Under Monitoring > System logs, It appears that they have a Brute force attack that has been ongoing on our portal for some time. Logs are not consistent… slow hits… 1 maybe 2 times per minute, but then there are others that are 1 every 2-3 minutes.
This appears to be the GlobalProtect portal page, which is for when you have a new remote laptop. You punch in the FQDN, and then you can download the VPN client.
I’m not sure how they’re doing this, but you see random names attempting to access our firewall portal. We do have OKTA, but. The Palo Engineer mentioned that the firewall is doing its job.
Solutions? I was thinking of doing either or leaving it as is.
Customize the Action and Trigger Conditions for a Brute Force Signature
Auto-Tagging to Automate Security Actions
One of many Logs
( description contains ‘failed authentication for user 'nat'. Reason: User is not in allowlist. auth profile 'Aut-Prf-OKTA', vsys 'vsys1', From: 179.43.148.58.’ )
This is part of being on the Internet and having a login page. Use mitigating protections like account lockouts, two factor, and, for optimal security, machine certificates on top of user authentication.
We had rules in place to drop Brute Force attempts on GP Portals, but that lead to other issues.
We have now just accepted it as a part of normal operations, since you cannot turn off the Portal if you want to use GP that isn’t going through Prisma Access.
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClJ2CAK
This article explains how to block the IP after a certain number of attempts in a specific time period. You can then set a duration for the length of time you want to block it. While this doesn’t prevent the attackers from trying, it does cut down on the rapid attacks. I will say, this is all fine and dandy for the portal, but I’ve also seen attacks on the gateway - almost as if they engineered the requests to appear to come from a GP client. Those unfortunately do not fall under this detection, and you have to add a sec policy to block the IP as you see it, or just deal with it.