<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Suspicious TLS Evasion Found(14978) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-tls-evasion-found-14978/m-p/433635#M95898</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/124013"&gt;@Jafar_Hussain&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;The piece that is actually relevant to your alert:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN&gt;Evasion signatures that detect crafted HTTP or TLS requests can send alerts when clients connect to a domain other than the domain specified in the original DNS request. Make sure to configure DNS proxy before you enable evasion signatures. Without DNS proxy, evasion signatures can trigger alerts when a DNS server in the DNS load balancing configuration returns different IP addresses—for servers hosting identical resources—to the firewall and client in response to the same DNS request.&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;If you haven't used a DNS proxy object you can ignore these alerts, or override the action to allow so you don't have them filling up your threat logs. By default the 14978 signature is actually already set to allow, so you've actually modified the default action or setup a policy that otherwise overrides the default action for simple-informational alerts to receive any notice about these threats to begin with.&lt;/P&gt;&lt;P&gt;I'd recommend that you either configure the dns proxy object and get that setup so the signature actually functions correctly, or you set the action back to allow. Without the DNS proxy configured they aren't going to work effectively, which is why they are setup as informational allowed threats.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 13 Sep 2021 20:58:40 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2021-09-13T20:58:40Z</dc:date>
    <item>
      <title>Suspicious TLS Evasion Found(14978)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-tls-evasion-found-14978/m-p/433475#M95871</link>
      <description>&lt;P&gt;Dear Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have configured the web service behind PA. and attached the security profile . i can see in the thread logs the thread is generating &lt;STRONG&gt;"Suspicious TLS Evasion Found(14978)".&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;i have gone through the below KB but didn't understand&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HBwCCAW&amp;amp;lang=en_US%E2%80%A9" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HBwCCAW&amp;amp;lang=en_US%E2%80%A9&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;moreover, I can see the thread signature is showing in excpetion so I have enabled this and put the action is alert. the severity is informational. do i need to take any action on this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Jafar_Hussain_0-1631539667011.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36358iF6FA6650288FE418/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Jafar_Hussain_0-1631539667011.png" alt="Jafar_Hussain_0-1631539667011.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the severity is informational&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 13:29:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-tls-evasion-found-14978/m-p/433475#M95871</guid>
      <dc:creator>Jafar_Hussain</dc:creator>
      <dc:date>2021-09-13T13:29:13Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious TLS Evasion Found(14978)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-tls-evasion-found-14978/m-p/433585#M95892</link>
      <description>&lt;P&gt;Please see our best practices guide &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/best-practices-for-securing-your-network-from-layer-4-and-layer-7-evasions.html" target="_self"&gt;here&lt;/A&gt;, in which we recommend changing the default alert behavior to drop.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 17:55:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-tls-evasion-found-14978/m-p/433585#M95892</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2021-09-13T17:55:29Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious TLS Evasion Found(14978)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-tls-evasion-found-14978/m-p/433635#M95898</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/124013"&gt;@Jafar_Hussain&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;The piece that is actually relevant to your alert:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN&gt;Evasion signatures that detect crafted HTTP or TLS requests can send alerts when clients connect to a domain other than the domain specified in the original DNS request. Make sure to configure DNS proxy before you enable evasion signatures. Without DNS proxy, evasion signatures can trigger alerts when a DNS server in the DNS load balancing configuration returns different IP addresses—for servers hosting identical resources—to the firewall and client in response to the same DNS request.&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;If you haven't used a DNS proxy object you can ignore these alerts, or override the action to allow so you don't have them filling up your threat logs. By default the 14978 signature is actually already set to allow, so you've actually modified the default action or setup a policy that otherwise overrides the default action for simple-informational alerts to receive any notice about these threats to begin with.&lt;/P&gt;&lt;P&gt;I'd recommend that you either configure the dns proxy object and get that setup so the signature actually functions correctly, or you set the action back to allow. Without the DNS proxy configured they aren't going to work effectively, which is why they are setup as informational allowed threats.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 20:58:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-tls-evasion-found-14978/m-p/433635#M95898</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-09-13T20:58:40Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious TLS Evasion Found(14978)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-tls-evasion-found-14978/m-p/433709#M95907</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;I have checked, according to the below documents the best practice is we should set the action drop for the evasion signature 14978.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/best-practices-for-securing-your-network-from-layer-4-and-layer-7-evasions.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/best-practices-for-securing-your-network-from-layer-4-and-layer-7-evasions.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;moreover, if i set the action drop so the service is stopped and drop all the traffic for my server, that I have attached the antispyware profile.&lt;/P&gt;&lt;P&gt;i have configured below antispyware profile:-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Jafar_Hussain_0-1631600466484.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36371iC7F68C100182A237/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Jafar_Hussain_0-1631600466484.png" alt="Jafar_Hussain_0-1631600466484.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Jafar_Hussain_1-1631600509008.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36372i49287F138E7CC0A8/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Jafar_Hussain_1-1631600509008.png" alt="Jafar_Hussain_1-1631600509008.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so now, i want to allow the traffic but an alert should not come. what i need to do.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Do i need to allow the traffic instead of alert in the exception?&lt;/P&gt;&lt;P&gt;- If alerts are coming so i can ignore?&lt;/P&gt;&lt;P&gt;- or to work properly do i need to configure the DNS proxy. i believe if i configure the DNS proxy and if i will put in the antispyware rule and exception all the things is drop. it will work or not?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Sep 2021 06:29:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-tls-evasion-found-14978/m-p/433709#M95907</guid>
      <dc:creator>Jafar_Hussain</dc:creator>
      <dc:date>2021-09-14T06:29:56Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious TLS Evasion Found(14978)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-tls-evasion-found-14978/m-p/434277#M95964</link>
      <description>&lt;P&gt;DNS Proxy just allows the firewall to cache DNS responses and forward to your internal server, if you choose. See &lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/network/network-dns-proxy/dns-proxy-overview.html" target="_self"&gt;here&lt;/A&gt;. You *must* configure a DNS proxy for the TLS evasion blocks to work properly.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 16:13:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-tls-evasion-found-14978/m-p/434277#M95964</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2021-09-15T16:13:32Z</dc:date>
    </item>
  </channel>
</rss>

