<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Query -&amp;gt; Data Center Best Practice Antivirus Profile in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/query-gt-data-center-best-practice-antivirus-profile/m-p/227703#M375</link>
    <description>&lt;P&gt;Thanks Mivaldi.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1)&amp;nbsp;&lt;SPAN&gt;AV enforcement is per-protocol -&amp;gt; I assume this is only for the following 6 protocols, right? From the admin guide: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"The Antivirus profile has decoders that detect and prevent viruses and malware from being transferred over six protocols: HTTP, SMTP, IMAP, POP3, FTP, and SMB"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2) If the above is correct, what is the below parragraph referring to, if there are only 6 decoders for AV? Why does the admin guide state that AV should be enabled "&lt;U&gt;to all security policy rules that allow traffic&lt;/U&gt;", if there are only decoders for HTTP, SMTP, IMAP, POP3, FTP, and SMB?:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"The reason to attach the best practice Antivirus profile to all security policy rules that allow traffic is to block known malicious files (malware, ransomware bots, and viruses) as they attempt to enter the network."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3) What would be the use case of enabling AV in a security policy for an app that is not&amp;nbsp;HTTP, SMTP, IMAP, POP3, FTP, and SMB, if AV does not have a decoder for it?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 21 Aug 2018 08:41:43 GMT</pubDate>
    <dc:creator>ash83</dc:creator>
    <dc:date>2018-08-21T08:41:43Z</dc:date>
    <item>
      <title>Query -&gt; Data Center Best Practice Antivirus Profile</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/query-gt-data-center-best-practice-antivirus-profile/m-p/227606#M373</link>
      <description>&lt;P&gt;Hi Community.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The below article states that "&lt;SPAN&gt;The Antivirus profile has decoders that detect and prevent viruses and malware from being transferred over six protocols: HTTP, SMTP, IMAP, POP3, FTP, and SMB&lt;/SPAN&gt;":&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/81/best-practices/best-practices-data-center/data-center-best-practice-security-policy/how-to-create-data-center-best-practice-security-profiles/create-the-data-center-best-practice-antivirus-profile" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/81/best-practices/best-practices-data-center/data-center-best-practice-security-policy/how-to-create-data-center-best-practice-security-profiles/create-the-data-center-best-practice-antivirus-profile&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A bit further down in the same article, the following can be read: "&lt;SPAN&gt;The reason to attach the best practice Antivirus profile to all security policy rules that allow traffic is to block known malicious files (malware, ransomware bots, and viruses) as they attempt to enter the network.&amp;nbsp;&lt;/SPAN&gt;"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why would AV be enabled for ALL security policies that allow traffic, if it only has decoders for 6 protocols?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For instance, why would AV be enabled for a security policy using app=FTP, if AV does not have a decoder for this app=FTP?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Aug 2018 13:49:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/query-gt-data-center-best-practice-antivirus-profile/m-p/227606#M373</guid>
      <dc:creator>ash83</dc:creator>
      <dc:date>2018-08-20T13:49:38Z</dc:date>
    </item>
    <item>
      <title>Re: Query -&gt; Data Center Best Practice Antivirus Profile</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/query-gt-data-center-best-practice-antivirus-profile/m-p/227638#M374</link>
      <description>&lt;P&gt;AV enforcement is per-protocol, and WF signatures are also configured separately per-protocol in the Antivirus profile.&lt;/P&gt;
&lt;P&gt;AV will process for Security Policies configured to use it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Answering your question: "Why would AV be enabled for a security policy using app=FTP, if AV does not have a decoder for this app=FTP?" ... AV would not be enabled for FTP traffic matching the security policy if the associated AV profile is not set to enfoce AV signatures for the ftp protocol.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Aug 2018 18:28:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/query-gt-data-center-best-practice-antivirus-profile/m-p/227638#M374</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2018-08-20T18:28:26Z</dc:date>
    </item>
    <item>
      <title>Re: Query -&gt; Data Center Best Practice Antivirus Profile</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/query-gt-data-center-best-practice-antivirus-profile/m-p/227703#M375</link>
      <description>&lt;P&gt;Thanks Mivaldi.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1)&amp;nbsp;&lt;SPAN&gt;AV enforcement is per-protocol -&amp;gt; I assume this is only for the following 6 protocols, right? From the admin guide: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"The Antivirus profile has decoders that detect and prevent viruses and malware from being transferred over six protocols: HTTP, SMTP, IMAP, POP3, FTP, and SMB"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2) If the above is correct, what is the below parragraph referring to, if there are only 6 decoders for AV? Why does the admin guide state that AV should be enabled "&lt;U&gt;to all security policy rules that allow traffic&lt;/U&gt;", if there are only decoders for HTTP, SMTP, IMAP, POP3, FTP, and SMB?:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"The reason to attach the best practice Antivirus profile to all security policy rules that allow traffic is to block known malicious files (malware, ransomware bots, and viruses) as they attempt to enter the network."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3) What would be the use case of enabling AV in a security policy for an app that is not&amp;nbsp;HTTP, SMTP, IMAP, POP3, FTP, and SMB, if AV does not have a decoder for it?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Aug 2018 08:41:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/query-gt-data-center-best-practice-antivirus-profile/m-p/227703#M375</guid>
      <dc:creator>ash83</dc:creator>
      <dc:date>2018-08-21T08:41:43Z</dc:date>
    </item>
    <item>
      <title>Re: Query -&gt; Data Center Best Practice Antivirus Profile</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/query-gt-data-center-best-practice-antivirus-profile/m-p/228502#M384</link>
      <description>&lt;P&gt;Can anyone with experience on this assist with this query? Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Aug 2018 08:46:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/query-gt-data-center-best-practice-antivirus-profile/m-p/228502#M384</guid>
      <dc:creator>ash83</dc:creator>
      <dc:date>2018-08-28T08:46:32Z</dc:date>
    </item>
    <item>
      <title>Re: Query -&gt; Data Center Best Practice Antivirus Profile</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/query-gt-data-center-best-practice-antivirus-profile/m-p/228583#M386</link>
      <description>&lt;P&gt;Ash83,&amp;nbsp;we have the following Antivirus decoders (see picture below).&amp;nbsp; If a security policy rule is not permitting http, smtp, imap, pop3, ftp, or smb traffic then there is no value in inspecting traffic using an Antivirus decoder.&amp;nbsp; You've pretty much answered your own question.&amp;nbsp; There is no harm in applying an AV Security Profile to a security policy rule that is not processing http, smtp, imap, pop3, ftp, or smb traffic as the decoder will never engage to inspect traffic if the traffic does not match one of these applications.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-08-28 at 10.35.14 AM.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16379i450495325E65E5B9/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-08-28 at 10.35.14 AM.png" alt="Screen Shot 2018-08-28 at 10.35.14 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Aug 2018 15:42:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/query-gt-data-center-best-practice-antivirus-profile/m-p/228583#M386</guid>
      <dc:creator>bvandivier</dc:creator>
      <dc:date>2018-08-28T15:42:09Z</dc:date>
    </item>
    <item>
      <title>Re: Query -&gt; Data Center Best Practice Antivirus Profile</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/query-gt-data-center-best-practice-antivirus-profile/m-p/229386#M391</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;SPAN class=""&gt;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7292" target="_self"&gt;bvandivier&lt;/A&gt;&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Think it would be useful to update the admin guide, from the current "&lt;SPAN&gt;AV should be enabled "&lt;/SPAN&gt;&lt;U&gt;to all security policy rules that allow traffic&lt;/U&gt;", to "&lt;SPAN&gt;AV should be enabled &lt;/SPAN&gt;&lt;U&gt;to all security policy rules that allow traffic for Apps:&amp;nbsp;&lt;SPAN&gt;HTTP, SMTP, IMAP, POP3, FTP, and SMB"&lt;/SPAN&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;SPAN&gt;Cheers.&lt;/SPAN&gt;&lt;/U&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Sep 2018 12:55:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/query-gt-data-center-best-practice-antivirus-profile/m-p/229386#M391</guid>
      <dc:creator>ash83</dc:creator>
      <dc:date>2018-09-04T12:55:24Z</dc:date>
    </item>
    <item>
      <title>Re: Query -&gt; Data Center Best Practice Antivirus Profile</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/query-gt-data-center-best-practice-antivirus-profile/m-p/229418#M392</link>
      <description>&lt;P&gt;You are mixing up 'applications' with 'protocols'.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example, we have multiple apps that are not named web-browsing, that use the HTTP protocol and for which we can provide AV scanning.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To give you an example, when you say&amp;nbsp;&lt;U&gt;"AV should be enabled&amp;nbsp;to all security policy rules that allow traffic for Apps:&amp;nbsp;HTTP, SMTP, IMAP, POP3, FTP, and SMB"&lt;/U&gt;, you are saying that HTTP is an app, and that is incorrect. We do not have an http app, the app is web-browsing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This mixup is common with customers as well. If we documented &lt;U&gt;"AV should be enabled to all security policy rules that allow traffic which use decoders:&amp;nbsp;&lt;/U&gt;&lt;SPAN&gt;&lt;U&gt;HTTP, SMTP, IMAP, POP3, FTP, and SMB"&lt;/U&gt;, then that would be accurate, but would create a lot of confussion. You would be asking customers to be able to know which apps use which decoders.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Sep 2018 17:35:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/query-gt-data-center-best-practice-antivirus-profile/m-p/229418#M392</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2018-09-04T17:35:18Z</dc:date>
    </item>
    <item>
      <title>Re: Query -&gt; Data Center Best Practice Antivirus Profile</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/query-gt-data-center-best-practice-antivirus-profile/m-p/229760#M397</link>
      <description>&lt;P&gt;Thanks Mivaldi, great explanation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would personally prefer the admin guide to be as accurate as possible, to avoid any possible missunderstandings, and see the following sentence (as per your previous update):&amp;nbsp;&amp;nbsp;"AV should be enabled to all security policy rules that allow traffic which use decoders: HTTP, SMTP, IMAP, POP3, FTP, and SMB"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In order to complement that, and to have a complete picture, we (firewall admins) should ideally be also be able to see which decoder(s) is/are use per App. I do not think this is an option at the moment. I have not been able to find this information on applipedia. Is this information available somewhere else?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 16:05:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/query-gt-data-center-best-practice-antivirus-profile/m-p/229760#M397</guid>
      <dc:creator>ash83</dc:creator>
      <dc:date>2018-09-06T16:05:56Z</dc:date>
    </item>
  </channel>
</rss>

