<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best Practices query for Security settings in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-query-for-security-settings/m-p/360011#M88042</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp; Thanks . this will certainly help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding points such as Threat prevention and Wildfire :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For eg : There is a rule from a User zone to Printer zone : Does it make sense to enable Threat and Wildfire .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I mean doesnot it cause more process utilization ? I am just asking from functionality point of view .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The other points for URL , APP ID and SSL Decryption is understandable .&lt;/P&gt;</description>
    <pubDate>Fri, 30 Oct 2020 20:51:02 GMT</pubDate>
    <dc:creator>FWPalolearner</dc:creator>
    <dc:date>2020-10-30T20:51:02Z</dc:date>
    <item>
      <title>Best Practices query for Security settings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-query-for-security-settings/m-p/359883#M88024</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a customer who has Threat prevention , AV, Wildfire ,licesne&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Network is divided into various Security Zones - like Users , Printers, Voip , Front end servers , Backend Servers , there are around 15 zones&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now we have the BPA report and a lot in terms of APP ID and Service needs to be fixed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Customer wants a kind of matrix as a Industry Best Practice about from which zone to which zone below needs to be enabled&lt;/P&gt;&lt;P&gt;URL Filtering&lt;/P&gt;&lt;P&gt;Threat Prevention- AV, Antispyware&lt;/P&gt;&lt;P&gt;Malware Anlysis&lt;/P&gt;&lt;P&gt;SSL Decryption&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do we have any Best Pratice Matrix so that once we fix the rulebase to specific zones with APP ID , we have to be sure where to enable these security features&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2020 11:41:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-query-for-security-settings/m-p/359883#M88024</guid>
      <dc:creator>FWPalolearner</dc:creator>
      <dc:date>2020-10-30T11:41:20Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices query for Security settings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-query-for-security-settings/m-p/359926#M88037</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I like to have the following:&lt;/P&gt;
&lt;P&gt;URL filtering: only for outbound web traffic (not inbound or internal)&lt;/P&gt;
&lt;P&gt;Threat Prevention- AV, Antispyware:&amp;nbsp; On all policies, if something breaks, add an exception for just hat one policy, i.e. a ssh brute for due to a monitoring solution, just create a special policy that ignores that and only for that traffic policy)&lt;/P&gt;
&lt;P&gt;Malware Anlysis: On all policies, same reasoning as above.&lt;/P&gt;
&lt;P&gt;SSL Decryption: Where practical, external traffic is a must, inbound and internal traffic at your discretion.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In addition to this use policies that have Applications instead of Services(ports), where applicable. This will help as well. i.e. only DNS application traffic from your internal DNS servers and only to a public DNS server that is secure (such as OpenDNS, cloudflare, etc.). This will prevent internal clients bypassing your internal DNS and/or exfiltrating data out using the DNS protocol.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2020 16:52:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-query-for-security-settings/m-p/359926#M88037</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-10-30T16:52:50Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices query for Security settings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-query-for-security-settings/m-p/360011#M88042</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp; Thanks . this will certainly help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding points such as Threat prevention and Wildfire :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For eg : There is a rule from a User zone to Printer zone : Does it make sense to enable Threat and Wildfire .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I mean doesnot it cause more process utilization ? I am just asking from functionality point of view .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The other points for URL , APP ID and SSL Decryption is understandable .&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2020 20:51:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-query-for-security-settings/m-p/360011#M88042</guid>
      <dc:creator>FWPalolearner</dc:creator>
      <dc:date>2020-10-30T20:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices query for Security settings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-query-for-security-settings/m-p/360014#M88043</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;While yes it does increase load on the system, I try my best to follow the Zero Trust approach. So yes I will enable those features for the internal traffic as well. This can indicate a malicious actor on the network attempting to get a foothold somehow. It will also potentially stop lateral movement.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2020 21:51:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-query-for-security-settings/m-p/360014#M88043</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-10-30T21:51:11Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices query for Security settings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-query-for-security-settings/m-p/363754#M88410</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The thing is i have to define the KPI for each of the Security feature ; I have got the BPA report and now&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what should be the required KPI once we implement all the security features&lt;/P&gt;</description>
      <pubDate>Wed, 18 Nov 2020 10:53:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-query-for-security-settings/m-p/363754#M88410</guid>
      <dc:creator>FWPalolearner</dc:creator>
      <dc:date>2020-11-18T10:53:30Z</dc:date>
    </item>
  </channel>
</rss>

