<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: &amp;quot;SMB: User Password Brute Force Attempt detected&amp;quot; on share that is not being accessed in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/quot-smb-user-password-brute-force-attempt-detected-quot-on/m-p/309804#M80250</link>
    <description>&lt;P&gt;yes, this can be a way to cross verify it.&lt;/P&gt;</description>
    <pubDate>Thu, 06 Feb 2020 14:32:16 GMT</pubDate>
    <dc:creator>ZS_NET</dc:creator>
    <dc:date>2020-02-06T14:32:16Z</dc:date>
    <item>
      <title>"SMB: User Password Brute Force Attempt detected" on share that is not being accessed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-smb-user-password-brute-force-attempt-detected-quot-on/m-p/309711#M80233</link>
      <description>&lt;P&gt;Recently I accessed a SMB share on a corporate Synology device (through the PA firewall). Accessing this share is hardly ever used. Now...days later, after several reboots of the client computer, the Firewall keeps on detecting the "vulnerability"&amp;nbsp;&lt;STRONG&gt;SMB: User Password Brute Force Attempt(40004)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is something I cannot explain. There are no active connections to this share from the client computer. There is nothing in the credential manager of Windows. There is nothing it the frequently accessed locations... Any idea why the Palo Alto would think this vulnerability is triggered an how can I find the "culprit" program which tries to access this file share?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remko&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 07:58:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-smb-user-password-brute-force-attempt-detected-quot-on/m-p/309711#M80233</guid>
      <dc:creator>Indorama_Ventures</dc:creator>
      <dc:date>2020-02-06T07:58:41Z</dc:date>
    </item>
    <item>
      <title>Re: "SMB: User Password Brute Force Attempt detected" on share that is not being accessed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-smb-user-password-brute-force-attempt-detected-quot-on/m-p/309783#M80244</link>
      <description>&lt;P&gt;It seems there are still login attempts from client which is triggering child signature. Are you seeing same client IP every time?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 13:42:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-smb-user-password-brute-force-attempt-detected-quot-on/m-p/309783#M80244</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2020-02-06T13:42:33Z</dc:date>
    </item>
    <item>
      <title>Re: "SMB: User Password Brute Force Attempt detected" on share that is not being accessed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-smb-user-password-brute-force-attempt-detected-quot-on/m-p/309792#M80248</link>
      <description>&lt;P&gt;Yes, according to the firewall it is the same client (IP address).&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately I can determine what is causing the SMB traffic. There is simply nothing open on the client.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Every 2 hours or so I see a whole bunch of warnings appear in the logs of the firewall. Then it is silent again after which the process repeats itself.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Very weird ?!?!?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remko&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 14:09:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-smb-user-password-brute-force-attempt-detected-quot-on/m-p/309792#M80248</guid>
      <dc:creator>Indorama_Ventures</dc:creator>
      <dc:date>2020-02-06T14:09:52Z</dc:date>
    </item>
    <item>
      <title>Re: "SMB: User Password Brute Force Attempt detected" on share that is not being accessed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-smb-user-password-brute-force-attempt-detected-quot-on/m-p/309802#M80249</link>
      <description>&lt;P&gt;Try by running wireshark on client end to check if there are any hits to server.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 14:29:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-smb-user-password-brute-force-attempt-detected-quot-on/m-p/309802#M80249</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2020-02-06T14:29:15Z</dc:date>
    </item>
    <item>
      <title>Re: "SMB: User Password Brute Force Attempt detected" on share that is not being accessed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-smb-user-password-brute-force-attempt-detected-quot-on/m-p/309804#M80250</link>
      <description>&lt;P&gt;yes, this can be a way to cross verify it.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 14:32:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-smb-user-password-brute-force-attempt-detected-quot-on/m-p/309804#M80250</guid>
      <dc:creator>ZS_NET</dc:creator>
      <dc:date>2020-02-06T14:32:16Z</dc:date>
    </item>
    <item>
      <title>Re: "SMB: User Password Brute Force Attempt detected" on share that is not being accessed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-smb-user-password-brute-force-attempt-detected-quot-on/m-p/309806#M80251</link>
      <description>&lt;P&gt;Good tip... Will do!&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 14:34:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-smb-user-password-brute-force-attempt-detected-quot-on/m-p/309806#M80251</guid>
      <dc:creator>Indorama_Ventures</dc:creator>
      <dc:date>2020-02-06T14:34:05Z</dc:date>
    </item>
    <item>
      <title>Re: "SMB: User Password Brute Force Attempt detected" on share that is not being accessed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-smb-user-password-brute-force-attempt-detected-quot-on/m-p/311023#M80518</link>
      <description>&lt;P&gt;Wireshark reveiled that it was a webservice that tried to contact the Synology. From there, I guess it tried to open the SMB share on the computer.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Although not visible on the computer itself it was a browser session on tcp/5000 which initiated the connection.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2020 09:33:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-smb-user-password-brute-force-attempt-detected-quot-on/m-p/311023#M80518</guid>
      <dc:creator>Indorama_Ventures</dc:creator>
      <dc:date>2020-02-13T09:33:42Z</dc:date>
    </item>
    <item>
      <title>Re: "SMB: User Password Brute Force Attempt detected" on share that is not being accessed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-smb-user-password-brute-force-attempt-detected-quot-on/m-p/1231506#M124544</link>
      <description>&lt;P&gt;We are in the process of implementing zero trust via Palo and now we are seeing this. No one has even logged in to the machine at the time the alerts are raised.. The machines certainly don't have any malicious software on them and we have a xdr product protecting them and the xdr product is not raising the alarm. It's difficult to do a packet capture as the alerts are raised at random times.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jun 2025 08:14:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-smb-user-password-brute-force-attempt-detected-quot-on/m-p/1231506#M124544</guid>
      <dc:creator>uduwawalan</dc:creator>
      <dc:date>2025-06-11T08:14:12Z</dc:date>
    </item>
  </channel>
</rss>

