<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unusual traffic on port 135 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/unusual-traffic-on-port-135/m-p/431791#M95142</link>
    <description>&lt;P&gt;Hello, I have been facing an issue where I see lots of traffic toward internal serves on port 135. The source of the traffic is the firewall management IP. Its agentless user-id setup on the firewall. Previously WMI probing is enabled which cause the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can still see the same traffic on port 135 after disabling the WMI probing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In server monitoring, there are only AD server&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 05 Sep 2021 21:31:27 GMT</pubDate>
    <dc:creator>mshihora</dc:creator>
    <dc:date>2021-09-05T21:31:27Z</dc:date>
    <item>
      <title>Unusual traffic on port 135</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unusual-traffic-on-port-135/m-p/431791#M95142</link>
      <description>&lt;P&gt;Hello, I have been facing an issue where I see lots of traffic toward internal serves on port 135. The source of the traffic is the firewall management IP. Its agentless user-id setup on the firewall. Previously WMI probing is enabled which cause the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can still see the same traffic on port 135 after disabling the WMI probing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In server monitoring, there are only AD server&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Sep 2021 21:31:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unusual-traffic-on-port-135/m-p/431791#M95142</guid>
      <dc:creator>mshihora</dc:creator>
      <dc:date>2021-09-05T21:31:27Z</dc:date>
    </item>
    <item>
      <title>Re: Unusual traffic on port 135</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unusual-traffic-on-port-135/m-p/431794#M95143</link>
      <description>&lt;P&gt;Are the internal servers the ones you have configured for agentless User-ID?&amp;nbsp; These are located under Device &amp;gt; User Identification &amp;gt; User Mapping &amp;gt; Server Monitoring.&amp;nbsp; Agentless User-ID uses WMI Authentication.&amp;nbsp; &lt;A href="https://knowledgebase.paloaltonetworks.com/kcSArticleDetail?id=kA10g000000ClGG" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/kcSArticleDetail?id=kA10g000000ClGG&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see the same traffic on my network, but it is only to the servers I have configured.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Sep 2021 22:13:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unusual-traffic-on-port-135/m-p/431794#M95143</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2021-09-05T22:13:48Z</dc:date>
    </item>
    <item>
      <title>Re: Unusual traffic on port 135</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unusual-traffic-on-port-135/m-p/432071#M95165</link>
      <description>&lt;P&gt;Hi thanks for the reply but I have seen this traffic for other servers too. They are not added to server monitoring as well.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Sep 2021 13:31:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unusual-traffic-on-port-135/m-p/432071#M95165</guid>
      <dc:creator>mshihora</dc:creator>
      <dc:date>2021-09-06T13:31:59Z</dc:date>
    </item>
    <item>
      <title>Re: Unusual traffic on port 135</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unusual-traffic-on-port-135/m-p/432076#M95166</link>
      <description>&lt;P&gt;Very interesting!&amp;nbsp; Now I am curious as well.&amp;nbsp; Could you take those other server destination IP addresses and put them in the Global Find magnifying glass in the upper right of your NGFW to see if they are in the config?&amp;nbsp; If not, triple check that "Device &amp;gt; User Identification &amp;gt; User Mapping &amp;gt; Enable Probing" is unchecked and commit again?&amp;nbsp; It stands to reason that if the management interface is sourcing the traffic it must be configured somewhere.&amp;nbsp; Maybe also restart the management server with the command "debug software restart process management-server" on the CLI.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Sep 2021 16:08:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unusual-traffic-on-port-135/m-p/432076#M95166</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2021-09-06T16:08:00Z</dc:date>
    </item>
  </channel>
</rss>

