What are Labs?
The goal is to take part in the ongoing and open discussion of these challenges. We welcome suggestions for future Labs or if you are so inclined you can create your own Lab and share it with us via email@example.com
For access to live Palo Alto Networks boxes for lab practice purposes please go to: https://www.paloaltonetworks.com/services/education/cybersecurity-skills-practice-lab
This is a no charge service provided by Palo Alto Networks.
If you would like to be notified by email when new labs become available, sign up here.
In order to prevent successful cyberattacks, many organizations collect indicators of compromise (IOCs) from various threat intelligence providers with the intent of creating new controls for their security devices. Unfortunately, legacy approaches to aggregation and enforcement are highly manual in nature, often creating complex workflows and extending the time needed to identify and validate which IOCs should be blocked.
Now security organizations can leverage MineMeld, an open-source application that streamlines the aggregation, enforcement and sharing of threat intelligence. This lab will walk you through the deployment and initial configuration of Mine Meld as a a dynamic data feed into your Palo Alto Networks firewall.
Auto-Tagging in PANOS 8.x
Using “Syslog Listener” to Collect User-ID data
April 4, 2018
User Identification is one of the most frequently asked for and effective features that can be used to control networkRead More
Using Destination NAT to Isolate Internet Facing Services
March 6, 2018
We all have network services that must be exposed to the internet for our world to function — DNS, mailRead More
Migration to App-ID Based Security Policy
February 2, 2018
Legacy firewall rules are created around the Network (IPs) and Transport (Ports) layers of the Open Systems Interconnection (OSI) model.Read More
Application-Based Quality of Service on Palo Alto Networks Firewalls
January 3, 2018
Quality of Service (QoS) on Palo Alto Networks firewalls represents a set of features used to prioritize and adjust qualityRead More
Troubleshooting with counters, test, and Flow Basic
December 1, 2017
There are a myriad of decision points the firewall makes on a session as it is processed adding complexity toRead More
Deploying SSL Decryption with a Palo Alto Networks Firewall
October 31, 2017
Network Security Systems, including firewalls, can be configured to control (permit or deny) encrypted traffic, but cannot decipher the contentsRead More
Enabling Zone and DoS Protection in Palo Alto Networks Firewalls
October 6, 2017
Denial of Service (DoS) and Distributed Denial of Service (DDoS) types of attack are attempts to disrupt network services byRead More
Automated Reporting in Palo Alto Firewalls
March 7, 2017
Your mission, should you choose to accept it, is to automate the generation and delivery of the various different reportsRead More