<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Not all SSL traffic is being decrypted in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/not-all-ssl-traffic-is-being-decrypted/m-p/190655#M117</link>
    <description>&lt;P&gt;One other way to import that certicate into your machine if using Windows is through MMC cosole Certificates.&amp;nbsp; Or right click the certifacte and choose install. You can't decrypt all SSL just most of it. Normal behovior to see some decrypted some not decrypted. As for Alerts you could go to Deviced logs then the System tab and create a log with a serverity level and forward to an email. As for blocking the decryption profile only blocks unsupported ciphers, unsupported cipher suites, expired certificates ,unknown certificates, certificate timeouts and if the firewall has exhausted it resources and is low on memory cpu . So the decryption profile wouldn't block everything . Someone please correct me if I'm wrong.&lt;/P&gt;</description>
    <pubDate>Thu, 07 Dec 2017 17:12:10 GMT</pubDate>
    <dc:creator>AndyYerger</dc:creator>
    <dc:date>2017-12-07T17:12:10Z</dc:date>
    <item>
      <title>Not all SSL traffic is being decrypted</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/not-all-ssl-traffic-is-being-decrypted/m-p/187781#M110</link>
      <description>&lt;P&gt;I configured the firewall to decrypt outbound SSL traffic and installed a local cert I created onto my broswer. When I monitor my port 443 traffic I see some of&amp;nbsp; it is decrypted and some of it isnt. Is this normal behavior? I thought it was suppose to decrypt all SSL traffic?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, I was trying to create a policy that would send an alert any time malicious activity is found inside the traffic. the decryption profile only allows you to block everything. How would this alert be possible? Im new at making these rules.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Nov 2017 05:50:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/not-all-ssl-traffic-is-being-decrypted/m-p/187781#M110</guid>
      <dc:creator>wrainwater</dc:creator>
      <dc:date>2017-11-18T05:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: Not all SSL traffic is being decrypted</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/not-all-ssl-traffic-is-being-decrypted/m-p/190655#M117</link>
      <description>&lt;P&gt;One other way to import that certicate into your machine if using Windows is through MMC cosole Certificates.&amp;nbsp; Or right click the certifacte and choose install. You can't decrypt all SSL just most of it. Normal behovior to see some decrypted some not decrypted. As for Alerts you could go to Deviced logs then the System tab and create a log with a serverity level and forward to an email. As for blocking the decryption profile only blocks unsupported ciphers, unsupported cipher suites, expired certificates ,unknown certificates, certificate timeouts and if the firewall has exhausted it resources and is low on memory cpu . So the decryption profile wouldn't block everything . Someone please correct me if I'm wrong.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2017 17:12:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/not-all-ssl-traffic-is-being-decrypted/m-p/190655#M117</guid>
      <dc:creator>AndyYerger</dc:creator>
      <dc:date>2017-12-07T17:12:10Z</dc:date>
    </item>
  </channel>
</rss>

