Explain what CIF does now to retrieve information from Palo Alto
Share diagram and details on how it works at this time
Cron job is ran once a day to retrieve information from Palo Alto hardware, and then relayed to CIF
Explain how we aim to work with Palo Alto API and CIF to make the information pulling from Palo Alto hardware automatic
Hopefully pull information from PA every 15 minutes
Questions/Considerations
When the cron job is run, how much information, on average, is being sent to CIF?
If we pull and send information between the PA and CIF every 15 minutes, how much information is being sent? Does it use up a lot of resources to send the information every 15 minutes?
Etc.
CIF Research and Setup
Details on where the Documentation was located?
Feedback from documentation review
Is it up to date? Easy to follow? Etc.
Install CIF on Ubuntu 16.04 server VMs to first familiarizeourselves with CIF
Details on the requirements of CIF installation
Roadblocks and other notes from installing CIF that are worth mentioning
How were the roadblocks mitigated?
What else stuck out and why?
Palo Alto API Research and Implementation
Details on researching Palo Alto Documentation
Was it up to date? Easy to follow? What resources wereavailable?
Details on getting access to Palo Alto API
Get it from Brian somehow? Palo Alto?
Details on this pending
Details on setting up Palo Alto to work with CIF
What was required?
What issues/roadblocks did we face?
Putting PA API and CIF together
TBD
Summary of findings
Conclusion
Note: Many sections include roadblocks/issues that arose. We may want to dedicate a Roadblock/Issue section to this.
Note: Don't use a converter from Word to Markdown because you're gonna have a bad time.
in this paper we plan to do blah blah blah and relay back to gaps that was set up in problem context
rest of the paper will flow as yadda
background/literature review
here are the major areas of research that are relevant to this problem
touch on top level categories - synthesize around the authors you found. Try to make meaningful picture between all the authors to characterize the space and draw from all the references we looked through
mainly conducting experiment, but can point to something like threat vector mitigation, some may have tried this but we speak to it better
(CIF could be in background but also it's own section)
methodology
explaining what you did and maybe talk about the solution
Draft Research Paper Outline
Introduction
Project Goals
Questions/Considerations
CIF Research and Setup
Details on where the Documentation was located?Feedback from documentation reviewIs it up to date? Easy to follow? Etc.Palo Alto API Research and Implementation
Details on this pendingPutting PA API and CIF together
Summary of findings
Conclusion
Note: Many sections include roadblocks/issues that arose. We may want to dedicate a Roadblock/Issue section to this.
Note: Don't use a converter from Word to Markdown because you're gonna have a bad time.