<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Tips and Tricks: Filtering the Security Policy in General Articles</title>
    <link>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/ta-p/573184</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;DIV class="flex flex-grow flex-col max-w-full"&gt;
&lt;DIV class="min-h-[20px] text-message flex flex-col items-start gap-3 whitespace-pre-wrap break-words [.text-message+&amp;amp;]:mt-5 overflow-x-auto" data-message-author-role="assistant" data-message-id="2f8ca960-21bd-4f44-8bc1-cbb55ba82ed1"&gt;
&lt;DIV class="markdown prose w-full break-words dark:prose-invert light"&gt;
&lt;P&gt;Digging into the depths of policy details can be quite the task, especially after a long and tiring day. But fear not, handy search tools are here to lighten your load!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's how it works: Simply pop in a keyword related to what you're hunting for. This could be the name of a policy (just squish it into one word), an IP address or object name, maybe an application, or even a service.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Keep in mind though,&amp;nbsp;wildcards (like *) aren't supported. You'll need a partial or an exact match.&lt;/P&gt;
&lt;P&gt;Add a partial IP address and you'll get all the partial and exact matches in the result:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Fig 1_Filtering-the-Security-Policy_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56550iB13BEB62B7692626/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 1_Filtering-the-Security-Policy_palo-alto-networks.png" alt="Fig 1_Filtering-the-Security-Policy_palo-alto-networks.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Want to narrow things down even further? You can target your search to specific fields like the source zone or application. And guess what? There’s a super handy drop-down function that sets up your search filter in a snap. Easy-peasy!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="add to filter.gif" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56545i4C5DAF5DE6E5C8AF/image-size/large?v=v2&amp;amp;px=999" role="button" title="add to filter.gif" alt="add to filter.gif" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;You can also create a search string manually. I've provided a list of all fields below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Name&lt;/STRONG&gt;:&amp;nbsp;(name contains 'unlocate-block')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Tags&lt;/STRONG&gt;: (tag/member eq 'tagname')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Type&lt;/STRONG&gt;: (rule-type eq 'intrazone|interzone')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Source Zone&lt;/STRONG&gt;: (from/member eq 'zonename')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Source Address&lt;/STRONG&gt;: (source/member eq 'any|ip|object')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Source User&lt;/STRONG&gt;: (source-user/member eq 'any|username|groupname')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Hip profile&lt;/STRONG&gt;: &amp;nbsp;(hip-profiles/member eq 'any|profilename')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Destination Zone&lt;/STRONG&gt;: (to/member eq 'zonename')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Destination Address&lt;/STRONG&gt;: (destination/member eq 'any|ip|object')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Destination User&lt;/STRONG&gt;: (destination-user/member eq 'any|username|groupname')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Application&lt;/STRONG&gt;: (application/member eq 'any|applicationname|applicationgroup|applicationfilter')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Service&lt;/STRONG&gt;: (service/member eq 'any|servicename|application-default')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;URL Category&lt;/STRONG&gt;: (category/member eq 'any|categoryname')&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This is a destination category, not a URL filtering security profile&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Action&lt;/STRONG&gt;: (action eq 'allow|drop|deny|reset-client|reset-server|reset-both')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Action send ICMP unreachable&lt;/STRONG&gt;: (icmp-unreachable eq 'yes')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Security Profiles&lt;/STRONG&gt;:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (profile-setting/profiles/virus/member eq 'profilename')&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (profile-setting/profiles/spyware/member eq 'profilename')&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; (profile-setting/profiles/vulnerability/member eq 'profilename')&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (profile-setting/profiles/url-filtering/member eq 'profilename')&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (profile-setting/profiles/file-blocking/member eq 'profilename')&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (profile-setting/profiles/wildfire-analysis/member eq 'profilegroupname')&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (profile-setting/group/member eq 'profilename')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Disable server response inspection&lt;/STRONG&gt;: (option/disable-server-response-inspection eq 'yes')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Log at session start&lt;/STRONG&gt;: (log-start eq 'yes|no')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Log at session end&lt;/STRONG&gt;: (log-end eq 'yes|no')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Schedule&lt;/STRONG&gt;: (schedule eq 'schedulename')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Log Forwarding&lt;/STRONG&gt;: &amp;nbsp;(log-setting eq "forwardingprofilename')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Qos Marking&lt;/STRONG&gt;:&amp;nbsp; &amp;nbsp; (qos/marking/ip-dscp eq 'codepoint')&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; (qos/marking/ip-precedence eq 'codepoint')&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; (qos/marking/follow-c2s-flow eq '')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;:&amp;nbsp;(description contains '&amp;lt;keyword&amp;gt;')&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Disabled policy&lt;/STRONG&gt;: (disabled eq yes|no)&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policies will only respond to 'no' if they have been disabled before&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As you can see in the examples above the operands are 'contains' and 'eq' (=equals).&lt;/P&gt;
&lt;P&gt;Note that you can also use the negate option using the operand 'neq' (=not equals).&lt;/P&gt;
&lt;P&gt;For example, here's how you can use the negate option to list all the rules that do NOT have a ALLOW action: (action neq 'allow'):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Fig 3_Filtering-the-Security-Policy_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56551i2637A92E90959D91/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 3_Filtering-the-Security-Policy_palo-alto-networks.png" alt="Fig 3_Filtering-the-Security-Policy_palo-alto-networks.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tag Browser can also come in very handy if you're able to tag all your security policies. It can be used in a similar way as the search function and display only the selected tags.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More information and a tutorial video on the Tag Browser can be found here: &lt;A title="Tag Browser | Knowledge Base | Palo Alto Networks" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTyCAK" target="_blank" rel="noopener nofollow noreferrer"&gt;&lt;STRONG&gt;Tutorial: Tag Browser&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this was helpful, feel free to ask questions or post remarks below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for taking time to read this blog.&lt;/P&gt;
&lt;P&gt;Don't forget to hit that&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Like (thumbs up)&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;button and don't forget to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;subscribe&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A title="LIVEcommunity Blog | Palo Alto Networks" href="https://live.paloaltonetworks.com/t5/Blogs/bg-p/CommunityBlog" target="_self"&gt;&lt;STRONG&gt;LIVEcommunity Blog&lt;/STRONG&gt;&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Stay Secure,&lt;BR /&gt;Kiwi out!&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Tue, 16 Jan 2024 20:30:07 GMT</pubDate>
    <dc:creator>kiwi</dc:creator>
    <dc:date>2024-01-16T20:30:07Z</dc:date>
    <item>
      <title>Tips and Tricks: Filtering the Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/ta-p/573184</link>
      <description>&lt;P&gt;Digging into the depths of policy details can be quite the task, especially after a long and tiring day. But fear not, handy search tools are here to lighten your load!&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jan 2024 20:30:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/ta-p/573184</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2024-01-16T20:30:07Z</dc:date>
    </item>
    <item>
      <title>Re: Tips and Tricks: Filtering the Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/573478#M698</link>
      <description>&lt;P&gt;Is there any way to sort and/or filter on the Created and Modified columns?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 15:04:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/573478#M698</guid>
      <dc:creator>BYates</dc:creator>
      <dc:date>2024-01-18T15:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: Tips and Tricks: Filtering the Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/588010#M715</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/291421"&gt;@BYates&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can filter on the columns. Click the arrow next to the column name. From there select "Columns" and you can check/uncheck all the columns you would like to see.&lt;/P&gt;
&lt;P&gt;You can also drag/drop the columns to change the order you would like to see.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kiwi_0-1716816319465.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60053iDE97415F63283412/image-size/medium?v=v2&amp;amp;px=400" role="button" title="kiwi_0-1716816319465.png" alt="kiwi_0-1716816319465.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As far as I know there is no filter option in the search bar at the top to filter out certain columns that way.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Still not what you need ? In that case custom reports also allow you define specific colums in the report.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Mon, 27 May 2024 13:28:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/588010#M715</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2024-05-27T13:28:21Z</dc:date>
    </item>
    <item>
      <title>Re: Tips and Tricks: Filtering the Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/589915#M718</link>
      <description>&lt;P&gt;Any way to filter for udp protocol?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2024 16:40:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/589915#M718</guid>
      <dc:creator>AWAW</dc:creator>
      <dc:date>2024-06-19T16:40:21Z</dc:date>
    </item>
    <item>
      <title>Re: Tips and Tricks: Filtering the Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/589992#M719</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/142815"&gt;@AWAW&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes you can use the filter &lt;STRONG&gt;(proto eq udp)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2024 12:03:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/589992#M719</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2024-06-20T12:03:58Z</dc:date>
    </item>
    <item>
      <title>Re: Tips and Tricks: Filtering the Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/591050#M726</link>
      <description>&lt;P&gt;If you want to filter for Rule ID which is called UUID the filter is:&lt;/P&gt;&lt;P&gt;(uuid eq xyz)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 12:08:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/591050#M726</guid>
      <dc:creator>AlexHalbarth</dc:creator>
      <dc:date>2024-07-03T12:08:56Z</dc:date>
    </item>
    <item>
      <title>Re: Tips and Tricks: Filtering the Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/592070#M731</link>
      <description>&lt;P&gt;how about searching by modified date?&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 19:35:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/592070#M731</guid>
      <dc:creator>J_Healy</dc:creator>
      <dc:date>2024-07-15T19:35:17Z</dc:date>
    </item>
    <item>
      <title>Re: Tips and Tricks: Filtering the Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/592100#M732</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1423359225"&gt;@J_Healy&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can't seem to add a filter based on modified date on the policies tab.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, knowing the modified date should allow you to do a Config Audit (Device tab &amp;gt; Config Audit) for that date/config version and verify all the changes in the config (including the rules).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If that doesn't provide you the requested information then a feature request might be in order.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 06:10:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/592100#M732</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2024-07-16T06:10:57Z</dc:date>
    </item>
    <item>
      <title>Re: Tips and Tricks: Filtering the Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/592337#M734</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 20:39:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/592337#M734</guid>
      <dc:creator>J_Healy</dc:creator>
      <dc:date>2024-07-17T20:39:16Z</dc:date>
    </item>
    <item>
      <title>Re: Tips and Tricks: Filtering the Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/592576#M735</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How would one filter the security policy view in Panorama by targeted device?&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 18:28:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/592576#M735</guid>
      <dc:creator>JR-Astound</dc:creator>
      <dc:date>2024-07-19T18:28:44Z</dc:date>
    </item>
    <item>
      <title>Re: Tips and Tricks: Filtering the Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/597542#M748</link>
      <description>&lt;P&gt;Hello Team,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Can I create filter to see only rules in specific Device Group. I have device group which have 3 parent Device Groups and there are 500 rules coming from them. This is pre-rules, so every time I have to scroll down to the local rules for the Device Group. Can I filter only for local rules in this Device Group without seeing all the rules coming from parents?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Kind Regards&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 12:42:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/tips-and-tricks-filtering-the-security-policy/tac-p/597542#M748</guid>
      <dc:creator>ildragoev</dc:creator>
      <dc:date>2024-09-11T12:42:29Z</dc:date>
    </item>
  </channel>
</rss>

