<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unauthorized Access in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/unauthorized-access/m-p/261837#M74211</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/105432"&gt;@karthikeyanB&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If you don't have the logs anymore and you aren't sending them off of the firewall then you essentially don't have anything to view what credentials were used to make those changes anymore. I would recommend you simply have anyone with credentials change them. Same thing goes with restoring the configuration or log files, if you weren't already sending them elsewhere you have nothing to restore from.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just a few things I would really recommend you do to increase security:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Utilizes permitted-ips&amp;nbsp;on the management interfaces to restrict management access to a few machines.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Assuming that the GUI was open to the internet, absolutely stop doing this. If&amp;nbsp;&lt;EM&gt;required&lt;/EM&gt; restrict it to one external IP address under your control.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Configure log forwarding so the logs aren't only on the firewall.&lt;/LI&gt;&lt;LI&gt;Configure log settings so you get alerted for any configuration change made to the device; and if that's to chatty for you at least configure an alert for when a commit is performed.&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;</description>
    <pubDate>Tue, 21 May 2019 17:19:56 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2019-05-21T17:19:56Z</dc:date>
    <item>
      <title>Unauthorized Access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unauthorized-access/m-p/261726#M74204</link>
      <description>&lt;DIV class="x_MsoNormal"&gt;Hi All,&lt;/DIV&gt;&lt;DIV class="x_MsoNormal"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="x_MsoNormal"&gt;we had an unauthorised access to our firewall, after the access all the logs in the firewall have been deleted and configurations have been changed and committed.&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="x_MsoNormal"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="x_MsoNormal"&gt;we need to which credential are used to login the firewall.&lt;/DIV&gt;&lt;DIV class="x_MsoNormal"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="x_MsoNormal"&gt;Now we found the ip address as well as what changes are they made.&lt;/DIV&gt;&lt;DIV class="x_MsoNormal"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="x_MsoNormal"&gt;there is any other chance for restoring&amp;nbsp; the deleted file.&lt;/DIV&gt;&lt;DIV class="x_MsoNormal"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="x_MsoNormal"&gt;Regards&lt;/DIV&gt;&lt;DIV class="x_MsoNormal"&gt;Karthikeyan&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Tue, 21 May 2019 06:07:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unauthorized-access/m-p/261726#M74204</guid>
      <dc:creator>karthikeyanB</dc:creator>
      <dc:date>2019-05-21T06:07:32Z</dc:date>
    </item>
    <item>
      <title>Re: Unauthorized Access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unauthorized-access/m-p/261837#M74211</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/105432"&gt;@karthikeyanB&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If you don't have the logs anymore and you aren't sending them off of the firewall then you essentially don't have anything to view what credentials were used to make those changes anymore. I would recommend you simply have anyone with credentials change them. Same thing goes with restoring the configuration or log files, if you weren't already sending them elsewhere you have nothing to restore from.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just a few things I would really recommend you do to increase security:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Utilizes permitted-ips&amp;nbsp;on the management interfaces to restrict management access to a few machines.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Assuming that the GUI was open to the internet, absolutely stop doing this. If&amp;nbsp;&lt;EM&gt;required&lt;/EM&gt; restrict it to one external IP address under your control.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Configure log forwarding so the logs aren't only on the firewall.&lt;/LI&gt;&lt;LI&gt;Configure log settings so you get alerted for any configuration change made to the device; and if that's to chatty for you at least configure an alert for when a commit is performed.&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Tue, 21 May 2019 17:19:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unauthorized-access/m-p/261837#M74211</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-05-21T17:19:56Z</dc:date>
    </item>
  </channel>
</rss>

