<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Suspected false positives in FMC in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/suspected-false-positives-in-fmc/m-p/4425446#M1081876</link>
    <description>&lt;P&gt;Old thread but I thought i'd touch base on also as I am going down the same road. If we look at packet that for me is related to snort signature&amp;nbsp; MALWARE-CNC DNS Fast Flux attempt (1:57756:2). I believe the rule is flagging as an Intrusion event due to the returned small TTL value of the record as shown below. I think load balancers out there when left at default settings have very low TTL for domain names associated with them or admins purposely setting to such a low value as to avoid some stale record cache to constantly keep the DNS servers updating.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;wd-prod-ss.trafficmanager.net: type A, class IN&lt;BR /&gt;Name: wd-prod-ss.trafficmanager.net&lt;BR /&gt;Type: A (Host address)&lt;BR /&gt;Class: IN (0x0001)&lt;BR /&gt;wd-prod-ss.trafficmanager.net: type CNAME, class IN, cname wd-prod-ss-us-west-2-fe.westus.cloudapp.azure.com&lt;BR /&gt;Name: wd-prod-ss.trafficmanager.net&lt;BR /&gt;Type: CNAME (Canonical name for an alias)&lt;BR /&gt;Class: IN (0x0001)&lt;BR /&gt;Time to live: 4 minutes, 22 seconds&lt;BR /&gt;Data length: 51&lt;BR /&gt;Primaryname: wd-prod-ss-us-west-2-fe.westus.cloudapp.azure.com&lt;BR /&gt;wd-prod-ss-us-west-2-fe.westus.cloudapp.azure.com: type A, class IN, addr 104.42.196.205&lt;BR /&gt;Name: &lt;STRONG&gt;wd-prod-ss-us-west-2-fe.westus.cloudapp.azure.com&lt;/STRONG&gt;&lt;BR /&gt;Type: A (Host address)&lt;BR /&gt;Class: IN (0x0001)&lt;BR /&gt;&lt;STRONG&gt;Time to live: 5 seconds&lt;/STRONG&gt;&lt;BR /&gt;Data length: 4&lt;BR /&gt;Addr: 104.42.196.205&lt;BR /&gt;&amp;lt;Root&amp;gt;: type OPT&lt;BR /&gt;Name: &amp;lt;Root&amp;gt;&lt;BR /&gt;Type: OPT (EDNS0 option)&lt;BR /&gt;UDP payload size: 4096&lt;BR /&gt;Higher bits in extended RCODE: 0x0&lt;BR /&gt;EDNS0 version: 0&lt;BR /&gt;Z: 0x8000&lt;BR /&gt;Bit 0 (DO bit): 1 (Accepts DNSSEC security RRs)&lt;BR /&gt;Bits 1-15: 0x0 (reserved)&lt;BR /&gt;Data length: 0&lt;/P&gt;</description>
    <pubDate>Tue, 29 Jun 2021 14:00:29 GMT</pubDate>
    <dc:creator>keithcclark71</dc:creator>
    <dc:date>2021-06-29T14:00:29Z</dc:date>
    <item>
      <title>Suspected false positives in FMC</title>
      <link>https://community.cisco.com/t5/network-security/suspected-false-positives-in-fmc/m-p/4291088#M1078450</link>
      <description>&lt;P&gt;This morning when I logged into our FMC I had several new IOC's on my context explorer, all of which were related to CnC connection attempts. After getting into the analysis and using the talos lookup tool on the IP address associated with these events, they're all looking fairly benign. Most were to IP's that according to talos belong to amazon cloud-front with a neutral reputation the remaining were cloudflare connections with same neutral reputation.&lt;/P&gt;&lt;P&gt;The IP's are as follows: 54.230.125.230 &amp;nbsp; 54.230.125.6&amp;nbsp;&amp;nbsp; 99.84.199.157 &amp;nbsp; 54.230.125.123&amp;nbsp;&amp;nbsp; 99.84.199.145&amp;nbsp;&amp;nbsp; 54.230.125.68&amp;nbsp;&amp;nbsp; 172.67.190.148&lt;/P&gt;&lt;P&gt;Assuming that these IP's aren't malicious CnC servers, as indicated by talos tool, why are they showing up as that in my FMC? I can see that these events are showing up under the security intelligence category of URL CnC. I don't know where the URL CnC is drawing from to determine what is "Bad" and to blacklist, but I would assume it would be talos? Lastly how would I edit this policy? If I go into Policies -&amp;gt; Access Control -&amp;gt; My Policy -&amp;gt; Security Intelligence, and under Blacklist is URL CnC, but I don't see any means in which to edit URL CnC there?&lt;/P&gt;&lt;P&gt;I would be appreciative if the Cisco team could advise as to what the best practice would be for adjusting the URL CnC blacklist, and whether I should just whitelist the IP addresses that were indicated above.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Sat, 13 Feb 2021 01:50:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/suspected-false-positives-in-fmc/m-p/4291088#M1078450</guid>
      <dc:creator>AFlack20</dc:creator>
      <dc:date>2021-02-13T01:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: Suspected false positives in FMC</title>
      <link>https://community.cisco.com/t5/network-security/suspected-false-positives-in-fmc/m-p/4291125#M1078452</link>
      <description>&lt;P&gt;The listing of what's included in both IP and URL security intelligence categories comes from the Cisco Security Intelligence feeds (TALOS-provided) which you can see under Objects &amp;gt; Security Intelligence. By default they are updated by FMC every 2 hours in the background and then pushed out to be immediately available on your managed devices.&lt;/P&gt;
&lt;P&gt;If you want to whitelist addresses that would otherwise be indicated as malicious, you can do so from the same object management page. Generally you create a text file with the objects and upload it to FMC. You can also right click on the address in the events listing and choose "Whitelist now".&lt;/P&gt;
&lt;P&gt;It might be worth opening a TAC case to understand why these particular addresses were identified as being associated with CnC events. They appear benign to me as well based on checking the TALOS site (and Threatgrid and Shodan) via SecureX / Cisco Threat Response.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Feb 2021 06:09:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/suspected-false-positives-in-fmc/m-p/4291125#M1078452</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-02-13T06:09:49Z</dc:date>
    </item>
    <item>
      <title>Re: Suspected false positives in FMC</title>
      <link>https://community.cisco.com/t5/network-security/suspected-false-positives-in-fmc/m-p/4291294#M1078460</link>
      <description>&lt;P&gt;You can go to&amp;nbsp;&lt;A href="https://talosintelligence.com/" target="_blank"&gt;https://talosintelligence.com/&lt;/A&gt;&amp;nbsp;and lookup the websites you have questions about and you will see the reputation they are being assigned.&lt;/P&gt;
&lt;P&gt;I had a similar issue after upgrading from 6.4.x to 6.6.1.x.&amp;nbsp; I contacted TAC regarding this and they said that they can not do anything about this blocked site as this might jeopardise the integrity of the automated calculations and that the only way to allow this is to either add specific ACP rules for the sites or whitelist them.&lt;/P&gt;
&lt;P&gt;So, that will be the basic reply you will get from TAC if you try to contact them.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Feb 2021 19:59:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/suspected-false-positives-in-fmc/m-p/4291294#M1078460</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-02-13T19:59:52Z</dc:date>
    </item>
    <item>
      <title>Re: Suspected false positives in FMC</title>
      <link>https://community.cisco.com/t5/network-security/suspected-false-positives-in-fmc/m-p/4292088#M1078491</link>
      <description>&lt;P&gt;Thanks Marvin and Marius. When navigating to the objects -&amp;gt; security intelligence -&amp;gt; url lists &amp;amp; feeds, I don't see any feeds. Could that possibly be because we don't have a license for URL filtering?&lt;/P&gt;&lt;P&gt;We're running 6.6.1 as well so perhaps these IP's being flagged could just be a bug with 6.6.1?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2021 01:06:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/suspected-false-positives-in-fmc/m-p/4292088#M1078491</guid>
      <dc:creator>AFlack20</dc:creator>
      <dc:date>2021-02-16T01:06:40Z</dc:date>
    </item>
    <item>
      <title>Re: Suspected false positives in FMC</title>
      <link>https://community.cisco.com/t5/network-security/suspected-false-positives-in-fmc/m-p/4292185#M1078498</link>
      <description>&lt;P&gt;Security intelligence is included in the Threat license.&amp;nbsp; It is not a bug, but more likely that the Talos automated systems do not yet have enough information on the sites to provide a different reputation.&amp;nbsp; As mentioned above, the only way to allow this traffic immediately is to whitelist it.&amp;nbsp; Otherwise you will need to wait for the Talos system to reassess the webiste reputation.s&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2021 07:37:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/suspected-false-positives-in-fmc/m-p/4292185#M1078498</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-02-16T07:37:14Z</dc:date>
    </item>
    <item>
      <title>Re: Suspected false positives in FMC</title>
      <link>https://community.cisco.com/t5/network-security/suspected-false-positives-in-fmc/m-p/4425446#M1081876</link>
      <description>&lt;P&gt;Old thread but I thought i'd touch base on also as I am going down the same road. If we look at packet that for me is related to snort signature&amp;nbsp; MALWARE-CNC DNS Fast Flux attempt (1:57756:2). I believe the rule is flagging as an Intrusion event due to the returned small TTL value of the record as shown below. I think load balancers out there when left at default settings have very low TTL for domain names associated with them or admins purposely setting to such a low value as to avoid some stale record cache to constantly keep the DNS servers updating.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;wd-prod-ss.trafficmanager.net: type A, class IN&lt;BR /&gt;Name: wd-prod-ss.trafficmanager.net&lt;BR /&gt;Type: A (Host address)&lt;BR /&gt;Class: IN (0x0001)&lt;BR /&gt;wd-prod-ss.trafficmanager.net: type CNAME, class IN, cname wd-prod-ss-us-west-2-fe.westus.cloudapp.azure.com&lt;BR /&gt;Name: wd-prod-ss.trafficmanager.net&lt;BR /&gt;Type: CNAME (Canonical name for an alias)&lt;BR /&gt;Class: IN (0x0001)&lt;BR /&gt;Time to live: 4 minutes, 22 seconds&lt;BR /&gt;Data length: 51&lt;BR /&gt;Primaryname: wd-prod-ss-us-west-2-fe.westus.cloudapp.azure.com&lt;BR /&gt;wd-prod-ss-us-west-2-fe.westus.cloudapp.azure.com: type A, class IN, addr 104.42.196.205&lt;BR /&gt;Name: &lt;STRONG&gt;wd-prod-ss-us-west-2-fe.westus.cloudapp.azure.com&lt;/STRONG&gt;&lt;BR /&gt;Type: A (Host address)&lt;BR /&gt;Class: IN (0x0001)&lt;BR /&gt;&lt;STRONG&gt;Time to live: 5 seconds&lt;/STRONG&gt;&lt;BR /&gt;Data length: 4&lt;BR /&gt;Addr: 104.42.196.205&lt;BR /&gt;&amp;lt;Root&amp;gt;: type OPT&lt;BR /&gt;Name: &amp;lt;Root&amp;gt;&lt;BR /&gt;Type: OPT (EDNS0 option)&lt;BR /&gt;UDP payload size: 4096&lt;BR /&gt;Higher bits in extended RCODE: 0x0&lt;BR /&gt;EDNS0 version: 0&lt;BR /&gt;Z: 0x8000&lt;BR /&gt;Bit 0 (DO bit): 1 (Accepts DNSSEC security RRs)&lt;BR /&gt;Bits 1-15: 0x0 (reserved)&lt;BR /&gt;Data length: 0&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jun 2021 14:00:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/suspected-false-positives-in-fmc/m-p/4425446#M1081876</guid>
      <dc:creator>keithcclark71</dc:creator>
      <dc:date>2021-06-29T14:00:29Z</dc:date>
    </item>
  </channel>
</rss>

