{"id":14772,"date":"2024-02-28T04:43:56","date_gmt":"2024-02-28T04:43:56","guid":{"rendered":"https:\/\/ramsdata.com.pl\/redes-palo-alto\/"},"modified":"2024-03-16T09:41:37","modified_gmt":"2024-03-16T09:41:37","slug":"redes-palo-alto","status":"publish","type":"page","link":"https:\/\/ramsdata.com.pl\/pt-pt\/fabricantes\/redes-palo-alto\/","title":{"rendered":"Redes Palo Alto"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"14772\" class=\"elementor elementor-14772 elementor-7822\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e46e805 e-flex e-con-boxed e-con e-parent\" data-id=\"5e46e805\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-569ae1eb e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"569ae1eb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b4082e9 elementor-widget elementor-widget-heading\" data-id=\"1b4082e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">REDE PALO ALTO\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-59eab7af e-flex e-con-boxed e-con e-parent\" data-id=\"59eab7af\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5392944f e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"5392944f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-772c1e43 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"772c1e43\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Partilhe aplica\u00e7\u00f5es de forma segura em vez de as bloquear.<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31f26a3f elementor-widget elementor-widget-text-editor\" data-id=\"31f26a3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A Palo Alto Networks torna poss\u00edvel atingir o equil\u00edbrio certo entre bloquear e permitir aplica\u00e7\u00f5es, tudo atrav\u00e9s de pol\u00edticas de firewall que utilizam elementos relevantes para o processo empresarial, tais como a identidade da aplica\u00e7\u00e3o, a identidade do utilizador e o tipo de conte\u00fado ou amea\u00e7a. Esta abordagem conduz a um controlo mais informado do acesso \u00e0 rede e do desenvolvimento do neg\u00f3cio. A utiliza\u00e7\u00e3o de elementos relevantes para os processos empresariais transforma a pol\u00edtica tradicional de firewall baseada na distin\u00e7\u00e3o entre permitir e bloquear naquilo a que chamamos &#8220;habilita\u00e7\u00e3o segura de aplica\u00e7\u00f5es&#8221;. Isto significa que pode criar pol\u00edticas de firewall com base nas propriedades da aplica\u00e7\u00e3o\/aplica\u00e7\u00e3o, utilizadores e grupos, bem como no conte\u00fado, por oposi\u00e7\u00e3o a elementos como a porta, o protocolo e o endere\u00e7o IP.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-437d3668 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"437d3668\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2a12d6b elementor-widget elementor-widget-image\" data-id=\"2a12d6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"374\" height=\"200\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/producenci_paloalto.png.webp\" class=\"attachment-full size-full wp-image-13873\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/producenci_paloalto.png.webp 374w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/producenci_paloalto.png-300x160.webp 300w\" sizes=\"(max-width: 374px) 100vw, 374px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-19397f06 e-flex e-con-boxed e-con e-parent\" data-id=\"19397f06\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7a4b60e5 e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"7a4b60e5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45064f4d elementor-widget elementor-widget-heading\" data-id=\"45064f4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">exemplos<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7e911a elementor-widget elementor-widget-text-editor\" data-id=\"d7e911a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Permitir que a equipa de TI utilize um conjunto fixo de aplica\u00e7\u00f5es de gest\u00e3o remota (por exemplo, SSH, RDP, telnet) nas portas padr\u00e3o para estas aplica\u00e7\u00f5es, mas bloquear a sua utiliza\u00e7\u00e3o por todos os outros utilizadores.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-39c5bae0 e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"39c5bae0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4c728ca2 e-con-full e-flex e-con e-child\" data-id=\"4c728ca2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f5f967 elementor-widget elementor-widget-text-editor\" data-id=\"3f5f967\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Permitir que a equipa de TI utilize um conjunto fixo de aplica\u00e7\u00f5es de gest\u00e3o remota (por exemplo, SSH, RDP, telnet) nas portas padr\u00e3o para estas aplica\u00e7\u00f5es, mas bloquear a sua utiliza\u00e7\u00e3o por todos os outros utilizadores.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5571df1e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5571df1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4e75fb0 e-con-full e-flex e-con e-child\" data-id=\"4e75fb0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e29073 elementor-widget elementor-widget-text-editor\" data-id=\"9e29073\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Permitir a navega\u00e7\u00e3o relacionada com o Facebook a todos os utilizadores, bloqueando todos os jogos e plugins sociais associados; al\u00e9m disso, permitir publica\u00e7\u00f5es no Facebook apenas para o departamento de marketing. Escala toda a transmiss\u00e3o relacionada com o Facebook para malware e exploits.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6008a96 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6008a96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3cc3528 e-con-full e-flex e-con e-child\" data-id=\"3cc3528\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b1dbbf0 elementor-widget elementor-widget-text-editor\" data-id=\"b1dbbf0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Permitir, numa base de categoria, aplica\u00e7\u00f5es que utilizem media streaming, mas aplicando uma pol\u00edtica de QoS para este grupo espec\u00edfico de aplica\u00e7\u00f5es (e n\u00e3o apenas para a porta) para minimizar o seu impacto nas aplica\u00e7\u00f5es VoIP.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bbe474 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2bbe474\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aa1d98e e-con-full e-flex e-con e-child\" data-id=\"aa1d98e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46ed38d elementor-widget elementor-widget-text-editor\" data-id=\"46ed38d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Permitir aplica\u00e7\u00f5es de webmail mas desencriptar (SSL) a transmiss\u00e3o associada, realizar inspec\u00e7\u00f5es para detetar malware e controlar as fun\u00e7\u00f5es de transfer\u00eancia de ficheiros.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f1dd5c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1f1dd5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b96075 e-con-full e-flex e-con e-child\" data-id=\"6b96075\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c6e0ee elementor-widget elementor-widget-text-editor\" data-id=\"7c6e0ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Bloqueio transparente de todas as aplica\u00e7\u00f5es P@P, aplica\u00e7\u00f5es concebidas para iludir a dete\u00e7\u00e3o, t\u00faneis n\u00e3o VPN encriptados e proxies externos, independentemente da porta, do protocolo ou das t\u00e1cticas concebidas para iludir a dete\u00e7\u00e3o.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84a3a12 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"84a3a12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35319a8d e-flex e-con-boxed e-con e-parent\" data-id=\"35319a8d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-71c1c972 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"71c1c972\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ce69529 elementor-widget elementor-widget-heading\" data-id=\"7ce69529\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">melhores pr\u00e1ticas<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c05e4bb elementor-widget elementor-widget-text-editor\" data-id=\"1c05e4bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>De acordo com as melhores pr\u00e1ticas para pol\u00edticas de firewall que permitem a partilha segura de aplica\u00e7\u00f5es, \u00e9 necess\u00e1rio obter primeiro informa\u00e7\u00f5es detalhadas sobre as aplica\u00e7\u00f5es na sua rede. A Palo Alto Networks pode ajudar a obter esta informa\u00e7\u00e3o das seguintes formas:<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-63d9c035 e-con-full e-flex e-con e-child\" data-id=\"63d9c035\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-2319dec8 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"2319dec8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-615b6c42 elementor-view-stacked elementor-shape-circle elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"615b6c42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M466.5 83.7l-192-80a48.15 48.15 0 0 0-36.9 0l-192 80C27.7 91.1 16 108.6 16 128c0 198.5 114.5 335.7 221.5 380.3 11.8 4.9 25.1 4.9 36.9 0C360.1 472.6 496 349.3 496 128c0-19.4-11.7-36.9-29.5-44.3zM256.1 446.3l-.1-381 175.9 73.3c-3.3 151.4-82.1 261.1-175.8 307.7z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tA partilha segura de aplica\u00e7\u00f5es come\u00e7a no momento em que estas s\u00e3o identificadas.\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tA firewall de pr\u00f3xima gera\u00e7\u00e3o da Palo Alto Networks \u00e9 constru\u00edda com base na APP-ID, uma tecnologia de classifica\u00e7\u00e3o de transmiss\u00e3o que identifica instant\u00e2nea e automaticamente as aplica\u00e7\u00f5es que atravessam a rede: independentemente da porta, encripta\u00e7\u00e3o (SSL ou SSH) ou t\u00e9cnica de preven\u00e7\u00e3o de dete\u00e7\u00e3o utilizada. Por outras palavras, a tecnologia App-ID est\u00e1 activada por defeito - ligue a firewall, defina as interfaces e a pol\u00edtica inicial e j\u00e1 ter\u00e1 conhecimento das aplica\u00e7\u00f5es que atravessam a sua rede. Mais ningu\u00e9m pode oferecer um resultado semelhante. A identidade da aplica\u00e7\u00e3o \u00e9 ent\u00e3o utilizada como base para a sua pol\u00edtica de seguran\u00e7a. O App-ID monitoriza continuamente o estado da aplica\u00e7\u00e3o, verificando se determinadas propriedades, como a transfer\u00eancia de ficheiros ou as fun\u00e7\u00f5es de \"lan\u00e7amento\", est\u00e3o activas. Quando h\u00e1 uma mudan\u00e7a de estatuto a este respeito, pode ser tomada uma decis\u00e3o adequada com base na pol\u00edtica de seguran\u00e7a. Al\u00e9m disso, as \u00e1reas do aspeto dos dados que est\u00e3o envolvidas na tomada de decis\u00f5es mais informadas e centradas na atividade incluem a descri\u00e7\u00e3o da aplica\u00e7\u00e3o, o seu comportamento, as portas que pode utilizar e a forma como \u00e9 categorizada.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b628ba9 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"b628ba9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-18afc09 elementor-view-stacked elementor-shape-circle elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"18afc09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M466.5 83.7l-192-80a48.15 48.15 0 0 0-36.9 0l-192 80C27.7 91.1 16 108.6 16 128c0 198.5 114.5 335.7 221.5 380.3 11.8 4.9 25.1 4.9 36.9 0C360.1 472.6 496 349.3 496 128c0-19.4-11.7-36.9-29.5-44.3zM256.1 446.3l-.1-381 175.9 73.3c-3.3 151.4-82.1 261.1-175.8 307.7z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tProte\u00e7\u00e3o contra amea\u00e7as de aplica\u00e7\u00f5es.\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tA prote\u00e7\u00e3o contra amea\u00e7as dependente da aplica\u00e7\u00e3o come\u00e7a por limitar o \u00e2mbito das amea\u00e7as atrav\u00e9s da implementa\u00e7\u00e3o de uma pol\u00edtica transparente para bloquear aplica\u00e7\u00f5es indesejadas, como proxies externos, aplica\u00e7\u00f5es concebidas para evitar a dete\u00e7\u00e3o e aplica\u00e7\u00f5es de partilha de ficheiros P2P. Uma vez autorizada a utiliza\u00e7\u00e3o de aplica\u00e7\u00f5es espec\u00edficas e fun\u00e7\u00f5es relacionadas, devem ser activadas as fun\u00e7\u00f5es de prote\u00e7\u00e3o contra v\u00edrus, explora\u00e7\u00e3o de vulnerabilidades, spyware e malware moderno. Estas actividades destinam-se a alargar o contexto espec\u00edfico da aplica\u00e7\u00e3o a um sistema de preven\u00e7\u00e3o de riscos. Por exemplo, s\u00f3 pode permitir que o Oracle RDB seja utilizado numa porta padr\u00e3o para garantir a continuidade das actividades financeiras e operacionais, ao mesmo tempo que fornece prote\u00e7\u00e3o contra ataques de inje\u00e7\u00e3o de SQL e a explora\u00e7\u00e3o de vulnerabilidades espec\u00edficas do Oracle. As fun\u00e7\u00f5es de prote\u00e7\u00e3o contra amea\u00e7as que fazem parte da tecnologia Content-ID utilizam um formato de assinatura \u00fanico e unificado para realizar an\u00e1lises de transmiss\u00e3o \u00fanicas (e bloqueio, de acordo com a pol\u00edtica) de amea\u00e7as de qualquer tipo. Os actuais fornecedores de firewall est\u00e3o a tentar resolver a quest\u00e3o de facilitar a utiliza\u00e7\u00e3o de aplica\u00e7\u00f5es, acrescentando funcionalidades de controlo de aplica\u00e7\u00f5es aos mecanismos de firewall com estado, \u00e0 semelhan\u00e7a do que foi feito com os sistemas IPS. Esta abordagem tem v\u00e1rias limita\u00e7\u00f5es significativas.\n\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e40e78 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"5e40e78\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-953defd elementor-view-stacked elementor-shape-circle elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"953defd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M466.5 83.7l-192-80a48.15 48.15 0 0 0-36.9 0l-192 80C27.7 91.1 16 108.6 16 128c0 198.5 114.5 335.7 221.5 380.3 11.8 4.9 25.1 4.9 36.9 0C360.1 472.6 496 349.3 496 128c0-19.4-11.7-36.9-29.5-44.3zM256.1 446.3l-.1-381 175.9 73.3c-3.3 151.4-82.1 261.1-175.8 307.7z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tA regra \"permitir\" baseada nos dados do porto tem preced\u00eancia sobre a regra \"bloquear tudo\".\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tA atividade ininterrupta da classifica\u00e7\u00e3o de transmiss\u00e3o baseada em portas significa que a firewall ter\u00e1 primeiro de abrir a porta predefinida que controla a aplica\u00e7\u00e3o em quest\u00e3o. Para controlar a p\u00e1gina do Facebook, abra a porta tcp\/80 ou tcp\/443. Com base no Application Usage and Related Risk Report de dezembro de 2011, pode muito bem estar a permitir que 297 (25 por cento do conjunto habitual de aplica\u00e7\u00f5es empresariais) outras aplica\u00e7\u00f5es residam na sua rede contra a sua vontade. Isto significa, portanto, que o poder da pol\u00edtica predefinida para bloquear todas as aplica\u00e7\u00f5es \u00e9 significativamente reduzido. Assim que uma transmiss\u00e3o chega \u00e0 firewall da Palo Alto Networks, o App-ID identifica imediatamente o tipo de aplica\u00e7\u00e3o em quest\u00e3o, em todas as portas, em todos os momentos. As decis\u00f5es de controlo de acesso s\u00e3o tomadas numa base de aplica\u00e7\u00e3o a aplica\u00e7\u00e3o e o mecanismo predefinido de bloqueio de todas as aplica\u00e7\u00f5es pode ser mantido.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d382343 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"d382343\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27c7607 elementor-view-stacked elementor-shape-circle elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"27c7607\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M466.5 83.7l-192-80a48.15 48.15 0 0 0-36.9 0l-192 80C27.7 91.1 16 108.6 16 128c0 198.5 114.5 335.7 221.5 380.3 11.8 4.9 25.1 4.9 36.9 0C360.1 472.6 496 349.3 496 128c0-19.4-11.7-36.9-29.5-44.3zM256.1 446.3l-.1-381 175.9 73.3c-3.3 151.4-82.1 261.1-175.8 307.7z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAs aplica\u00e7\u00f5es que utilizam portas n\u00e3o normalizadas podem n\u00e3o ser tidas em conta.\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tN\u00e3o \u00e9 raro que os utilizadores com mais conhecimentos t\u00e9cnicos utilizem ferramentas de acesso remoto em portas n\u00e3o normalizadas. Os programadores de bases de dados s\u00e3o igualmente culpados de executarem sess\u00f5es SQL em portas n\u00e3o standard. A depend\u00eancia estrita da classifica\u00e7\u00e3o baseada em portas significa que as aplica\u00e7\u00f5es que utilizam portas n\u00e3o padr\u00e3o podem ser completamente ignoradas, apesar das defini\u00e7\u00f5es de configura\u00e7\u00e3o personalizadas. Mais uma vez, a diferen\u00e7a fundamental \u00e9 a forma como o App-ID procura todas as portas para todas as aplica\u00e7\u00f5es.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8831c86 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"8831c86\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f08895 elementor-view-stacked elementor-shape-circle elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"1f08895\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M466.5 83.7l-192-80a48.15 48.15 0 0 0-36.9 0l-192 80C27.7 91.1 16 108.6 16 128c0 198.5 114.5 335.7 221.5 380.3 11.8 4.9 25.1 4.9 36.9 0C360.1 472.6 496 349.3 496 128c0-19.4-11.7-36.9-29.5-44.3zM256.1 446.3l-.1-381 175.9 73.3c-3.3 151.4-82.1 261.1-175.8 307.7z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tNumerosas pol\u00edticas com informa\u00e7\u00e3o duplicada aumentam o esfor\u00e7o de gest\u00e3o.\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tUma firewall baseada em portas e uma abordagem que utilize mecanismos adicionais de controlo de aplica\u00e7\u00f5es implicam a necessidade de criar e gerir uma pol\u00edtica de firewall que inclua informa\u00e7\u00f5es como a origem, o destino, o utilizador, a porta, a a\u00e7\u00e3o, etc. O mesmo conjunto de informa\u00e7\u00f5es ser\u00e1 utilizado para as aplica\u00e7\u00f5es de controlo das pol\u00edticas e ser\u00e1 complementado por dados relativos \u00e0s aplica\u00e7\u00f5es e \u00e0s actividades. Se a sua organiza\u00e7\u00e3o se assemelha \u00e0 grande maioria das outras, \u00e9 muito prov\u00e1vel que esteja a utilizar centenas ou mesmo milhares de pol\u00edticas de firewall. Uma abordagem centrada em v\u00e1rias bases com regras para a pol\u00edtica n\u00e3o s\u00f3 aumentar\u00e1 a carga administrativa, como tamb\u00e9m poder\u00e1 aumentar desnecessariamente os riscos comerciais e de seguran\u00e7a. A Palo Alto Networks utiliza um editor de pol\u00edticas \u00fanico e unificado que lhe permite utilizar dados de aplica\u00e7\u00f5es, utilizadores e conte\u00fados como base para as suas pol\u00edticas para facilitar a utiliza\u00e7\u00e3o segura de aplica\u00e7\u00f5es.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-db6ea8d e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"db6ea8d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-265a04b elementor-view-stacked elementor-shape-circle elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"265a04b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M466.5 83.7l-192-80a48.15 48.15 0 0 0-36.9 0l-192 80C27.7 91.1 16 108.6 16 128c0 198.5 114.5 335.7 221.5 380.3 11.8 4.9 25.1 4.9 36.9 0C360.1 472.6 496 349.3 496 128c0-19.4-11.7-36.9-29.5-44.3zM256.1 446.3l-.1-381 175.9 73.3c-3.3 151.4-82.1 261.1-175.8 307.7z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tGest\u00e3o sistem\u00e1tica da transmiss\u00e3o desconhecida.\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tA transmiss\u00e3o desconhecida \u00e9 o exemplo da regra 80% - 20% - uma pequena propor\u00e7\u00e3o de transmiss\u00e3o em qualquer rede representa, no entanto, um grande risco. Uma transmiss\u00e3o desconhecida pode estar associada a uma aplica\u00e7\u00e3o n\u00e3o normalizada, a uma aplica\u00e7\u00e3o comercial n\u00e3o identificada ou a uma amea\u00e7a. Os fornecedores n\u00e3o disp\u00f5em de uma forma de identificar e gerir sistematicamente essas transmiss\u00f5es desconhecidas. Para clarificar a situa\u00e7\u00e3o, todas as transmiss\u00f5es s\u00e3o registadas pela firewall atrav\u00e9s de logs, embora os logs das aplica\u00e7\u00f5es sejam gerados separadamente e sejam um subconjunto, o que torna quase imposs\u00edvel gerir transmiss\u00f5es desconhecidas. O bloqueio n\u00e3o \u00e9 uma op\u00e7\u00e3o, pois pode afetar negativamente os processos empresariais. A habilita\u00e7\u00e3o \u00e9 um fator de alto risco. A Palo Alto Networsk, por outro lado, categoriza a transmiss\u00e3o desconhecida de modo a que as aplica\u00e7\u00f5es internas possam ser encontradas e os elementos App-ID personalizados possam ser criados; isto, por sua vez, permite que os pacotes associados a aplica\u00e7\u00f5es comerciais n\u00e3o identificadas sejam interceptados e utilizados para desenvolver App-IDs; as fun\u00e7\u00f5es de recolha de registos e de relat\u00f3rios podem ser utilizadas para verificar se os pacotes representam uma amea\u00e7a. Por conseguinte, permitimos a gest\u00e3o sistem\u00e1tica da transmiss\u00e3o desconhecida at\u00e9 ao n\u00edvel de pequenos elementos de baixo risco - tudo com base na pol\u00edtica.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>REDE PALO ALTO Partilhe aplica\u00e7\u00f5es de forma segura em vez de as bloquear. A Palo Alto Networks torna poss\u00edvel atingir o equil\u00edbrio certo entre bloquear e permitir aplica\u00e7\u00f5es, tudo atrav\u00e9s de pol\u00edticas de firewall que utilizam elementos relevantes para o processo empresarial, tais como a identidade da aplica\u00e7\u00e3o, a identidade do utilizador e o tipo [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":14836,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-14772","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages\/14772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/comments?post=14772"}],"version-history":[{"count":1,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages\/14772\/revisions"}],"predecessor-version":[{"id":14784,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages\/14772\/revisions\/14784"}],"up":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages\/14836"}],"wp:attachment":[{"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/media?parent=14772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}