Resource List: Firewall 9.0 Optimizing Firewall Threat Prevention (EDU-114)

Resource List: Firewall 9.0 Optimizing Firewall Threat Prevention (EDU-114)

5155
Created On 05/05/21 20:35 PM - Last Modified 05/05/21 23:21 PM


Question


Videos are from the Palo Alto Networks Learning Center course, Firewall 9.0 Optimizing Firewall Threat Prevention (EDU-114). These videos are a partial representation of the full course and it is highly encouraged to check out the EDU-114 course.

To learn more or sign up to view the online class, please go to Palo Alto Networks Education.


Environment


  • Palo Alto Firewall.
  • PAN-OS 9.0.
  • Threat Protection.


Answer


 
Block Packet-Based and Protocol-Based Attacks
Video Tutorial: How to configure ICMP drops using the zone protection profile
Video Tutorial: How to configure ICMPv6 drops using the zone protection profile
Video Tutorial: How to configure IP drops using the zone protection profile
Video Tutorial: How to configure IPv6 Drops using zone protection profile
Video Tutorial: How to configure TCP drops in the zone protection profile
Video Tutorial: How to Configure DoS Protection Policy on the Palo Alto Networks Firewall
Video Tutorial: How to Configure DoS Protection Profile Flood Session on the Palo Alto Networks Firewall
Video Tutorial: How to Configure Packet Buffer Protection on the Palo Alto Networks Firewall
Video Tutorial: How to configure Flood Protection Thresholds
Video Tutorial: How to enable Recon Protection
Video Tutorial: How to Whitelist Pen Testers
Blocking Threats from Known-Bad Sources
Video Tutorial: How To Configure DNS Signature Match (Sinkhole) Protection on the Palo Alto Networks Firewall
Video Tutorial: How to determine the URL of Malicious IP address List of MineMeld
Video Tutorial: How to use Malicious IP Lists in an EDL
Video Tutorial: Creating Static Address Group
Video Tutorial: How to Create Address Objects in the Palo Alto Networks Firewall
Blocking Threats Using App-ID
Video Tutorial: How to Manually Download and Install the Content Updates
Video Tutorial: How to review the Content Update Release Notes
Video Tutorial: How to Review New and Updated App Details
Video Tutorial: How to review and update Policies based new or modified application signatures.
Video Tutorial: How to schedule Download and Install of Content Updates
Video Tutorial: How to avoid blocking new applications
Video Tutorial: How to discover security policy rules allowing unused application
Video Tutorial: How to disable or delete unused Port-Based Rules
Video Tutorial: How to use Policy Optimizer
Blocking Threats Using Custom Applications
Video Tutorial: How to Configure an Application Override Policy on the Palo Alto Networks Firewall
Video Tutorial: How to define a Custom Application
Video Tutorial: How to Create Custom App Signature on the Palo Alto Networks Firewall
Video Tutorial: How to find application signature
Video Tutorial: How to take a Data Plane Packet Capture
Creating Custom Threat Signatures
Video Tutorial: How to Create Combination Signature on the Palo Alto Networks Firewall
Video Tutorial: How To Create Custom Threat Signatures on the Palo Alto Networks Firewall
Blocking Threats in Encrypted Traffic
Video Tutorial: How to Manage Digital Certificates on the Palo Alto Networks Firewall
Video Tutorial: How To Configure SSH Proxy Decryption on the Palo Alto Networks Firewall
Video Tutorial: How To Configure SSL Forward Proxy Decryption on the Palo Alto Networks Firewall
Video Tutorial: How to Configure SSL Inbound Inspection on the Palo Alto Networks Firewall
Video Tutorial: How to Configure Forward Trust Certificate on the Palo Alto Networks Firewall
Video Tutorial: How to Generate a CSR and import the Signed Certificate
Video Tutorial: How to configure Master Key
Blocking Threats in Allowed Traffic
Video Tutorial: How to Block Known Exploits on the Palo Alto Networks Firewall
Video Tutorial: How to Block Known Spyware on the Palo Alto Networks Firewall
Video Tutorial: How to Block Known Virus on the Palo Alto Networks Firewall
Video Tutorial: How to Configure Data Patterns & Data Filtering Profiles on the Palo Alto Networks Firewall
Video Tutorial: How to Configure Security Policy Rule Tags Descriptions on the Palo Alto Networks Firewall
Video Tutorial: How to Configure Security Profile Groups on the Palo Alto Networks Firewall
Video Tutorial: How to Configure URL Filtering on Palo Alto Networks Firewall
Video Tutorial: How to Configure Wildfire Forwarding on the Palo Alto Networks Firewall
Video Tutorial: How to force Per Rule Tag, Description or Audit Comments
Video Tutorial: How to view submissions to Wildfire in the Wildfire Logs and Portal
Blocking Threats from Stolen Credentials
Video Tutorial: How to Configure Anti-Phishing Protection on the Palo Alto Networks Firewall
Video Tutorial: How to create Admin Role Profiles
Video Tutorial: How to Create User Account in the Local User Database
Viewing Threat and Traffic Information
Video Tutorial: How To Use the App Scope Report in the Firewall
Video Tutorial: How to Use the ACC Tab in the Firewall
Video Tutorial: How to Configure a Botnet Report on the Palo Alto Networks Firewall
Video Tutorial: How To Configure Custom Reports on the Palo Alto Networks Firewall
Video Tutorial: How To Configure Log Forwarding on the Palo Alto Networks Firewall
Video Tutorial: How To View and Manage Predefined Reports on the Palo Alto Networks Firewall
Video Tutorial: How to customize the dashboard
Video Tutorial: How to monitor Threats using Threat Activity Widget


Additional Information


Note: The videos are from the Palo Alto Network Learning Center course, Firewall 9.0: Optimizing Firewall Threat Prevention (EDU-114).
Please go to Palo Alto Networks Education to learn more or sign up for the online class.


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000001VJ5CAM&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language