<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zone Protection - Reconnaissance in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-reconnaissance/m-p/327253#M83289</link>
    <description>&lt;P&gt;I think whatever you get to see in best practice document of PA ( which I hope you followed ) , then that is sufficient for now .&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rest you can customize at later stage once you know the effects of zone protection on your live traffic.&lt;/P&gt;</description>
    <pubDate>Sun, 10 May 2020 13:49:40 GMT</pubDate>
    <dc:creator>KunalChopra</dc:creator>
    <dc:date>2020-05-10T13:49:40Z</dc:date>
    <item>
      <title>Zone Protection - Reconnaissance</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-reconnaissance/m-p/327078#M83259</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are there any best practice settings for the reconnaissance portion of the zone protection profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see the default has the below.&amp;nbsp; Is it recommended to leave as defaults or does someone have a better recommendation?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TCP Port scan 100 events within 2 seconds&lt;BR /&gt;UDP Port scan 100 events within 2 seconds&lt;BR /&gt;Host Sweep 100 events within 10 seconds&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2020 19:07:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-reconnaissance/m-p/327078#M83259</guid>
      <dc:creator>MikeC</dc:creator>
      <dc:date>2020-05-08T19:07:21Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Protection - Reconnaissance</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-reconnaissance/m-p/327253#M83289</link>
      <description>&lt;P&gt;I think whatever you get to see in best practice document of PA ( which I hope you followed ) , then that is sufficient for now .&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rest you can customize at later stage once you know the effects of zone protection on your live traffic.&lt;/P&gt;</description>
      <pubDate>Sun, 10 May 2020 13:49:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-reconnaissance/m-p/327253#M83289</guid>
      <dc:creator>KunalChopra</dc:creator>
      <dc:date>2020-05-10T13:49:40Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Protection - Reconnaissance</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-reconnaissance/m-p/327341#M83308</link>
      <description>&lt;P&gt;Interestingly enough, the best practice guide mentions to leave the default threshold, but there is a video from Palo Alto regarding BPA and the threshold is different than the default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=QAuJyboFPy8" target="_blank"&gt;https://www.youtube.com/watch?v=QAuJyboFPy8&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2020 13:26:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-reconnaissance/m-p/327341#M83308</guid>
      <dc:creator>MikeC</dc:creator>
      <dc:date>2020-05-11T13:26:17Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Protection - Reconnaissance</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-reconnaissance/m-p/328421#M83463</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Zone protection feature should be handled carefully every feature requires uniqe apporach, for me i am using with block ip with duration 1Hour+ option against bad guys.&lt;/P&gt;&lt;P&gt;İnstead of using a general zone protection i choose to implement every single zone an individual zone protection profile.&lt;/P&gt;&lt;P&gt;For startup some higher thresholds rather than default can be used with "alert" action.&lt;BR /&gt;After creation of profile with desired thresholds, monitor alerts on threat log it would appear as "scan". Enabling extensive logging feature considerable.&lt;BR /&gt;Zone protection works on ingress zone only.&lt;BR /&gt;If every zone has a zone protection profile keep an eye on email servers.&lt;BR /&gt;Adjust threshold levels as "scan" attacks count. My solution was checking threat logs when i see a "scan" threat than i check traffic logs and counting connections corresponing source ip to identify scanning timing.&lt;/P&gt;</description>
      <pubDate>Sun, 17 May 2020 11:14:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-protection-reconnaissance/m-p/328421#M83463</guid>
      <dc:creator>upelister</dc:creator>
      <dc:date>2020-05-17T11:14:25Z</dc:date>
    </item>
  </channel>
</rss>

