<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto Security Profiles Suggestions in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-security-profiles-suggestions/m-p/596313#M118626</link>
    <description>&lt;P&gt;Can someone please suggest me any inputs on this ?&lt;/P&gt;</description>
    <pubDate>Thu, 29 Aug 2024 16:37:17 GMT</pubDate>
    <dc:creator>Khanna075</dc:creator>
    <dc:date>2024-08-29T16:37:17Z</dc:date>
    <item>
      <title>Palo Alto Security Profiles Suggestions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-security-profiles-suggestions/m-p/596234#M118614</link>
      <description>&lt;P&gt;I am seeing that we have different Palo Alto provided Security Profiles that we can map to the security policy. What would best strategy to test it first in lower environments before rolling onto prod ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We just want to make sure it should not create any problems to existing traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Right now, we are not using for each security policy. But we want to use.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;any kind of help would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ty&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 02:01:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-security-profiles-suggestions/m-p/596234#M118614</guid>
      <dc:creator>Khanna075</dc:creator>
      <dc:date>2024-08-29T02:01:33Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Security Profiles Suggestions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-security-profiles-suggestions/m-p/596313#M118626</link>
      <description>&lt;P&gt;Can someone please suggest me any inputs on this ?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 16:37:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-security-profiles-suggestions/m-p/596313#M118626</guid>
      <dc:creator>Khanna075</dc:creator>
      <dc:date>2024-08-29T16:37:17Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Security Profiles Suggestions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-security-profiles-suggestions/m-p/596514#M118680</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/100866759"&gt;@Khanna075&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for posting question.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We had a similar situation in the past. We used AD group of IT / Security Department as a source user to limit the policies with strict security profile for testing before rolling this out to rest of the policies. Alternatively you can use source IP address (Source subnet if this is possible in your case) to limit policies with&amp;nbsp;strict security profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Mon, 02 Sep 2024 04:22:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-security-profiles-suggestions/m-p/596514#M118680</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2024-09-02T04:22:23Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Security Profiles Suggestions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-security-profiles-suggestions/m-p/596535#M118682</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/100866759"&gt;@Khanna075&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I do a migration from a another vendor firewall to Palo Alto, I used to test the security profiles 1st.&amp;nbsp; Here was my process:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Use security profile groups which make changing the profiles per security policy rule a LOT easier.&lt;/LI&gt;
&lt;LI&gt;Use the Day 1 Configuration which has built in security profile groups such as Alert-Only, Inbound, Outbound, Internal, etc.&lt;/LI&gt;
&lt;LI&gt;Assign the desired groups Inbound, Outbound, Internal, etc. to your security policy rules.&lt;/LI&gt;
&lt;LI&gt;Change the security profiles in those groups to Alert-Only.&lt;/LI&gt;
&lt;LI&gt;After the traffic has been cut over to the Palo Alto, review the Monitor logs to confirm if there are any false positives.&lt;/LI&gt;
&lt;LI&gt;Configure exceptions for the false positives, and change the security profiles in the groups to the recommended settings.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;To be honest, it has been a while since I have done that.&amp;nbsp; I found very little false positives as I did many migrations.&amp;nbsp; There were some.&amp;nbsp; Today, I enable all the security profiles; have the customer perform their test plan; and troubleshoot the false positives the night of the cut-over or the next day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is important to run a BPA on the new NGFW before the cutover because the BPA recommends additional security profile settings that the Day 1 Configuration does not have.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Mon, 02 Sep 2024 11:20:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-security-profiles-suggestions/m-p/596535#M118682</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2024-09-02T11:20:12Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Security Profiles Suggestions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-security-profiles-suggestions/m-p/596965#M118749</link>
      <description>&lt;P&gt;Thanks Pavel for your inputs.&lt;/P&gt;
&lt;P&gt;It is helpful to plan my requirement.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 11:34:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-security-profiles-suggestions/m-p/596965#M118749</guid>
      <dc:creator>Khanna075</dc:creator>
      <dc:date>2024-09-05T11:34:11Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Security Profiles Suggestions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-security-profiles-suggestions/m-p/596966#M118750</link>
      <description>&lt;P&gt;Thank you much Tom for taking out time and sharing your inputs. This actually covers everything that I need to consider my planning.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Really appreciate the help!&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 11:35:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-security-profiles-suggestions/m-p/596966#M118750</guid>
      <dc:creator>Khanna075</dc:creator>
      <dc:date>2024-09-05T11:35:13Z</dc:date>
    </item>
  </channel>
</rss>

