<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Antivirus Profile - Wildfire Inline ML - best approach to enabling? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-profile-wildfire-inline-ml-best-approach-to-enabling/m-p/552234#M112380</link>
    <description>&lt;P&gt;Thanks for the suggestion. I'll see where they may be a place that is appropriate but I can't think off hand right now where there would be a place for it that traffic would ever reach since anything valid (outside of intrazone) would hit other rules above it.&amp;nbsp; Perhaps I can also place a rule above somewhere with a very limited scope to see how it fairs before a wider application.&lt;/P&gt;</description>
    <pubDate>Wed, 02 Aug 2023 16:43:26 GMT</pubDate>
    <dc:creator>TonyDeHart</dc:creator>
    <dc:date>2023-08-02T16:43:26Z</dc:date>
    <item>
      <title>Antivirus Profile - Wildfire Inline ML - best approach to enabling?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-profile-wildfire-inline-ml-best-approach-to-enabling/m-p/552125#M112367</link>
      <description>&lt;P&gt;We currently have the ability to use WildFire Inline ML via the Antivirus Profile settings on our PA-5220's.&amp;nbsp; However, all models currently are set to ACTION = DISABLE. I do NOT know why other than either that is what it defaulted to on a previous upgrade or my predecessor had a reason to leave it off.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is the best approach to activating this without potentially causing issues with false positives but NOT leaving us more vulnerable while we turn it up?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I assume setting the action to ALERT-ONLY (override more strict actions to alert) would be the option to choose but the I'm concerned by it overriding more strict options it is effectively going to turn OFF scanning/analysis that is already in effect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd appreciate any insight from others with more experience.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2023 18:55:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-profile-wildfire-inline-ml-best-approach-to-enabling/m-p/552125#M112367</guid>
      <dc:creator>TonyDeHart</dc:creator>
      <dc:date>2023-08-01T18:55:22Z</dc:date>
    </item>
    <item>
      <title>Re: Antivirus Profile - Wildfire Inline ML - best approach to enabling?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-profile-wildfire-inline-ml-best-approach-to-enabling/m-p/552225#M112379</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/272860"&gt;@TonyDeHart&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Advanced Wildfire Inline ML compliments your Threat Prevention License with basic Wildfire capabilities. Using the Wildfire Inline ML will not turn off scanning/analysis in security profiles that are attached to existing security policies.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Consider creating and placing your alert-only Wildfire Inline ML enhanced security policies below your existing security policies in select zones where you are able to test and monitor the new capability in your environment.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Aug 2023 16:21:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-profile-wildfire-inline-ml-best-approach-to-enabling/m-p/552225#M112379</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2023-08-02T16:21:28Z</dc:date>
    </item>
    <item>
      <title>Re: Antivirus Profile - Wildfire Inline ML - best approach to enabling?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/antivirus-profile-wildfire-inline-ml-best-approach-to-enabling/m-p/552234#M112380</link>
      <description>&lt;P&gt;Thanks for the suggestion. I'll see where they may be a place that is appropriate but I can't think off hand right now where there would be a place for it that traffic would ever reach since anything valid (outside of intrazone) would hit other rules above it.&amp;nbsp; Perhaps I can also place a rule above somewhere with a very limited scope to see how it fairs before a wider application.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Aug 2023 16:43:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/antivirus-profile-wildfire-inline-ml-best-approach-to-enabling/m-p/552234#M112380</guid>
      <dc:creator>TonyDeHart</dc:creator>
      <dc:date>2023-08-02T16:43:26Z</dc:date>
    </item>
  </channel>
</rss>

