<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: When setting Strict Security Profile in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175214#M54937</link>
    <description>&lt;P&gt;For traffic logs, I usually recommend to "log at session end" for all of the security policies, and then filter out what you don't want to see. &amp;nbsp;This can be accomplished in the ACC as well as the raw logs. &amp;nbsp;One way is to do it by rule name:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="acc-traffic.png" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11162iFF9CD6860C7CA69C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="acc-traffic.png" alt="acc-traffic.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="acc-threat.png" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11163i1334CC9E6FBF589D/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="acc-threat.png" alt="acc-threat.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This shows you traffic and threats, except for those you specifically filter out in the list. &amp;nbsp;Once you find a view that you like, you can create your own custom ACC tab and have those filters pre-populated. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can do similar things in the traffic, threat, and unified logs with a query like:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; (rule neq 'allow to services') and (rule neq 'allow untrust to untrust')&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="unified-rule.png" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11164iF13B8674AD91C1B3/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="unified-rule.png" alt="unified-rule.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One benefit to this approach is that you still have logs for all of the events, but you're only shown the ones you're interested in. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You're aware of the "log at session start" and "log at session end"&amp;nbsp;options. &amp;nbsp;That governs how traffic is logged for each individual security policy. &amp;nbsp;If, for example, you have an internal application that generates way too many logs and you need to reduce the # of logs being written to disk (to increase log retention time for other traffic logs), then your next option is to not log any traffic through this particular security policy rule. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Afaik, this only affects "traffic logs" (aka traditional firewall logs). &amp;nbsp;You'll still have URL logs, Threat logs, Data Filtering logs, etc. if applicable. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your goal is to reduce logging for certain threat signatures, that can be done on a case-by-case basis by using security profile "exceptions". &amp;nbsp;Let's say you had a network monitoring server that initatiates SSH sessions to network equipment all throughout your environment and it was generating too many "SSH2 Login Attempt" information alerts in your threat logs. &amp;nbsp;You could add an exception to that profile by a.) enabling the exception, and b.) adding the IP address (source or destination). &amp;nbsp;This&amp;nbsp;action will disable that signature for traffic inspected by this specific profile and to/from the listed IP address. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="exception.png" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11165i7C1FA7788CA76874/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="exception.png" alt="exception.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hopefully that gives you enough information to accomplish your goals. &amp;nbsp;If not, let us know in more detail what you're trying to accomplish, what you see and what you'd like to see, and we'll figure it out. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 06 Sep 2017 15:51:28 GMT</pubDate>
    <dc:creator>jvalentine</dc:creator>
    <dc:date>2017-09-06T15:51:28Z</dc:date>
    <item>
      <title>When setting Strict Security Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/174377#M54807</link>
      <description>&lt;P&gt;Good day everyone need help with verify some information about setting strict security profile.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are wanting to set the all Security profile from default to strict to help contiune doing the best security practices recommend by palo alto. Also not wanting the logging in the threat montior to show traffic we already know is ok. So when we are monitoring threat logging it will only show issues we need to investigate.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After research seeing what will be affect by this change and know that you can add expections to so that strict profile setting should not stop the traffic from contiuning.&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do I verify that traffic is not being stop by the new strict security profile setting?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you any help would be great&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 16:05:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/174377#M54807</guid>
      <dc:creator>AdamCoombs</dc:creator>
      <dc:date>2017-09-01T16:05:39Z</dc:date>
    </item>
    <item>
      <title>Re: When setting Strict Security Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/174411#M54810</link>
      <description>&lt;P&gt;Are you referring to limiting only specific applications or enabling threat prevention and looking for false positives?&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 17:45:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/174411#M54810</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-09-01T17:45:52Z</dc:date>
    </item>
    <item>
      <title>Re: When setting Strict Security Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/174421#M54811</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/41718"&gt;@AdamCoombs&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I think you're likely going to need to include a bit more information in what exactly you are looking to do. Are you talking about only allowing certain applications, upping your vulnerability profiles so that you specify actions other than default, tuning your Antivirus profile?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 18:57:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/174421#M54811</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-09-01T18:57:14Z</dc:date>
    </item>
    <item>
      <title>Re: When setting Strict Security Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/174433#M54813</link>
      <description>&lt;P&gt;Ok, here is the links from the palo alto&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;His one&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/tkb/articleprintpage/tkb-id/Management-TKB/article-id/866" target="_blank"&gt;https://live.paloaltonetworks.com/t5/tkb/articleprintpage/tkb-id/Management-TKB/article-id/866&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;How to Add Exempt IP Addresses from the Threat Monitor Logs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/policy/create-best-practice-security-profiles" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/policy/create-best-practice-security-profiles&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;search for&amp;nbsp;Vulnerability Protection&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The goal is to when we see something that is critical and high for severity it does just alert it, it stops it by the strict profile settings.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Hope this help make more sense,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 20:51:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/174433#M54813</guid>
      <dc:creator>AdamCoombs</dc:creator>
      <dc:date>2017-09-01T20:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: When setting Strict Security Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/174438#M54816</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;You should be able to accomplish this with a &amp;nbsp;Vulnerability Protection Profile. Objects-&amp;gt;Security Profiles-&amp;gt; Vulnerability Protection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10997i12DB09E9EDABBD1E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here I have the polciies to block the offending IP for 1 hour. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once this is completed you need to add the profile to a Security Polcies to it will take affect. What I usually do is Set all the security Profiles I need and then Bundle ithem into a Security Profile Group, then just apply the group to the security Policy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 21:45:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/174438#M54816</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2017-09-01T21:45:20Z</dc:date>
    </item>
    <item>
      <title>Re: When setting Strict Security Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/174557#M54836</link>
      <description>&lt;P&gt;this maybe helpful in understanding (and optimizing) your security profiles:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IFRAME width="560" height="315" src="https://www.youtube.com/embed/oUdqQSRyMis" frameborder="0" allowfullscreen=""&gt;&lt;/IFRAME&gt; (security profiles start at about 7:08)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Sep 2017 08:41:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/174557#M54836</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-09-04T08:41:34Z</dc:date>
    </item>
    <item>
      <title>Re: When setting Strict Security Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/174994#M54887</link>
      <description>&lt;P&gt;Sorry for the late reply&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you use policy that is blocking offending IP for a hour, can you still see the traffic in the Threat monitor logs ?&lt;/P&gt;</description>
      <pubDate>Tue, 05 Sep 2017 17:46:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/174994#M54887</guid>
      <dc:creator>AdamCoombs</dc:creator>
      <dc:date>2017-09-05T17:46:26Z</dc:date>
    </item>
    <item>
      <title>Re: When setting Strict Security Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175012#M54891</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;While that response depends on the capacity of the PAN you have and how much traffic is flowing through it, I would honeslty say yes, I am most confident that the logs should be there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 05 Sep 2017 18:56:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175012#M54891</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2017-09-05T18:56:38Z</dc:date>
    </item>
    <item>
      <title>Re: When setting Strict Security Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175189#M54931</link>
      <description>&lt;P&gt;Thank you Otakar.klier&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to make those expections not show up in the monitor threat logs?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2017 14:14:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175189#M54931</guid>
      <dc:creator>AdamCoombs</dc:creator>
      <dc:date>2017-09-06T14:14:27Z</dc:date>
    </item>
    <item>
      <title>Re: When setting Strict Security Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175191#M54932</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Maybe someone else has a better way. However what I thought up was to create two Vulnerability policies and two traffic policies. In the first policy you would have traffic that you don’t want logged, i.e. informational or low, etc. and you set the security policy not to log the traffic. The second policy would have the more strict Vulnerability policy and that Security policy would be set to log at session end.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure you would want to do this since you might lose good information when it some to the traffic logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2017 14:23:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175191#M54932</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2017-09-06T14:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: When setting Strict Security Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175193#M54933</link>
      <description>&lt;P&gt;Well, sorry I will explain more on why I would not want to see the traffic that is high that I add execptions listed after change the security profile and setting that security profile to a group profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is traffic that is showing in the monitor threat area as high, I know this traffic is required for business to run plus it the traffic is going cross zone.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was thinking it would be better when I am monitor threat logs to see traffic that I need to do research in to make sure that is business approved traffic. &amp;nbsp;Also it will clean up a lot of traffic that is not need to be seen in my thinking.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2017 14:31:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175193#M54933</guid>
      <dc:creator>AdamCoombs</dc:creator>
      <dc:date>2017-09-06T14:31:07Z</dc:date>
    </item>
    <item>
      <title>Re: When setting Strict Security Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175202#M54935</link>
      <description>&lt;P&gt;Another thought could be to just let the PAN log everything and then filter the view to only things you want to see?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2017 14:52:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175202#M54935</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2017-09-06T14:52:45Z</dc:date>
    </item>
    <item>
      <title>Re: When setting Strict Security Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175214#M54937</link>
      <description>&lt;P&gt;For traffic logs, I usually recommend to "log at session end" for all of the security policies, and then filter out what you don't want to see. &amp;nbsp;This can be accomplished in the ACC as well as the raw logs. &amp;nbsp;One way is to do it by rule name:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="acc-traffic.png" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11162iFF9CD6860C7CA69C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="acc-traffic.png" alt="acc-traffic.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="acc-threat.png" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11163i1334CC9E6FBF589D/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="acc-threat.png" alt="acc-threat.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This shows you traffic and threats, except for those you specifically filter out in the list. &amp;nbsp;Once you find a view that you like, you can create your own custom ACC tab and have those filters pre-populated. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can do similar things in the traffic, threat, and unified logs with a query like:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; (rule neq 'allow to services') and (rule neq 'allow untrust to untrust')&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="unified-rule.png" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11164iF13B8674AD91C1B3/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="unified-rule.png" alt="unified-rule.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One benefit to this approach is that you still have logs for all of the events, but you're only shown the ones you're interested in. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You're aware of the "log at session start" and "log at session end"&amp;nbsp;options. &amp;nbsp;That governs how traffic is logged for each individual security policy. &amp;nbsp;If, for example, you have an internal application that generates way too many logs and you need to reduce the # of logs being written to disk (to increase log retention time for other traffic logs), then your next option is to not log any traffic through this particular security policy rule. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Afaik, this only affects "traffic logs" (aka traditional firewall logs). &amp;nbsp;You'll still have URL logs, Threat logs, Data Filtering logs, etc. if applicable. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your goal is to reduce logging for certain threat signatures, that can be done on a case-by-case basis by using security profile "exceptions". &amp;nbsp;Let's say you had a network monitoring server that initatiates SSH sessions to network equipment all throughout your environment and it was generating too many "SSH2 Login Attempt" information alerts in your threat logs. &amp;nbsp;You could add an exception to that profile by a.) enabling the exception, and b.) adding the IP address (source or destination). &amp;nbsp;This&amp;nbsp;action will disable that signature for traffic inspected by this specific profile and to/from the listed IP address. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="exception.png" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11165i7C1FA7788CA76874/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="exception.png" alt="exception.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hopefully that gives you enough information to accomplish your goals. &amp;nbsp;If not, let us know in more detail what you're trying to accomplish, what you see and what you'd like to see, and we'll figure it out. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2017 15:51:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175214#M54937</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2017-09-06T15:51:28Z</dc:date>
    </item>
    <item>
      <title>Re: When setting Strict Security Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175474#M54985</link>
      <description>&lt;P&gt;Hey jvalentine&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do not use the ACC much, maybe I should look into that more.&lt;BR /&gt;This seems to me to answer my questions about logging&lt;BR /&gt;.&lt;/P&gt;&lt;P&gt;With the help of Otakar.kKlier on knowing how the security profile will affect as well what i will still see in logging so be a enough to get this going&lt;/P&gt;</description>
      <pubDate>Thu, 07 Sep 2017 17:53:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175474#M54985</guid>
      <dc:creator>AdamCoombs</dc:creator>
      <dc:date>2017-09-07T17:53:13Z</dc:date>
    </item>
    <item>
      <title>Re: When setting Strict Security Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175498#M54989</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/41718"&gt;@AdamCoombs&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I would highly recommend getting to know your way around the ACC. It's an astounding resource when you know how to use it properly and filter to what you actually want to see.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Sep 2017 19:16:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175498#M54989</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-09-07T19:16:50Z</dc:date>
    </item>
    <item>
      <title>Re: When setting Strict Security Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175502#M54992</link>
      <description>&lt;P&gt;Thank you BPry&lt;/P&gt;&lt;P&gt;Can you recommend documentation for 7.1 or videos please&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Adam&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Sep 2017 19:25:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175502#M54992</guid>
      <dc:creator>AdamCoombs</dc:creator>
      <dc:date>2017-09-07T19:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: When setting Strict Security Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175661#M55025</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/41718"&gt;@AdamCoombs&lt;/a&gt;&lt;/P&gt;&lt;P&gt;The following link is a pretty good starting point in how to use the ACC and what exactly it is/isn't able to accomplish.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/71/pan-os/web-interface-help/acc" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/71/pan-os/web-interface-help/acc&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2017 14:50:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175661#M55025</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-09-08T14:50:37Z</dc:date>
    </item>
    <item>
      <title>Re: When setting Strict Security Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175665#M55027</link>
      <description>&lt;P&gt;Thank you BPry&amp;nbsp;&lt;/P&gt;&lt;P&gt;I started to look at the ACC yesterday&lt;/P&gt;&lt;P&gt;I do like the option of jumping to logging with all the commands there&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2017 15:01:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/when-setting-strict-security-profile/m-p/175665#M55027</guid>
      <dc:creator>AdamCoombs</dc:creator>
      <dc:date>2017-09-08T15:01:20Z</dc:date>
    </item>
  </channel>
</rss>

