In AWS, the auto scaling process can fail for multiple reasons. Check out some self-inflicted causes for auto-scaling failures in AWS. We also discuss how to avoid these self-inflicted failures by following a few simple best practices.
How the columns FILES and TOP FILE TYPES are generated inside the SaaS report. There can be cases where the FILES column shows a significant number of files but TOP FILE TYPE does not show any entry. How can this happen?
When purchasing Palo Alto Networks devices or services, log storage is an important consideration. Ensuring sufficient log retention enables operations by ensuring data is available to administrators for troubleshooting and incident response. But how do you size for storage of the logging service?
Organizations with industrial control systems (ICS) have been on a path to secure the border between IT (corporate network) and OT (ICS network) for some time. This document shows how to simulate the IT/OT boundary in order to test appID, userID, and other features within the Palo Alto Networks firewall. This entire lab can be virtualized on a single laptop.
Antivirus collision is a case where a signature created for one malware file, or a malware family, triggers on a benign file unrelated to original file for which the signature was created. In order to understand it a little better, read the background information and detailed explanation offered in this article.
Inside WebGUI > Network> IPSec Tunnels, the IKE Gateway Status (Phase 1) light is red, whereas the IPSec Tunnel (Phase 2) light is green. However, traffic still continues to flow through the tunnel properly. After some time, the IKE Gateway Status light returns to green. Is this normal?
Ask questions and #GetAnswers here in the Live Community, but now we have aquestionand challengefor you! Responding to either reaps great rewards for you, including a nice accumulation of communitybadges.
Reaper's challenge still stands, and that nice, cozy-warm hoodie is yet unclaimed! It could be yours -- easily, too! Show off those hacking skills, or just send us a funny pic (c'mon) or a spoof of your liking and ours. Easy peasy, and it earns you a special badge, fame, recognition and who knows where that may take you|? But, remember, you must play to win!