<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo alto WAF risk assessment in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-waf-risk-assessment/m-p/589669#M3309</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/596147711"&gt;@gajji229&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;to only add what Jay mentioned it is crucial to enabled &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-concepts/ssl-inbound-inspection" target="_self"&gt;inbound ssl decryption&lt;/A&gt;&amp;nbsp;to allow Firewall have a full visibility into incoming traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
    <pubDate>Mon, 17 Jun 2024 01:06:01 GMT</pubDate>
    <dc:creator>PavelK</dc:creator>
    <dc:date>2024-06-17T01:06:01Z</dc:date>
    <item>
      <title>Palo alto WAF risk assessment</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-waf-risk-assessment/m-p/589542#M3303</link>
      <description>I got request to do PA WAF risk assessment for my environment, do you have any suggestions how should i do 
Any documents/steps/url that i can follow to do the same.</description>
      <pubDate>Thu, 13 Jun 2024 17:34:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-waf-risk-assessment/m-p/589542#M3303</guid>
      <dc:creator>gajji229</dc:creator>
      <dc:date>2024-06-13T17:34:07Z</dc:date>
    </item>
    <item>
      <title>Re: Palo alto WAF risk assessment</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-waf-risk-assessment/m-p/589624#M3305</link>
      <description>&lt;P&gt;Hi &lt;SPAN&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/596147711"&gt;@gajji229&lt;/a&gt;&lt;/SPAN&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope you're doing well!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have a public-facing web application that handles sensitive data, it's a good idea to include a dedicated Web Application Firewall (WAF) in your architecture alongside your Next-Generation Firewall (NGFW). You might want to check out &lt;A href="https://docs.prismacloud.io/en/classic/compute-admin-guide/waas/waas-intro" target="_blank" rel="noopener"&gt;Prisma Cloud's Web-Application and API Security (WAAS)&lt;/A&gt; offering—it could be a great fit for your organization's needs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When doing your assessment, consider the differences between &lt;A href="https://www.paloaltonetworks.com/cyberpedia/difference-between-wafs-and-ngfws" target="_self"&gt;NGFW and WAFs&lt;/A&gt;. It's important to determine whether it's acceptable for your organization to operate without a dedicated WAF. Keep in mind that assessing just the NGFW might not cover all the crucial areas a WAF is designed to protect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2024 16:16:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-waf-risk-assessment/m-p/589624#M3305</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2024-06-14T16:16:44Z</dc:date>
    </item>
    <item>
      <title>Re: Palo alto WAF risk assessment</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-waf-risk-assessment/m-p/589669#M3309</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/596147711"&gt;@gajji229&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;to only add what Jay mentioned it is crucial to enabled &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/decryption/decryption-concepts/ssl-inbound-inspection" target="_self"&gt;inbound ssl decryption&lt;/A&gt;&amp;nbsp;to allow Firewall have a full visibility into incoming traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 01:06:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-waf-risk-assessment/m-p/589669#M3309</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2024-06-17T01:06:01Z</dc:date>
    </item>
  </channel>
</rss>

