General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Discussions

The Cortex UX Research Lab Is Seeking Participants!

 

Hello LIVEcommunity!

 

 

The Cortex team is currently developing a significant UX research effort, the Cortex UX Research Lab, for all aspects of Cortex. As a part of that, we need you — the user — to help us best understand how people use our pro

...

Screen Shot 2023-01-17 at 9.59.01 AM.png
JayGolf by Community Team Member
  • 306 Views
  • 0 replies
  • 0 Likes

Traffic Monitor Filter Basics

  1. PURPOSE

The purpose of this document is to demonstrate several methods of filtering and looking for specific types of traffic on the Palo Alto Firewalls. They are broken down into different areas such as host, zone, port, date/time, categories. At the

...

gmchenry by L1 Bithead
  • 22959 Views
  • 13 replies
  • 7 Likes

Resolved! Report-based Logging Without Interfering With Policies

Hi PANland, I'm back with another implementation question th

 

So PAN devices log when you tell them to, but for their reports feature it seems that with or without logs they will keep unmutable counters of very basic information that has to be parse

...

Resolved! How do I identify which PC made a suspicious DNS query?

Hello

 

I have setup the Anti-Spyware Profile in our firewall and I have a lot of threat logs of type spyware suspicious DNS  queries from a domain controller machine and this is cleansed.

Monitor > Logs > Threat list

As you can see I have configure

...

sinkhole.jpg
SOC_CSG by L4 Transporter
  • 5112 Views
  • 3 replies
  • 0 Likes

Response Page on Internet Zone

Hello Community,

our customer has a Cluster of PA-3020 with PANOS 7.0.2.

We have enabled Application Block Page and the Internal users can view it properly.

Customer has a rule to permit Web-browsing traffic from Internet to DMZ.

 

 

When users try

...

image001.png