- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
01-31-2023 06:15 AM
You can verify the action taken by looking at the associated threat logs on the firewall. If it says 'alert' then the firewall didn't block the activity.
Personally my default assigned profile has critical and high severity alerts set to reset-both for client and server traffic. This voids the default action so that whatever signatures match this severity aren't allowed by default, and then I can make overrides as required. The downside to this method is that sometimes PAN will set a disruptive signature to alert at first to verify that they don't have any false positives before they change the default action; in this instance if I were to see false positives I need to manually override these specific signatures.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!