08-19-2020 06:49 AM
Looking for input on this one. From a Palo Alto perspective, what would be the best way to monitor for encrypted traffic in general? Need a way to make sure we're specifically able to point to traffic that was encrypted and provide a report or show that in a dashboard perhaps in our SIEM. Taking a first look from the ground up and looking for open discussion. Thanks in advance!
08-05-2021 07:17 AM
Super slick way to get this done, let's utilize some built-in functionality to make this easy.
Create a custom vulnerability profile, in my example I used the hexadecimal payload in an SSL-response-version packet to indicate TLS 1.0 is being used.
Now that I have a custom vuln sig, we are able to see all the traffic touching it on the ACC tab.
Which means that I am now able to build custom reports based off that vuln.
You could fully automate getting emailed reports of the traffic touching your signature, or configure a custom log forwarding rule to generate email alerts, for example. Lots of options. For a SIEM, you could export the log/alert to an HTTP server profile. See example screenshot below. But instead of those real threats, you would see your custom encrypted traffic one.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!