<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Brute force and scanning signatures in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8354#M6169</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Panse,&lt;/P&gt;&lt;P&gt;you can get a hold of your sales contact or call into support and open up an ehancement request regarding this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Stephen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 24 Jun 2010 22:18:27 GMT</pubDate>
    <dc:creator>swhyte</dc:creator>
    <dc:date>2010-06-24T22:18:27Z</dc:date>
    <item>
      <title>Brute force and scanning signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8341#M6156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Box: PA-2020 (probably all)&lt;/DIV&gt;&lt;DIV&gt;OS Version: PANOS-3.0.6&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Hi!&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;I have some questions and suggestions for the threat-ips part of the box.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;1. Ability to view settings for scanning and brute force signatures.&lt;/DIV&gt;&lt;DIV&gt; - What are the settings for these signatures? I cant find for instance how many attempts/ips/ports is needed for the signature to trigger.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;2. Ability to change settings on brute force and scanning signatures.&lt;/DIV&gt;&lt;DIV&gt; - Sometimes you want to change the default behaviour of a signature. For instance we want to change how many attempts a client needs to do before a brute force signature triggers. This is also applicable for scanning signatures.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;3. More detail in signature summaries&lt;/DIV&gt;&lt;DIV&gt; - When looking at a SSH Brute force alarm, it states "count": 1. If its only 1 attempt its not a brute force attack &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; When checking the packet-capture data we only see 1 packet. It would be great to get more information of these "summarizing, threshold" signatures.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;4. Regexp signatures&lt;/DIV&gt;&lt;DIV&gt; - The ability to view the regular expressions on signatures that you don't need to protect would be nice.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;//Henrik&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Mar 2010 13:38:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8341#M6156</guid>
      <dc:creator>u2521</dc:creator>
      <dc:date>2010-03-09T13:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: Brute force and scanning signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8342#M6157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Regarding the brute force signatures, we are working on opening them  &lt;/P&gt;&lt;P&gt;up the signatures to allow administrators to change how many attempts  &lt;/P&gt;&lt;P&gt;a client needs to do over a customizable period of time to trigger a  &lt;/P&gt;&lt;P&gt;brute force signature. Right now, we don't expose those thresholds in  &lt;/P&gt;&lt;P&gt;the product. So here they are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. 40001 &lt;A href="FTP: login brute force attempt"&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a session has the same source and destination and triggers a single  &lt;/P&gt;&lt;P&gt;login/authentication event 10 times in 60 seconds, we will identify it  &lt;/P&gt;&lt;P&gt;as a brute force attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. 40003 &lt;A href="DNS: Spoofing Cache Record Attempt"&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a session has the same source and destination and triggers a single  &lt;/P&gt;&lt;P&gt;login/authentication event 100 times in 60 seconds, we will identify  &lt;/P&gt;&lt;P&gt;it as a brute force attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. 40004 &lt;A href="SMB: User Password Brute-force Attempt"&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a session has the same source and destination and triggers a single  &lt;/P&gt;&lt;P&gt;login/authentication event 14 times in 60 seconds, we will identify it  &lt;/P&gt;&lt;P&gt;as a brute force attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. 40005 &lt;A href="LDAP: User Login Brute-force Attempt"&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a session has the same source and destination and triggers a single  &lt;/P&gt;&lt;P&gt;login/authentication event 20 times in 60 seconds, we will identify it  &lt;/P&gt;&lt;P&gt;as a brute force attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5. 40006 &lt;A href="HTTP: User Authentication Brute-force Attempt"&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a session has the same source and destination and triggers a single  &lt;/P&gt;&lt;P&gt;login/authentication event 100 times in 60 seconds, we will identify  &lt;/P&gt;&lt;P&gt;it as a brute force attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6. 40007 &lt;A href="MAIL: User Login Brute-force Attempt"&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a session has the same source and destination and triggers a single  &lt;/P&gt;&lt;P&gt;login/authentication event 10 times in 60 seconds, we will identify it  &lt;/P&gt;&lt;P&gt;as a brute force attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;7. 40008 &lt;A href="MySQL Authentication Brute-force Attempt"&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a session has the same source and destination and triggers a single  &lt;/P&gt;&lt;P&gt;login/authentication event 25 times in 60 seconds, we will identify it  &lt;/P&gt;&lt;P&gt;as a brute force attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;8. 40009 &lt;A href="Telnet Authentication Brute-force Attempt"&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a session has the same source and destination and triggers a single  &lt;/P&gt;&lt;P&gt;login/authentication event 10 times in 60 seconds, we will identify it  &lt;/P&gt;&lt;P&gt;as a brute force attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;9. 40010 &lt;A href="Microsoft SQL Server User Authentication Brute-force Attempt"&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a session has the same source and destination and triggers a single  &lt;/P&gt;&lt;P&gt;login/authentication event 20 times in 60 seconds, we will identify it  &lt;/P&gt;&lt;P&gt;as a brute force attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10. 40011 &lt;A href="Postgres Database User Authentication Brute-force Attempt"&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a session has the same source and destination and triggers a single  &lt;/P&gt;&lt;P&gt;login/authentication event 10 times in 60 seconds, we will identify it  &lt;/P&gt;&lt;P&gt;as a brute force attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;11. 40012 &lt;A href="Oracle Database User Authentication Brute-force Attempt"&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a session has the same source and destination and triggers a single  &lt;/P&gt;&lt;P&gt;login/authentication event 7 times in 60 seconds, we will identify it  &lt;/P&gt;&lt;P&gt;as a brute force attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;12. 40013 &lt;A href="Sybase Database User Authentication Brute-force Attempt"&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a session has the same source and destination and triggers a single  &lt;/P&gt;&lt;P&gt;login/authentication event 10 times in 60 seconds, we will identify it  &lt;/P&gt;&lt;P&gt;as a brute force attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;13. 40014 &lt;A href="DB2 Database User Authentication Brute-force Attempt"&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a session has the same source and destination and triggers a single  &lt;/P&gt;&lt;P&gt;login/authentication event 20 times in 60 seconds, we will identify it  &lt;/P&gt;&lt;P&gt;as a brute force attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;14. 40015 &lt;A href="SSH User Authentication Brute-force Attempt"&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a session has the same source and destination and triggers a single  &lt;/P&gt;&lt;P&gt;login/authentication event 20 times in 60 seconds, we will identify it  &lt;/P&gt;&lt;P&gt;as a brute force attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;15. 40016 &lt;A href="SIP INVITE Method Request Flood Attempt"&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a session has the same source and destination and triggers a single  &lt;/P&gt;&lt;P&gt;login/authentication event 10 times in 20 seconds, we will identify it  &lt;/P&gt;&lt;P&gt;as a brute force attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;16. 40017 &lt;A href="VPN: PAN BOX SSL VPN Authentication Brute-force Attempt"&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a session has the same source and destination and triggers a single  &lt;/P&gt;&lt;P&gt;login/authentication event 10 times in 60 seconds, we will identify it  &lt;/P&gt;&lt;P&gt;as a brute force attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;17. 40018 &lt;A href="HTTP: Apache Denial Of Service Attempt"&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a session has the same source and destination and triggers a single  &lt;/P&gt;&lt;P&gt;login/authentication event 40 times in 60 seconds, we will identify it  &lt;/P&gt;&lt;P&gt;as a brute force attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;18. 40019 &lt;A href="HTTP: IIS Denial Of Service Attempt"&gt;&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a session has the same source and destination and triggers a single  &lt;/P&gt;&lt;P&gt;login/authentication event 10 times in 20 seconds, we will identify it  &lt;/P&gt;&lt;P&gt;as a brute force attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, I'm not sure I understand question #4 below. If you could  &lt;/P&gt;&lt;P&gt;explain a little bit more of what you're looking for, that would be  &lt;/P&gt;&lt;P&gt;great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alfred&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Mar 2010 17:50:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8342#M6157</guid>
      <dc:creator>fredallee</dc:creator>
      <dc:date>2010-03-09T17:50:39Z</dc:date>
    </item>
    <item>
      <title>Re: Brute force and scanning signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8343#M6158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you soooo much, I've been looking for these for days !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While we are at it, how does denying such signature will work ? I guess the deny will be triggered after one minute (when the signature will) and starts dropping further attemps. But if the attacks stops and starts again after a few sec (or even just one), will the first attemps be allowed again for a minute ? Or am I totally wrong ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Mar 2010 13:43:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8343#M6158</guid>
      <dc:creator>axel.bodart</dc:creator>
      <dc:date>2010-03-10T13:43:50Z</dc:date>
    </item>
    <item>
      <title>Re: Brute force and scanning signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8344#M6159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Once the brute force signature threshold is reached will drop all  &lt;/P&gt;&lt;P&gt;further attempts for sampling time frame. So if a signature monitors  &lt;/P&gt;&lt;P&gt;over 60 seconds, we will drop all further attempts for 60 seconds.  &lt;/P&gt;&lt;P&gt;After that, we will start allowing until the threshold is reached again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alfred&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Mar 2010 17:17:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8344#M6159</guid>
      <dc:creator>fredallee</dc:creator>
      <dc:date>2010-03-10T17:17:47Z</dc:date>
    </item>
    <item>
      <title>Re: Brute force and scanning signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8345#M6160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the reply. Im glad you are working on getting the settings into the product &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some clarification for #4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm talking about the signatures that are in the product that look for data patterns for example some sort of buffer overflow. In other products like Cisco, Juniper etc etc you are able to view the "matching pattern" (in regular expression format) for some signatures. Some of the signatures are "protected" because the vendors have agreements with Microsoft etc etc so the vendors are not allowed to give the matching patterns out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What i'm asking for is the ability to view "what a signatures matches" for all signatures except those you need to protect (encrypt). Also the possibility to change the "matching patterns" on a signatures provided by you would be totally awesome!! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The basic use for that function would be to tune the signatures ourself until we have had time to contact you about a signature that generates alot of false positives and you have tuned the signatures and sent out a new update &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;//Henrik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Mar 2010 22:41:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8345#M6160</guid>
      <dc:creator>u2521</dc:creator>
      <dc:date>2010-03-10T22:41:09Z</dc:date>
    </item>
    <item>
      <title>Re: Brute force and scanning signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8346#M6161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I understand. We have a closed system where we don't show any of the  &lt;/P&gt;&lt;P&gt;signatures on our box except for the custom created regex signatures  &lt;/P&gt;&lt;P&gt;that are created by administrators. The only method that we have for  &lt;/P&gt;&lt;P&gt;fixing signatures is currently through us. So if there are false  &lt;/P&gt;&lt;P&gt;positives, please let support know and we will tune the signature and  &lt;/P&gt;&lt;P&gt;release a new update. In the meantime, customers can create an  &lt;/P&gt;&lt;P&gt;exception for that signature so that it's effectively disabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alfred&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Mar 2010 22:58:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8346#M6161</guid>
      <dc:creator>fredallee</dc:creator>
      <dc:date>2010-03-10T22:58:17Z</dc:date>
    </item>
    <item>
      <title>Re: Brute force and scanning signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8347#M6162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the explanation. I have another related question : currently we are blocking threats from the level high and above as the medium level seems to be a bit to harsh a level to drop packets at. Since all thoses bruteforce attemps are medium, they are allowed. Is there a way to eitherraise the bruteforce vulnerabilities level to high or add them as blocked ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thansk alot !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Mar 2010 12:59:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8347#M6162</guid>
      <dc:creator>axel.bodart</dc:creator>
      <dc:date>2010-03-31T12:59:09Z</dc:date>
    </item>
    <item>
      <title>Re: Brute force and scanning signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8348#M6163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could do this via a custom vulnerability profile, but the drawback  &lt;/P&gt;&lt;P&gt;is that you need to manually add newly released signatures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alfred&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Apr 2010 06:54:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8348#M6163</guid>
      <dc:creator>fredallee</dc:creator>
      <dc:date>2010-04-01T06:54:09Z</dc:date>
    </item>
    <item>
      <title>Re: Brute force and scanning signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8349#M6164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thansk alot, that would indeed be a bit awfull to manage. So I'm left with 2 options :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Customize the severity level for a vulnerability (like applications), bit that's not possible, is it ? &lt;/P&gt;&lt;P&gt;2. Block all medium severity vulnerabilites. Would'nt that lead to too many blocked apps ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thaks for advises.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Apr 2010 07:23:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8349#M6164</guid>
      <dc:creator>axel.bodart</dc:creator>
      <dc:date>2010-04-01T07:23:22Z</dc:date>
    </item>
    <item>
      <title>Re: Brute force and scanning signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8350#M6165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. Customized severity for threats is not currently possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Blocking all medium severity vulnerabilities shouldn't block apps.  &lt;/P&gt;&lt;P&gt;If you want to block the brute force attacks, then I would turn on  &lt;/P&gt;&lt;P&gt;blocking for medium severity for server side vulnerabilities.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alfred&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Apr 2010 01:03:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8350#M6165</guid>
      <dc:creator>fredallee</dc:creator>
      <dc:date>2010-04-02T01:03:10Z</dc:date>
    </item>
    <item>
      <title>Re: Brute force and scanning signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8351#M6166</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For me it is a must to be able to at least be able to customize the severity level for a non-custom vulnerability signature. I understand that PA might not want to allow modification of their internal signatures, but modifying the severity is a very important requirement for my organization. I bet it is the same for many other organizations. After all, what it is medium for some it could be high for others, or the other way around. Everybody has a different risk tolerance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By the other hand, it would be very useful to be able to have the ability of making a copy of an internal signature and be able to modify it to suit the customer's needs. In that way organizations can leverage the work already made by PA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I strongly request to add the ability to customize the severity level as a feature in next releases of PAN-OS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Apr 2010 19:11:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8351#M6166</guid>
      <dc:creator>klomboy</dc:creator>
      <dc:date>2010-04-03T19:11:11Z</dc:date>
    </item>
    <item>
      <title>Re: Brute force and scanning signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8352#M6167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any news regarding the ability to view the "matching pattern" or settings for brute force and scanning signatures directly in the GUI ? Will this be available in future versions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ability to view the "matching pattern" is very helpful in deciding if the alarm is a false positive or not. If you have pcap active and can see the "matching pattern" you can make up your own mind if its a FP or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;//Henrik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 May 2010 10:59:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8352#M6167</guid>
      <dc:creator>u2521</dc:creator>
      <dc:date>2010-05-26T10:59:31Z</dc:date>
    </item>
    <item>
      <title>Re: Brute force and scanning signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8353#M6168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just ran into the same requirement ... OfficeMax would like the ability to customize the severity level of a threat in our Threat DB.&amp;nbsp; We already allow them to customize the Risk Level of an App ... they want the same ability for the Severity Level of a Threat/Spyware.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dave Klein&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jun 2010 13:29:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8353#M6168</guid>
      <dc:creator>panse</dc:creator>
      <dc:date>2010-06-24T13:29:48Z</dc:date>
    </item>
    <item>
      <title>Re: Brute force and scanning signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8354#M6169</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Panse,&lt;/P&gt;&lt;P&gt;you can get a hold of your sales contact or call into support and open up an ehancement request regarding this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Stephen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jun 2010 22:18:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/brute-force-and-scanning-signatures/m-p/8354#M6169</guid>
      <dc:creator>swhyte</dc:creator>
      <dc:date>2010-06-24T22:18:27Z</dc:date>
    </item>
  </channel>
</rss>

