<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Thoughts on a set of application rules? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/thoughts-on-a-set-of-application-rules/m-p/15183#M11140</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi BobW,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is an interesting take on using the risk value. In my experience we tend to only be interested in the risk value when looking into reports and what applications we have running on our networks (like a big fat red block for bit-torrent in the new ACC).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would advise in taking a look at the security policy fundamentals documents &lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-7175"&gt;Fundamentals Guide: Security Policies&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and also keeping a keen eye on the application and threats release notes. With PanOS 7, a new feature has been implemented in which you can see what modifications a new version will have to your device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know how you get on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 14 Jul 2015 01:20:08 GMT</pubDate>
    <dc:creator>bmorris1</dc:creator>
    <dc:date>2015-07-14T01:20:08Z</dc:date>
    <item>
      <title>Thoughts on a set of application rules?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/thoughts-on-a-set-of-application-rules/m-p/15182#M11139</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was messing around in the interface today and had a thought as for rules and am curious what other might think.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created a group of rules for a particular zone/AD User group.&amp;nbsp; Something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Allow but do not log (DNS for example)&lt;/P&gt;&lt;P&gt;Allow these apps (Appgrp--custom application group)&lt;/P&gt;&lt;P&gt;Allow risk1 (custom app filter includes all "risk 1" apps)&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333330154419px;"&gt;Allow risk2 (&lt;SPAN style="font-size: 13.3333330154419px;"&gt;custom app filter includes all "risk 2" apps&lt;/SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333330154419px;"&gt;Allow risk3 (&lt;SPAN style="font-size: 13.3333330154419px;"&gt;custom app filter includes all "risk 3" apps&lt;/SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333330154419px;"&gt;Allow risk4 (&lt;SPAN style="font-size: 13.3333330154419px;"&gt;custom app filter includes all "risk 4" apps&lt;/SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333330154419px;"&gt;Deny risk5 (&lt;SPAN style="font-size: 13.3333330154419px;"&gt;custom app filter includes all "risk 5" apps&lt;/SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333330154419px;"&gt;Block all&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333330154419px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333330154419px;"&gt;My thinking is that I could monitor Risk 3,4,5 and add the appropriate apps to the custom app group "Appgrp" and eventully make levels 4 and 5 (possible risk 3) deny rules.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333330154419px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333330154419px;"&gt;Any thoughts would be appreciated,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333330154419px;"&gt;Bob&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Jul 2015 22:14:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/thoughts-on-a-set-of-application-rules/m-p/15182#M11139</guid>
      <dc:creator>BobW</dc:creator>
      <dc:date>2015-07-09T22:14:21Z</dc:date>
    </item>
    <item>
      <title>Re: Thoughts on a set of application rules?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/thoughts-on-a-set-of-application-rules/m-p/15183#M11140</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi BobW,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is an interesting take on using the risk value. In my experience we tend to only be interested in the risk value when looking into reports and what applications we have running on our networks (like a big fat red block for bit-torrent in the new ACC).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would advise in taking a look at the security policy fundamentals documents &lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-7175"&gt;Fundamentals Guide: Security Policies&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and also keeping a keen eye on the application and threats release notes. With PanOS 7, a new feature has been implemented in which you can see what modifications a new version will have to your device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know how you get on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jul 2015 01:20:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/thoughts-on-a-set-of-application-rules/m-p/15183#M11140</guid>
      <dc:creator>bmorris1</dc:creator>
      <dc:date>2015-07-14T01:20:08Z</dc:date>
    </item>
    <item>
      <title>Re: Thoughts on a set of application rules?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/thoughts-on-a-set-of-application-rules/m-p/15184#M11141</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The other consideration here is business risk for false positive blocks.&amp;nbsp; Applications that are business critical my need to be treated with kid gloves on their action with threat profiles.&amp;nbsp; Setting the action to alert rather than block to prevent fals positives from blocking critical workflows.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After which you need a regular procedure to review the alerts and insure all is well with the affected workstations.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jul 2015 12:16:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/thoughts-on-a-set-of-application-rules/m-p/15184#M11141</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-07-14T12:16:57Z</dc:date>
    </item>
  </channel>
</rss>

