Objects > Security Profiles > Anti-Spyware Profile
Table of Contents
Expand all | Collapse all
-
- Firewall Overview
- Features and Benefits
- Last Login Time and Failed Login Attempts
- Message of the Day
- Task Manager
- Language
- Alarms
- Commit Changes
- Save Candidate Configurations
- Revert Changes
- Lock Configurations
- Global Find
- Threat Details
- AutoFocus Intelligence Summary
- Configuration Table Export
- Change Boot Mode
-
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > Devices
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > Mobile Network Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Packet Broker Profile
- Objects > Schedules
-
-
- Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > VLANs
- Network > Virtual Wires
-
- Network > Routing > Logical Routers > General
- Network > Routing > Logical Routers > Static
- Network > Routing > Logical Routers > OSPF
- Network > Routing > Logical Routers > OSPFv3
- Network > Routing > Logical Routers > RIPv2
- Network > Routing > Logical Routers > BGP
- Network > Routing > Logical Routers > Multicast
-
- Network > Routing > Routing Profiles > BGP
- Network > Routing > Routing Profiles > BFD
- Network > Routing > Routing Profiles > OSPF
- Network > Routing > Routing Profiles > OSPFv3
- Network > Routing > Routing Profiles > RIPv2
- Network > Routing > Routing Profiles > Filters
- Network > Routing > Routing Profiles > Multicast
-
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
-
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device > Setup > ACE
- Device > Setup > DLP
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
- Device > Device Quarantine
-
- Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Certificate Management > SSH Service Profile
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > SCP
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
- Device > Policy Recommendation > IoT
- Device > Policy > Recommendation SaaS
-
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
-
- Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Server Profiles > SCP
- Panorama > Scheduled Config Export
- Panorama > Device Registration Auth Key
Objects > Security Profiles > Anti-Spyware Profile
You can attach an Anti-Spyware profile to a Security
policy rule to detect connections initiated by spyware and various
types of command-and-control (C2) malware installed on systems on
your network. You can choose between two predefined Anti-Spyware
profiles to attach to a Security policy rule. Each profile has a
set of predefined rules (with threat signatures) organized by the
severity of the threat; each threat signature includes a default action
that is specified by Palo Alto Networks.
- Default—The default profile uses the default action for critical, high, medium, and low severity signatures, as specified by the Palo Alto Networks content package when the signature is created. It does not include a signature policy for events classified as informational.
- Strict—The strict profile overrides the action defined in the signature file for critical, high, and medium severity threats, and sets it to the reset-both action. The default action is taken with low and informational severity threats.
- You can also create custom profiles. You can, for example, reduce the stringency for Anti-Spyware inspection for traffic between trusted security zones, and maximize the inspection of traffic received from the internet, or traffic sent to protected assets such as server farms.
The following tables describe the Anti-Spyware profile
settings:
Anti-Spyware Profile
Settings | Description |
---|---|
Name | Enter a profile name (up to 31 characters).
This name appears in the list of Anti-Spyware profiles when defining
security policies. The name is case-sensitive and must be unique.
Use only letters, numbers, spaces, hyphens, periods, and underscores. |
Description | Enter a description for the profile (up
to 255 characters). |
Shared (Panorama only) | Select this option if you want the profile
to be available to:
|
Disable override (Panorama only) | Select this option to prevent administrators
from overriding the settings of this Anti-Spyware profile in device
groups that inherit the profile. This selection is cleared by default,
which means administrators can override the settings for any device
group that inherits the profile. |
Signature Policies Tab Anti-Spyware
rules allow you to define a custom severity and action to take on
any threat, a specific threat name that contains the text that you
enter, and/or by a threat category, such as adware. Add a
new rule, or you can select an existing rule to and select Find
Matching Signatures to filter threat signatures based
on that rule. | |
Rule Name | Specify the rule name. |
Threat Name | Enter any to match
all signatures, or enter text to match any signature containing
the entered text as part of the signature name. |
Category | Choose a category, or choose any to match all categories. |
Action | Choose an action for each threat. For a
list of actions, see Actions
in Security Profiles. The Default action
is based on the pre-defined action that is part of each signature
provided by Palo Alto Networks. To view the default action for a
signature, select ObjectsSecurity ProfilesAnti-Spyware and Add or
select an existing profile. Click the Exceptions tab
and then click Show all signatures to see
a list of all signatures and the associated Action. For the best security, use the Action settings
in the predefined strict profile. |
Packet Capture | Select this option if you want to capture
identified packets.
Threats that are detected using the advanced Inline Cloud
Analysis engines do not generate packet capture data.
Select single-packet to
capture one packet when a threat is detected, or select the extended-capture option
to capture from 1 to 50 packets (default is 5 packets). Extended-capture
provides more context about the threat when analyzing the threat
logs. To view the packet capture, select MonitorLogsThreat, locate
the log entry you are interested in, and then click the green down
arrow in the second column. To define the number of packets to capture,
select DeviceSetupContent-ID and then edit the Content-ID™
Settings. If the action for a given threat is allow, the firewall
does not trigger a Threat log and does not capture packets. If the
action is alert, you can set the packet capture to single-packet
or extended-capture. All blocking actions (drop, block, and reset
actions) capture a single packet. The content package on the device
determines the default action. Enable
extended-capture for critical, high, and medium severity events.
Use the default extended-capture value of 5 packets, which provides
enough information to analyze the threat in most cases. (Too much
packet capture traffic may result in dropping packet captures.)
Don’t enable extended-capture for informational and low severity
events because it’s not very useful compared to capturing information
about higher severity events and creates a relatively high volume
of low-value traffic. |
Severity | Choose a severity level (critical, high, medium, low,
or informational). |
Signature Exceptions Tab Allows
you to change the action for a specific signature. For example,
you can generate alerts for a specific set of signatures and block
all packets that match all other signatures. Threat exceptions are
usually configured when false-positives occur. To make management
of threat exceptions easier, you can add threat exceptions directly
from the MonitorLogsThreat list. Ensure that you
obtain the latest content updates so that you are protected against
new threats and have new signatures for any false-positives. | |
Exceptions | Enable each threat
for which you want to assign an action or select All to
respond to all listed threats. The list depends on the selected
host, category, and severity. If the list is empty, there are no
threats for the current selections. Use IP Address Exemptions
to add IP address filters to a threat exception. If IP addresses
are added to a threat exception, the threat exception action for
that signature overrides the action for a rule only when the signature
is triggered by a session with a source or destination IP address
that matches an IP address in the exception. You can add up to 100
IP addresses per signature. With this option, you do not have to
create a new policy rule and new vulnerability profile to create
an exception for a specific IP address. Create
an exception only if you are sure that a signature identified as
spyware is not a threat (it is a false positive). If you believe
you discovered a false positive, open a support case with TAC so
Palo Alto Networks can analyze and fix the incorrectly identified
signature. As soon as the issue is resolved, remove the exception from
the profile. |
DNS Policies Tab The DNS
Policies settings provide an additional method of identifying
infected hosts on a network. These signatures detect specific DNS
lookups for host names that have been associated with DNS-based
threats. | |
You can configure specific
DNS signature sources with separate policy actions, log severity level,
and packet capture settings. Hosts that perform DNS queries for
malware domains will appear in the botnet report. Additionally,
you can specify sinkhole IPs in the DNS Sinkhole Settings if
you are sinkholing malware DNS queries. | |
DNS Signature Source | Allows you to select the lists for which
you want to enforce an action when a DNS query occurs. There are
two default DNS signature policy options:
By
default, the locally-accessed Palo Alto Networks Content DNS signatures
are sinkholed, while the cloud-based DNS Security is set to allow.
If you want to enable sinkholing using DNS Security, you must configure
the action on DNS queries to sinkhole. The default address used
for sinkholing belongs to Palo Alto Networks (sinkhole.paloaltonetworks.com).
This address is not static and can be modified through content updates
on the firewall or Panorama. Add a
new list and select the External Dynamic List of type Domain that
you created. To create a new list, see Objects
> External Dynamic Lists. |
Log Severity | Allows you to specify the log severity level
that is recorded when the firewall detects a domain matching a DNS
signature. |
Policy Action | Choose an action to take when DNS lookups
are made to known malware sites. The options are alert, allow, block,
or sinkhole. The default action for Palo
Alto Networks DNS signatures is sinkhole. The
DNS sinkhole action provides administrators with a method of identifying
infected hosts on the network using DNS traffic, even when the firewall
is north of a local DNS server (for example, the firewall cannot
see the originator of the DNS query). When a threat prevention license
is installed and an Anti-Spyware profile is enabled in a Security
Profile, the DNS-based signatures trigger on DNS queries directed
at malware domains. In a typical deployment where the firewall is
north of the local DNS server, the threat log identifies the local
DNS resolver as the source of the traffic rather than the actual infected
host. Sinkholing malware DNS queries solves this visibility problem
by forging responses to the queries directed at malicious domains,
so that clients attempting to connect to malicious domains (for
command-and-control, for example) instead attempt connections to
an IP address specified by the administrator. Infected hosts can then
be easily identified in the traffic logs because any host that attempts
to connect to the sinkhole IP are most likely infected with malware. Enable DNS sinkhole when the firewall can’t
see the originator of the DNS query (typically when the firewall
is north of the local DNS server) so you can identify infected hosts.
If you can’t sinkhole the traffic, block it. |
Packet Capture | Select this option for a given source if
you want to capture identified packets. Enable
packet capture on sinkholed traffic so you can analyze it and get
information about the infected host. |
DNS Sinkhole Settings | After sinkhole action is defined for a DNS
signature source, specify an IPv4 and/or IPv6 address that will
be used for sinkholing. By default, the sinkhole IP address is set
to a Palo Alto Networks server. You can then use the traffic logs
or build a custom report that filters on the sinkhole IP address
and identify infected clients. The following is the sequence
of events that will occur when an DNS request is sinkholed: Malicious
software on an infected client computer sends a DNS query to resolve
a malicious host on the Internet. The client's DNS query is
sent to an internal DNS server, which then queries a public DNS
server on the other side of the firewall. The DNS query matches
a DNS entry in the specified DNS signature database source, so the
sinkhole action will be performed on the query. The infected
client then attempts to start a session with the host, but uses
the forged IP address instead. The forged IP address is the address
defined in the Anti-Spyware profile DNS Signatures tab when the
sinkhole action is selected. The administrator is alerted
of a malicious DNS query in the threat log, and can then search
the traffic logs for the sinkhole IP address and can easily locate
the client IP address that is trying to start a session with the
sinkhole IP address. |
DNS Exceptions Tab The
DNS signature exceptions allow you to exclude specific threat IDs
from policy enforcement as well as specify domain/FQDN allow lists
for approved domain sources. To add specific threats that
you want to exclude from policy, select or search for a Threat
ID and click Enable. Each entry provides
the threat Threat ID, Name,
and FQDN of the object. To Add a
domain or FQDN allow list, provide the location of the allow list
as well as an appropriate description. | |
Inline Cloud Analysis Tab Inline
Cloud Analysis allows you to enable and configure the settings
for real-time analysis of advanced C2 threats on a per detection
engine basis. | |
Enable cloud inline analysis—Enables
real-time analysis of advanced C2 threats across all available inline
cloud analysis engines. | |
Available Analysis Engines | For each available analysis engine representing
a threat category, you can select one of the following actions that
you want the firewall to enforce when a corresponding threat is
detected:
The default action
for all analysis engines is alert. |
Exclude from Inline Cloud Analysis | Allows you to select a URL or IP address
exception list that bypasses the inline cloud analysis engines.
Exceptions can be specified using URLs and/or IP addresses. URL
exceptions include an EDL (external dynamic list) or a custom URL
category, while IP address exceptions include an EDL or an Address
object. Click Add to view and select from
the available options. You can select the following list types:
|