General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.
About General Topics
Post a discussion here if you have general questions regarding configuration and troubleshooting for Palo Alto Networks products. Use this forum to collaborate with like-minded security professionals to improve your security posture.

Discussions

Ensuring a Safe and Secure Community: How You Can Help

 

Dear LIVEcommunity Members,

 

Ensuring a top-tier experience on LIVEcommunity and protecting our members’ safety and security is our top priority! To this end, we have implemented additional security measures to safeguard our vibrant global commun

...

safe-community_oct24.jpg
report-content.jpg
jforsythe by Community Team Member
  • 434 Views
  • 0 replies
  • 2 Likes

ThreatID 33542 and Facebook

I'm seeing a lot of alerts in the last couple days for threatID 33542 when users are visiting facebook via http://www.facebook.com/

Could this be a false positive?  Anyone else seeing a jump in this threat?

Tnx, Tom

TomS by L1 Bithead
  • 4084 Views
  • 8 replies
  • 0 Likes

Data Filtering Patterns

Does anyone know the logic used to interpret data patterns/filtering expressions?

By this I mean, if I have two patterns:-

Confidential\\Eyes-Only     (exact match Confidential\Eyes-Only)

and

Confidential\\.+               (wildcard match Confidential\*)

...

apackard by L4 Transporter
  • 2001 Views
  • 1 replies
  • 0 Likes

Difference between session start vs end when doing DENY

The difference (generally speaking) between "log on session start" and "log on session end" (for ALLOW rules) is that the "session end" will also log application and trafficvolume however it will not show up in the log-files until the session really

...

mikand by L6 Presenter
  • 4131 Views
  • 1 replies
  • 0 Likes

Large User-ID Deployments

All,

We're in the process of migrating from a WCCP Proxy implentation for URL filtering to the Palo Alto solution (LOTS of work needs to be done obviously!) and we're starting to work with the User-ID Agent and have some questions..

First, I'm curious

...

steveo by L3 Networker
  • 5121 Views
  • 6 replies
  • 1 Likes

Custom Block Page

Hi

I'm finding it really difficult to upload a customised url block page. Each time I do it only the default page appears. Out of around 20 times of uploading the edited txt message (custom block message) it's only ever updated to the new message on

...

djrodb by L3 Networker
  • 2965 Views
  • 4 replies
  • 0 Likes

Resolved! Logs retained after vSys deleted?

If a vSys is deleted, i'm assuming (dangerous i know), that the logs related to that vSys are deleted off of the device.

Is this a valid assumption?

What about any logging forwarded to Panorama, are they deleted or retained?

If not a valid assumption, i

...

u11756 by Not applicable
  • 2106 Views
  • 2 replies
  • 0 Likes

CNSE Review Guide

Has anyone have any idea what kind of topic you will be asked? Want to start reviewing for this certification.

thanks

friento by L3 Networker
  • 4494 Views
  • 8 replies
  • 0 Likes

Palo and TMG

Hello

I have a tmg box at the moment that publishes our web sites, can i still leave that still setup and point the palo at the tmg for the web sites we publish? or how do i do that with the palo in place.

Mark

Office 365 App Detection

Hi,

I was wondering if there are any plans or a method how to detect Office 365 traffic?

We have no URL scanning license on the box, so we depend on the App detection method.

Because all traffic is a SSL connection, PaloAlto reports the traffic as gene

...

u2343 by Not applicable
  • 2251 Views
  • 1 replies
  • 0 Likes

No IP addresses on HA interfaces

Hi all,

I'm working for a new company building out several new data centers. They got a jump on getting things up and running before hiring their own resource and had a consultant setup a couple of pairs of PA-2050s. They are active/passive. The consu

...

GV27 by L1 Bithead
  • 1723 Views
  • 1 replies
  • 0 Likes

commit is always there

I have noticed that whenever I log into my firewall now the commit option is always available.  I haven't made changes yet I can click commit.  Whats up with that? I would expect it to be grayed out like right after I do the commit.

Dropbox - allow web app but block client?

Our IT department has decided to allow Dropbox, but only the web interface. Installed client traffic should still be blocked.

Since the only identified app in Palo Alto is dropbox, we cannot block that app.

Is there any suggestion on how can I do this?

...

oaus by L0 Member
  • 8491 Views
  • 8 replies
  • 0 Likes

Vulnerability Protection - BlockIP

I have configured a vulnerability protection profile to blacklist the ip addresses of attackers for all brute force login attempts with the signatures provided in the threat database.  The profile works very well.  However, i would now like to see th

...

Resolved! Threath Monitor / App Monitor

Hi all,

Does anybody already succeed to auto send either Threat or Network monitor by email ?

Or able to export ? or re-create ?

Thanks for your hlep

Vincent

VinceM by L5 Sessionator
  • 4442 Views
  • 4 replies
  • 0 Likes
  • 23698 Posts
  • 110 Subscriptions
Top Solution Authors
Labels