<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can you use the DNS policy  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/malware-cnc-win-trojan-pmabot-outbound-connection-attempt-etc/m-p/2926915#M43768</link>
    <description>&lt;P&gt;Can you use the DNS policy (this is in FMC version 6.0.x)? &amp;nbsp;I currently using the DNS Policy for suspicious sites, and refreshes every 2 hours.&lt;/P&gt;</description>
    <pubDate>Mon, 18 Jul 2016 16:46:48 GMT</pubDate>
    <dc:creator>Ed Padilla Jr</dc:creator>
    <dc:date>2016-07-18T16:46:48Z</dc:date>
    <item>
      <title>MALWARE-CNC Win.Trojan.Pmabot outbound connection attempt Etc...</title>
      <link>https://community.cisco.com/t5/network-security/malware-cnc-win-trojan-pmabot-outbound-connection-attempt-etc/m-p/2926914#M43767</link>
      <description>&lt;P&gt;From time to time I receive alerts such as the above one, there are others. These typiically occurr on a Guest Wifi network I run.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In my ACP (Position 3) I have an entry allowing the DNS application from my DMZ (Guest Wifi Zone) to the Outside of my ASA. Other rules lower down match HTTP/HTTPS policies etc. The Default rule&amp;nbsp; (last position) in the ACP is a FIle Policy has IPS enabled, it is set to Allow traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have enabled the Global Blacklist config for in the ACP settings under the Security Intelligence tab &amp;amp; I have modified the DNS setting to include blacklisting of DNS sites that Taos record as suspect.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;To block the above DNS entries, is it simply a case of removing the DNS application entry (Position 3) in the ACP and change my Default rule (last place) from Permit to Deny so that the DNS traffic is blocked to suspect sites. Or by doing this am I in danger of blocking other traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Simply, I want to allow HTTP, allow HTTPS and allow DNS traffic but with the latter only to trusted destinations. Where lookups occurr that trigger the above alerts and others, I would like to drop these so the DNS is blocked.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Darren&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:38:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-cnc-win-trojan-pmabot-outbound-connection-attempt-etc/m-p/2926914#M43767</guid>
      <dc:creator>darreng</dc:creator>
      <dc:date>2019-03-10T13:38:57Z</dc:date>
    </item>
    <item>
      <title>Can you use the DNS policy</title>
      <link>https://community.cisco.com/t5/network-security/malware-cnc-win-trojan-pmabot-outbound-connection-attempt-etc/m-p/2926915#M43768</link>
      <description>&lt;P&gt;Can you use the DNS policy (this is in FMC version 6.0.x)? &amp;nbsp;I currently using the DNS Policy for suspicious sites, and refreshes every 2 hours.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2016 16:46:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-cnc-win-trojan-pmabot-outbound-connection-attempt-etc/m-p/2926915#M43768</guid>
      <dc:creator>Ed Padilla Jr</dc:creator>
      <dc:date>2016-07-18T16:46:48Z</dc:date>
    </item>
    <item>
      <title>Hello Team,</title>
      <link>https://community.cisco.com/t5/network-security/malware-cnc-win-trojan-pmabot-outbound-connection-attempt-etc/m-p/2926916#M43772</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;
&lt;P&gt;First of all make sure that you are in latest version of SRU in the device.&lt;/P&gt;
&lt;P&gt;By any chance are you running&amp;nbsp;PHPMyAdmin in the device ? Also verify&amp;nbsp;what are the variables for&amp;nbsp;&amp;nbsp;HOME_NET and EXTERNAL_NET variables?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you suspect this as a false positive alert, then&amp;nbsp;&amp;nbsp;provide following elements to TAC in order to verify if this is a false positive or a valid alert due to an issue.&lt;/P&gt;
&lt;P&gt;1. Packet matching the rule:&lt;/P&gt;
&lt;P&gt;- Log in to the DC Web interface&lt;/P&gt;
&lt;P&gt;- Navigate to "Analysis" &amp;gt; "Intrusions" &amp;gt; "Events" &amp;gt; Change Workflow to "Table View of Events" &amp;gt; Select the corresponding alert(s) &amp;gt; Click "Download Packets"&lt;/P&gt;
&lt;P&gt;- You should obtain a ZIP file containing a packet capture in PCAP format.&lt;/P&gt;
&lt;P&gt;- Send this ZIP file to the TAC team and request an analysis.&lt;/P&gt;
&lt;P&gt;Rate if the posts helps you&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Jetsy&amp;nbsp;&lt;/P&gt;
&lt;DIV class="hist-remaining"&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2016 17:32:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-cnc-win-trojan-pmabot-outbound-connection-attempt-etc/m-p/2926916#M43772</guid>
      <dc:creator>Jetsy Mathew</dc:creator>
      <dc:date>2016-07-18T17:32:57Z</dc:date>
    </item>
    <item>
      <title>Hi Jetsy,</title>
      <link>https://community.cisco.com/t5/network-security/malware-cnc-win-trojan-pmabot-outbound-connection-attempt-etc/m-p/2926917#M43779</link>
      <description>&lt;P&gt;Hi Jetsy,&lt;/P&gt;
&lt;P&gt;I had not realised that the variable set required updating. Following a change I now see entries relating to such DNS attempts seem to be blocked, thank you.&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;Darren&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2016 06:03:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-cnc-win-trojan-pmabot-outbound-connection-attempt-etc/m-p/2926917#M43779</guid>
      <dc:creator>darreng</dc:creator>
      <dc:date>2016-07-20T06:03:03Z</dc:date>
    </item>
    <item>
      <title>Hi Ed,</title>
      <link>https://community.cisco.com/t5/network-security/malware-cnc-win-trojan-pmabot-outbound-connection-attempt-etc/m-p/2926918#M43781</link>
      <description>&lt;P&gt;Hi Ed,&lt;/P&gt;
&lt;P&gt;thanks is for the reply.&lt;/P&gt;
&lt;P&gt;Yes I had the DNS policy applied. It looks to have been an issue caused by me not updating the variable set.&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;Darren&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2016 06:05:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-cnc-win-trojan-pmabot-outbound-connection-attempt-etc/m-p/2926918#M43781</guid>
      <dc:creator>darreng</dc:creator>
      <dc:date>2016-07-20T06:05:34Z</dc:date>
    </item>
    <item>
      <title>Re: Hello Team,</title>
      <link>https://community.cisco.com/t5/network-security/malware-cnc-win-trojan-pmabot-outbound-connection-attempt-etc/m-p/3357360#M43783</link>
      <description>&lt;P&gt;There are lot of traffic for&amp;nbsp; win.trojan.pmbot outbound connection. do we have any specific signature in the Cisco IPS to block the same.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Akv&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Mar 2018 10:31:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-cnc-win-trojan-pmabot-outbound-connection-attempt-etc/m-p/3357360#M43783</guid>
      <dc:creator>AKV</dc:creator>
      <dc:date>2018-03-29T10:31:21Z</dc:date>
    </item>
  </channel>
</rss>

