<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Known Malware passing through PA to Client in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/known-malware-passing-through-pa-to-client/m-p/10202#M7489</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats incorrect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to install a selfsigned CA-cert (along with its private key) in your PA device and then install the public key as "trusted CA" in your clients browsers (if you have an AD you can push this CA public key through GPO).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This CA-cert (for ssl-termination) can be created by using the openssl binary.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However - depending on your company regulations regarding certs and stuff and specially if you already have a PKI infrastructure then I would use the PKI environment to create either a new CA or an intermediate CA to be used in your PA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Jun 2012 18:27:57 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2012-06-08T18:27:57Z</dc:date>
    <item>
      <title>Known Malware passing through PA to Client</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/known-malware-passing-through-pa-to-client/m-p/10197#M7484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello PAN,&lt;/P&gt;&lt;P&gt;Today I had a client get infected with the "Windows Privacy Module" Fake AV, This wasn't cought by either PAN OS or Trend Micro while a MalwareBytes scan found it and removed it no problem. Is there something more I can do to increase the odds of my PA SG in catching these? I do keep th AV software up to date along with the PAN OS and I do have the Security profile on all ingress traffic set to block.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2012 19:43:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/known-malware-passing-through-pa-to-client/m-p/10197#M7484</guid>
      <dc:creator>Bvance</dc:creator>
      <dc:date>2012-06-07T19:43:59Z</dc:date>
    </item>
    <item>
      <title>Re: Known Malware passing through PA to Client</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/known-malware-passing-through-pa-to-client/m-p/10198#M7485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H4 style="font-size:1.4444em;font-family:Arial, Helvetica, sans-serif;background-color:#f8f4e6"&gt;This looks like a false-negative&amp;nbsp; bypassing PAN-OS firewall.Please open a support case providing following info.&lt;/H4&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:12px;background-color:#f8f4e6"&gt;(1) samples&amp;nbsp; pcaps &lt;BR /&gt;(2) Reference URL /Links etc.&amp;nbsp; associated with the Virus.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Refer : &lt;A class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-1283"&gt;https://live.paloaltonetworks.com/docs/DOC-1283&lt;/A&gt;&amp;nbsp;&amp;nbsp; for future references.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #f8f4e6; min-height: 8pt;"&gt;Thanks ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #f8f4e6; min-height: 8pt;"&gt;Ameya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2012 19:55:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/known-malware-passing-through-pa-to-client/m-p/10198#M7485</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2012-06-07T19:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: Known Malware passing through PA to Client</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/known-malware-passing-through-pa-to-client/m-p/10199#M7486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As a sidenote you could also enable ssl decryption in order to be able to inspect also https traffic. Along with (if possible) block .exe and other filetypes from being downloadable by the clients. And to top it off you could enable url categorization and block follow categories:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Keyloggers and Monitoring&lt;/P&gt;&lt;P&gt;Malware sites&lt;/P&gt;&lt;P&gt;Spyware and Adware&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2012 20:39:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/known-malware-passing-through-pa-to-client/m-p/10199#M7486</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-06-07T20:39:10Z</dc:date>
    </item>
    <item>
      <title>Re: Known Malware passing through PA to Client</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/known-malware-passing-through-pa-to-client/m-p/10200#M7487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, I'll give these a shot.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2012 12:21:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/known-malware-passing-through-pa-to-client/m-p/10200#M7487</guid>
      <dc:creator>Bvance</dc:creator>
      <dc:date>2012-06-08T12:21:53Z</dc:date>
    </item>
    <item>
      <title>Re: Known Malware passing through PA to Client</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/known-malware-passing-through-pa-to-client/m-p/10201#M7488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From what I have been reading on inbound SSL decryption it looks like we would have to have our own Microsoft certificate server. Is this correct?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2012 14:32:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/known-malware-passing-through-pa-to-client/m-p/10201#M7488</guid>
      <dc:creator>Bvance</dc:creator>
      <dc:date>2012-06-08T14:32:49Z</dc:date>
    </item>
    <item>
      <title>Re: Known Malware passing through PA to Client</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/known-malware-passing-through-pa-to-client/m-p/10202#M7489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats incorrect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to install a selfsigned CA-cert (along with its private key) in your PA device and then install the public key as "trusted CA" in your clients browsers (if you have an AD you can push this CA public key through GPO).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This CA-cert (for ssl-termination) can be created by using the openssl binary.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However - depending on your company regulations regarding certs and stuff and specially if you already have a PKI infrastructure then I would use the PKI environment to create either a new CA or an intermediate CA to be used in your PA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2012 18:27:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/known-malware-passing-through-pa-to-client/m-p/10202#M7489</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-06-08T18:27:57Z</dc:date>
    </item>
  </channel>
</rss>

