Network Security
Identify Untrusted CA Certificates
Table of Contents
Expand All
|
Collapse All
Network Security Docs
-
- Security Policy
-
- Security Profile Groups
- Security Profile: AI Security
- Security Profile: WildFire® Analysis
- Security Profile: Antivirus
- Security Profile: Vulnerability Protection
- Security Profile: Anti-Spyware
- Security Profile: DNS Security
- Security Profile: DoS Protection Profile
- Security Profile: File Blocking
- Security Profile: URL Filtering
- Security Profile: Data Filtering
- Security Profile: Zone Protection
-
- Policy Object: Address Groups
- Policy Object: Regions
- Policy Object: Traffic Objects
- Policy Object: Applications
- Policy Object: Application Groups
- Policy Object: Application Filter
- Policy Object: Services
- Policy Object: Auto-Tag Actions
- Policy Object: Devices
-
- Uses for External Dynamic Lists in Policy
- Formatting Guidelines for an External Dynamic List
- Built-in External Dynamic Lists
- Configure Your Environment to Access an External Dynamic List
- Configure your Environment to Access an External Dynamic List from the EDL Hosting Service
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Policy Object: HIP Objects
- Policy Object: Schedules
- Policy Object: Quarantine Device Lists
- Policy Object: Dynamic User Groups
- Policy Object: Custom Objects
- Policy Object: Log Forwarding
- Policy Object: Authentication
- Policy Object: Decryption Profile
- Policy Object: Packet Broker Profile
-
-
-
- The Quantum Computing Threat
- How RFC 8784 Resists Quantum Computing Threats
- How RFC 9242 and RFC 9370 Resist Quantum Computing Threats
- Support for Post-Quantum Features
- Post-Quantum Migration Planning and Preparation
- Best Practices for Resisting Post-Quantum Attacks
- Learn More About Post-Quantum Security
-
-
-
- Investigate Reasons for Decryption Failure
- Identify Weak Protocols and Cipher Suites
- Troubleshoot Version Errors
- Troubleshoot Unsupported Cipher Suites
- Identify Untrusted CA Certificates
- Repair Incomplete Certificate Chains
- Troubleshoot Pinned Certificates
- Troubleshoot Expired Certificates
- Troubleshoot Revoked Certificates
Identify Untrusted CA Certificates
Find sites that have untrusted CA certificates so you can make informed decisions
about allowed traffic.
Where Can I Use This? | What Do I Need? |
---|---|
|
No separate license required for decryption when using NGFWs or
Prisma Access.
Note: The features and capabilities available to you in
Strata Cloud Manager depend on your active license(s).
|
Blocking access to sites with untrusted CA certificates and certificates
self-signed by an untrusted root CA is a best practice because sites with untrusted
CAs may indicate a man-in-the-middle attack, a replay attack, or other malicious
activity.
Identify Untrusted CA Certificates (Strata Cloud Manager)
- Block sessions with untrusted issuers in the decryption profile for SSL Forward Proxy.When you block sessions with untrusted issuers in the decryption profile, the decryption log records the error.
- Select Manage Configuration NGFW and Prisma Access Security Services Decryption.
- Under Decryption Profiles, select or Add a new profile, and then select the Block sessions with untrusted issuers option.
- Filter decryption logs to identify sessions that failed due to revoked certificates.
- Select Incidents and Alerts Log Viewer and select Firewall/Decryption.
- Use the query Error Message = ‘Untrusted issuer CA’.
- (Optional) Double-check the certificate expiration date at the Qualys SSL Labs site.Enter the hostname of the server (Server Name Identification column of the decryption log) in the Hostname field, and then Submit it to view certificate information for the host.
Identify Untrusted CA Certificates (PAN-OS)
- Block sessions with untrusted issuers in the Forward Proxy Decryption profile.When you block sessions with untrusted issuers in the Decryption profile, the Decryption logs log the error.Select ObjectsDecryptionDecryption Profiles. Then, select a profile to modify or create a new profile.
- Filter the log to identify sessions that failed due to revoked certificates using the query (error eq ‘Untrusted issuer CA’).
- (Optional) Double-check the certificate expiration date at the Qualys SSL Labs site.Enter the hostname of the server (Server Name Identification column of the Decryption log) in the Hostname field and Submit it to view certificate information for the host.