Printer Friendly Page

3.5 Threat

 

This activity results in configuration of The Day 1 Security stance of the Palo Alto Networks Platform.  Implementation of The Day 1 Security Stance is a Palo Alto Networks recommended best practice.The Day 1 Security stance provides visibility into Critical and High categories (as defined by WildFire) Viruses, Spyware, and Vulnerability Exploit Attempts.  Tasks include:

  • Verify Deployment of all correct and agreed upon Threat Profiles,  Logging , Email alerting and URL Profiles as per agreed upon settings in HLD/TDD
  • Customize and Deploy Custom Tuning and Threat Reports
  • Validate Custom Reporting Results are accurate
  • Perform a Post Cutover Threat Assessment
  • Enable all Transformation Visibility Level Best Practices

 

Deliverables: 

  • Post Cutover Threat Assessment Document
  • Threat Reports 
  • Addendum to the As-Built document User-ID Visibility Checklist (Template)

 

Consultant Collateral: 

  • Threat Visibility Best Practices Deployment Guide
  • Threat Reports Checklist (from Threat Practice)
  • Post-Cutover Threat Assessment Checklist (from Threat Practice)
Ask Questions Get Answers Join the Live Community
Version history
Revision #:
3 of 3
Last update:
‎07-02-2020 11:21 AM
Updated by:
 
Labels
Contributors