<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Greenfield Security Policies Generation (Video) in Expedition Articles</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/ta-p/215617</link>
    <description>&lt;P&gt;This is a full walk-through on how to use Expedition to run the new functionality to learn from the device logs and generate security policies based on consumption models.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Duration of this video is approximately 6 minutes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;div class="lia-vid-container video-embed-center"&gt;&lt;div id="lia-vid-JuZ2hmZjE6_aQxhk9YsEO2LYCj_Cuq-iw1400h875r877" class="lia-video-brightcove-player-container"&gt;&lt;video-js data-video-id="6064689516001" data-account="6058004142001" data-player="default" data-embed="default" class="vjs-fluid" controls="" data-application-id="" style="width: 100%; height: 100%;"&gt;&lt;/video-js&gt;&lt;/div&gt;&lt;script src="https://players.brightcove.net/6058004142001/default_default/index.min.js"&gt;&lt;/script&gt;&lt;script&gt;(function() {  var wrapper = document.getElementById('lia-vid-JuZ2hmZjE6_aQxhk9YsEO2LYCj_Cuq-iw1400h875r877');  var videoEl = wrapper ? wrapper.querySelector('video-js') : null;  if (videoEl) {     if (window.videojs) {       window.videojs(videoEl).ready(function() {         this.on('loadedmetadata', function() {           this.el().querySelectorAll('.vjs-load-progress div[data-start]').forEach(function(bar) {             bar.setAttribute('role', 'presentation');             bar.setAttribute('aria-hidden', 'true');           });         });       });     }  }})();&lt;/script&gt;&lt;a class="video-embed-link" href="https://live.paloaltonetworks.com/t5/video/gallerypage/video-id/JuZ2hmZjE6_aQxhk9YsEO2LYCj_Cuq-i"&gt;(view in My Videos)&lt;/a&gt;&lt;/div&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 08 Jul 2019 15:34:49 GMT</pubDate>
    <dc:creator>alestevez</dc:creator>
    <dc:date>2019-07-08T15:34:49Z</dc:date>
    <item>
      <title>Greenfield Security Policies Generation (Video)</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/ta-p/215617</link>
      <description>&lt;P&gt;Take a look to the new Greenfield security policy generation based on PanOS logs.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 15:34:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/ta-p/215617</guid>
      <dc:creator>alestevez</dc:creator>
      <dc:date>2019-07-08T15:34:49Z</dc:date>
    </item>
    <item>
      <title>Re: Greenfield Security Policies generation. Video 6min</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/216973#M22</link>
      <description>&lt;P&gt;Will this be spelled out in the hopefully forthcoming User Guide for Expedition?&amp;nbsp; Also, will this be something I can just pull out of the Palo device direct?&amp;nbsp; It seems unnecessary to have to go to a syslog server when the Palo device has them essentially in the device or in Panorama.&amp;nbsp; Maybe I missed that in the video.&amp;nbsp; You moved pretty quick which I appreciate.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jun 2018 12:27:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/216973#M22</guid>
      <dc:creator>ShawnSlater</dc:creator>
      <dc:date>2018-06-07T12:27:15Z</dc:date>
    </item>
    <item>
      <title>Re: Greenfield Security Policies generation. Video 6min</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/219937#M31</link>
      <description>&lt;P&gt;There's no link to the video anymore.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jun 2018 15:52:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/219937#M31</guid>
      <dc:creator>didel0815</dc:creator>
      <dc:date>2018-06-29T15:52:45Z</dc:date>
    </item>
    <item>
      <title>Re: Greenfield Security Policies generation. Video 6min</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/220533#M32</link>
      <description>&lt;P&gt;In further User Guides we will describe in deeper detail the process of Learning from Logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The video shows how to export the logs via SCP (not syslog server), preprocess the logs to convert them into an internal format (parquet) enhanced for paralell processing and machine learning, and crunching this parquet for identifying traffic behaviors and suggest security policies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Notice that I mentioned the parquet format. This is the reason we require exporting the logs into Expedition, as we need to convert the original log format into a parquet format that will enable us for the ML processes. So, we can't directly work with internal DB in a PANOS device. Additionally, we don't want to stress the PANOS devices with this intense data analytics process, but we can stress a VM hosting Expedition.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The video was originally intended for a presentation at Ignite, therefore it is condensed to show a rapid view of the process in only 6 minutes. And the video seems to be available now.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jul 2018 14:43:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/220533#M32</guid>
      <dc:creator>dgildelaig</dc:creator>
      <dc:date>2018-07-04T14:43:43Z</dc:date>
    </item>
    <item>
      <title>Re: Greenfield Security Policies generation. Video 6min</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/222148#M37</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm trying to test Greenfield ML in order to have a flow matrix of my Firewalls and have an idea about security policies, but the phase called "Spark: Process CSV files to Parquet" takes too long (more than 6 hours), is that normal ? or should i stop it and repeat again ?&lt;/P&gt;
&lt;P&gt;The status shown is "Pending", so i don't know if it's already started or not ! samething as in security policies, when i try to analyze data from specific security policy (CONTENT LEARNED FROM expedition ML), the status also shown is "pending" for too long without any reaction ! can you please help to resolve that issue ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks a lot,&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jul 2018 09:52:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/222148#M37</guid>
      <dc:creator>Abdeljalil-AGNAOU</dc:creator>
      <dc:date>2018-07-13T09:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: Greenfield Security Policies generation. Video 6min</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/222176#M38</link>
      <description>&lt;P&gt;If the status is "Pending" most probably the process did not start.&lt;/P&gt;
&lt;P&gt;I guess you do have a version of Expedition prior to 1.0.99.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would suggest to update Expedition via the apt-get commands and try again.&lt;/P&gt;
&lt;P&gt;I will provide you better information if something is not correctly set up.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jul 2018 09:57:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/222176#M38</guid>
      <dc:creator>dgildelaig</dc:creator>
      <dc:date>2018-07-13T09:57:42Z</dc:date>
    </item>
    <item>
      <title>Re: Greenfield Security Policies generation. Video 6min</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/244339#M115</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;
&lt;P&gt;I just prepired all my collected CSV-Files. and tryed to do an analysis, but I cant add an logcollector, because of not reachable PA.&lt;/P&gt;
&lt;P&gt;Is there a possibility do do the analysis offline?&lt;/P&gt;
&lt;P&gt;thanks in advance&lt;/P&gt;
&lt;P&gt;Gernot&lt;/P&gt;</description>
      <pubDate>Sat, 22 Dec 2018 21:05:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/244339#M115</guid>
      <dc:creator>ederg</dc:creator>
      <dc:date>2018-12-22T21:05:56Z</dc:date>
    </item>
    <item>
      <title>Re: Greenfield Security Policies generation. Video 6min</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/256043#M127</link>
      <description>&lt;P&gt;&lt;SPAN&gt;It seems there is no link to the video.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 08:23:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/256043#M127</guid>
      <dc:creator>Bomi</dc:creator>
      <dc:date>2019-04-04T08:23:32Z</dc:date>
    </item>
    <item>
      <title>Re: Greenfield Security Policies generation. Video 6min</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/256046#M128</link>
      <description>&lt;P&gt;The video is embedded in the post.&lt;/P&gt;
&lt;P&gt;Either check with another browser or wait a bit for the video to load.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 08:33:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/256046#M128</guid>
      <dc:creator>dgildelaig</dc:creator>
      <dc:date>2019-04-04T08:33:12Z</dc:date>
    </item>
    <item>
      <title>Re: Greenfield Security Policies generation. Video 6min</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/261503#M140</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;i need to know how we know which rules from transformed rules (in vsys2)&amp;nbsp; refered to which original wide open rules (in vsys1)?&lt;/P&gt;
&lt;P&gt;if the tool ML analysis three rules as example, how we determine which rules from the output rules refered to which one of the three orignal rules?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ahmed sabry.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2019 12:54:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/261503#M140</guid>
      <dc:creator>sabrawy</dc:creator>
      <dc:date>2019-05-17T12:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Greenfield Security Policies generation. Video 6min</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/261505#M141</link>
      <description>&lt;DIV&gt;The ML won’t provide this information.&lt;/DIV&gt;
&lt;DIV&gt;Due to the logic of the process, we aggregate the log info for all the selected rules and look for patterns from that dataset.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;If you want to determine it by rule, you would have to apply ML with only one rule at a time.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Fri, 17 May 2019 13:00:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/261505#M141</guid>
      <dc:creator>dgildelaig</dc:creator>
      <dc:date>2019-05-17T13:00:03Z</dc:date>
    </item>
    <item>
      <title>Re: Greenfield Security Policies generation. Video 6min</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/261507#M142</link>
      <description>&lt;P&gt;so what is the best approach if we need to tune a production firewall rules (200 rules as example) ?&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2019 13:16:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/261507#M142</guid>
      <dc:creator>sabrawy</dc:creator>
      <dc:date>2019-05-17T13:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: Greenfield Security Policies generation. Video 6min</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/261516#M143</link>
      <description>&lt;P&gt;Unless you are fine doing Rule Enrichment (RE), you would have to do Ml having only one rule selected at a time.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have a clear idea regarding the goal of ML and RE?&lt;/P&gt;
&lt;P&gt;because maybe you actually want to do RE and then you have no problems selecting the 200 and doing one single apps. The result of RE will tell you which rule got enriched.&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2019 14:08:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/greenfield-security-policies-generation-video/tac-p/261516#M143</guid>
      <dc:creator>dgildelaig</dc:creator>
      <dc:date>2019-05-17T14:08:40Z</dc:date>
    </item>
  </channel>
</rss>

