BPA Report: Methodology and Training Links for Security Posture

L4 Transporter

Read BPA Report: Methodology and Training Links for Security Posture to learn about resources to use from the BPA report. See how the BPA report can guide you towards an improved security posture through best practice recommendations. Got Questions? Get Answers on LIVEcommunity.

 

The BPA tool has added web links right in the report, so you can easily access specific documents that relate to a specific tab in the BPA report.

 

The links added specifically help users evaluate their security policy capability adoption, evaluate their best practice configuration, suggest how to prioritize best practices, and suggest how to implement the same. The links also provide a guided approach so you can move from your current state of posture to a more secure posture that is defined as a goal.

 

Please note that the same links will not be in each tab. Only documents links that apply to that specific tab will be shown. For example, if you are in the "Trending" tab, you get different links from the "Device Group" tab. This helps to provide the right guidance and moves you towards the next steps in security adoption.

 

Some of the links you see are as follows:

 

Transition to Best Practices

https://docs.paloaltonetworks.com/best-practices/transition-to-best-practices

 

Videos explaining how to use Heatmap, BPA and explaining all the components

https://paloaltonetworks.com/bpatraining

NOTE: You will need to register for a Learning Center account to view the BPA Training.

 

Below is a sample of a Security Profile Adoption Summary. In this page, on the top right, we added links that are relevant to this tab. 

Security policy capability adption Summary.pngSecurity Profile Adoption Summary

In the left navigation, we added a new section for "Learn More" that provides all the links that are necessary as you transition to best practices, videos to learn the heatmap and BPA, and more. 

Methodolgy and Training links guiding towards security goals.pngBPA Report Learn More Reference Links

 

See Also:

Getting Started with Best Practices

Evaluate Security Policy Capability Adoption

Prioritize Best Practice Changes

Transition to Best Practices

977 Views