<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS Detection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-detection/m-p/4422296#M1081715</link>
    <description>&lt;P&gt;there are few think you can do.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. you can go to the intrusion policy snort rule and either you can disable this rule your snort id 1:57756 (&lt;A href="https://attack.mitre.org/techniques/T1568/001/" target="_blank"&gt;https://attack.mitre.org/techniques/T1568/001/&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;&lt;A href="https://snort.org/rule_docs/1-57756" target="_blank"&gt;https://snort.org/rule_docs/1-57756&lt;/A&gt; or you can Generate the event but not droping the packet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Snort.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/123404i3002E85E7AD77FAE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Snort.PNG" alt="Snort.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="snort_doc.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/123405i0AB817B6533C0934/image-size/large?v=v2&amp;amp;px=999" role="button" title="snort_doc.PNG" alt="snort_doc.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 23 Jun 2021 07:23:55 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2021-06-23T07:23:55Z</dc:date>
    <item>
      <title>IPS Detection</title>
      <link>https://community.cisco.com/t5/network-security/ips-detection/m-p/4422017#M1081708</link>
      <description>&lt;P&gt;I configured my IPS policy by filtering by maleware and selecting "Drop and Block" for all snort rules. I have this event coming up (See atttached) matching one of the rules. Its the internal DNS server it seems being flagged as the attacker and event suggests maleware on it. I have researched all over on this , ran maleware scans, AV is on the server and have come up empty. The research I did suggest this server is part of a botnet but I cant find anything wrong with it and the snort definition states no known false positives. Any ideas here on how I can go about seeing if this is legit or not or where I can find doc on how to remediate?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jun 2021 17:48:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-detection/m-p/4422017#M1081708</guid>
      <dc:creator>keithcclark71</dc:creator>
      <dc:date>2021-06-22T17:48:15Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Detection</title>
      <link>https://community.cisco.com/t5/network-security/ips-detection/m-p/4422296#M1081715</link>
      <description>&lt;P&gt;there are few think you can do.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. you can go to the intrusion policy snort rule and either you can disable this rule your snort id 1:57756 (&lt;A href="https://attack.mitre.org/techniques/T1568/001/" target="_blank"&gt;https://attack.mitre.org/techniques/T1568/001/&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;&lt;A href="https://snort.org/rule_docs/1-57756" target="_blank"&gt;https://snort.org/rule_docs/1-57756&lt;/A&gt; or you can Generate the event but not droping the packet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Snort.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/123404i3002E85E7AD77FAE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Snort.PNG" alt="Snort.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="snort_doc.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/123405i0AB817B6533C0934/image-size/large?v=v2&amp;amp;px=999" role="button" title="snort_doc.PNG" alt="snort_doc.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jun 2021 07:23:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-detection/m-p/4422296#M1081715</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2021-06-23T07:23:55Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Detection</title>
      <link>https://community.cisco.com/t5/network-security/ips-detection/m-p/4422329#M1081717</link>
      <description>&lt;P&gt;Have you defined your $HOME_NET and @$EXTERNAL_NET variables correctly (Variable set under objects)? The rule seems to indicate it should only flag hosts it believe are external.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jun 2021 08:21:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-detection/m-p/4422329#M1081717</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-06-23T08:21:31Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Detection</title>
      <link>https://community.cisco.com/t5/network-security/ips-detection/m-p/4422501#M1081731</link>
      <description>&lt;P&gt;I did define the variables as shown in the attached(EXTERNAL defined as exclusion of HOME-NE)&lt;/P&gt;&lt;P&gt;I am stumped and would hate to just turn off the rule if there actually is a legit threat here. I also have another snort rule as shown populating intrusion logs as well.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jun 2021 12:49:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-detection/m-p/4422501#M1081731</guid>
      <dc:creator>keithcclark71</dc:creator>
      <dc:date>2021-06-23T12:49:30Z</dc:date>
    </item>
  </channel>
</rss>

