Proactively Enforce Security Checks
Focus
Focus
Strata Cloud Manager

Proactively Enforce Security Checks

Table of Contents

Proactively Enforce Security Checks

Use the
Panorama CloudConnector Plugin
to block faulty configurations before they’re committed.
Where Can I Use This?
What Do I Need?
  • NGFW (Managed by Strata Cloud Manager)
  • NGFW (Managed by PAN-OS or Panorama)
  • VM-Series, funded with Software NGFW Credits
  • AIOps for NGFW Premium license (use the Strata Cloud Manager app)
You can customize security posture checks for your deployment to maximize relevant recommendations using the features below.
  • Security Checks
    List of the best practice checks that AIOps for NGFW uses to evaluate your configuration. The configuration of firewalls and Panorama is compared to Palo Alto Networks best practice checks to assess the security posture of your devices and to generate security alerts. You can see a list of the best practice checks that are used to evaluate your configuration.
    Here, you can:
    1. Set the severity level for checks to identify the checks that are the most critical to your deployment.
    2. Temporarily disable checks.
      If you choose to disable a check, you can specify how long it will remain disabled and leave a comment explaining the reason for disabling it.
    3. Set the response when a check fails.
  • Zone to Role Mapping
    Map the zones in NGFWs to roles to get customized recommendations.
  • Role to Security Service Mapping
    Manage the security services needed for traffic between zones and roles in all NGFWs.
The
Panorama CloudConnector Plugin
enables you to take proactive measures against suboptimal configurations by blocking commits that do not pass particular best practice checks. When you indicate in
AIOps for NGFW
that you want a check to
Fail Commit
, Panorama automatically blocks commits of any configuration that does not pass that check. Rather than wait to receive an alert about a failed best practice check, use the plugin to keep configuration issues out of your deployment in the first place.
  1. Specify the best practice checks that will block commits on failure.
    1. Select
      Manage
      Security Posture
      Settings
      .
    2. Find the check that you want to block commits.
    3. Set
      Action on Fail
      to
      Fail Commit
  2. Verify by attempting to commit a configuration that does not pass the check.
    1. Log in to Panorama.
    2. Violate the best practice check that you specified to
      Fail Commit
      .
    3. Select
      Commit
      Commit to Panorama
      Validate Configuration
      .
    You should see a dialog stating that the validation failed because the configuration did not pass the best practice check.
    Setting a check to
    Fail Commit
    causes the check to fail both validation and the actual commit operation.
    See Manage: Security Posture Settings for more information.

Recommended For You