<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Issues fixed as recommended by AIOPS Premium console are still being reported negatively in AIOps for NGFW Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/aiops-for-ngfw-discussions/issues-fixed-as-recommended-by-aiops-premium-console-are-still/m-p/543521#M395</link>
    <description>&lt;P&gt;1:&amp;nbsp;&amp;nbsp; I have critical alerts in AIOPS that when corrected are still being reported in the console and not configured:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Outbound High Risk IP Addresses Not Blocked: &lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;
&lt;DIV class="SecurityDetailCellRenderer_instruction-header__FcGZO"&gt;
&lt;DIV class="SecurityDetailCellRenderer_text__Y61y5"&gt;Follow these steps to resolve the issue:&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;Configure and enable a deny rule with the 'Palo Alto Networks - High risk IP addresses' EDL in the destination address, Log at Session End enabled, along with a Log Forwarding Profile OR an allow rule with the same configurations along with Antivirus, Vulnerablility Protection, Anti-Spyware and URL Filtering profiles configured&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&lt;STRONG&gt;I also have similar for the "Inbound".&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&lt;STRONG&gt;2:&amp;nbsp;&amp;nbsp; &lt;SPAN data-id="header-alert-name"&gt;Undecrypted Traffic Settings Not Set To Recommended&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;
&lt;DIV class="SecurityDetailCellRenderer_instruction-header__FcGZO"&gt;
&lt;DIV class="SecurityDetailCellRenderer_text__Y61y5"&gt;Follow these steps to resolve the issue: &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-concepts/no-decryption-decryption-profile" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-concepts/no-decryption-decryption-profile&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;The following options need to be enabled: block_expired_certificate, block_untrusted_issuer&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&lt;STRONG&gt;If I follow the recommended steps in AIOPS the non-decrypted excluded sites are blocked.&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&lt;STRONG&gt;3:&amp;nbsp;&amp;nbsp; &lt;SPAN data-id="header-alert-name"&gt;File Blocking Profile Not Strict&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;I have one user that uses the website Canva.com and if I put the Strict File Blocking profile of that specific userid Canva.com stops working because it uses Windows PE to display images in the site.&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;How can I get these sorted? I am pulling my hair our double and triple checking configs.&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;Finally, AIOPS is grading the default "READ ONLY" Objects like URL Filtering, Antispyware, Antivirus etc: and preventing the Firewall from moving from Orange(Fair) to Good(Green) in the Device Security Dashboard.&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;Can you do a forced manual AIOPS scan of the firewall instead of having to wait on the automatic scan every 24hrs?&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&amp;nbsp;Please help&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Fri, 26 May 2023 15:12:54 GMT</pubDate>
    <dc:creator>bahan</dc:creator>
    <dc:date>2023-05-26T15:12:54Z</dc:date>
    <item>
      <title>Issues fixed as recommended by AIOPS Premium console are still being reported negatively</title>
      <link>https://live.paloaltonetworks.com/t5/aiops-for-ngfw-discussions/issues-fixed-as-recommended-by-aiops-premium-console-are-still/m-p/543521#M395</link>
      <description>&lt;P&gt;1:&amp;nbsp;&amp;nbsp; I have critical alerts in AIOPS that when corrected are still being reported in the console and not configured:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Outbound High Risk IP Addresses Not Blocked: &lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;
&lt;DIV class="SecurityDetailCellRenderer_instruction-header__FcGZO"&gt;
&lt;DIV class="SecurityDetailCellRenderer_text__Y61y5"&gt;Follow these steps to resolve the issue:&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;Configure and enable a deny rule with the 'Palo Alto Networks - High risk IP addresses' EDL in the destination address, Log at Session End enabled, along with a Log Forwarding Profile OR an allow rule with the same configurations along with Antivirus, Vulnerablility Protection, Anti-Spyware and URL Filtering profiles configured&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&lt;STRONG&gt;I also have similar for the "Inbound".&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&lt;STRONG&gt;2:&amp;nbsp;&amp;nbsp; &lt;SPAN data-id="header-alert-name"&gt;Undecrypted Traffic Settings Not Set To Recommended&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;
&lt;DIV class="SecurityDetailCellRenderer_instruction-header__FcGZO"&gt;
&lt;DIV class="SecurityDetailCellRenderer_text__Y61y5"&gt;Follow these steps to resolve the issue: &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-concepts/no-decryption-decryption-profile" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-concepts/no-decryption-decryption-profile&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;The following options need to be enabled: block_expired_certificate, block_untrusted_issuer&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&lt;STRONG&gt;If I follow the recommended steps in AIOPS the non-decrypted excluded sites are blocked.&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&lt;STRONG&gt;3:&amp;nbsp;&amp;nbsp; &lt;SPAN data-id="header-alert-name"&gt;File Blocking Profile Not Strict&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;I have one user that uses the website Canva.com and if I put the Strict File Blocking profile of that specific userid Canva.com stops working because it uses Windows PE to display images in the site.&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;How can I get these sorted? I am pulling my hair our double and triple checking configs.&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;Finally, AIOPS is grading the default "READ ONLY" Objects like URL Filtering, Antispyware, Antivirus etc: and preventing the Firewall from moving from Orange(Fair) to Good(Green) in the Device Security Dashboard.&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;Can you do a forced manual AIOPS scan of the firewall instead of having to wait on the automatic scan every 24hrs?&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&amp;nbsp;Please help&lt;/DIV&gt;
&lt;DIV class="SecurityDetailCellRenderer_message__zONWv"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 26 May 2023 15:12:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/aiops-for-ngfw-discussions/issues-fixed-as-recommended-by-aiops-premium-console-are-still/m-p/543521#M395</guid>
      <dc:creator>bahan</dc:creator>
      <dc:date>2023-05-26T15:12:54Z</dc:date>
    </item>
    <item>
      <title>Re: Issues fixed as recommended by AIOPS Premium console are still being reported negatively</title>
      <link>https://live.paloaltonetworks.com/t5/aiops-for-ngfw-discussions/issues-fixed-as-recommended-by-aiops-premium-console-are-still/m-p/544983#M399</link>
      <description>&lt;P&gt;Have you found an answer to this? I'm also curious&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 18:44:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/aiops-for-ngfw-discussions/issues-fixed-as-recommended-by-aiops-premium-console-are-still/m-p/544983#M399</guid>
      <dc:creator>DopedWafer</dc:creator>
      <dc:date>2023-06-06T18:44:55Z</dc:date>
    </item>
    <item>
      <title>Re: Issues fixed as recommended by AIOPS Premium console are still being reported negatively</title>
      <link>https://live.paloaltonetworks.com/t5/aiops-for-ngfw-discussions/issues-fixed-as-recommended-by-aiops-premium-console-are-still/m-p/544985#M400</link>
      <description>&lt;P&gt;My Friend,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not a single person replied. Worse yet you are not allowed to call tech support for AIOPS issues.&lt;/P&gt;
&lt;P&gt;You are directed bck to the Community where the support is located, but still no answers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It seems as if you literally have to wait 30 days for the console to refresh so you can get answers to the changes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I will upload a tech cupport file to the BPA section so see if this will trigger and update and regrading in AIOPS cloud console.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 19:21:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/aiops-for-ngfw-discussions/issues-fixed-as-recommended-by-aiops-premium-console-are-still/m-p/544985#M400</guid>
      <dc:creator>bahan</dc:creator>
      <dc:date>2023-06-06T19:21:14Z</dc:date>
    </item>
    <item>
      <title>Re: Issues fixed as recommended by AIOPS Premium console are still being reported negatively</title>
      <link>https://live.paloaltonetworks.com/t5/aiops-for-ngfw-discussions/issues-fixed-as-recommended-by-aiops-premium-console-are-still/m-p/544993#M402</link>
      <description>&lt;P&gt;Bahan, sorry for the delayed response.&amp;nbsp; Here are answers to your questions:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Q.&amp;nbsp;Outbound High Risk IP Addresses Not Blocked&lt;/P&gt;
&lt;P&gt;A. The likely reason is that if there are any rules with an action of "allow" above the rule in question, the check will fail.&amp;nbsp; We are doing a full review of BP checks now, and that requirement (for this check) is being removed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Q.&amp;nbsp;Undecrypted Traffic Settings Not Set To Recommended&lt;/P&gt;
&lt;P&gt;A.&amp;nbsp; This is a best practice.&amp;nbsp; If you continue to have issues with this setting it is best to open a ticket with TAC to investigate why the settings are not working as the documentation describes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Q.&amp;nbsp;File Blocking Profile Not Strict&lt;/P&gt;
&lt;P&gt;A. This check is being removed as part of our ongoing BP check review.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Q.&amp;nbsp;Finally, AIOPS is grading the default "READ ONLY" Objects like URL Filtering, Antispyware, Antivirus etc: and preventing the Firewall from moving from Orange(Fair) to Good(Green) in the Device Security Dashboard.&lt;/P&gt;
&lt;P&gt;A. As part of our ongoing BP check review we are working with the PAN-OS team to change "defaults" (where possible) to align with best practices.&amp;nbsp; We will be working to resolve this issue going forward.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Q.&amp;nbsp;&lt;SPAN&gt;Can you do a forced manual AIOPS scan of the firewall instead of having to wait on the automatic scan every 24hrs?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;A. Not currently (via telemetry).&amp;nbsp; There is an "on-demand" TSF upload feature now, which you can use to force a re-evaluation for that TSF which was uploaded.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 20:45:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/aiops-for-ngfw-discussions/issues-fixed-as-recommended-by-aiops-premium-console-are-still/m-p/544993#M402</guid>
      <dc:creator>cchristiansen</dc:creator>
      <dc:date>2023-06-06T20:45:53Z</dc:date>
    </item>
    <item>
      <title>Re: Issues fixed as recommended by AIOPS Premium console are still being reported negatively</title>
      <link>https://live.paloaltonetworks.com/t5/aiops-for-ngfw-discussions/issues-fixed-as-recommended-by-aiops-premium-console-are-still/m-p/545007#M403</link>
      <description>&lt;P&gt;&lt;SPAN&gt;There is an "on-demand" TSF upload feature now, which you can use to force a re-evaluation for that TSF which was uploaded.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please sir, where exactly is this feature? Is it the upload in Posture/On-Demand BPA? &amp;nbsp;or another location?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2023 00:18:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/aiops-for-ngfw-discussions/issues-fixed-as-recommended-by-aiops-premium-console-are-still/m-p/545007#M403</guid>
      <dc:creator>bahan</dc:creator>
      <dc:date>2023-06-07T00:18:35Z</dc:date>
    </item>
    <item>
      <title>Re: Issues fixed as recommended by AIOPS Premium console are still being reported negatively</title>
      <link>https://live.paloaltonetworks.com/t5/aiops-for-ngfw-discussions/issues-fixed-as-recommended-by-aiops-premium-console-are-still/m-p/561313#M455</link>
      <description>&lt;P&gt;Not sure if you still need an answer to this, but if you go to Dashboards &amp;gt; On Demand BPA &amp;gt; Generate New BPA Report - Here is where you would upload the TSF file. The On Demand BPA feature only allows usage of the Best Practices dashboard and Feature adoption dashboard. Although this would allow you to refresh the best practice assessment, it is my understanding that this would not refresh the rest of the information in AIOps that is being received through telemetry.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 16:34:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/aiops-for-ngfw-discussions/issues-fixed-as-recommended-by-aiops-premium-console-are-still/m-p/561313#M455</guid>
      <dc:creator>kaymorrison</dc:creator>
      <dc:date>2023-10-11T16:34:34Z</dc:date>
    </item>
  </channel>
</rss>

