<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS Default Protections? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ips-default-protections/m-p/23031#M16799</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jeff, I think you may be asking a question that has a moving target for an answer.&amp;nbsp; Maybe your best bet is to log into a PAN appliance and look at the signature list to see what the signature's default settings are.&amp;nbsp; Every sig has its own default action, which could be reset server, reset client, reset both, alert, drop, drop all packets.&amp;nbsp; These default actions are assigned by the PAN threat team when the new signature is added to the threat database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Checkpoint IPS is known to trigger a very high rate false positives, which can severely limit its effectiveness.&amp;nbsp; While no vendor can guarantee zero false positives, I believe PAN does a much better job in this arena.&amp;nbsp; In part because of the efficiency that AppID gives you when married to IPS, the ease of use, and also in the implementation of the IPS signatures by PAN's threat team.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="file:/C:/DOCUME%7E1/SPOLO%7E1.PAL/LOCALS%7E1/Temp/moz-screenshot-15.png" /&gt;&lt;IMG src="file:/C:/DOCUME%7E1/SPOLO%7E1.PAL/LOCALS%7E1/Temp/moz-screenshot-16.png" /&gt;&lt;IMG src="file:/C:/DOCUME%7E1/SPOLO%7E1.PAL/LOCALS%7E1/Temp/moz-screenshot-17.png" /&gt;&lt;IMG alt="1-28-2011 8-52-16 AM.png" class="jive-image-thumbnail jive-image" height="374" onclick="" src="https://live.paloaltonetworks.com/legacyfs/online/2162_1-28-2011 8-52-16 AM.png" width="676" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 28 Jan 2011 16:57:18 GMT</pubDate>
    <dc:creator>spolo</dc:creator>
    <dc:date>2011-01-28T16:57:18Z</dc:date>
    <item>
      <title>IPS Default Protections?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ips-default-protections/m-p/23030#M16798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I need a techincal answer for default protections with PAN IPS enabled.&amp;nbsp; If possible, think in a CP-to-PAN conversion.&amp;nbsp; I know...apples to oranges. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA - Jeff&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Jan 2011 16:55:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ips-default-protections/m-p/23030#M16798</guid>
      <dc:creator>jhill</dc:creator>
      <dc:date>2011-01-27T16:55:56Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Default Protections?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ips-default-protections/m-p/23031#M16799</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jeff, I think you may be asking a question that has a moving target for an answer.&amp;nbsp; Maybe your best bet is to log into a PAN appliance and look at the signature list to see what the signature's default settings are.&amp;nbsp; Every sig has its own default action, which could be reset server, reset client, reset both, alert, drop, drop all packets.&amp;nbsp; These default actions are assigned by the PAN threat team when the new signature is added to the threat database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Checkpoint IPS is known to trigger a very high rate false positives, which can severely limit its effectiveness.&amp;nbsp; While no vendor can guarantee zero false positives, I believe PAN does a much better job in this arena.&amp;nbsp; In part because of the efficiency that AppID gives you when married to IPS, the ease of use, and also in the implementation of the IPS signatures by PAN's threat team.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="file:/C:/DOCUME%7E1/SPOLO%7E1.PAL/LOCALS%7E1/Temp/moz-screenshot-15.png" /&gt;&lt;IMG src="file:/C:/DOCUME%7E1/SPOLO%7E1.PAL/LOCALS%7E1/Temp/moz-screenshot-16.png" /&gt;&lt;IMG src="file:/C:/DOCUME%7E1/SPOLO%7E1.PAL/LOCALS%7E1/Temp/moz-screenshot-17.png" /&gt;&lt;IMG alt="1-28-2011 8-52-16 AM.png" class="jive-image-thumbnail jive-image" height="374" onclick="" src="https://live.paloaltonetworks.com/legacyfs/online/2162_1-28-2011 8-52-16 AM.png" width="676" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 16:57:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ips-default-protections/m-p/23031#M16799</guid>
      <dc:creator>spolo</dc:creator>
      <dc:date>2011-01-28T16:57:18Z</dc:date>
    </item>
  </channel>
</rss>

