03-31-2020 08:06 AM
Hello All,
Just curious as to what additional threat feeds you use to ingest into your PAN. Here are some of the ones we use:
Threat intelligence blocklists
https://talosintelligence.com/documents/ip-blacklist
http://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt
http://panwdbl.appspot.com/
http://www.spamhaus.org/drop/drop.txt
http://www.spamhaus.org/drop/edrop.txt
http://panwdbl.appspot.com/lists/openbl.txt
http://panwdbl.appspot.com/lists/bruteforceblocker.txt
http://panwdbl.appspot.com/lists/mdl.txt
http://panwdbl.appspot.com/lists/ettor.txt
http://panwdbl.appspot.com/lists/etcompromised.txt
http://panwdbl.appspot.com/lists/dshieldbl.txt
http://panwdbl.appspot.com/lists/sslabuseiplist.txt
http://panwdbl.appspot.com/lists/zeustrackerbadips.txt
Would love to hear all of your thoughts whether its into the PAN or SIEM or something else.
Regards,
03-31-2020 08:45 AM
We have configured our own feed url on windows based server and added it under EDL. Whenever we find any of malicious/suspicious IP/domain, we add it under site.
We haven't configured any of publically available URLs as given below. The reason being we do not have any control on it.
Mayur
03-31-2020 09:55 AM
@SutareMayur How to configure own feed url on windows server?
03-31-2020 11:25 PM
@johndeYou can simply webpage using IIS under windows server. You can refer below link to do the configuration.
https://www.youtube.com/watch?v=abqTcXeyst0
Once your webpage is ready, configure feed url under EDL.
Hope it helps!
Mayur
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!