<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Yeah I see that kind of thing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-blocking-cnc/m-p/3051977#M17011</link>
    <description>&lt;P&gt;Yeah I see that kind of thing often as well on things that have exposed ports. Basically the system is working as intended. I wish it would say more clearly whether it blocked the connection or not. If it is recognized as a C&amp;amp;C connection, it should be blocked but I guess it depends on how you set your policy really.&lt;/P&gt;</description>
    <pubDate>Mon, 24 Apr 2017 15:53:14 GMT</pubDate>
    <dc:creator>Jonathan Bayless</dc:creator>
    <dc:date>2017-04-24T15:53:14Z</dc:date>
    <item>
      <title>Firepower blocking CnC</title>
      <link>https://community.cisco.com/t5/network-security/firepower-blocking-cnc/m-p/3051975#M17009</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;We are running an ASA with FirePower and a FMC for management. We are seeing many attempts from external C&amp;amp;C servers to our DMZ hosts which are getting blocked by FP. We are not seeing any attempts from our hosts to any C&amp;amp;C servers. I have been investigating these attempts but am not really getting anywhere so I am wondering if it is really worthwhile seeing as the traffic is being blocked anyways.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any thoughts if I should be chasing these alerts?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2017 14:07:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-blocking-cnc/m-p/3051975#M17009</guid>
      <dc:creator>Lars Brachlow</dc:creator>
      <dc:date>2017-04-19T14:07:16Z</dc:date>
    </item>
    <item>
      <title>C&amp;C server trying to access a</title>
      <link>https://community.cisco.com/t5/network-security/firepower-blocking-cnc/m-p/3051976#M17010</link>
      <description>&lt;P&gt;C&amp;amp;C server trying to access a DMZ host dopesn't necessarily mean the host is compromised.&lt;/P&gt;
&lt;P&gt;If the DMZ servers have public IP addresses assigned, it could simply be scanning attempts from the C&amp;amp;C servers.&lt;/P&gt;
&lt;P&gt;I'd just chalk it up as a "win" and move on.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 08:43:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-blocking-cnc/m-p/3051976#M17010</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-04-20T08:43:21Z</dc:date>
    </item>
    <item>
      <title>Yeah I see that kind of thing</title>
      <link>https://community.cisco.com/t5/network-security/firepower-blocking-cnc/m-p/3051977#M17011</link>
      <description>&lt;P&gt;Yeah I see that kind of thing often as well on things that have exposed ports. Basically the system is working as intended. I wish it would say more clearly whether it blocked the connection or not. If it is recognized as a C&amp;amp;C connection, it should be blocked but I guess it depends on how you set your policy really.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 15:53:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-blocking-cnc/m-p/3051977#M17011</guid>
      <dc:creator>Jonathan Bayless</dc:creator>
      <dc:date>2017-04-24T15:53:14Z</dc:date>
    </item>
    <item>
      <title>Thanks Jonathan and Marvin. </title>
      <link>https://community.cisco.com/t5/network-security/firepower-blocking-cnc/m-p/3051978#M17013</link>
      <description>&lt;P&gt;Thanks Jonathan and Marvin.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was thinking that things were working as they should but wanted to make sure.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 16:05:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-blocking-cnc/m-p/3051978#M17013</guid>
      <dc:creator>Lars Brachlow</dc:creator>
      <dc:date>2017-04-24T16:05:22Z</dc:date>
    </item>
    <item>
      <title>@Lars Brachlow  </title>
      <link>https://community.cisco.com/t5/network-security/firepower-blocking-cnc/m-p/3051979#M17015</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://supportforums.cisco.com/users/lbrachlow1"&gt;lbrachlow1&lt;/A&gt;&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You're welcome. Please mark your question as answered if it has been.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2017 00:27:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-blocking-cnc/m-p/3051979#M17015</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-04-25T00:27:18Z</dc:date>
    </item>
  </channel>
</rss>

