Configuration Wizard Policies

Here you will find content that will no longer be featured across LIVEcommunity. Although the content will soon be retired, it may still be relevant for your needs. For the most accurate and updated information on BPA, please visit the AIOps for NGFW articles.

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
About Configuration Wizard Policies

Here you will find content that will no longer be featured across LIVEcommunity. Although the content will soon be retired, it may still be relevant for your needs. For the most accurate and updated information on BPA, please visit the AIOps for NGFW articles.

  Before you allow and block traffic by application, it is advisable to block traffic from IP addresses that Palo Alto Networks and trusted third-party sources have proven to be high risk in nature.
View full article
  Before you allow and block traffic by application, it is advisable to block traffic from IP addresses that Palo Alto Networks and trusted their-party sources have proven to be high risk in nature.
View full article
  Before you allow and block traffic by application, it is advisable to block traffic from IP addresses that Palo Alto Networks and trusted third-party sources have proven to be malicious.
View full article
  The security rule will ensure that your network is always protected against the IP addresses from the Palo Alto Networks malicious IP address feeds and other feeds, which are compiled and dynamically updated based on the latest threat intelligence. Ensure the security rule is logging at session end and a log forwarding profile is applied to track activity.
View full article
  The Intrazone Allow Rule With Logging assessment checks to see if the firewall has a default security policy rule at the bottom of the rulebase that allows all traffic whose source and destination are within the same zone. Override the rule, enable log at session end to gain visibility into the allowed traffic, and apply at least the Antivirus, Anti-Spyware, and Vulnerability Protection security profiles to protect against threats.
View full article
  The Interzone deny rule with logging assessment checks to see if there’s a policy rule that either modifies or overrides the default Interzone Deny rule. It is best practice to enable logging at session end for traffic between zones. The firewall has a default security policy rule.
View full article
  • 6 Posts
  • 140 Subscriptions
Customer Advisories

Your security posture is important to us. If you’re a Palo Alto Networks customer, be sure to login to see the latest critical announcements and updates in our Customer Advisories area.

Learn how to subscribe to and receive email notifications here.

Listen to PANCast

PANCast is a Palo Alto Networks podcast that provides actionable insights to customers, helping you maximize your investment while improving your cybersecurity posture.

Labels
Top Contributors