<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article February 2023 Rewind: LIVEcommunity Highlights in News</title>
    <link>https://live.paloaltonetworks.com/t5/news/february-2023-rewind-livecommunity-highlights/ta-p/532515</link>
    <description>&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="february-rewind-2023.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48242i27AB91A052B0F64B/image-size/large?v=v2&amp;amp;px=999" role="button" title="february-rewind-2023.jpg" alt="february-rewind-2023.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Welcome to our February 2023 Rewind, where we review some of LIVEcommunity’s biggest headlines from the past month!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In February, LIVEcommunity was busy sharing Palo Alto Networks’ Zero Trust OT Security announcement, an addition to our Member Testimonial series, playbooks for fighting cryptojacking, and more!&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;&lt;A id="link_6" class="page-link lia-link-navigation lia-custom-event" href="https://live.paloaltonetworks.com/t5/member-testimonials/livecommunity-member-testimonial-steve-cantwell/ba-p/532198" target="_blank" rel="noopener"&gt;LIVEcommunity Member Testimonial: Steve Cantwell&lt;/A&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FGX4oHn0-oXI%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DGX4oHn0-oXI&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FGX4oHn0-oXI%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="600" height="337" scrolling="no" title="LIVEcommunity Member Testimonial: Steve Cantwell" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-message-template-content-zone"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-message-template-content-zone"&gt;&lt;FONT color="#000000"&gt;Our new &lt;A href="https://live.paloaltonetworks.com/t5/member-testimonials/bg-p/Member-Testimonials" target="_self"&gt;Member Testimonial video series&lt;/A&gt;&amp;nbsp;invites community members from around the world to share their experience on LIVEcommunity, the importance of connecting with peers in cybersecurity, and what keeps them coming back.&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp;has been a member of LIVEcommunity since 2019 and part of community’s Cyber Elite program — which recognizes our most committed, helpful, and knowledgeable members — since it launched in 2020. He is an involved, responsive, and thoughtful member, and we’re grateful to have him as a part of LIVEcommunity: To date, he has made 745 posts, given 191 kudos and created 95 accepted solutions!&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-message-template-content-zone"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/introducing-ai-ml-powered-industrial-ot-security/ba-p/532275" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Introducing AI/ML Powered Industrial OT Security&lt;/STRONG&gt;&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-message-template-content-zone"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jforsythe_0-1677609637702.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48238i8F2EEA9FD5694D0C/image-size/large?v=v2&amp;amp;px=999" role="button" title="jforsythe_0-1677609637702.png" alt="jforsythe_0-1677609637702.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV class="lia-message-template-content-zone"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="lia-message-template-content-zone"&gt;&lt;SPAN&gt;Cyber attacks are increasingly disrupting manufacturing production, and CXOs are realizing that their current security measures are simply not enough to cope with changes in the OT network at their production facilities. Only Palo Alto Networks provides complete Zero Trust security so you can focus on uninterrupted operations and continued modernization of your production facilities. Read more about how &lt;/SPAN&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://live.paloaltonetworks.com/t5/blogs/introducing-ai-ml-powered-industrial-ot-security/ba-p/532275" target="_blank" rel="noopener"&gt;Palo Alto Networks Industrial OT Security solution&lt;/A&gt;&lt;SPAN&gt; allows you to achieve unprecedented levels of protection.&lt;/SPAN&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/xsoar-marketplace-keeping-it-simple-with-microsoft-teams-via/ba-p/531135" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;XSOAR Marketplace: Keeping it Simple with Microsoft Teams via Webhook&lt;/STRONG&gt;&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The Cortex XSOAR integration with Microsoft Teams is fantastic, and includes a lot of useful functionality, but how do you schedule a message?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;That question piqued my curiosity and a quick Google search gave me what was needed: Microsoft Teams supports messages via incoming webhook, and with Cortex XSOAR Bring Your Own Integration (BYOI) capabilities, it didn’t seem like an insurmountable challenge to write a simple integration that would simply send a message. Read on to learn how to &lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/xsoar-marketplace-keeping-it-simple-with-microsoft-teams-via/ba-p/531135" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;send a message using Microsoft Teams, webhook, and XSOAR&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/pancast-what-topics-do-you-want-covered-share-your-ideas-with-us/ba-p/529685#:~:text=Ideas%20With%20Us!-,What%20PANCast%20Episode%20Do%20You%20Want%20to%20Learn%20About%20Next%3F%20Share%20Your%20Ideas%20With%20Us!,-Jennaqualls" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;PANCast Is Looking for Episode Ideas!&lt;/STRONG&gt;&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;PANCast, a Palo Alto Networks podcast that provides actionable insights to customers, is looking for ideas! &lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/pancast/tkb-p/palo-alto-networks-podcasts-PANCast" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;PANCast&lt;/STRONG&gt;&lt;/A&gt;&lt;SPAN&gt; provides actionable insights from cybersecurity experts to customers, helping ensure each day is more secure than the one before it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please share what topics you'd like to hear covered, simply by clicking "Suggest an idea" via this &lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/pancast-episode-ideas-submission/idb-p/PANCast-Ideas" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;PANCast Ideas page&lt;/STRONG&gt;&lt;/A&gt;&lt;SPAN&gt;. You can also listen to the &lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/pancast/tkb-p/palo-alto-networks-podcasts-PANCast" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;latest PANCast episodes now&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;&lt;A id="link_5" class="page-link lia-link-navigation lia-custom-event" href="https://live.paloaltonetworks.com/t5/blogs/how-to-use-cortex-xdr-to-monitor-cryptojacking-malware/ba-p/531108" target="_blank" rel="noopener"&gt;How to Use Cortex XDR to Monitor Cryptojacking Malware&amp;nbsp;&lt;/A&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jforsythe_1-1677609637616.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48237i3843DB4392B2DECA/image-size/large?v=v2&amp;amp;px=999" role="button" title="jforsythe_1-1677609637616.png" alt="jforsythe_1-1677609637616.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cryptojacking —&amp;nbsp;a form of cryptomining that uses unauthorized access to someone else's device and resources to mine for cryptocurrency —&amp;nbsp;is officially a thing. These two blogs take a look at how Cortex can be used to combat cryptojacking malware:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/playbook-of-the-week-cloud-cryptojacking-response/ba-p/531126" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Playbook of the Week: Cortex XSOAR Cloud Cryptojacking Response&lt;/STRONG&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/poc-cortex-xdr-and-cryptojacking/ba-p/531108" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;PoC - Cortex XDR and Cryptojacking&lt;/STRONG&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/tcp-mss-adjustments-updated-february-2023/ba-p/156881" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;TCP MSS Adjustments&lt;/STRONG&gt;&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The Maximum Transmission Unit (MTU) specifies the largest amount of data that can be transmitted by a protocol in one TCP segment.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;The larger it is, the less overhead you have but the more retransmits you'll get in case of a problem. The larger frame also means increased latency due to time necessary to transmit. The smaller it is, the more overhead you'll have but less to retransmit if there is a problem. Learn more about how to manage&amp;nbsp;TCP MSS adjustments in this blog.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/cortex-xsoar-archiving-hosted-data-for-xsoar-6/ba-p/531871" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Cortex XSOAR: How to Archive Hosted Data for XSOAR 6&lt;/STRONG&gt;&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;There are many benefits to being a hosted XSOAR customer, such as offloading the care and feeding of the XSOAR environment. That being the case, it does require a different process when the time comes to archive the data to prevent slow performance or running out of storage. Let's review how to archive and retrieve your data, including best practices, recommendations and FAQs for archiving.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/playbook-of-the-week-speed-up-phishing-response-with-the-cortex/ba-p/530362" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Playbook of the Week: Speed Up Phishing Response with the Cortex XSOAR Deployment Wizard&lt;/STRONG&gt;&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Phishing is involved in almost 40% of security incidents, according to the &lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/unit42/2022-incident-response-report" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;2022 Unit 42 Incident Response Threat Report&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;. Attacks that once relied on poorly written phishing emails to find victims have rapidly increased in sophistication and targeting due to the growing amount of personal information easily found on the internet.&lt;/SPAN&gt;&lt;/P&gt;
&lt;BR /&gt;
&lt;P&gt;&lt;SPAN&gt;With Cortex XSOAR, phishing responses can easily be automated and it is one of the most popular use cases for automation. The &lt;/SPAN&gt;&lt;A href="https://cortex.marketplace.pan.dev/marketplace/details/Phishing/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Phishing pack&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; helps organizations reduce the time spent managing phishing alerts and provides a standardized, methodical process to handle phishing.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/tlp-update-2-0-going-softer-on-amber-and-adding-amber-strict/ba-p/530512" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;TLP Update (2.0), Going Softer on AMBER and Adding AMBER+STRICT&lt;/STRONG&gt;&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The Traffic Light Protocol (TLP) can play a major role in your XSOAR instance. As you may have seen already, every Threat Intelligence Feed you can add will come with this option to be set.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;The traffic light protocol was first developed by &lt;/SPAN&gt;&lt;A href="https://draft.blogger.com/blog/post/edit/5635472147002872161/7188741757965164567?hl=de#" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;first.org&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, a security professional community in the area of incident response but actually mainly CERT related.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As you may imagine, when CERT people come together they are keen on sharing knowledge and insights as well as the latest and most urgent events they are facing with each other. But how do you end up not over sharing information while publicly exposing that your company may or may not be affected by a certain threat actor or vulnerability? How can you make sure that your effort of investigating a certain threat gets public knowledge?&lt;/SPAN&gt;&lt;/P&gt;
&lt;BR /&gt;
&lt;H2&gt;&lt;A href="https://live.paloaltonetworks.com/t5/internal-knowledge-base/autonomous-digital-experience-management-use-cases/ta-p/529050/message-revision/529050%3A1" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Autonomous Digital Experience Management Use-Cases&lt;/STRONG&gt;&lt;/A&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Over ninety-five percent of end users report experiencing unanticipated application downtime, which causes businesses to lose valuable productivity. Find and fix problems with the user experience using autonomous digital experience management, all before those problems have an effect on your company.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Feb ‘23 Discussion Highlight: Posts With Accepted Solutions&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Nominated Discussions help LIVEcommunity Solutions Engineers highlight a discussion that has an &lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/welcome-guide/how-to-recognize-accepted-solutions/ta-p/439722" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Accepted Solution&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, and turn it into an article with additional helpful information, documentation, and clarity! Here are the Nominated Discussions we published this past month:&lt;/SPAN&gt;&lt;/P&gt;
&lt;BR /&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-how-to-change-forward-decrypt-trust/ta-p/529594" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Nominated Discussion: How to Change Forward Decrypt Trust Certificate&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-delete-all-address-objects/ta-p/530489" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Nominated Discussion: Delete All Address Objects&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-how-to-add-risk-based-apps-to-a-custom/ta-p/531059" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Nominated Discussion: How to Add Risk Based Apps to a Custom Group&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-qos-cleartext-match-issue/ta-p/532093" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Nominated Discussion: QoS Cleartext Match Issue&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-palo-alto-integration-with-azure-sentinel/ta-p/532000" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Nominated Discussion: Palo Alto integration with Azure Sentinel&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-url-filtering-in-tls-v1-3/ta-p/532455" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Nominated Discussion: URL Filtering in TLS v1.3&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;BR /&gt;
&lt;H2&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Content From Our Cyber Elite Experts:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;@&lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/153031" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Nikoolayy1&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; is a longtime Cyber Elite expert and wrote two posts for LIVEcommunity this&amp;nbsp; past month! Nikolay is a Senior Cybersecurity Consultant who is responsible for the implementation of NGFW as the primary leader in Palo Alto firewalls, WAF systems, and DDOS/Bot protection technologies. He is an expert in Palo Alto Networks’ security solutions and his insights are well-worth a read:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/automating-the-palo-alto-ngfw-s-process-deamon-restarts/ta-p/529328" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Automating the Palo Alto NGFW's Process/Deamon Restart&lt;/STRONG&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/advanced-wildfire-as-an-icap-alternative/ta-p/531881" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Advanced Wildfire as an ICAP Alternative&lt;/STRONG&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;P&gt;&lt;SPAN&gt;You're now fully briefed on LIVEcommunity's February 2023 highlights!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;If this was helpful, be sure to give this blog a thumbs up. See you next month!&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Tue, 28 Feb 2023 18:56:13 GMT</pubDate>
    <dc:creator>jforsythe</dc:creator>
    <dc:date>2023-02-28T18:56:13Z</dc:date>
    <item>
      <title>February 2023 Rewind: LIVEcommunity Highlights</title>
      <link>https://live.paloaltonetworks.com/t5/news/february-2023-rewind-livecommunity-highlights/ta-p/532515</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Welcome to our February 2023 Rewind, where we review some of LIVEcommunity’s biggest headlines from the past month!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="february-rewind-2023.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48242i27AB91A052B0F64B/image-size/large?v=v2&amp;amp;px=999" role="button" title="february-rewind-2023.jpg" alt="february-rewind-2023.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2023 18:56:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/news/february-2023-rewind-livecommunity-highlights/ta-p/532515</guid>
      <dc:creator>jforsythe</dc:creator>
      <dc:date>2023-02-28T18:56:13Z</dc:date>
    </item>
  </channel>
</rss>

