct 2017 20:27:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/183313#M56352</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2017-10-23T20:27:01Z</dc:date>
    </item>
    <item>
      <title>Re: Dealing with Threat Alerts?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/183320#M56355</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56398"&gt;@OMatlock&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You really should have an automated response setup that can read these events and block the source IPs at a set threshold. While&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;'s solution is a good first step, it isn't really recommend to just live with the IPs attacking your network. Setup an automated response that puts these indicated addresses into a deny rule and just block them all together. MineMeld can help with this, otherwise their are plenty of other possible solutions.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Oct 2017 21:00:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/183320#M56355</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-10-23T21:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: Dealing with Threat Alerts?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/183503#M56382</link>
      <description>&lt;P&gt;Thank you guys for the feedback.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580" target="_blank"&gt;&lt;FONT color="#00689a"&gt;@Otakar.Klier&lt;/FONT&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are currently using default vulnerability profile.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vulnerability1.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/12054i8857656364C07C45/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="vulnerability1.jpg" alt="vulnerability1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you say block action, do you mean Block IP like this?&amp;nbsp; Does that reduce the alert emails?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vulnerability2.jpg" style="width: 649px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/12055i454A830A2153E321/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="vulnerability2.jpg" alt="vulnerability2.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2017 18:39:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/183503#M56382</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-10-24T18:39:03Z</dc:date>
    </item>
    <item>
      <title>Re: Dealing with Threat Alerts?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/183509#M56388</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56398"&gt;@OMatlock&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;The setting you have displayed would block the IP that triggered that critical threat alert for 3600 seconds. That will stop you from recieving another alert for that time period, but if you have IPs continually&amp;nbsp;launching attacks against your network you would still recieive alerts when that window has passed.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2017 19:26:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/183509#M56388</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-10-24T19:26:29Z</dc:date>
    </item>
    <item>
      <title>Re: Dealing with Threat Alerts?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/183512#M56389</link>
      <description>&lt;P&gt;BPry&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you again (I am still learning).&amp;nbsp; The alerts and traffic log indicates that the attacks occur within a couple of minutes and then a different IP (group) comes.&amp;nbsp; Would blocking the IP for this duration (1 hour) at least give some relief, assuming the attacks stay like they currently are (within minutes and then stops)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I agree, ideally need to come up with an automatically updated IP deny rule.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2017 19:37:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/183512#M56389</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-10-24T19:37:42Z</dc:date>
    </item>
    <item>
      <title>Re: Dealing with Threat Alerts?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/183517#M56395</link>
      <description>&lt;P&gt;It would certaintly help. Keep in mind that IP Spoofing is a thing though, and what you are describing is typical of someone employing a botnet.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2017 20:24:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/183517#M56395</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-10-24T20:24:02Z</dc:date>
    </item>
    <item>
      <title>Re: Dealing with Threat Alerts?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/183520#M56396</link>
      <description>&lt;P&gt;BPry&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you so much for your responses, as I continue to learn new everyday.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just to confirm.&amp;nbsp; For this example, since these two IP threats came in consecutively and then stops, I should only receive two alerts (1 for each&amp;nbsp;IP)&amp;nbsp;instead of a whole bunch of them by&amp;nbsp;employing this new Block IP setting?&amp;nbsp; (For at least the hour)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's the idea right?&amp;nbsp; Making more sense to me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="firewallthreats.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/12057i130305059A032334/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="firewallthreats.jpg" alt="firewallthreats.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2017 20:32:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/183520#M56396</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-10-24T20:32:23Z</dc:date>
    </item>
    <item>
      <title>Re: Dealing with Threat Alerts?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/183628#M56419</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56398"&gt;@OMatlock&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Correct.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Oct 2017 13:24:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/183628#M56419</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-10-25T13:24:38Z</dc:date>
    </item>
    <item>
      <title>Re: Dealing with Threat Alerts?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/184867#M56640</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not sure&amp;nbsp;is this quite correct&amp;nbsp;if you live this host type to server? If you filter your traffic logs for attacker address, you will see that it is client side of connection. So any attacker which initiate connection to your exposed resource (ex. web server...), is considered as client and stateful firewall marked it as client side of session.&amp;nbsp;&lt;/P&gt;&lt;P&gt;When replicate that on this policy setting it should be client host type, isn't it?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2017 10:24:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/184867#M56640</guid>
      <dc:creator>Tician</dc:creator>
      <dc:date>2017-11-01T10:24:37Z</dc:date>
    </item>
    <item>
      <title>Re: Dealing with Threat Alerts?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/184888#M56647</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10387"&gt;@Tician&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Out of curiosity why would you want to close the client side by a reset? If you force the potential attacker to leave its connection open, but you close the servers connection, then you save resources on your end but cause the attacker to increase their resources.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2017 12:43:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/184888#M56647</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-11-01T12:43:44Z</dc:date>
    </item>
    <item>
      <title>Re: Dealing with Threat Alerts?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/184893#M56648</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;yes you're completely right, it is good to reset server connections in this case, so what should be scenario where you suggest to use reset client&amp;nbsp; connections instead?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2017 13:06:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dealing-with-threat-alerts/m-p/184893#M56648</guid>
      <dc:creator>Tician</dc:creator>
      <dc:date>2017-11-01T13:06:23Z</dc:date>
    </item>
  </channel>
</rss>

