<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Threat alert emails in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-emails/m-p/529302#M109266</link>
    <description>&lt;P&gt;You can verify the action taken by looking at the associated threat logs on the firewall. If it says 'alert' then the firewall didn't block the activity.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Personally my default assigned profile has critical and high severity alerts set to reset-both for client and server traffic. This voids the default action so that whatever signatures match this severity aren't allowed by default, and then I can make overrides as required. The downside to this method is that sometimes PAN will set a disruptive signature to alert at first to verify that they don't have any false positives before they change the default action; in this instance if I were to see false positives I need to manually override these specific signatures.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 31 Jan 2023 14:15:11 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2023-01-31T14:15:11Z</dc:date>
    <item>
      <title>Threat alert emails</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-emails/m-p/529293#M109265</link>
      <description>&lt;P&gt;I see threat alerts as critical but no words of block. Are these still getting thru even if flagged as an alert? How do I verify or change to alert and block?&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2023 14:04:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-emails/m-p/529293#M109265</guid>
      <dc:creator>MMurphy1</dc:creator>
      <dc:date>2023-01-31T14:04:22Z</dc:date>
    </item>
    <item>
      <title>Re: Threat alert emails</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-emails/m-p/529302#M109266</link>
      <description>&lt;P&gt;You can verify the action taken by looking at the associated threat logs on the firewall. If it says 'alert' then the firewall didn't block the activity.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Personally my default assigned profile has critical and high severity alerts set to reset-both for client and server traffic. This voids the default action so that whatever signatures match this severity aren't allowed by default, and then I can make overrides as required. The downside to this method is that sometimes PAN will set a disruptive signature to alert at first to verify that they don't have any false positives before they change the default action; in this instance if I were to see false positives I need to manually override these specific signatures.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2023 14:15:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-alert-emails/m-p/529302#M109266</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2023-01-31T14:15:11Z</dc:date>
    </item>
  </channel>
</rss>

