Weekly Recap 50

by ‎12-09-2016 08:44 PM - edited ‎05-11-2017 06:46 AM (1,440 Views)

NEW!! HOW TO OPEN A SUPPORT CASE ON ROUTING ISSUES

When troubleshooting routing issues, a packet capture on the data plane and the management plane is critical for troubleshooting. Let's look at the information required by the support engineer and a few case studies showing common issues with OSPF routing and solutions.

From the article, please send comments to @sraghunandan

 

Join us on a journey to recap a few of our high-hitting articles and videos from a not-so-distant past and a great year!

 

GETTING STARTED: CUSTOM APPLICATIONS AND APP OVERRIDE

What More Can My Firewall Do? Custom Applications and App Override

Do you have custom-created, proprietary applications or traffic you want to identify by a custom name, perhaps a web service identified as web-browsing, making it harder for you to create reporting? See how a signature-based custom App-ID can help.

From the article, please send questions, comments and share your experience with Tom @reaper

 

VIDEO TUTORIAL: CUSTOM REPORTS

What More Can My Firewall Do? Custom Reports

After configuring the firewall, enabling security policies and profiles, you can sit back and focus on other tasks, knowing that your network is secure. A good way to keep that peace of mind without constantly checking logs and searching for anomalies is to use scheduled reports to keep you posted on everything happening in your network. Take a look at our video, then follow along step-by-step to configure your own custom reports.

From the video, share your experience or ask Tom tons of questions about custom reports @reaper

 

 

DISCUSSION OF THE WEEK (DotW)

Blast from a recent past: Block Web Ads with an External Dynamic List

How do you block web ads using an external dynamic list, or EDL, and get an 'Ad blocked' page? The Palo Alto Networks firewall presents a number of options. Check out our 'member-supported' Discussion of the Week (DotW) to learn more.

Ready, aim, fire from the article, and shoot your observations and comments to Kim @kiwi

 

TIPS & TRICKS

Complete Action List in Profiles

Beginning with PAN-OS 7.0, we've added more actions you can take with threat signatures. Previously, only allow, alert, and block actions were permitted, but we now offer more scalable actions that permit more control and granularity, and  are also logged in threat logs. We even illustrate mapping actions for you if you're downgrading or upgrading around PAN-OS 7.0. You're going to like this!

Let Kim know if you have questions, comments, or insight on actions with threat signatures @kiwi

 

 

MICROSOFT OFFICE 365

Microsoft Office 365 Access Control Field Support Guide

Microsoft Office 365 Access Control Field Support Guide

From the article, please send comments to @msandhu or @nasingh

 

App-ID for Office 365

From the article, please send comments to @msandhu
 
 
TOOLS AND RESOURCES

MineMeld

This versatile tool includes the repository on GitHub, articles, discussions and more. Use MineMeld to mine, collect, aggregate and filter threat indicators, then meld your knowledge with that of other users. Engage here in the Live Community!

 

OPSWAT Support Charts for GlobalProtect 3.1.0

Please refer to the OPSWAT Support Chart for a list of third-party products that can be detected by a specific GlobalProtect software version.
From the article, please send comments to @srajasekar

 

Tour the New Live Community (video with transcript)

We speak 6 different languages in the Live Community! Take our quick tour of discussion and navigation and let us know what you think!

From the article, video and transcript, please send comments in any language to @jdelio or @carnould

 

YOUTUBE AND TWITTER

Live Community YouTube Channel

Check out the Live Community channel on YouTube! Thousands of subscribers and views! Check out our playlists, including the complete Getting Started series on YouTube.  Also watch videos from Tech Docs and the Technical Lightboard series.

 

Learn about new features in the Live Community, including our language offerings in the discussion forum. We speak your language!

 

Ignite travels to Vancouver, BC in 2017! New to the community? New to Ignite? Learn more about our annual conference on YouTube at What Is Ignite Conference 2017?

 

Live Community on Twitter

Check us out on Twitter to see what's trending in the community.

Join us at @PALiveCommunity.

 

 

AROUND PALO ALTO NETWORKS

Top Tweets                 
·         Did you hear? @paloaltontwks Traps won @CRN's 2016 Product of the Year Award for Endpoint Security! http://bit.ly/2fQ4kTl
·         Password mgmt & multifactor authentication: @rinkisethi shares 2 ways to improve #cyberhygiene http://oak.ctx.ly/r/59wat via @SecurityRT
·         #2017cyberpredictions: Ransomware & SaaS challenges persist in healthcare http://bit.ly/2gTFe5c
·         #2017cyberpredictions: Financial sector attackers will continue to exploit cracks in blockchain technology http://bit.ly/2gCliRf
·         Preparation, proliferation, personnel & protection: @GregDaySecurity shares his #2017cyberpredictions for EMEA http://bit.ly/2gaP7HT
 
LinkedIn/Facebook/Google+ Posts             
·         Did you hear? Palo Alto Networks Traps advanced endpoint protection won CRN's 2016 Product of the Year Award for Endpoint Security! http://bit.ly/2fQ4kTl

 

Palo Alto Networks Traps advanced endpoint protection wins CRN's 2016 Product of the Year!Palo Alto Networks Traps advanced endpoint protection wins CRN's 2016 Product of the Year!

 

More...

·         2017 Cybersecurity Prediction: Ransomware & SaaS challenges persist in healthcare http://bit.ly/2gTFe5c
·         2017 Cybersecurity Prediction: Financial sector attackers will continue to exploit cracks in blockchain technology http://bit.ly/2gCliRf
·         Palo Alto Networks CSO EMEA shares his cybersecurity predictions for 2017 http://bit.ly/2gaP7HT


Threat and Cybersecurity Blogs
·         Shamoon 2: Return of the Disttrack Wiper
·         PluginPhantom: New Android Trojan Abuses “DroidPlugin” Framework
·         What Are Unknown Cyber Threats? (And Are They Really Unknown?)
·         The Cybersecurity Canon: How to Measure Anything in Cybersecurity Risk
 
It's All About the Cloud
·         3 Fundamentals for Secure Cloud Adoption
 
2017 Cybersecurity Predictions
·         2017 Cybersecurity Predictions: Ransomware and SaaS Challenges Persist in Healthcare
·         2017 Cybersecurity Predictions: Financial Sector Attackers Exploit Cracks in Blockchain Technology
·        2017 Cybersecurity Predictions: Preparation, Proliferation, Personnel and Protection = A Bumper Yea...
 
Partners
·         Traps Earns CRN Product of the Year Award for Endpoint Security
·         Channel Scoop – December 2, 2016
 
Regional
·        2017 Cybersecurity Predictions: Preparation, Proliferation, Personnel and Protection = A Bumper Yea...
·         Calling All Women in Technology: Japan’s Cybersecurity Field Needs You
 
Events
·         Cyber3 Conference: Actionable Takeaways for Global Thought Leaders

 

Stay with us as we look forward to 2017 and transitioning from our Weekly Recap to the new LiveWeek!

 

Tilll next week--

Gail

@editeur

Ask Questions Get Answers Join the Live Community