<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DNS Security - AntiSpyWare Profile/DNS Signatures/Policies Security Policy in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dns-security-antispyware-profile-dns-signatures-policies/m-p/471058#M103058</link>
    <description>&lt;P&gt;Per the steps in the guide, I cloned the default profile and set about to configure&amp;nbsp;&lt;/P&gt;&lt;P&gt;the DNS Signatures tab of the new profile. I believe that I want to sinkhole&lt;/P&gt;&lt;P&gt;both the classic signature (with 100k rules in the firewall) and the&lt;/P&gt;&lt;P&gt;newer DNS Security signature which will query PANs cloud database.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;But then to effect these actions I need to add a security policy where Actions/Profiles&lt;/P&gt;&lt;P&gt;references my new Anti-Spyware profile which I named "DNS Security Profile".&lt;/P&gt;&lt;P&gt;For this specific rule, should the Action be Allow? Deny? Drop? Other?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 08 Mar 2022 00:26:10 GMT</pubDate>
    <dc:creator>palomed</dc:creator>
    <dc:date>2022-03-08T00:26:10Z</dc:date>
    <item>
      <title>DNS Security - AntiSpyWare Profile/DNS Signatures/Policies Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-security-antispyware-profile-dns-signatures-policies/m-p/471058#M103058</link>
      <description>&lt;P&gt;Per the steps in the guide, I cloned the default profile and set about to configure&amp;nbsp;&lt;/P&gt;&lt;P&gt;the DNS Signatures tab of the new profile. I believe that I want to sinkhole&lt;/P&gt;&lt;P&gt;both the classic signature (with 100k rules in the firewall) and the&lt;/P&gt;&lt;P&gt;newer DNS Security signature which will query PANs cloud database.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;But then to effect these actions I need to add a security policy where Actions/Profiles&lt;/P&gt;&lt;P&gt;references my new Anti-Spyware profile which I named "DNS Security Profile".&lt;/P&gt;&lt;P&gt;For this specific rule, should the Action be Allow? Deny? Drop? Other?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 00:26:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-security-antispyware-profile-dns-signatures-policies/m-p/471058#M103058</guid>
      <dc:creator>palomed</dc:creator>
      <dc:date>2022-03-08T00:26:10Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Security - AntiSpyWare Profile/DNS Signatures/Policies Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-security-antispyware-profile-dns-signatures-policies/m-p/471469#M103101</link>
      <description>&lt;P&gt;You've already configured it. In the DNS Security Profile, you set the action to "sinkhole." So when your traffic with that security policy applied, reaches out to a known bad source, the request will get dropped. Even though it may be an allow traffic rule, DNS Security will always run. Trust, but verify.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See more &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/dns-security/enable-dns-security" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 18:57:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-security-antispyware-profile-dns-signatures-policies/m-p/471469#M103101</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2022-03-08T18:57:46Z</dc:date>
    </item>
  </channel>
</rss>

