Reader small image

You're reading from  Mastering Palo Alto Networks - Second Edition

Product typeBook
Published inJun 2022
PublisherPackt
ISBN-139781803241418
Edition2nd Edition
Concepts
Right arrow
Author (1)
Tom Piens aka Piens aka 'reaper'
Tom Piens aka Piens aka 'reaper'
author image
Tom Piens aka Piens aka 'reaper'

Tom Piens is a seasoned cybersecurity professional with a distinguished career closely tied to Palo Alto Networks. With over two decades of experience in the field, Tom has played a pivotal role in shaping the digital defense landscape. His journey began as the first international (outside of the continental US) support engineer at Palo Alto Networks, where he rapidly ascended the ranks due to his remarkable aptitude for innovative solutions. Beyond his technical prowess, Tom's passion for knowledge transfer has made him a sought-after mentor. He's been instrumental in cultivating a dynamic learning environment within the Palo Alto Networks LIVE community, fostering a culture of continuous growth and excellence. His innate ability to simplify complex concepts has empowered his colleagues to stay at the forefront of cybersecurity trends.
Read more about Tom Piens aka Piens aka 'reaper'

Right arrow

Understanding and preparing security profiles

There are several types of security profiles, like Antivirus, Vulnerability Protection, URL Filtering, and Anti-Spyware. We’ll cover all of these different profiles in the following sections.

Before you can start building a solid security rule base, you need to create at least one custom security profile of each type to use in all of your security rules. There are default profiles available, but these are set to read-only, which means that if you start using them in security rules, you’ll need to replace them one by one if you create custom ones later.

Security profiles are evaluated by the first security rule that a session is matched against. If a six-tuple is matched against a security rule with no or limited security profiles, no scanning can take place until there is an application shift and the security policy is re-evaluated. All security rules need to have security profiles.

The Antivirus profile

...
lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Mastering Palo Alto Networks - Second Edition
Published in: Jun 2022Publisher: PacktISBN-13: 9781803241418

Author (1)

author image
Tom Piens aka Piens aka 'reaper'

Tom Piens is a seasoned cybersecurity professional with a distinguished career closely tied to Palo Alto Networks. With over two decades of experience in the field, Tom has played a pivotal role in shaping the digital defense landscape. His journey began as the first international (outside of the continental US) support engineer at Palo Alto Networks, where he rapidly ascended the ranks due to his remarkable aptitude for innovative solutions. Beyond his technical prowess, Tom's passion for knowledge transfer has made him a sought-after mentor. He's been instrumental in cultivating a dynamic learning environment within the Palo Alto Networks LIVE community, fostering a culture of continuous growth and excellence. His innate ability to simplify complex concepts has empowered his colleagues to stay at the forefront of cybersecurity trends.
Read more about Tom Piens aka Piens aka 'reaper'