<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.sophos.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>Portscan notifications</title><link>https://community.sophos.com/utm-firewall/f/network-protection-firewall-nat-qos-ips/99840/portscan-notifications</link><description>This may be a little tough to answer, but a question.... 
 So I have as Rule #1 in my firewall to DROP all connections Incoming/Outgoing if it is in an ip address range/network/etc. as a first line of defense. 
 I then receive notifications about a portscan</description><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>RE: Portscan notifications</title><link>https://community.sophos.com/thread/362805?ContentTypeID=1</link><pubDate>Wed, 24 Jan 2018 13:46:50 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:540b5e4d-0881-49e6-9608-17b602a6baf1</guid><dc:creator>BAlfson</dc:creator><description>&lt;p&gt;Z, take a look at #2 in &lt;a href="/products/unified-threat-management/f/general-discussion/22065/rulz"&gt;Rulz&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Cheers - Bob&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Portscan notifications</title><link>https://community.sophos.com/thread/362694?ContentTypeID=1</link><pubDate>Tue, 23 Jan 2018 14:31:48 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:b875d651-d67a-4578-85f3-dee3db3385ae</guid><dc:creator>Alexander Busch</dc:creator><description>&lt;p&gt;[quote user=&amp;quot;zburns&amp;quot;]I&amp;#39;ve also thought about an auto-block - but that scared me a little bit.  You could create an issue real quick by scanning yourself.  :-)&lt;/p&gt;
&lt;p&gt;[/quote]&lt;/p&gt;
&lt;p&gt;Make an exception for your internal lan.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Portscan notifications</title><link>https://community.sophos.com/thread/362681?ContentTypeID=1</link><pubDate>Tue, 23 Jan 2018 12:37:55 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:ab0e1c16-b8c1-4729-8d8a-9abf336475a5</guid><dc:creator>zburns</dc:creator><description>&lt;p&gt;I&amp;#39;ve also thought about an auto-block - but that scared me a little bit.&amp;nbsp; You could create an issue real quick by scanning yourself.&amp;nbsp; :-)&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Portscan notifications</title><link>https://community.sophos.com/thread/362679?ContentTypeID=1</link><pubDate>Tue, 23 Jan 2018 12:22:50 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:72bc8b48-45f5-4308-a463-f49a85ede3f4</guid><dc:creator>Alexander Busch</dc:creator><description>&lt;p&gt;Maybe this one is interessting &lt;a href="https://community.sophos.com/kb/en-us/115153"&gt;community.sophos.com/.../115153&lt;/a&gt; &lt;/p&gt;
&lt;p&gt;So a connection attempt is already enough I think. It seems the attempt is already be counted in front of the manual firewall rules.&lt;/p&gt;
&lt;p&gt;Best&lt;/p&gt;
&lt;p&gt;Alex&lt;/p&gt;
&lt;p&gt;PS A nice feature of UTM would be automaticly block IPs which triggered IPS for example. &lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>