<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: traffic logs as type - spyware and vulnerability -------session end reason threat in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-logs-as-type-spyware-and-vulnerability-session-end/m-p/234314#M67170</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;DNS can be identified via a number of different vulnerabilities and spyware signatures, and the action would be dependent on the profile applied to this traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;More often then not when DNS traffic is identified with Spyware signatures it's due to the user requesting certain domains that have been identified and this traffic will almost always have an action of drop if you've left everything setup to default. With the action setup as Drop the client simply wouldn't be able to resolve the domain.&amp;nbsp;&lt;/P&gt;&lt;P&gt;DNS traffic is actually failry reqularly seen under Vulnerability and some of them are simply informational ( 'DNS Zone Transfer AXFR Response' 'DNS Zone Transfer AXFR Attempt'). You'd either have to share the signature you are hitting or really look at your profile to figure out what's exactly going on here.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;session_end_reason threat doesn't necissarily mean anything other then a threat was identified somewhere within the session traffic. Going into detailed log view will show you exactly what happended and what action was taken once the threat was identified.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 07 Oct 2018 15:44:37 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2018-10-07T15:44:37Z</dc:date>
    <item>
      <title>traffic logs as type - spyware and vulnerability -------session end reason threat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-logs-as-type-spyware-and-vulnerability-session-end/m-p/234235#M67153</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;under unified logs i see the application DNS&amp;nbsp; and when i click on detailed log view sometimes i see&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;type as vulnerability&amp;nbsp; and action reset both&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;session end reason threat&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;type as spyware and action as drop&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;session end reason threat&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Need to know type vulnerability and spyware are using this security profiles&amp;nbsp; &amp;nbsp;vulnerability and antispyware?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;why DNS traffic shows as spyware?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also when we see that session end reason is threat does it mean PA drops the traffic ???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Oct 2018 04:37:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-logs-as-type-spyware-and-vulnerability-session-end/m-p/234235#M67153</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2018-10-06T04:37:02Z</dc:date>
    </item>
    <item>
      <title>Re: traffic logs as type - spyware and vulnerability -------session end reason threat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-logs-as-type-spyware-and-vulnerability-session-end/m-p/234314#M67170</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;DNS can be identified via a number of different vulnerabilities and spyware signatures, and the action would be dependent on the profile applied to this traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;More often then not when DNS traffic is identified with Spyware signatures it's due to the user requesting certain domains that have been identified and this traffic will almost always have an action of drop if you've left everything setup to default. With the action setup as Drop the client simply wouldn't be able to resolve the domain.&amp;nbsp;&lt;/P&gt;&lt;P&gt;DNS traffic is actually failry reqularly seen under Vulnerability and some of them are simply informational ( 'DNS Zone Transfer AXFR Response' 'DNS Zone Transfer AXFR Attempt'). You'd either have to share the signature you are hitting or really look at your profile to figure out what's exactly going on here.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;session_end_reason threat doesn't necissarily mean anything other then a threat was identified somewhere within the session traffic. Going into detailed log view will show you exactly what happended and what action was taken once the threat was identified.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Oct 2018 15:44:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-logs-as-type-spyware-and-vulnerability-session-end/m-p/234314#M67170</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-10-07T15:44:37Z</dc:date>
    </item>
    <item>
      <title>Re: traffic logs as type - spyware and vulnerability -------session end reason threat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-logs-as-type-spyware-and-vulnerability-session-end/m-p/234317#M67173</link>
      <description>&lt;P&gt;strange thing is that under unified i only see traffic logs no threat logs.&lt;/P&gt;&lt;P&gt;when i go to threat logs i see this signature 18003.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;unified logs does not show threat logs and threat id.&lt;/P&gt;&lt;P&gt;so it means that this signature as per threat vault is anti spyware signature.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;how often this antispayware signature gets dynamic updates?&lt;/P&gt;&lt;P&gt;if i use app override for the dns application traffic then i will avoid the l4 to l7 inspection right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Sun, 07 Oct 2018 16:23:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-logs-as-type-spyware-and-vulnerability-session-end/m-p/234317#M67173</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2018-10-07T16:23:18Z</dc:date>
    </item>
    <item>
      <title>Re: traffic logs as type - spyware and vulnerability -------session end reason threat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-logs-as-type-spyware-and-vulnerability-session-end/m-p/234319#M67174</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You can enable or disable what Log Types you wish to show in the Unified Logs, verify that you have Threat enabled. Click on the 'Effective Querries' icon to the left of the magnifying glass if using the GUI, then make sure the little check box by Threat is checked.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 401px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17046iFC12C09262A42173/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"unified logs does not show threat logs and threat id.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;so it means that this signature as per threat vault is anti spyware signature."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;-&amp;nbsp;&lt;/EM&gt;Correct, 18003 detects data infiltrations over DNS; I haven't known this signature to be wrong unless using certain antivirus products that actually update information via DNS. I would highly recommend you look into the machine that is getting identified and verify it isn't infected.&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"how often this antispayware signature gets dynamic updates?&amp;nbsp;&lt;/EM&gt;&lt;STRONG&gt;Doesn't really have a set schedule, updates are pushed as needed. Once a month Palo Alto pushes&amp;nbsp;&lt;EM&gt;new&lt;/EM&gt; application signatures, but updates can be multiple times per week and even multiple per day.&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;if i use app override for the dns application traffic then i will avoid the l4 to l7 inspection right?"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Depends on how you build it out, if you override to DNS then no, inspections would still take place since DNS is a built-in application. Regardless, I really wouldn't recommend this as DNS is actively used to extract information.&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Oct 2018 16:36:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-logs-as-type-spyware-and-vulnerability-session-end/m-p/234319#M67174</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-10-07T16:36:05Z</dc:date>
    </item>
    <item>
      <title>Re: traffic logs as type - spyware and vulnerability -------session end reason threat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-logs-as-type-spyware-and-vulnerability-session-end/m-p/234322#M67177</link>
      <description>&lt;P&gt;i check on the left hand side and verify that show effective queries all is selected.&lt;/P&gt;&lt;P&gt;threat is also checked there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;d&lt;STRONG&gt;oes this mean it is antispy ware signature as we do not see this under unified logs?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;on threat logs i see attack and victim.&lt;/P&gt;&lt;P&gt;and machines are dns server and proofpoint appliance.&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;so when i see attacker and victim how can i know which is source and destination ?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;is victim always be the affected in threat logs?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appoverride&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have built custom app with&amp;nbsp; app dns and port tcp and udp 443.&lt;/P&gt;&lt;P&gt;then i created app override policy&lt;/P&gt;&lt;P&gt;then under security policy i have choose this custom app dns on tcp and udp port 443.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have read that if you use app override then PA doet do anything afrom l5 to l7?&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;please confirm this?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Oct 2018 17:12:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-logs-as-type-spyware-and-vulnerability-session-end/m-p/234322#M67177</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2018-10-07T17:12:54Z</dc:date>
    </item>
  </channel>
</rss>

