<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello Anders, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/analysis-help-needed/m-p/2981596#M18176</link>
    <description>&lt;P&gt;Hello Anders,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Make sure that the SRU is on the latest version.&lt;/P&gt;
&lt;P&gt;If you are receiving alerts like this , we need to verify the packet capture for this intrusion events.&lt;/P&gt;
&lt;P&gt;You should collect packet download from Analysis &amp;gt; intrusion events &amp;gt; Select the respective intrusion event &amp;gt;Download packet .&lt;/P&gt;
&lt;P&gt;Collect the capture and open a service request with TAC to analyze the same.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Jetsy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 15 Aug 2016 07:33:21 GMT</pubDate>
    <dc:creator>Jetsy Mathew</dc:creator>
    <dc:date>2016-08-15T07:33:21Z</dc:date>
    <item>
      <title>Analysis help needed</title>
      <link>https://community.cisco.com/t5/network-security/analysis-help-needed/m-p/2981595#M18158</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;We have a security event that says that a trojan has tried to make a outbound connection attempt. What confuses me is that the source is an external IP-address and the source is our IP-address. If its an outbound attempt then the traffic should be the other way around?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Security event:&lt;/P&gt;
&lt;P&gt;[1:37215:1] "MALWARE-CNC Win.Trojan.Pmabot outbound connection attempt" [Impact: Vulnerable] From "NAME_OF_OUR_FIREWALL" at Thu Aug 11 21:59:31 2016 UTC [Classification: A Network Trojan was Detected] [Priority: 1] {tcp} EXTERNAL_IP-ADDRESS:48242 (canada)-&amp;gt;OUR_IP-ADDRESS:80 (OUR_COUNTRY)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Should we worry that we have an infected host?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Anders&lt;/P&gt;</description>
      <pubDate>Mon, 15 Aug 2016 07:12:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/analysis-help-needed/m-p/2981595#M18158</guid>
      <dc:creator>anders.akamai</dc:creator>
      <dc:date>2016-08-15T07:12:55Z</dc:date>
    </item>
    <item>
      <title>Hello Anders,</title>
      <link>https://community.cisco.com/t5/network-security/analysis-help-needed/m-p/2981596#M18176</link>
      <description>&lt;P&gt;Hello Anders,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Make sure that the SRU is on the latest version.&lt;/P&gt;
&lt;P&gt;If you are receiving alerts like this , we need to verify the packet capture for this intrusion events.&lt;/P&gt;
&lt;P&gt;You should collect packet download from Analysis &amp;gt; intrusion events &amp;gt; Select the respective intrusion event &amp;gt;Download packet .&lt;/P&gt;
&lt;P&gt;Collect the capture and open a service request with TAC to analyze the same.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Jetsy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Aug 2016 07:33:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/analysis-help-needed/m-p/2981596#M18176</guid>
      <dc:creator>Jetsy Mathew</dc:creator>
      <dc:date>2016-08-15T07:33:21Z</dc:date>
    </item>
  </channel>
</rss>

