<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Policy order in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/policy-order/m-p/9440#M6925</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It was explained to me that each rule should have them. At least for how I was applying policies. You just want to make sure that each packet allowed through has policies that apply to your traffic at risk. If you have a rule that traffic matches on the top and you don't have any threat policies there then none will be applied because the traffic has already been permitted without. If I am incorrect in this understanding or was not clear enough please post further clarification.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From: jorge &amp;lt;live@paloaltonetworks.com&amp;lt;mailto:live@paloaltonetworks.com&amp;gt;&amp;gt; &lt;/P&gt;&lt;P&gt;Reply-To: live &amp;lt;live@paloaltonetworks.com&amp;lt;mailto:live@paloaltonetworks.com&amp;gt;&amp;gt; &lt;/P&gt;&lt;P&gt;To: Brad Spilde &amp;lt;brad.spilde@daktronics.com&amp;lt;mailto:brad.spilde@daktronics.com&amp;gt;&amp;gt; &lt;/P&gt;&lt;P&gt;Subject: &lt;A href="https://live.paloaltonetworks.com/DevCenter"&gt;&lt;/A&gt; Policy order &lt;A href="https://live.paloaltonetworks.com/prpcsf-1mh-c2k"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it important to have the Antivus, Vulnerability and Anti-Spyware rule as the first policy?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 17 May 2012 20:35:44 GMT</pubDate>
    <dc:creator>bspilde</dc:creator>
    <dc:date>2012-05-17T20:35:44Z</dc:date>
    <item>
      <title>Policy order</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-order/m-p/9439#M6924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is it important to have the Antivus, Vulnerability and Anti-Spyware rule as the first policy?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 May 2012 18:41:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-order/m-p/9439#M6924</guid>
      <dc:creator>jorge</dc:creator>
      <dc:date>2012-05-17T18:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: Policy order</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-order/m-p/9440#M6925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It was explained to me that each rule should have them. At least for how I was applying policies. You just want to make sure that each packet allowed through has policies that apply to your traffic at risk. If you have a rule that traffic matches on the top and you don't have any threat policies there then none will be applied because the traffic has already been permitted without. If I am incorrect in this understanding or was not clear enough please post further clarification.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From: jorge &amp;lt;live@paloaltonetworks.com&amp;lt;mailto:live@paloaltonetworks.com&amp;gt;&amp;gt; &lt;/P&gt;&lt;P&gt;Reply-To: live &amp;lt;live@paloaltonetworks.com&amp;lt;mailto:live@paloaltonetworks.com&amp;gt;&amp;gt; &lt;/P&gt;&lt;P&gt;To: Brad Spilde &amp;lt;brad.spilde@daktronics.com&amp;lt;mailto:brad.spilde@daktronics.com&amp;gt;&amp;gt; &lt;/P&gt;&lt;P&gt;Subject: &lt;A href="https://live.paloaltonetworks.com/DevCenter"&gt;&lt;/A&gt; Policy order &lt;A href="https://live.paloaltonetworks.com/prpcsf-1mh-c2k"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it important to have the Antivus, Vulnerability and Anti-Spyware rule as the first policy?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 May 2012 20:35:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-order/m-p/9440#M6925</guid>
      <dc:creator>bspilde</dc:creator>
      <dc:date>2012-05-17T20:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: Policy order</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-order/m-p/9441#M6926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You're right.  I've gone ahead and applied them to all the policies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 May 2012 20:37:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-order/m-p/9441#M6926</guid>
      <dc:creator>jorge</dc:creator>
      <dc:date>2012-05-17T20:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: Policy order</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-order/m-p/9442#M6927</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The security rules in PA devices is executed in top-down first-match order (similar to how acl's in cisco devices works).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which gives that if you have a rule where you didnt enable antivirus etc and this rule is hit then the traffic hitting this rule wont be examined for viruses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the "test" command in cli to figure out which rule will be matched for which traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A general recommendation is to use whitelisting instead of blacklisting (e.g. rules with which traffic you want to allow and then block as default) and when blacklisting is used make sure to make that as broad as possible while whitelisting should be as narrow as possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example setting srczone:any is mostly a good thing for blacklists but often a bad thing for whitelists (security wise).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 May 2012 21:03:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-order/m-p/9442#M6927</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-05-17T21:03:59Z</dc:date>
    </item>
  </channel>
</rss>

