<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article October 2022 Rewind: Here's What You Missed on LIVEcommunity in News</title>
    <link>https://live.paloaltonetworks.com/t5/news/october-2022-rewind-here-s-what-you-missed-on-livecommunity/ta-p/518957</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="October 2022 LIVEcommunity Rewind" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/44909i4960D9B211D4C180/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2022-10-26 at 10.28.42 PM.png" alt="October 2022 LIVEcommunity Rewind" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;October 2022 LIVEcommunity Rewind&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Welcome to our October 2022 Rewind, where we review some of LIVEcommunity’s biggest headlines from the past month!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In October, we recap new episodes of PANCast, a Palo Alto Networks podcast; Cortex XSIAM, Palo Alto Networks’ new autonomous platform powering the modern SOC; new webinars and more! Read on to learn about LIVEcommunity’s October 2022 highlights.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/xsiam-has-arrived-to-revolutionize-the-soc/ba-p/517529" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;XSIAM Has Arrived to Revolutionize the SOC&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;A href="https://start.paloaltonetworks.com/the-modern-soc-reimagined#Register" target="_self"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jforsythe_2-1666886103206.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/44947i1C15E9A0C4AF8D41/image-size/large?v=v2&amp;amp;px=999" role="button" title="jforsythe_2-1666886103206.jpeg" alt="jforsythe_2-1666886103206.jpeg" /&gt;&lt;/span&gt;&lt;/A&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We believe that the only way a SOC platform can operate at today’s scale is to completely rebuild from the ground up. So we’ve done exactly that with XSIAM, the autonomous security operations platform designed to enable all customers to achieve the outcomes Palo Alto Networks does in our own SOC. How? It all comes down to data that drives analytics, automation and proactivity. Read more about it in the blog from Lee Klarich, Palo Alto Networks Chief Product Officer, “&lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/xsiam-has-arrived-to-revolutionize-the-soc/ba-p/517529" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;XSIAM Has Arrived to Revolutionize the SOC&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;.”&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5 class="lia-align-center"&gt;&lt;STRONG&gt;Register now for the&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://start.paloaltonetworks.com/the-modern-soc-reimagined#Register" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;The Modern SOC, Reimagined&lt;/STRONG&gt;&lt;/A&gt;, a virtual event happening November 2, 2022&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;New Episodes of PANCast, a Palo Alto Networks Podcast&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FC8Y3BSnUiK0%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DC8Y3BSnUiK0&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FC8Y3BSnUiK0%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="600" height="337" scrolling="no" title="PANCast Episode 2: How Does GlobalProtect Split Tunneling Work?" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Have you listened to &lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/pancast/tkb-p/palo-alto-networks-podcasts-PANCast" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;PANCast&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; yet? This new Palo Alto Networks podcast provides actionable insights from cybersecurity experts to customers; episodes will cover a range of Palo Alto Networks products, offering valuable tips and key information for a successful adoption journey. Check out the newest episodes from &lt;/SPAN&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/53844"&gt;@jarena&lt;/a&gt;:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF6600"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/pancast/pancast-episode-2-how-does-globalprotect-split-tunneling-work/ta-p/516866" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;PANCast Episode 2: How Does GlobalProtect Split Tunneling Work?&lt;/SPAN&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF6600"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/pancast/pancast-episode-3-url-filtering-allowing-and-blocking-the-right/ta-p/518607" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;PANCast Episode 3: URL Filtering — Allowing and Blocking the Right Traffic&lt;/SPAN&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/playbook-of-the-week-teaching-xsoar-a-few-new-tricks-with-slack/ba-p/518946" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Playbook of the Week: Teaching XSOAR a Few New Tricks with Slack Blocks&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In most cases, SlackAsk does not provide enough information suitable for analyst investigations, as it focuses mainly on binary “yes/no” questions. It has become fairly common for SOC engineers to use the &lt;/SPAN&gt;&lt;A href="https://xsoar.pan.dev/marketplace/details/Slack#new-slackblockbuilder" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;SlackV3&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; content pack purely as a notification utility, but you shouldn’t have to be a Slack power user to utilize all that Slack blocks are capable of providing.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The &lt;/SPAN&gt;&lt;A href="https://xsoar.pan.dev/marketplace/details/Slack#what-does-this-pack-do" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Slack V3 content pack&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; allows you to interact with the Slack API by collecting logs and sending messages and notifications to your Slack team. It integrates with Slack's services to investigate failed login events and execute, create, read, update, and delete operations for employee lifecycle processes.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;&lt;SPAN data-sheets-value="{&amp;quot;1&amp;quot;:2,&amp;quot;2&amp;quot;:&amp;quot;New AIOps Feature: On-Demand BPA&amp;quot;}" data-sheets-userformat="{&amp;quot;2&amp;quot;:31555,&amp;quot;3&amp;quot;:{&amp;quot;1&amp;quot;:0},&amp;quot;4&amp;quot;:{&amp;quot;1&amp;quot;:2,&amp;quot;2&amp;quot;:14277081},&amp;quot;9&amp;quot;:0,&amp;quot;11&amp;quot;:4,&amp;quot;12&amp;quot;:0,&amp;quot;14&amp;quot;:{&amp;quot;1&amp;quot;:2,&amp;quot;2&amp;quot;:10921496},&amp;quot;15&amp;quot;:&amp;quot;Montserrat&amp;quot;,&amp;quot;16&amp;quot;:12,&amp;quot;17&amp;quot;:1}" data-sheets-hyperlink="https://live.paloaltonetworks.com/t5/blogs/new-aiops-feature-on-demand-bpa/ba-p/518810"&gt;&lt;A class="in-cell-link" href="https://live.paloaltonetworks.com/t5/blogs/new-aiops-feature-on-demand-bpa/ba-p/518810" target="_blank" rel="noopener"&gt;&lt;FONT color="#FF6600"&gt;New AIOps Feature: On-Demand BPA&lt;/FONT&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You can now run a best practice assessment (BPA) directly in AIOps for NGFW by uploading a Tech Support File (TSF). Now, you can&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/aiops/aiops-for-ngfw/security-posture/on-demand-bpa-report/generating-on-demand-bpa-report" target="_blank" rel="noopener nofollow noreferrer"&gt;generate an on-demand BPA report&lt;/A&gt;&amp;nbsp;for devices that are not sending telemetry data or are not onboarded to AIOps (e.g. PAN-OS 9.1 devices), as well as devices that are onboarded to&amp;nbsp;&lt;A id="hoverCardLink" class="lia-link-navigation lia-product-hover-card-link lia-product-mention lia-tooltip-trigger" href="https://live.paloaltonetworks.com/t5/c-twzvq79624/AIOps+for+NGFW/pd-p/AIOps-for-NGFW" target="_blank" rel="noopener"&gt;AIOps for NGFW&lt;/A&gt;&amp;nbsp;with telemetry enabled.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Cortex XDR How-to Videos&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2Fh9ZdoIizfuE%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dh9ZdoIizfuE&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fh9ZdoIizfuE%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="600" height="337" scrolling="no" title="Cortex XDR How-To Video: Endpoint Administration Cleanup" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;
&lt;P&gt;Learn about a common use case for Endpoint Administration Cleanup,&amp;nbsp;how Cortex XDR can ingest Windows DHCP logs to discover additional network devices; and how to use object data from Active Directory to create endpoint groups which can be used for policy targeting in the latest Cortex XDR how-to videos!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/cortex-xdr-how-to-videos/cortex-xdr-how-to-video-endpoint-group/ta-p/513765" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Cortex XDR How-To Video: Endpoint Group&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/cortex-xdr-how-to-videos/cortex-xdr-how-to-video-configure-cloud-identity-agent/ta-p/513622" target="_self"&gt;Cortex XDR How-To Video: Configure Cloud Identity Agent&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/cortex-xdr-how-to-videos/cortex-xdr-how-to-video-windows-dhcp-log-ingestion/ta-p/514078" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Cortex XDR How-To Video: Windows DHCP Log Ingestion&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/blogworkflowpage/blog-id/CommunityBlog/article-id/2533?prePageCrumb=BlogDashboardPage" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;What's New: IoT Security, October '22 Update&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In the October what’s in IoT Security update, we learned about a new third-party integration with BlueCat IPAM — which expands visibility into the structure and organization of the IP address—improvements to appearance and behavior, and a new &lt;/SPAN&gt;&lt;A href="https://rhisac.org/press-release/intelligence-trends-summary-2022/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;report from RHISAC&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; on the latest cyber threats from the retail, hospitality, and travel sectors.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Two New Posts Written By Cyber Elite Expert @&lt;/STRONG&gt;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/153031" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Nikoolayy1&lt;/STRONG&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cyber Elite Expert @&lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/153031" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Nikoolayy1&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; wrote two super-helpful posts for LIVEcommunity this month! Check ‘em out:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/ocr-for-enterprise-dlp-and-saas-security-api/ba-p/515593" target="_blank" rel="noopener"&gt;OCR for Enterprise DLP and SaaS Security API&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Optical Character Recognition or Optical Character reader (OCR), which is the electronic or mechanical conversion of images of typed, handwritten or printed text into machine-encoded text. This new feature is configured in Enterprise DLP cloud portal and functions for Prisma Access or on-prem firewalls with the Panorama Plug-in.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF6600"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/xdr-isolation-exceptions-and-exclusions-use-case/ta-p/515583" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;&lt;STRONG&gt;XDR Isolation Exceptions and Exclusions Use Case&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When you isolate an endpoint, you halt all endpoint network access — except for traffic to &lt;/SPAN&gt;&lt;SPAN&gt;#Cortex XDR&lt;/SPAN&gt;&lt;SPAN&gt;. This can prevent a compromised endpoint from communicating with other endpoints, which reduces an attacker’s mobility. But traffic to &lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/c-twzvq79624/Cortex+XDR/pd-p/Cortex_XDR" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Cortex XDR&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; can be halted while still ensuring communication to Cortex XDR is always allowed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/tips-amp-tricks-how-to-get-updates-from-the-internet-without/ba-p/517581" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Tips &amp;amp; Tricks: How to Get Updates From the Internet Without Internet Access&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jforsythe_3-1666886165136.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/44948iA8D7D99B6F20C05C/image-size/large?v=v2&amp;amp;px=999" role="button" title="jforsythe_3-1666886165136.png" alt="jforsythe_3-1666886165136.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Did you know that you can avoid messy work-arounds for not having internet access with Service Routes. This cool feature makes certain services use a dataplane interface (instead of the management interface). Special shoutout to Cyber Elite &lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;@reaper&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; for his contribution to this blog!&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;&lt;A id="link_5" class="page-link lia-link-navigation lia-custom-event" href="https://live.paloaltonetworks.com/t5/blogs/october-2022-livecommunity-member-spotlight-layer-8/ba-p/519321" target="_blank" rel="noopener"&gt;&lt;FONT color="#FF6600"&gt;October 2022 LIVEcommunity Member Spotlight: @LAYER_8&lt;/FONT&gt;&lt;/A&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the October 2022 Member Spotlight, we’d like to applaud one of our community members,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/160615" target="_blank" rel="noopener"&gt;@LAYER_8&lt;/A&gt;&lt;/STRONG&gt;, for their participation and engagement in the LIVEcommunity!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Since joining the community in July 2014, they have written&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;293 posts&lt;/STRONG&gt;&lt;SPAN&gt;, received&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;79 likes&lt;/STRONG&gt;&lt;SPAN&gt;, and authored&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;32 solutions&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;(and counting). Thank you for your contribution and participation in the community&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/160615" target="_blank" rel="noopener"&gt;@LAYER_8&lt;/A&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/vm-series-virtual-firewalls-integrate-with-azure-gateway-load/ba-p/518169" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;VM-Series Virtual Firewalls Integrate with Azure Gateway Load Balancer&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Palo Alto Networks is pleased to announce the General Availability of integration of &lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/prisma/vm-series" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;VM-Series virtual firewalls&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; with &lt;/SPAN&gt;&lt;A href="http://aka.ms/gatewaylb" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Microsoft Azure Gateway Load Balancer&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;. This integration has been designed to efficiently augment native Microsoft Azure network security capabilities with next-generation threat protection — so customers can more easily attain greater performance and scalability.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/tips-amp-tricks-block-high-risk-apps-with-application-filters/ba-p/517730" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Tips &amp;amp; Tricks: Block High-Risk Apps with Application Filters&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Often overlooked, Application Filter objects can be a useful tool for administrators to streamline the security policy rulebase. An Application Filter is a dynamic object that can be created based on administrator-defined application attributes, including category, subcategory, risk factor, tags, and characteristics. Read more in this blog by &lt;/SPAN&gt;&lt;SPAN&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/220841"&gt;@JayGolf&lt;/a&gt;&lt;/SPAN&gt;&lt;SPAN&gt; — again with help from Cyber Elite expert &lt;/SPAN&gt;&lt;SPAN&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&lt;/SPAN&gt;&lt;SPAN&gt;! &lt;span class="lia-unicode-emoji" title=":party_popper:"&gt;🎉&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/drift-detection/ba-p/516812" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Prisma Cloud Code Security and Drift Detection&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Drift Detection is a feature that is included with Prisma Cloud Code Security that helps detect unwanted changes to your project’s source code. A few lines of code can turn your project upside down by creating easy entry points for hackers to use in order to leak data or turn your repository into malware.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you already have a Prisma Cloud Code Security subscription, you can learn how to set up &lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-code-security/scan-monitor/drift-detection" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Drift Detection for your repositories&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; now. Otherwise, read this blog on &lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/drift-detection/ba-p/516812" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Prisma Cloud and Drift Detection&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; to learn about how Drift Detection can help you maintain your security posture.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/url-categories-match-different-categories/ba-p/516971" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;URL Filtering: Assigning Multiple Categories to URLs&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Did you know that Palo Alto Networks URL filtering can assign &lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/url-filtering/how-to-use-url-categories" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;multiple categories to URLs&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; that classify a website’s content, purpose, and safety? Every URL can have up to four categories, including a security-focused URL category (or "risk category" for short) that indicates how likely it is that the site will expose you to threats.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;These &lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/url-filtering/url-categories/url-risk-categories" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;risk categories&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; enable you to implement simple security and decryption policies based on website safety, without requiring you to research and individually assess the sites that are likely to expose you to web-based threats.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;This Month’s Nominated Discussions With Accepted Solutions&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Nominated Discussions help LIVEcommunity Solutions Engineers highlight a discussion post that has an &lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/welcome-guide/how-to-recognize-accepted-solutions/ta-p/439722" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Accepted Solution&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, and turn it into an article with additional helpful information, documentation, and clarity. Here are the Nominated Discussions we published this past month:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-multiple-isps-with-path-monitoring/ta-p/516776" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Multiple ISPs with Path Monitoring&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-url-filtering-profile-set-to-allow/ta-p/516907" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;URL Filtering Profile Set to Allow Ransomware&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-global-protect-authentication-happened-two/ta-p/518325" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Global Protect Authentication Happened Two Time While Using RADIUS&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You're now fully briefed on LIVEcommunity's October 2022 highlights!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;If this was helpful, be sure to give this blog a thumbs up. See you next month!&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Mon, 31 Oct 2022 15:20:45 GMT</pubDate>
    <dc:creator>jforsythe</dc:creator>
    <dc:date>2022-10-31T15:20:45Z</dc:date>
    <item>
      <title>October 2022 Rewind: Here's What You Missed on LIVEcommunity</title>
      <link>https://live.paloaltonetworks.com/t5/news/october-2022-rewind-here-s-what-you-missed-on-livecommunity/ta-p/518957</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Welcome to our October 2022 Rewind, where we review some of LIVEcommunity’s biggest headlines from the past month!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Oct 2022 15:20:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/news/october-2022-rewind-here-s-what-you-missed-on-livecommunity/ta-p/518957</guid>
      <dc:creator>jforsythe</dc:creator>
      <dc:date>2022-10-31T15:20:45Z</dc:date>
    </item>
  </channel>
</rss>

