Salesforce

How to Use Anti-Spyware, Vulnerability and Antivirus Exceptions to Block or Allow Threats

« Go Back

Information

 
TitleHow to Use Anti-Spyware, Vulnerability and Antivirus Exceptions to Block or Allow Threats
URL NameHow-to-Use-Anti-Spyware-44-Vul-66099
SummaryThe article provides information on configuration of exceptions tab in the anti-virus, anti-spyware or vulnerability protections.
Validation StatusValidated - External
Publication StatusPublished
Symptom
This document describes how to use Anti-Spyware, Vulnerability Protection, and Antivirus Exceptions to change actions for specific threats on the Palo Alto Network Firewalls.
Environment
  • Palo Alto Firewall
  • PAN-OS 8.1 and above.
  • Anti-Spyware, Vulnerability or Antivirus Exceptions
Cause
Resolution

Anti-Spyware or Vulnerability Protection Exceptions

For example: Add an Anti-Spyware Exception for threat ID #30003 to an existing profile named "corp-vp"

  1. Go to Objects > Security Profiles > 'Anti-Spyware' or 'Vulnerability Protection'
  2. Select the existing profile
  3. click the "Exceptions" tab.
  4. First, check the "Show all signatures" checkbox at the lower left hand part of the profile window.
  5. In the search field, enter a string as "( ex. 'microsoft' )" or simply enter the threat ID number itself (ex. 30003). Press enter or click the green arrow to initiate the search.
    Note: If the signature being searched for was just applied in the latest dynamic update operation and it is not being returned in the search results, log out of the Web UI and then log back in to clear the GUI cache.
  6. The results will return "Microsoft Windows DCOM RPC Interface Buffer Overrun Vulnerability" (which is threat ID #30003).
    Note: Threat IDs can be easily determined from the threat logs.
  7. To enable this exception, check the 'Enable' box
  8. change the default 'Action' value to handle the non-excluded traffic. To allow the traffic, select Allow, or to drop the traffic select Reset Both.
     

image.png

image.png
Threat Action detail - change default action.
  1. Use the IP Address Exceptions column to add IP address filters to a threat exception. If IP addresses are added to a threat exception, the threat exception action for that signature will only be taken over the rule's action if the signature is triggered by a session having either the source or destination IP matching an IP in the exception. You can add up to 100 IP addresses per signature. With this option, one does not need have to create a new policy rule and new vulnerability profile to create an exception for a specific IP address. In order to exclude certain IP addresses, and not all traffic, click on the blank under "IP Address Exemptions", click Add at the bottom. One can add up to 100 IP addresses to the list.
     
image.png
IP Address Exemption detail.
 
  1. Make sure that Anti-Spyware and or Vulnerability Protection profiles are applied to the appropriate security policies.
  2. Commit changes to enable the Exception.
  3. Exceptions will apply to any new sessions installed after the Commit succeeds. If the exception is used to allow traffic that was previously blocked, make sure there are no existing DISCARD sessions in the session table. For example, in cases like DNS or DHCP traffic, the 6-tuple is rechecked with each new packet, which could perpetuate a DISCARD session and override the newly added exception. For detailed instructions on clearing existing sessions, please refer to: How to View/Clear Sessions and/or How to View/Clear Sessions from the Session Monitor.

 

Antivirus Exceptions

For example, to add an antivirus exception for threat ID 398981154 to an existing profile named "Corp-AV":
(Note: Be aware that if you exclude a Virus from bring checked against, this is all or nothing, you cannot exclude just an IP from this protection, it would be all that is allowed on that rule/antivirus policy).

  1. Go to GUI: Objects > Security Profiles > Antivirus.
  2. In the existing the profile, click on the Signature Exceptions tab.
  3. Enter the ID value (for this example, 398981154 ) into the Threat Id field at the bottom of the page, and click Add and then OK.
    Note: The threat id can be determined from the threat logs.
  4. For this example, an exception for "Exploit/Win32.pidief.irr" is created.
image.pngAntivirus - Virus Exception window detail.
  1. Make sure that Antivirus profiles are applied to the appropriate security policies.
  2. There is no option to exclude just certain IP addresses with an Antivirus Exception.
  3. Commit the changes.

 

 

Additional Information
Legacy ID66099
Legacy Urlhttp://live.paloaltonetworks.com:80/t5/Management-Articles/How-to-Use-Anti-Spyware-Vulnerability-and-Antivirus-Exceptions/ta-p/66099
Auto Assistant Signature

Powered by