Anyone found a solution to get the following false positive not to display? Following all appear enabled, but still show up as failed Interzone Deny Rule With Logging Intrazone Deny Rule with Logging New Apps with Application Filter Inbound Malicious IP Address Feed Outbound Malicious IP Address Feed HIP Profiles Used In Rule Base --- already used security policies where source = vpn Quic App Deny - I have an exception for traffic from Cisco Umbrella forwarders SSH Proxy / SSH Tunnel - I have a rule configured, but first must allow specific SSH connections Looking at the Best Practices Assessment pdf file -> Policies, it looks like Device Group(s) vsys1 is passing most of these, but Device Group(s) shared is failing. I only have a single firewall. Any idea how to fix these? I do want to get these fixed up to show the report during an upcoming meeting, and explain where we have compensating controls, not that the report may be incorrect...
... View more