<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Threat Prevention Inline Cloud Analysis - Allow on Max Latency in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-inline-cloud-analysis-allow-on-max-latency/m-p/488539#M104827</link>
    <description>&lt;P&gt;With the new feature -&amp;nbsp;Advanced Threat Prevention in PAN-OS 10.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are Inline Cloud Analysis in PAN-OS 10.2&lt;/P&gt;&lt;P&gt;I found a new setup - Threat Prevention Inline Cloud Analysis under&amp;nbsp;Device &amp;gt; Setup &amp;gt; Content-ID&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JoeKwok_0-1652954864578.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/41066i852DD5F92100AFCA/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="JoeKwok_0-1652954864578.png" alt="JoeKwok_0-1652954864578.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to know what is the different with enable or not on "Allow on Max Latency".&lt;/P&gt;&lt;P&gt;Is it means that exceed the Latency of Inline Cloud Analysis, the packet will be bypass or drop?&lt;/P&gt;&lt;P&gt;enable means bypass or drop? Where can I find the document related to this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I take a look of below link, but no mention on this.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-web-interface-help/device/device-setup-content-id" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-web-interface-help/device/device-setup-content-id&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 19 May 2022 10:14:08 GMT</pubDate>
    <dc:creator>JoeKwok</dc:creator>
    <dc:date>2022-05-19T10:14:08Z</dc:date>
    <item>
      <title>Threat Prevention Inline Cloud Analysis - Allow on Max Latency</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-inline-cloud-analysis-allow-on-max-latency/m-p/488539#M104827</link>
      <description>&lt;P&gt;With the new feature -&amp;nbsp;Advanced Threat Prevention in PAN-OS 10.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are Inline Cloud Analysis in PAN-OS 10.2&lt;/P&gt;&lt;P&gt;I found a new setup - Threat Prevention Inline Cloud Analysis under&amp;nbsp;Device &amp;gt; Setup &amp;gt; Content-ID&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JoeKwok_0-1652954864578.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/41066i852DD5F92100AFCA/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="JoeKwok_0-1652954864578.png" alt="JoeKwok_0-1652954864578.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to know what is the different with enable or not on "Allow on Max Latency".&lt;/P&gt;&lt;P&gt;Is it means that exceed the Latency of Inline Cloud Analysis, the packet will be bypass or drop?&lt;/P&gt;&lt;P&gt;enable means bypass or drop? Where can I find the document related to this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I take a look of below link, but no mention on this.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-web-interface-help/device/device-setup-content-id" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-web-interface-help/device/device-setup-content-id&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 May 2022 10:14:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-inline-cloud-analysis-allow-on-max-latency/m-p/488539#M104827</guid>
      <dc:creator>JoeKwok</dc:creator>
      <dc:date>2022-05-19T10:14:08Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Prevention Inline Cloud Analysis - Allow on Max Latency</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-inline-cloud-analysis-allow-on-max-latency/m-p/488713#M104847</link>
      <description>&lt;P&gt;Palo Alto Networks now operates a series of ML-based detection engines in the Advanced Threat Prevention cloud to analyze traffic for advanced C2 (command-and-control) and spyware threats in real-time to protect users against zero-day threats. By operating cloud-based detection engines, you can access a wide array of detection mechanisms that are updated and deployed automatically without requiring the user to download update packages or operate process intensive, firewall-based analyzers which can sap resources. The cloud-based detection engine logic is continuously monitored and updated using C2 traffic datasets from WildFire, with additional support through manual updates by Palo Alto Networks threat researchers, who provide human intervention for highly accurized detection enhancements. Inline cloud analysis supports five analysis engines for C2-based threats over HTTP, HTTP2, SSL, unknown-UDP, and unknown-TCP. Additional analysis models are delivered through content updates, however, enhancements to existing models are performed as a cloud-side update, requiring no firewall update. Inline cloud analysis is enabled and configured using the anti-spyware profile and requires an active Advanced Threat Prevention license.&lt;/P&gt;</description>
      <pubDate>Fri, 20 May 2022 01:51:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-inline-cloud-analysis-allow-on-max-latency/m-p/488713#M104847</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2022-05-20T01:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Prevention Inline Cloud Analysis - Allow on Max Latency</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-inline-cloud-analysis-allow-on-max-latency/m-p/491723#M104965</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Per regulation, we must monitor the outgoing GW traffic. this undocumented feature is not clear for us too.&lt;/P&gt;&lt;P&gt;there are 2 "fail open" settings for URL &amp;amp; TP cloud analysis as mentioned above. when this is actually used? what is the flow of traffic in that case?&lt;/P&gt;&lt;P&gt;each http request (when we use aURLF) is going to palo alto for additional inspection?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2022 15:13:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-inline-cloud-analysis-allow-on-max-latency/m-p/491723#M104965</guid>
      <dc:creator>support_jmfo</dc:creator>
      <dc:date>2022-05-25T15:13:28Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Prevention Inline Cloud Analysis - Allow on Max Latency</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-inline-cloud-analysis-allow-on-max-latency/m-p/523903#M108446</link>
      <description>&lt;P&gt;Is there any license requirement that we should be on version 10.2 for ATP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 08:32:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-inline-cloud-analysis-allow-on-max-latency/m-p/523903#M108446</guid>
      <dc:creator>Sujanya</dc:creator>
      <dc:date>2022-12-13T08:32:20Z</dc:date>
    </item>
  </channel>
</rss>

