<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS signature 1:45304:3 is this only relevant if installed on endpoint or? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-signature-1-45304-3-is-this-only-relevant-if-installed-on/m-p/3673710#M923645</link>
    <description>&lt;P&gt;Thanks, I am using the inbuilt nmap scanner. What if I remove any doubt and manually set the OS?&lt;/P&gt;
&lt;P&gt;For eg,&lt;/P&gt;
&lt;P&gt;If I create an IPS signature for one server, and forced that server to be mircosoft 2012 R2, and then set the IPS policy to recommend on the one ip address of this server. Should I expect signatures for Linux, like&lt;/P&gt;
&lt;H5&gt;1:46736:2&lt;/H5&gt;
&lt;P&gt;to be set to drop (and not drop and generate events)?&lt;/P&gt;
&lt;P&gt;**edit, one can't set to drop and not generate events**&lt;/P&gt;
&lt;P&gt;I just want to make sure my expectation is right before putting effort in.&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;H2 class="message-subject"&gt;&amp;nbsp;&lt;/H2&gt;</description>
    <pubDate>Tue, 24 Jul 2018 22:06:43 GMT</pubDate>
    <dc:creator>evan.chadwick1</dc:creator>
    <dc:date>2018-07-24T22:06:43Z</dc:date>
    <item>
      <title>IPS signature 1:45304:3 is this only relevant if installed on endpoint or?</title>
      <link>https://community.cisco.com/t5/network-security/ips-signature-1-45304-3-is-this-only-relevant-if-installed-on/m-p/3404600#M923640</link>
      <description>&lt;P&gt;Hi Folks,&lt;/P&gt;
&lt;P&gt;If I receive an inbound attempt from outside to inside and it triggers snort rule 45304 (oracle weblogic signature). How do I know if this is relevant regardless of whether it is (oracle weblogic in this instance) actually installed/listening on my internal endpoint, or if it is relevant regardless if installed or not?&lt;BR /&gt;If it is only relevant if it is running weblogic on the endpoint, my next step is to ask the server team to confirm if it is running weblogic, and then ensure Firepower will not trigger future events for such destinations in the future.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:54:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-signature-1-45304-3-is-this-only-relevant-if-installed-on/m-p/3404600#M923640</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2020-02-21T15:54:44Z</dc:date>
    </item>
    <item>
      <title>Re: IPS signature 1:45304:3 is this only relevant if installed on endpoint or?</title>
      <link>https://community.cisco.com/t5/network-security/ips-signature-1-45304-3-is-this-only-relevant-if-installed-on/m-p/3405413#M923641</link>
      <description>&lt;P&gt;According to the documentation provided SID 1-45304, the affected system is Oracle Weblogic Server. If you do not have Weblogic Server at the IP Address provided after verifying with server team, you can mark it as false positive. You can exclude this IP address from this signature using Rule editor.&lt;/P&gt;
&lt;P&gt;Below is the link to Snort documentation:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.snort.org/rule_docs/1-45304" target="_blank"&gt;https://www.snort.org/rule_docs/1-45304&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jun 2018 06:41:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-signature-1-45304-3-is-this-only-relevant-if-installed-on/m-p/3405413#M923641</guid>
      <dc:creator>Shubham Bharti</dc:creator>
      <dc:date>2018-06-26T06:41:02Z</dc:date>
    </item>
    <item>
      <title>Re: IPS signature 1:45304:3 is this only relevant if installed on endpoint or?</title>
      <link>https://community.cisco.com/t5/network-security/ips-signature-1-45304-3-is-this-only-relevant-if-installed-on/m-p/3411166#M923642</link>
      <description>&lt;P&gt;Just confirming, Firepower can detect OS versions etc, but not if Oracle or Apache is running on a server?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jul 2018 22:42:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-signature-1-45304-3-is-this-only-relevant-if-installed-on/m-p/3411166#M923642</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2018-07-05T22:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: IPS signature 1:45304:3 is this only relevant if installed on endpoint or?</title>
      <link>https://community.cisco.com/t5/network-security/ips-signature-1-45304-3-is-this-only-relevant-if-installed-on/m-p/3672717#M923643</link>
      <description>&lt;P&gt;AFAIK, It cannot actively detect the OS unless you are running tools like nmap and feeding that information to FMC. It only looks at the traffic traversing through the device and determine the OS details using certainty factor depending on the traffic information. It can only detect anything that is running at the endpoint passively using the traffic information. You need to use active scanners&amp;nbsp;for accurate information about a certain endpoints' OS, applications.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jul 2018 07:32:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-signature-1-45304-3-is-this-only-relevant-if-installed-on/m-p/3672717#M923643</guid>
      <dc:creator>Shubham Bharti</dc:creator>
      <dc:date>2018-07-24T07:32:02Z</dc:date>
    </item>
    <item>
      <title>Re: IPS signature 1:45304:3 is this only relevant if installed on endpoint or?</title>
      <link>https://community.cisco.com/t5/network-security/ips-signature-1-45304-3-is-this-only-relevant-if-installed-on/m-p/3673710#M923645</link>
      <description>&lt;P&gt;Thanks, I am using the inbuilt nmap scanner. What if I remove any doubt and manually set the OS?&lt;/P&gt;
&lt;P&gt;For eg,&lt;/P&gt;
&lt;P&gt;If I create an IPS signature for one server, and forced that server to be mircosoft 2012 R2, and then set the IPS policy to recommend on the one ip address of this server. Should I expect signatures for Linux, like&lt;/P&gt;
&lt;H5&gt;1:46736:2&lt;/H5&gt;
&lt;P&gt;to be set to drop (and not drop and generate events)?&lt;/P&gt;
&lt;P&gt;**edit, one can't set to drop and not generate events**&lt;/P&gt;
&lt;P&gt;I just want to make sure my expectation is right before putting effort in.&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;H2 class="message-subject"&gt;&amp;nbsp;&lt;/H2&gt;</description>
      <pubDate>Tue, 24 Jul 2018 22:06:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-signature-1-45304-3-is-this-only-relevant-if-installed-on/m-p/3673710#M923645</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2018-07-24T22:06:43Z</dc:date>
    </item>
    <item>
      <title>Re: IPS signature 1:45304:3 is this only relevant if installed on endpoint or?</title>
      <link>https://community.cisco.com/t5/network-security/ips-signature-1-45304-3-is-this-only-relevant-if-installed-on/m-p/3675208#M923648</link>
      <description>&lt;P&gt;In my knowledge, yes, manual entry will supersede the data provided through Passive monitoring. So once you identify it as Windows Server 2012, it should ideally recommend to disable all the rules related to Linux servers.&amp;nbsp;&lt;SPAN&gt;The Firepower system uses Network Discovery information to make recommendations for which rules you do or do not need to have enabled.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 10:12:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-signature-1-45304-3-is-this-only-relevant-if-installed-on/m-p/3675208#M923648</guid>
      <dc:creator>Shubham Bharti</dc:creator>
      <dc:date>2018-07-26T10:12:57Z</dc:date>
    </item>
    <item>
      <title>Re: IPS signature 1:45304:3 is this only relevant if installed on endpoint or?</title>
      <link>https://community.cisco.com/t5/network-security/ips-signature-1-45304-3-is-this-only-relevant-if-installed-on/m-p/3889093#M923649</link>
      <description>&lt;P&gt;After testing with one host and manually forcing the OS to Windows i did still receive plenty of non windows attacks.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe some of them are relevant even to Windows? I dont' know. But my gut feel is its just not able to 'tune out noise as well as it should'.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2019 10:34:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-signature-1-45304-3-is-this-only-relevant-if-installed-on/m-p/3889093#M923649</guid>
      <dc:creator>evan.chadwick1</dc:creator>
      <dc:date>2019-07-12T10:34:17Z</dc:date>
    </item>
  </channel>
</rss>

