<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPS notification question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-notification-question/m-p/2072036#M54496</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unless you concerned about your internal users attacking external websites, you should create an event action filter for these when sourced from your own network.&amp;nbsp; If you don't, you will see a ton of them in normal traffic (Yahoo is a big one that has query paramaters that look like SQL injection when using a very simply signature such as this one).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 18 Oct 2012 20:04:48 GMT</pubDate>
    <dc:creator>mhellman</dc:creator>
    <dc:date>2012-10-18T20:04:48Z</dc:date>
    <item>
      <title>IPS notification question</title>
      <link>https://community.cisco.com/t5/network-security/ips-notification-question/m-p/2072035#M54495</link>
      <description>&lt;P&gt;Can some one tell me what exactly these two log notifiations mean:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;event_id = 1349377765028007908&lt;/P&gt;&lt;P&gt;severity = medium&lt;/P&gt;&lt;P&gt;app_name = sensorApp&lt;/P&gt;&lt;P&gt;receive_time = 10/18/2012 09:00:31 &lt;/P&gt;&lt;P&gt;event_time = 10/18/2012 14:00:30&lt;/P&gt;&lt;P&gt;sensor_local_time = 10/18/2012 08:06:30&lt;/P&gt;&lt;P&gt;sig_name = Generic SQL Injection&lt;/P&gt;&lt;P&gt;sig_details = Insert Into&lt;/P&gt;&lt;P&gt;attacker_ip = 10.1.132.38&lt;/P&gt;&lt;P&gt;attacker_port = 57776&lt;/P&gt;&lt;P&gt;victim_ip = 1.1.1.1 (This is an outside website IP)&lt;/P&gt;&lt;P&gt;victim_port = 80&lt;/P&gt;&lt;P&gt;summary_type = &lt;/P&gt;&lt;P&gt;actions = &lt;/P&gt;&lt;P&gt;---------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;event_id = 1349377765028007989&lt;/P&gt;&lt;P&gt;severity = high&lt;/P&gt;&lt;P&gt;app_name = sensorApp&lt;/P&gt;&lt;P&gt;receive_time = 10/18/2012 11:47:11&lt;/P&gt;&lt;P&gt;event_time = 10/18/2012 16:47:10&lt;/P&gt;&lt;P&gt;sensor_local_time = 10/18/2012 10:53:10&lt;/P&gt;&lt;P&gt;sig_name = HTTP args to xp_cmdshell in HTTP Request sig_details = xp_cmdshell attacker_ip = 10.1.136.72 attacker_port = 54239 victim_ip = 66.235.132.232 victim_port = 80 summary_type = Regular actions = &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;It seems like some times when users are browsing sites this notifciation gets generated I'd like to get better understanding of it.&amp;nbsp; Second error is actually from my own laptop and the public IP belongs to Adobe.&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:48:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-notification-question/m-p/2072035#M54495</guid>
      <dc:creator>ALIAOF_</dc:creator>
      <dc:date>2019-03-10T12:48:14Z</dc:date>
    </item>
    <item>
      <title>IPS notification question</title>
      <link>https://community.cisco.com/t5/network-security/ips-notification-question/m-p/2072036#M54496</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unless you concerned about your internal users attacking external websites, you should create an event action filter for these when sourced from your own network.&amp;nbsp; If you don't, you will see a ton of them in normal traffic (Yahoo is a big one that has query paramaters that look like SQL injection when using a very simply signature such as this one).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Oct 2012 20:04:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-notification-question/m-p/2072036#M54496</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2012-10-18T20:04:48Z</dc:date>
    </item>
  </channel>
</rss>

