<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to Analyse threats in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-analyse-threats/m-p/7790#M5744</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you look at the threat details you'll find the link to the corresponding Microsft Bulletin. This link usually tells you which patches you need to apply in order to be protected from the threat.&amp;nbsp; rgds Roland&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 29 Nov 2011 14:44:22 GMT</pubDate>
    <dc:creator>gafrol</dc:creator>
    <dc:date>2011-11-29T14:44:22Z</dc:date>
    <item>
      <title>How to Analyse threats</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-analyse-threats/m-p/7787#M5741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anybody suggest me how to analyse threats that's been alerted by Palo alto device.&lt;/P&gt;&lt;P&gt;What is the analysis ﻿approach?&lt;BR /&gt;Please advice.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 13:34:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-analyse-threats/m-p/7787#M5741</guid>
      <dc:creator>spriyadarshini</dc:creator>
      <dc:date>2011-11-28T13:34:16Z</dc:date>
    </item>
    <item>
      <title>Re: How to Analyse threats</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-analyse-threats/m-p/7788#M5742</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Priyadarshini,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the Palo Alto device captures the threats, you see them in the threat logs. ( Monitor--&amp;gt; Threat logs)&lt;/P&gt;&lt;P&gt;In order to see the threat id of the threat being detected click on the small magnifying icon on the left first column to get the details of that particular threat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Go to the Support portal,&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.paloaltonetworks.com/pa-portal/"&gt;https://support.paloaltonetworks.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Go to threat database and enter the threat id.&lt;/P&gt;&lt;P&gt;You will get the details of the threat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also get the pcap of the threat.&lt;/P&gt;&lt;P&gt;o to Objects--&amp;gt; Profiles---&amp;gt; Antivirus Profiles---&amp;gt; Enable packet capture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you think it is not a threat (False positive)and is being detected please contact Palo Alto Networks Support in order to open a case and have the issue resolved.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 21:30:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-analyse-threats/m-p/7788#M5742</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2011-11-28T21:30:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to Analyse threats</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-analyse-threats/m-p/7789#M5743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Patel &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your answer is very helpful.&lt;/P&gt;&lt;P&gt;I would also like to know what steps should I take to analyse the threat once its been reported by IDS i.e How to analyse that our internal system is vunerable or not.&lt;/P&gt;&lt;P&gt;Let me explain with an example.&lt;/P&gt;&lt;P&gt;say Http:IIS denial of service attack is reported by Palalto.Then what steps to be follow for analysis.Generally an alert provides us information on source ip,Destination ip,threat name,threat id,port number.....with these details how to proceed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; regards&lt;/P&gt;&lt;P&gt;priyadarshini&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 07:45:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-analyse-threats/m-p/7789#M5743</guid>
      <dc:creator>spriyadarshini</dc:creator>
      <dc:date>2011-11-29T07:45:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to Analyse threats</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-analyse-threats/m-p/7790#M5744</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you look at the threat details you'll find the link to the corresponding Microsft Bulletin. This link usually tells you which patches you need to apply in order to be protected from the threat.&amp;nbsp; rgds Roland&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2011 14:44:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-analyse-threats/m-p/7790#M5744</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2011-11-29T14:44:22Z</dc:date>
    </item>
  </channel>
</rss>

