<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Prisma Security Policy Configuration in Panorama Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/panorama-discussions/prisma-security-policy-configuration/m-p/561408#M1916</link>
    <description>&lt;P&gt;Forgive me as this question will probably seem a bit daft. We are using Prisma Access (Panorama Managed) , we have two mapped zones - one for trust and one to untrust. We have service connections that allow our users to access internal resources.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a question about Sec Pol configuration for our mobile users device group.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For our on-prem NGFWs we use best practice policies described here.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/best-practices/internet-gateway-best-practices/best-practice-internet-gateway-security-policy/define-the-initial-internet-gateway-security-policy/step-1-create-rules-based-on-trusted-threat-intelligence-sources" target="_blank"&gt;https://docs.paloaltonetworks.com/best-practices/internet-gateway-best-practices/best-practice-internet-gateway-security-policy/define-the-initial-internet-gateway-security-policy/step-1-create-rules-based-on-trusted-threat-intelligence-sources&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this also appropriate for prisma mobile users, (we do not split tunnel internet traffic) Please see screen shot above for proposed configuration. I guess my question more specifically is do we need the rules that block these dynamic lists as source , or is destination enough?&amp;nbsp; I guess my hesitation is because it don't really understand with prisma how traffic originating from untrust is treated , does the predefined network even allow any traffic originating from untrust ?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 12 Oct 2023 10:07:24 GMT</pubDate>
    <dc:creator>jbusby</dc:creator>
    <dc:date>2023-10-12T10:07:24Z</dc:date>
    <item>
      <title>Prisma Security Policy Configuration</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/prisma-security-policy-configuration/m-p/561408#M1916</link>
      <description>&lt;P&gt;Forgive me as this question will probably seem a bit daft. We are using Prisma Access (Panorama Managed) , we have two mapped zones - one for trust and one to untrust. We have service connections that allow our users to access internal resources.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a question about Sec Pol configuration for our mobile users device group.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For our on-prem NGFWs we use best practice policies described here.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/best-practices/internet-gateway-best-practices/best-practice-internet-gateway-security-policy/define-the-initial-internet-gateway-security-policy/step-1-create-rules-based-on-trusted-threat-intelligence-sources" target="_blank"&gt;https://docs.paloaltonetworks.com/best-practices/internet-gateway-best-practices/best-practice-internet-gateway-security-policy/define-the-initial-internet-gateway-security-policy/step-1-create-rules-based-on-trusted-threat-intelligence-sources&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this also appropriate for prisma mobile users, (we do not split tunnel internet traffic) Please see screen shot above for proposed configuration. I guess my question more specifically is do we need the rules that block these dynamic lists as source , or is destination enough?&amp;nbsp; I guess my hesitation is because it don't really understand with prisma how traffic originating from untrust is treated , does the predefined network even allow any traffic originating from untrust ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2023 10:07:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/prisma-security-policy-configuration/m-p/561408#M1916</guid>
      <dc:creator>jbusby</dc:creator>
      <dc:date>2023-10-12T10:07:24Z</dc:date>
    </item>
  </channel>
</rss>

