We are see numerous alarms from our SIEM from our Palo Alto firewall. Here is a copy of a scrubbed log message below. When asking the user about their activity, they only RDP'ed into various servers from their laptop via the Globalprotect VPN for remote admin work and ran a batch file that re-maps drives. Additionally they noted browsing to \\<dcserver>\netlogon and that it seem to take long to enumerate directory. Also full AV endpoint scans show clean. Is this s false-positive?
Yes, that signature was disabled on 03/22/2019 14:30 PDT.
You must be running an outdated Antivirus or WildFire-Virus package.
Please review what versions you're running and make sure your Dynamic Updates scheduler is properly set and that the firewall can reach updates.paloaltonetworks.com.
Did you get a resolution to this? We are experiencing a similar situation where ms-ds-smbv3 signature is being identified as a virus. We have all up to date Dynamic Content as well.
Just an FYI to those of you who are planning to upgrade your devices to 8.1 there is a known bug with 8.1 with it blocking SMB traffic that is traversing the firewall. This affected our Global Protect and other users connected via IPSEC VPN. Users would receive "Network Name no longer available" when attempting to browse SMB shares over the tunnels.
We were able to create an application override for port 445 on the firewall as a temporary workaround as the fix in 8.1.1 is expected on 4/26/18.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!