<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Automatic email alerts: Sinkhole and security policies in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/automatic-email-alerts-sinkhole-and-security-policies/m-p/261320#M74091</link>
    <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This query is for PAN-OS v8.1.X&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to generate an email alert when the firewall sees an (action&amp;nbsp;eq sinkhole) event or when the security policy created to sinkhole an infected host is used. Email Profile(s) have already configured and so has Sinkhole.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the best way to configure both, the email alert for the (action&amp;nbsp;eq sinkhole) or any other Log-Threat entry, and also, when a specific security policy is used?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lastly, is it possible to generate a dynamic object including source IPs that have already been blocked by the firewall after detecting a vulnerability? The idea is to block access to IPs that already attempted an attack and were blocked by the firewall in the past.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;panw-highrisk-ip-list and panw-known-ip-list do not seem to be very effective as only one IP: 80.211.52.246 has been detected in almost 5 days.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Ho&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 16 May 2019 10:02:01 GMT</pubDate>
    <dc:creator>ash83</dc:creator>
    <dc:date>2019-05-16T10:02:01Z</dc:date>
    <item>
      <title>Automatic email alerts: Sinkhole and security policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/automatic-email-alerts-sinkhole-and-security-policies/m-p/261320#M74091</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This query is for PAN-OS v8.1.X&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to generate an email alert when the firewall sees an (action&amp;nbsp;eq sinkhole) event or when the security policy created to sinkhole an infected host is used. Email Profile(s) have already configured and so has Sinkhole.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the best way to configure both, the email alert for the (action&amp;nbsp;eq sinkhole) or any other Log-Threat entry, and also, when a specific security policy is used?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lastly, is it possible to generate a dynamic object including source IPs that have already been blocked by the firewall after detecting a vulnerability? The idea is to block access to IPs that already attempted an attack and were blocked by the firewall in the past.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;panw-highrisk-ip-list and panw-known-ip-list do not seem to be very effective as only one IP: 80.211.52.246 has been detected in almost 5 days.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Ho&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2019 10:02:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/automatic-email-alerts-sinkhole-and-security-policies/m-p/261320#M74091</guid>
      <dc:creator>ash83</dc:creator>
      <dc:date>2019-05-16T10:02:01Z</dc:date>
    </item>
    <item>
      <title>Re: Automatic email alerts: Sinkhole and security policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/automatic-email-alerts-sinkhole-and-security-policies/m-p/261398#M74109</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/57857"&gt;@ash83&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;For alerting you would really want to build out a Log Setting profile. This will allow you to setup the filter that you want and then specify the actions you wish to take when the firewall sees anything matching your filter. Documentation can be found &lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/device/device-log-settings.html" target="_self"&gt;HERE&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;You could also setup an additional Log Forwarding profile if you want to alert on security policy activity. You can get pretty detailed here about when and how you want to be alerted, and what should actually trigger an alert. That documentation can be found &lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/monitoring/configure-log-forwarding.html" target="_self"&gt;HERE.&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There's a few ways you can do that last question. You could utilize a Vulnerability Protection Profile specific to external connections and set the Action to "Block IP" and specify your desired duration ( up-to 3600 seconds) to prevent continual requests from the same address in quick succession. You could also utilize something like MineMeld to build an EDL based off&amp;nbsp; of the alerts the firewall generates. More powerful SIEMs such as Splunk can also incorporate these logs and the MineMeld API to automatically feed indicators into MineMeld based off of the firewall logs for you without manual entry.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2019 20:53:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/automatic-email-alerts-sinkhole-and-security-policies/m-p/261398#M74109</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-05-16T20:53:02Z</dc:date>
    </item>
  </channel>
</rss>

