Prisma Cloud: "No matching finding id(s) were found for this query" or "Invalid entries detected in your query have been highlighted" error happen when running Saved Search of Attach Path Policies.

Prisma Cloud: "No matching finding id(s) were found for this query" or "Invalid entries detected in your query have been highlighted" error happen when running Saved Search of Attach Path Policies.

1804
Created On 03/06/24 07:44 AM - Last Modified 09/04/24 03:39 AM


Symptom


This article is regarding the error when running Saved Search of Attach Path Policies.
  • Error Message: "No matching finding id(s) were found for this query"

error.png

  • Error Message: "Invalid entries detected in your query have been highlighted"

image.png

The issue could be reproduced via the following steps:

  • Investigate > Query Library > Search the target Attack Path policy.
  • Then click "Open search" on the "Actions" column.

Or:

  • Go to "Governance" and search the target Attack Path policy.
  • Eidt the policy and move to "Create Query" tab.
  • Click "Launch Search".


Environment


  • Prisma Cloud
  • Attack Path Policies


Cause


This could happen when the Attack Path policy's any of the finding name(policies) are in disabled status.
For example:
  • Cloud breach risk due to publicly exposed admin ports on Azure Virtual Machine with risky storage account permissions
The included finding name(policies):
  • Azure Virtual Machine that is internet reachable with unrestricted access (0.0.0.0/0) to Admin ports
  • Azure VM instance with risky Storage account permissions
Including finding.png
スクリーンショット 2024-03-06 16.36.50.png


Resolution


Enable the included finding name(policies) via the following steps.
  • Go to "Governance" and search the policy.
  • Turn on the Status column toggle button.
スクリーンショット 2024-03-04 22.20.32.png


Additional Information


Regarding how to confirmed the included finding name(policies) of the target Attack Path policy, please refer to the following steps.  

  1. Go to "Investigate" > "Query Library" and search the attack path policy name.
  2. Hover the "Query" column, then it shows the finding and appends the "Disabled" keyword if the policy is disabled.
スクリーンショット 2024-03-11 9.43.59.png

Reference:



Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000XhtICAS&lang=en_US&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language