<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to verify that threat profiles are actually performing in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-verify-that-threat-profiles-are-actually-performing/m-p/208441#M295</link>
    <description>&lt;P&gt;Yes traffic is flowing.&amp;nbsp; Wish there was some other level of verification regarding the applied threat-profiles&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Mon, 02 Apr 2018 18:01:21 GMT</pubDate>
    <dc:creator>mikec-utas</dc:creator>
    <dc:date>2018-04-02T18:01:21Z</dc:date>
    <item>
      <title>How to verify that threat profiles are actually performing</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-verify-that-threat-profiles-are-actually-performing/m-p/208108#M293</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I currently have one rule, that pertains to one inside and one outside host.&amp;nbsp; I have a few profiles added to the rule such as a/v, spyware, vulnerability and file blocking.&amp;nbsp; I dont see any events in the Threat monitor nor my Syslog server so my assumption is all is well, no threats detected?&amp;nbsp; Is there any other way to confirm the firewall is performing the checks&amp;nbsp;in the profile?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 29 Mar 2018 18:34:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-verify-that-threat-profiles-are-actually-performing/m-p/208108#M293</guid>
      <dc:creator>mikec-utas</dc:creator>
      <dc:date>2018-03-29T18:34:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to verify that threat profiles are actually performing</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-verify-that-threat-profiles-are-actually-performing/m-p/208158#M294</link>
      <description>&lt;P&gt;As long as the traffic is communication across the rule that has your threat profiles applied then it should be filtering. I would search the destination and source address and verify that the traffic is not hitting any other&amp;nbsp;rules first.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Mar 2018 22:43:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-verify-that-threat-profiles-are-actually-performing/m-p/208158#M294</guid>
      <dc:creator>nescovedo</dc:creator>
      <dc:date>2018-03-29T22:43:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to verify that threat profiles are actually performing</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-verify-that-threat-profiles-are-actually-performing/m-p/208441#M295</link>
      <description>&lt;P&gt;Yes traffic is flowing.&amp;nbsp; Wish there was some other level of verification regarding the applied threat-profiles&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 02 Apr 2018 18:01:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-verify-that-threat-profiles-are-actually-performing/m-p/208441#M295</guid>
      <dc:creator>mikec-utas</dc:creator>
      <dc:date>2018-04-02T18:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: How to verify that threat profiles are actually performing</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-verify-that-threat-profiles-are-actually-performing/m-p/217248#M346</link>
      <description>&lt;P&gt;There are a few sites out there that will test it for you from the Internet IN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or go out and find an EICAR - eicar.org&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jun 2018 20:16:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-verify-that-threat-profiles-are-actually-performing/m-p/217248#M346</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2018-06-08T20:16:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to verify that threat profiles are actually performing</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-verify-that-threat-profiles-are-actually-performing/m-p/217950#M347</link>
      <description>&lt;P&gt;You may also refer to&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/documentation/81/wildfire/wf_api/get-wildfire-information-through-the-wildfire-api/get-a-malware-test-file-wildfire-api" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/81/wildfire/wf_api/get-wildfire-information-through-the-wildfire-api/get-a-malware-test-file-wildfire-api&lt;/A&gt; to pull some test files through your firewall to generate threat log entries&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jun 2018 16:38:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-verify-that-threat-profiles-are-actually-performing/m-p/217950#M347</guid>
      <dc:creator>jjosephs</dc:creator>
      <dc:date>2018-06-14T16:38:56Z</dc:date>
    </item>
  </channel>
</rss>

