<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: security profile malfunction detection in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/security-profile-malfunction-detection/m-p/588154#M2229</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/332460"&gt;@JasonRakersKSS&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for posting.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Given the criteria it is hard to advice a single solution to meet the requirement. To be honest, I would start with AIOps and BPA:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000TopKCAS" target="_self"&gt;Palo Alto Best Practice Assessment (BPA) for Security Profiles&lt;/A&gt;. The information in the link are addressing scenarios where security posture is not aligning with recommendations / best pracrtises.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 28 May 2024 23:20:47 GMT</pubDate>
    <dc:creator>PavelK</dc:creator>
    <dc:date>2024-05-28T23:20:47Z</dc:date>
    <item>
      <title>security profile malfunction detection</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/security-profile-malfunction-detection/m-p/587159#M2218</link>
      <description>&lt;P&gt;Does anyone have any good log events to key on for notifying when a security profile (antivirus, anti-spyware, vulnerability protection, url, file blocking, wildfire) may not be functioning properly?&amp;nbsp; I am thinking maybe trying to identify the log event for when dynamic updates have failed to install, and trying to alert when configuration changes to specific security profiles occur might be useful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any others? Does anyone know of any of log types/events which could imply that a security profile functionality may be impacted?&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2024 19:30:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/security-profile-malfunction-detection/m-p/587159#M2218</guid>
      <dc:creator>JasonRakersKSS</dc:creator>
      <dc:date>2024-05-17T19:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: security profile malfunction detection</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/security-profile-malfunction-detection/m-p/588154#M2229</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/332460"&gt;@JasonRakersKSS&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for posting.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Given the criteria it is hard to advice a single solution to meet the requirement. To be honest, I would start with AIOps and BPA:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000TopKCAS" target="_self"&gt;Palo Alto Best Practice Assessment (BPA) for Security Profiles&lt;/A&gt;. The information in the link are addressing scenarios where security posture is not aligning with recommendations / best pracrtises.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 23:20:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/security-profile-malfunction-detection/m-p/588154#M2229</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2024-05-28T23:20:47Z</dc:date>
    </item>
  </channel>
</rss>

