<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability assessment question in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9211#M6738</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not sure I understand your question.&amp;nbsp; But I think you want to have the vendor scanner addresses on the internet untrust zone have access to your network and turn off the layer 4-7 inspection profiles for these devices but have all the normal application or port access remain the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is correct, you need to essentially duplicate ALL your untrust to trust policies with the copy having the scanner addresses as the source and removing the profiles but leaving everything else the same.&amp;nbsp; This needs to the the first of the two rules.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 06 Jun 2015 12:51:01 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2015-06-06T12:51:01Z</dc:date>
    <item>
      <title>Vulnerability assessment question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9210#M6737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We're having a vulnerability assessment done, and want to make sure that the IDS/IPS part doesn't disable all attempts from the vendors IP addresses, just the application blocking/service blocking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I whitelist the 4 IP addresses and put them in a policy saying that for these addresses, do everything normally besides shutdown all communications from these addresses?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jun 2015 21:20:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9210#M6737</guid>
      <dc:creator>rivkin</dc:creator>
      <dc:date>2015-06-05T21:20:58Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability assessment question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9211#M6738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not sure I understand your question.&amp;nbsp; But I think you want to have the vendor scanner addresses on the internet untrust zone have access to your network and turn off the layer 4-7 inspection profiles for these devices but have all the normal application or port access remain the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is correct, you need to essentially duplicate ALL your untrust to trust policies with the copy having the scanner addresses as the source and removing the profiles but leaving everything else the same.&amp;nbsp; This needs to the the first of the two rules.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Jun 2015 12:51:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9211#M6738</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-06-06T12:51:01Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability assessment question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9212#M6739</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, taht's exactly what I meant.&amp;nbsp; Helpful, but not fun. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, basically make a rule that encompasses all of my untrust to dmz policies, but turn off the profiles?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jun 2015 14:07:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9212#M6739</guid>
      <dc:creator>rivkin</dc:creator>
      <dc:date>2015-06-08T14:07:34Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability assessment question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9213#M6740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Personally, I would rather do an assessment with the regular security profiles, or else the results won't be realistic. The only thing I would do is add exemptions to the vulnerability protection exceptions where I block the source IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess it depends on what you want to achieve.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Benjamin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jun 2015 14:30:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9213#M6740</guid>
      <dc:creator>BenjAudy.MTL</dc:creator>
      <dc:date>2015-06-08T14:30:02Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability assessment question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9214#M6741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@baudy - How do I do that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jun 2015 14:32:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9214#M6741</guid>
      <dc:creator>rivkin</dc:creator>
      <dc:date>2015-06-08T14:32:26Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability assessment question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9215#M6742</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oops, I just checked and the IP Address Exemptions list is to restrict the exemption I configured to a particular set of addresses. In your case, you would want to specify a set of addresses where the exception would NOT apply. I guess the only way is to do like Steven said, but like I said I'm not sure I would turn off all the security profiles or else it won't be realistic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Exemptions.PNG" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/19995_Exemptions.PNG" style="height: auto;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jun 2015 15:00:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9215#M6742</guid>
      <dc:creator>BenjAudy.MTL</dc:creator>
      <dc:date>2015-06-08T15:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability assessment question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9216#M6743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We started with the standard policies / vulnerability profiles to see how effective the current state is.&amp;nbsp; If your IPS is set to deliver a Block-IP response they the test may be a short one.&amp;nbsp; We then created a rule above the standard rule that handles the traffic to white list the tester with a profile that was alert only.&amp;nbsp; This way you get to see how effective your policies are and the tester gets to test the underlying servers to see how effectively you have them patched and configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jun 2015 16:18:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9216#M6743</guid>
      <dc:creator>HITSSEC</dc:creator>
      <dc:date>2015-06-08T16:18:53Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability assessment question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9217#M6744</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@phil So, the only thing in the whitelist policy is a different profile, and a source (specified addresses)?&amp;nbsp; Otherwise any/any?&lt;/P&gt;&lt;P&gt;thanks!&lt;/P&gt;&lt;P&gt;Rich&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jun 2015 16:25:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9217#M6744</guid>
      <dc:creator>rivkin</dc:creator>
      <dc:date>2015-06-08T16:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability assessment question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9218#M6745</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rich,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes if you trust your tester, otherwise limit the rule to the apps and/or ports in the original rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jun 2015 16:35:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9218#M6745</guid>
      <dc:creator>HITSSEC</dc:creator>
      <dc:date>2015-06-08T16:35:43Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability assessment question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9219#M6746</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's a lot of apps and ports...&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll run this by the sec analyst.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Rich&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jun 2015 18:20:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9219#M6746</guid>
      <dc:creator>rivkin</dc:creator>
      <dc:date>2015-06-08T18:20:36Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability assessment question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9220#M6747</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to add to what Phil is saying about trusting your tester.&amp;nbsp; make sure that if you do create these wide open access for his scanner that the report format he generates will not be "punishing" you for having lots of exposed and open systems.&amp;nbsp; When we open firewall rules for full access to the scanner some of these automated reports that go to management will make it look like your systems are far more exposed to internet threats than they actually are.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But at the same time allowing the scanner automatically past all the defenses will give your server admins a good solid list of all the missing patches on their systems that would be hidden by the firewall protection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It all depends on what your goal for the test is.&amp;nbsp; Do you want to see your true exposure to internet threats?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or do you want a full list of all possible vulnerabilities that need to be remediated?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jun 2015 22:50:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9220#M6747</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-06-08T22:50:43Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability assessment question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9221#M6748</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Steve,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We generally wait for the tester to cry "Uncle" as our IPS has a block IP response action for many of the threat signatures.&amp;nbsp; If they are paying attention, they will notice a lack of responses and get in touch with their contact.&amp;nbsp; If they just run the script then the will have very little to report on.&amp;nbsp; If they are professional they will report on their success with the IPS enabled and also report on the vulnerabilities on the underlying server (without IPS protection).&amp;nbsp; That way you get two useful reports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jun 2015 02:21:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9221#M6748</guid>
      <dc:creator>HITSSEC</dc:creator>
      <dc:date>2015-06-09T02:21:52Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability assessment question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9222#M6749</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since the PAN was new last year, and they didn't ask for us to disable, and we got a genuine report, going to leave it alone.&amp;nbsp; If they flag it, we'll worry about it. We alos have ingress rules with our ISP, so our web servers only talk what we want, even without the PAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Part of the assessment is a direct scan of the servers internally, so if we have vulnerabilities, that should get it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks everyone!&lt;/P&gt;&lt;P&gt;Rich&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jun 2015 13:48:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-assessment-question/m-p/9222#M6749</guid>
      <dc:creator>rivkin</dc:creator>
      <dc:date>2015-06-09T13:48:49Z</dc:date>
    </item>
  </channel>
</rss>

