Indeni Complements Your Monitoring Solution for Palo Alto Networks Firewalls

Notice: This blog post was originally published on Indeni before its acquisition by BlueCat.

The content reflects the expertise and perspectives of the Indeni team at the time of writing. While some references may be outdated, the insights remain valuable. For the latest updates and solutions, explore the rest of our blog

Five Reasons why enterprises deploy Indeni with their existing monitoring solutions.

1. Automate High Availability readiness checks

Proactively automate tasks to ensure seamless failover in the event of primary firewall failure. Indeni understands how the active/active and active/passive configurations work. For example, we understand the role of the control link, data link and backup links. We will not issue notification in the events these links are down as they are working as intended if the firewall was a passive member of a cluster. At the same time, we constantly ensure the primary and standby firewalls are synchronized including the static routing table, network interface MTU size, OS version, NTP servers, Radius Servers, time-zone, connected networks and many more.

Why Indeni Matters?

Monitoring tools do not automate high availability readiness. Worse yet, monitoring tools lack the deep understanding of how HA works, they are typically very noisy and generate a lot of false positives.

For more information, read this blog post.

2. Remediation Steps

Indeni will go one step further by providing actionable remediation steps. For example, Indeni will notify you if you accidentally left the debug mode command enabled (something that a monitoring tool will not be able to detect), it will tell you how to disable debug and provide you information about every debug command and its purpose.

Why Indeni Matters?

Monitoring tools are good at notifying you when a problem occurs but they lack details about how to address the issues.

3. Automate Regulatory Compliance/Security Risks Reporting

Indeni will regularly check for security risks to help with your compliance efforts. Refer to this blog post for a list of regulatory compliance & security risk checks.

Why Indeni matters?

Without Indeni these tasks are time-consuming and can take away from the team’s primary tasks.

4. Advanced Health Checks

As you start to enable advanced features such as URL filtering, Wildfire and SSL decryption, you want to ensure that these functions are not impacting the operations of your firewalls.

Why Indeni matters?

These advanced features are typically not supported by SNMP monitoring tools. For more information, read this blog post.

5. Palo Alto recommended Best Practices

Indeni has many built-in operations best practices and we make them easily accessible. For example:

  • Logs are being discarded
  • High log DB usage
  • Packet drop counter increasing
  • User-Id Agent down
  • URL cloud not connected
  • Wildfire cloud not connected
  • Authentication errors
  • Ensure failed login attempts is set to a low value
  • High neighbor discovery (ND) cache usage  
  • Check if any rule has source and destination zones set to “any”
  • Check all anti-spyware profiles have DNS sinkholing enabled
  • Ensure GlobalProtect update recurrence is set to hourly
  • Ensure Apps and Threat are righty configured for content update

Why Indeni matters?

Following vendor recommended best practices can avoid outages but you may not always have the time or experience to ensure best practices are followed.

With our continuous stream of knowledge contributed by industry experts around the globe, we frequently add best practices to keep you out of trouble.


Published in:


An avatar of the author

Ulrica de Fort-Menares is the Vice President of Product Management for Infrastructure Assurance.

Related content

Route traffic intelligently with DNS-based GSLB for BlueCat Edge

Discover how DNS-based GSLB with BlueCat Edge empowers networking teams to control traffic steering, reduce costs, and improve resilience.

Read more
Webinar

Making APIs Work for You (Part 5)

Welcome to Part 5 of Making APIs Work for You. Our community specialist, Vivek Mistry, is your guide, and today, Vivek will focus on user security…

Read more
Image shows BlueCat cathead image in the background with the text "Introducing Integrity X" appear over it. Integrity X is the newest version of BlueCat's DDI management solution.

Exciting product update: Introducing BlueCat Integrity X

Introducing BlueCat Integrity X, a single platform for complete visibility and control over critical network services.

Read more
Article

What is protective DNS (PDNS) and why is PDNS important?

Discover what protective DNS is, how it prevents cyber threats like phishing and malware, and why it’s essential for modern enterprise network security.

Read more