<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic This is just the way the rule in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075641#M1015290</link>
    <description>&lt;P&gt;This is just the way the rule is defined. As you can se by reading the rule it is hard coded to be a Priority 1 alert.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 27 Jun 2017 18:00:09 GMT</pubDate>
    <dc:creator>Dennis Perto</dc:creator>
    <dc:date>2017-06-27T18:00:09Z</dc:date>
    <item>
      <title>Firepower reports network trojan from External source to Internal source</title>
      <link>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075636#M1015280</link>
      <description>&lt;P&gt;Hi Folks,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After defining what my Home_net definitions are, I would have thought Firepower would know to only report a network trojan if it originated from a Home_net source. Main reason for asking is I want to reduce the amount of P1's I don't need to look at and I would have thought that Firepower should only tell me when my internal is originating to known trojan destinations.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;for eg below is an eg of external source to x.x.x.x an internal ip.&lt;/P&gt;
&lt;P&gt;[1:21925:6] "BLACKLIST User-Agent known malicious user agent BOT/0.1" [Impact: Vulnerable] From "firewall" at Sun Jun 18 10:25:11 2017 UTC [Classification: A Network Trojan was Detected] [Priority: 1] {tcp} 37.187.39.232:59166 (france)-&amp;gt;x.x.x.x:80 (unknown)&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:25:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075636#M1015280</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2019-03-12T13:25:59Z</dc:date>
    </item>
    <item>
      <title>Trojan activity would</title>
      <link>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075637#M1015282</link>
      <description>&lt;P&gt;Trojan activity would normally be expected to trigger no matter what zone the traffic is originating from.&lt;/P&gt;
&lt;P&gt;Did your policy block it?&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 13:58:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075637#M1015282</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-19T13:58:10Z</dc:date>
    </item>
    <item>
      <title>But a first attempt from</title>
      <link>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075638#M1015284</link>
      <description>&lt;P&gt;But a first attempt from outside to inside that is blocked is not even trojan activity.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yes it blocked it as its just nefarious traffic out on the internet trying to do stuff. I would have thought it would be best to only report on network trojans if a/ they did't get blocked and b/ they made it inside, ie inside is trying to talk to outside with known trojan activity.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there anyway to tweak the alerting to not report P1 events that are blocked? Other than supression and thresholds via IPS? Could be a good feature a P1 category that is blocked is treated different to a P1 category that is not blocked. Or perhaps a tick box that says ignore alerting for Outside talking to Home_Net that is blocked&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 19:42:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075638#M1015284</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2017-06-19T19:42:22Z</dc:date>
    </item>
    <item>
      <title>This confirms things, the ip</title>
      <link>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075639#M1015286</link>
      <description>&lt;P&gt;This confirms things, the ip source on the internet is a malware hunter ip address, would like to know why Firepower, with defined HOME_NET is treating as a P1:&lt;/P&gt;
&lt;P style="background: white;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'Arial',sans-serif; color: black;"&gt;Why did my security software raise an alert?&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial',sans-serif; color: black;"&gt;Malware Hunter doesn't perform any attacks and the requests it sends don't contain any malicious content. The reason your security product raised an alert is because it is using a signature that should only be used for traffic leaving the network (egress) but is incorrectly being applied to incoming traffic (ingress). In other words: the security product is using a signature that was meant to detect when a computer on your network was infected and reporting back to a C2. However, the signature is also being applied to all traffic going into your network which is why it's raising a false alert.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2017 00:40:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075639#M1015286</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2017-06-21T00:40:07Z</dc:date>
    </item>
    <item>
      <title>Good point. I'm not sure.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075640#M1015288</link>
      <description>&lt;P&gt;Good point. I'm not sure.&lt;/P&gt;
&lt;P&gt;Perhaps the TAC could assist in answering that.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2017 02:49:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075640#M1015288</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-21T02:49:32Z</dc:date>
    </item>
    <item>
      <title>This is just the way the rule</title>
      <link>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075641#M1015290</link>
      <description>&lt;P&gt;This is just the way the rule is defined. As you can se by reading the rule it is hard coded to be a Priority 1 alert.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2017 18:00:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075641#M1015290</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2017-06-27T18:00:09Z</dc:date>
    </item>
    <item>
      <title>We spend alot of time tuning</title>
      <link>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075642#M1015292</link>
      <description>&lt;P&gt;We spend alot of time tuning Firepower to understand the network its on and then it performs like a 1990's IPS product? This is a no brainer improvement that should be easy to implement. If rule x is trigger and is in the direction of sending to HOME_NET = !P1&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2017 20:55:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075642#M1015292</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2017-06-27T20:55:07Z</dc:date>
    </item>
    <item>
      <title>Here you go. The answer for</title>
      <link>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075643#M1015293</link>
      <description>&lt;P&gt;Here you go. The answer for your 1990's IPS.&lt;BR /&gt;http://www.cisco.com/c/en/us/support/docs/security/firesight-management-center/117909-config-sourcefire-00.html#anc6&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2017 21:06:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075643#M1015293</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2017-06-27T21:06:39Z</dc:date>
    </item>
    <item>
      <title>Thanks for the thought. </title>
      <link>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075644#M1015294</link>
      <description>&lt;P&gt;Thanks for the thought.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm aware of such configuration, i'm coming from a bigger perspective than just myself.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2017 21:11:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075644#M1015294</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2017-06-27T21:11:04Z</dc:date>
    </item>
    <item>
      <title>Great. Then you know that</title>
      <link>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075645#M1015296</link>
      <description>&lt;P&gt;Great. Then you know that Cisco Talos have put almost 34.000 rules in Firepower and that they are written in a specific way for a reason. This is not only for the sake of your company &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Either you you use the product, or.. you don't. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I hope that you find a solution that will fit your needs.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2017 21:15:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075645#M1015296</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2017-06-27T21:15:01Z</dc:date>
    </item>
    <item>
      <title>What is the reason that</title>
      <link>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075646#M1015298</link>
      <description>&lt;P&gt;What is the reason that Internet sourced traffic attempts from, outside to inside that get blocked, are flagged as a P1 and classed as a Network Trojan?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2017 21:18:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075646#M1015298</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2017-06-27T21:18:49Z</dc:date>
    </item>
    <item>
      <title>I am not sure that I am the</title>
      <link>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075647#M1015300</link>
      <description>&lt;P&gt;I am not sure that I am the right person to answer that question.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am just happy that Talos is keeping their rules up to date, so that I get alerted if anything ugly turns up.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I see that it is their 6th release of that Snort rule and they modified the rule state in a rule update not too long ago.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just currious. Are you running Joomla on the targeted server?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2017 21:29:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075647#M1015300</guid>
      <dc:creator>Dennis Perto</dc:creator>
      <dc:date>2017-06-27T21:29:17Z</dc:date>
    </item>
    <item>
      <title>I was justifying time</title>
      <link>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075648#M1015302</link>
      <description>&lt;P&gt;I was justifying time updating HOME_NET to a client. I realised at another client with HOME_NET well defined it did't reduce OUTSIDE to INSIDE noise where i thought it was going to, such as this example.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;I wanted to see if anyone had answers as to why, I'd say i've hit the limit here of this forum and thats fine.&lt;/P&gt;
&lt;P&gt;Yes the customer is, there is also a WAF in place.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2017 21:44:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-reports-network-trojan-from-external-source-to/m-p/3075648#M1015302</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2017-06-27T21:44:28Z</dc:date>
    </item>
  </channel>
</rss>

