<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Advanced threat protection_Deep Learning in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/advanced-threat-protection-deep-learning/m-p/529356#M834</link>
    <description>&lt;P&gt;By default the Palo Alto firewall will alow traffic while waiting for verdict as to not cause performance issues that ICAP causes. You can use dynamic tags to quarantine source ip/user when the verdict is returned &lt;A href="https://www.youtube.com/watch?v=WgG6Hi0T73g" target="_blank"&gt;https://www.youtube.com/watch?v=WgG6Hi0T73g&lt;/A&gt; or also enable the inline ML learning on the firewall that can block the attack even without verdict from the cloud as extra security &lt;A href="https://docs.paloaltonetworks.com/wildfire/u-v/wildfire-whats-new/wildfire-features-in-panos-100/configure-wildfire-inline-ml" target="_blank"&gt;https://docs.paloaltonetworks.com/wildfire/u-v/wildfire-whats-new/wildfire-features-in-panos-100/configure-wildfire-inline-ml&lt;/A&gt; .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also you have reports on the firewall &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004N9oCAE&amp;amp;lang=en_US%E2%80%A9" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004N9oCAE&amp;amp;lang=en_US%E2%80%A9&lt;/A&gt; and a GUI portal &lt;A href="https://docs.paloaltonetworks.com/advanced-wildfire/administration/monitor-wildfire-activity/use-the-wildfire-portal-to-monitor-malware" target="_blank"&gt;https://docs.paloaltonetworks.com/advanced-wildfire/administration/monitor-wildfire-activity/use-the-wildfire-portal-to-monitor-malware&lt;/A&gt; where you can see what happened.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have forgoten this but if the connection to the cloud is impacted I think that the files will be allowed if not blocked by the other Antivirus, Spyware or Vunrability profiles.&lt;/P&gt;</description>
    <pubDate>Tue, 31 Jan 2023 20:20:22 GMT</pubDate>
    <dc:creator>nikoolayy1</dc:creator>
    <dc:date>2023-01-31T20:20:22Z</dc:date>
    <item>
      <title>Advanced threat protection_Deep Learning</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/advanced-threat-protection-deep-learning/m-p/528669#M818</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Hi,&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;PAN OS Version 10.2 support Advanced threat protection and its seems like , for any unknowns the metadata will be forwarded to cloud for deep learning mechanism (Correct me if i am wrong). My coroners are &lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;how can we check what details has been uploaded to cloud for deep learning?&lt;/LI&gt;
&lt;LI&gt;what action that firewall will take until the verdict is returned back to the firewall ( what if internet is down after uploading the data, it may take time to retrieve the verdict)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also regarding the wildfire inspection, if the verdict is unknown to the firewall, the data will be uploaded to cloud for further analysis, until the verdict is returned back to the firewall, how does the firewall will treat that particular flow ( block or hold or allow)?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 05:06:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/advanced-threat-protection-deep-learning/m-p/528669#M818</guid>
      <dc:creator>Marsooq_A</dc:creator>
      <dc:date>2023-01-26T05:06:03Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced threat protection_Deep Learning</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/advanced-threat-protection-deep-learning/m-p/529356#M834</link>
      <description>&lt;P&gt;By default the Palo Alto firewall will alow traffic while waiting for verdict as to not cause performance issues that ICAP causes. You can use dynamic tags to quarantine source ip/user when the verdict is returned &lt;A href="https://www.youtube.com/watch?v=WgG6Hi0T73g" target="_blank"&gt;https://www.youtube.com/watch?v=WgG6Hi0T73g&lt;/A&gt; or also enable the inline ML learning on the firewall that can block the attack even without verdict from the cloud as extra security &lt;A href="https://docs.paloaltonetworks.com/wildfire/u-v/wildfire-whats-new/wildfire-features-in-panos-100/configure-wildfire-inline-ml" target="_blank"&gt;https://docs.paloaltonetworks.com/wildfire/u-v/wildfire-whats-new/wildfire-features-in-panos-100/configure-wildfire-inline-ml&lt;/A&gt; .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also you have reports on the firewall &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004N9oCAE&amp;amp;lang=en_US%E2%80%A9" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004N9oCAE&amp;amp;lang=en_US%E2%80%A9&lt;/A&gt; and a GUI portal &lt;A href="https://docs.paloaltonetworks.com/advanced-wildfire/administration/monitor-wildfire-activity/use-the-wildfire-portal-to-monitor-malware" target="_blank"&gt;https://docs.paloaltonetworks.com/advanced-wildfire/administration/monitor-wildfire-activity/use-the-wildfire-portal-to-monitor-malware&lt;/A&gt; where you can see what happened.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have forgoten this but if the connection to the cloud is impacted I think that the files will be allowed if not blocked by the other Antivirus, Spyware or Vunrability profiles.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2023 20:20:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/advanced-threat-protection-deep-learning/m-p/529356#M834</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2023-01-31T20:20:22Z</dc:date>
    </item>
  </channel>
</rss>

