<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Threat Prevention best practice ? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-best-practice/m-p/39903#M29257</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Welcome to PanOS.&amp;nbsp; There is a good overview document on all the threat prevention features and standard deploys below.&amp;nbsp; The general trade off between alert and block is the impact in your environment of false positives.&amp;nbsp; Palo Alto is very conservative in terms of blocking potentially legitimate traffic and will set for an alert default.&amp;nbsp; But as you see, these then require research to determine if this was a real threat or a false positive.&amp;nbsp; Once you are confident they are not false positives you can migrate from alert to block and have less to research.&amp;nbsp; You can make this determination signature by signature and build your own customized block to override each former alert.&amp;nbsp; Likewise if you see the alerts are false you can change these signatures so that no alert is generated anymore for that signature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-3094"&gt;Threat Prevention Deployment Tech Note&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 14 Feb 2015 13:35:49 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2015-02-14T13:35:49Z</dc:date>
    <item>
      <title>Threat Prevention best practice ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-best-practice/m-p/39902#M29256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Commuity,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm looking for your tips and hints regarding TP best practices. &lt;/P&gt;&lt;P&gt;(hopefully this newbee question is not too bad :smileyconfused:)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me explain our setup:&lt;/P&gt;&lt;P&gt;As a first step to a new IT Security Infrastructure we are running a HA-pair of PA-3050 in an "IPS Mode" behind our current firewalls.&lt;/P&gt;&lt;P&gt;From configuration point of view it means that we have a set of virtual wires with "allow any / inspect all" rules.&lt;/P&gt;&lt;P&gt;The security profiles are currently copies of the "default" profiels for antivirus, anti-spyware and vulnerability protection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically this works fine since we've started:&lt;/P&gt;&lt;P&gt;Only a few actions beside "alert" which had no impact on normal operations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But what about the lots of "alerts"?&lt;/P&gt;&lt;P&gt;Do we need to reserch on each and every of them?&lt;/P&gt;&lt;P&gt;Shall we tune the rules?&lt;/P&gt;&lt;P&gt;Is the "default" setting still ok?&lt;/P&gt;&lt;P&gt;Or are you running more in "strict" mode?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right now I'm a little bit confused. Which might be also related so some of the "not so perfect" AV and TP Updates of the last days.&lt;/P&gt;&lt;P&gt;Please help me to get out and to makes best use of our PAs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regrads&lt;/P&gt;&lt;P&gt;Thomas&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Feb 2015 08:26:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-best-practice/m-p/39902#M29256</guid>
      <dc:creator>schmidt_th</dc:creator>
      <dc:date>2015-02-13T08:26:54Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Prevention best practice ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-best-practice/m-p/39903#M29257</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Welcome to PanOS.&amp;nbsp; There is a good overview document on all the threat prevention features and standard deploys below.&amp;nbsp; The general trade off between alert and block is the impact in your environment of false positives.&amp;nbsp; Palo Alto is very conservative in terms of blocking potentially legitimate traffic and will set for an alert default.&amp;nbsp; But as you see, these then require research to determine if this was a real threat or a false positive.&amp;nbsp; Once you are confident they are not false positives you can migrate from alert to block and have less to research.&amp;nbsp; You can make this determination signature by signature and build your own customized block to override each former alert.&amp;nbsp; Likewise if you see the alerts are false you can change these signatures so that no alert is generated anymore for that signature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-3094"&gt;Threat Prevention Deployment Tech Note&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 14 Feb 2015 13:35:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-best-practice/m-p/39903#M29257</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-02-14T13:35:49Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Prevention best practice ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-best-practice/m-p/39904#M29258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have anything categorized as medium or higher to be blocked. We are looking at doing the same with low. I would not do Info since it will block legit requests.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Feb 2015 22:26:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-best-practice/m-p/39904#M29258</guid>
      <dc:creator>oklier</dc:creator>
      <dc:date>2015-02-16T22:26:02Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Prevention best practice ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-best-practice/m-p/39905#M29259</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Steven,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you for your warm welcome and especially for the link to the real good overview document.&lt;/P&gt;&lt;P&gt;By reading the document I've found that we've done a lot of things the right way - thanks to our consultant.&lt;/P&gt;&lt;P&gt;Additionally my understanding of the system has been improved with the document.&lt;/P&gt;&lt;P&gt;Nevertheless I guess that it needs even more experience with the system to feel real confident.&lt;/P&gt;&lt;P&gt;oklier has pointed out the interessting topic: How to move forward from the "default" setting without causing to much trouble for users and IT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So more answers are appreciated. Maybe some other end users share their experience.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Feb 2015 07:42:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-best-practice/m-p/39905#M29259</guid>
      <dc:creator>schmidt_th</dc:creator>
      <dc:date>2015-02-19T07:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Prevention best practice ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-best-practice/m-p/39906#M29260</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per what &lt;A href="https://live.paloaltonetworks.com/u1/17985"&gt;Steven Puluka&lt;/A&gt; said, default protections are a good start.&amp;nbsp; If you decided you want to be more strict in any area you will want to make sure you do a thorough analysis to make sure that you don't affect legitimate traffic.&amp;nbsp; You could do this by running some custom reports on threats that are logging as alerts and then investigate that traffic and device that is being hit by those threats.&amp;nbsp; If you have a specific threat you are concerned about that is not blocking, you can also report on that specific threat.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Feb 2015 16:46:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-prevention-best-practice/m-p/39906#M29260</guid>
      <dc:creator>Dz3015</dc:creator>
      <dc:date>2015-02-19T16:46:19Z</dc:date>
    </item>
  </channel>
</rss>

