<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: security policy in monitor mode only in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-in-monitor-mode-only/m-p/545313#M111529</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;The simple answer is use an 'allow' policy. Deploying the firewall there are two options:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Place it inline in vwire with an Any Any policy as the last policy, then you can build policies above it so see which ones get 'hit'.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Migrate the config from the previous device to the Palo Alto using the 'Expedition' tool to migrate the policies etc.
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://live.paloaltonetworks.com/t5/expedition/ct-p/migration_tool" target="_blank"&gt;https://live.paloaltonetworks.com/t5/expedition/ct-p/migration_tool&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Here is a guide for Best Practice to deployment:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/getting-started/best-practices-for-completing-the-firewall-deployment" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/getting-started/best-practices-for-completing-the-firewall-deployment&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What I did since it was a Cisco appliance I was migrating from, was to create the policies as layer 3/4 as with the standard Cisco ASA would. Then once deployed, I would create stricter policies with applications instead of 'services'(ports). I then created my own day one policy that had a lot of the config already built in both best practices and DISA STIG's etc. Its not fully complete due to differences in network and designed etc. but its a great start if your truly brave. The config does not allow for much to pass so treat it as DENY ALL allow by Exception, so you have to put in the allow policies.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/secure-day-one-configuration-not-for-the-faint-of-heart/ta-p/435501" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-articles/secure-day-one-configuration-not-for-the-faint-of-heart/ta-p/435501&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers!&lt;/P&gt;</description>
    <pubDate>Thu, 08 Jun 2023 15:27:34 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2023-06-08T15:27:34Z</dc:date>
    <item>
      <title>security policy in monitor mode only</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-in-monitor-mode-only/m-p/545298#M111526</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is a new Palo Alto deployment.&amp;nbsp; We used to have Cisco FTD as IPS and now we are replacing with Palo Alto.&amp;nbsp; We have 3 devices (router and SDWAN) that we configured using vwire so all traffic to the DC would pass through the Palo Alto inspection as IPS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to deploy the security profiles/group (vulnerability/antivirus/spyware) as monitor mode only, so I can see what traffic would have been blocked by PA and then correct all the false positives.&amp;nbsp; In Cisco FMC we have the option of the policy rule action as monitor to achieve this.&amp;nbsp; I cannot find something similar in Palo Alto.&amp;nbsp; Please can someone help with how to set the security policy to monitor only (not take the drop or reset-action) but I want to know the traffic that it would have dropped.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2023 13:40:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-in-monitor-mode-only/m-p/545298#M111526</guid>
      <dc:creator>ismailsh</dc:creator>
      <dc:date>2023-06-08T13:40:34Z</dc:date>
    </item>
    <item>
      <title>Re: security policy in monitor mode only</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-in-monitor-mode-only/m-p/545313#M111529</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;The simple answer is use an 'allow' policy. Deploying the firewall there are two options:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Place it inline in vwire with an Any Any policy as the last policy, then you can build policies above it so see which ones get 'hit'.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Migrate the config from the previous device to the Palo Alto using the 'Expedition' tool to migrate the policies etc.
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://live.paloaltonetworks.com/t5/expedition/ct-p/migration_tool" target="_blank"&gt;https://live.paloaltonetworks.com/t5/expedition/ct-p/migration_tool&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Here is a guide for Best Practice to deployment:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/getting-started/best-practices-for-completing-the-firewall-deployment" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/getting-started/best-practices-for-completing-the-firewall-deployment&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What I did since it was a Cisco appliance I was migrating from, was to create the policies as layer 3/4 as with the standard Cisco ASA would. Then once deployed, I would create stricter policies with applications instead of 'services'(ports). I then created my own day one policy that had a lot of the config already built in both best practices and DISA STIG's etc. Its not fully complete due to differences in network and designed etc. but its a great start if your truly brave. The config does not allow for much to pass so treat it as DENY ALL allow by Exception, so you have to put in the allow policies.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/secure-day-one-configuration-not-for-the-faint-of-heart/ta-p/435501" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-articles/secure-day-one-configuration-not-for-the-faint-of-heart/ta-p/435501&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2023 15:27:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-in-monitor-mode-only/m-p/545313#M111529</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-06-08T15:27:34Z</dc:date>
    </item>
    <item>
      <title>Re: security policy in monitor mode only</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-in-monitor-mode-only/m-p/545367#M111538</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/271833"&gt;@ismailsh&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;To explicitly answer your profile questions, you'd want to create new profiles and ensure that you have all actions set to alert. The one thing that I'll mention here is that some of the profiles you'll have to think a little bit about when you actually enforce them. For example, if you setup an Anti-Spyware profile and have all severities set to alert that doesn't show you everything that the firewall would actually take an action on if you set the action back to default.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That will at least get you to the point where you're gathering as much data as possible so you have it when changing the action and actually enforcing standards however.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2023 21:17:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-in-monitor-mode-only/m-p/545367#M111538</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2023-06-08T21:17:07Z</dc:date>
    </item>
    <item>
      <title>Re: security policy in monitor mode only</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-in-monitor-mode-only/m-p/545670#M111578</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;OtakarKlier and BPry for the replies.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 00:40:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-in-monitor-mode-only/m-p/545670#M111578</guid>
      <dc:creator>ismailsh</dc:creator>
      <dc:date>2023-06-13T00:40:13Z</dc:date>
    </item>
  </channel>
</rss>

