Community Release Notes - November 5, 2025
Contains an image
This release optimizes content discovery and community interaction. Updates include: Automated Featu...
Find answers, share solutions, and connect with peers and thought leaders from around the world.
New to LIVEcommunity? Check out our
Welcome Guide.
This release optimizes content discovery and community interaction. Updates include: Automated Featu...
We're excited to announce full Web Proxy support on the high-performance PA-5450 Next-Generation Fir...
Malware evolution is now fueled by LLMs, bypassing manual security. We're introducing Code Gene, a r...
Zero-day phishing attacks are moving faster than traditional defenses, triggering crises like the "S...
Malicious Traffic Distribution Systems (TDS) are weaponizing DNS records to deliver custom malware a...
Learn how Prisma AIRS 2.0 gives organizations a clear view of how their agents operate, the risks th...
AI adoption is outpacing every major tech wave of the past two decades, reshaping the digital ent...
We now support DNS over HTTPS (DoH), encrypting all your DNS traffic for maximum privacy and defense...
Welcome to this exciting event from the Fuel Workshop team on ZTNA - Zero Trust Network Access. This...
hi all, I have an issue where I generated and exported my custom report in PDF and the timestamp is not in order. And the "sort-by" option is limited, refer to the attached. Is there a way to view my report in the correct order based on the timestamp? My Palo alto software version is 10.1.8
Hello,We see that the option to show hidden fields by default on XSOAR is clicked only a few times for non-admin users.We would like to see always, by default, the hidden fields for all incident tickets.Thanks!
Hello Team,Goal:I want to access the DMZ Webserver (Public IP) via the Azure Load Balancer Public IP.Current Setup:Azure Public Load Balancer is created with Frontend IP, Backend Pool, and Health Probe.Palo Alto Firewall VM is added to the backend pool.DMZ VM (Webserver) is running with a Public IP.Issue:Load Balancer backend pool is correctly f...
Hi Team, I am trying to fetch some report from Cortex XDR console. I would like to know how many endpoints has host firewall rule applied. How many endpoints still running with Windows firewall. Is there any script available to check.
I have facing with can't connect to third party VPN like express, outline, V2box, after tuning of security profile. I would like to know, how can i find vpn log?
“Clarification on the meaning and performance implications of ‘Integrated Crypto Assistant’ for PA-1420 IPSec VPNs” Hi all, I’m working with a PA-1420 appliance in a site-to-site VPN deployment and I’d like to better understand the hardware/crypto architecture. Specifically: The PA-1420 architecture diagram lists “Integrated Crypto Assistant...
Hey, I was wondering if the PA-1420 model had physical alarm contacts or done through ethernet. Also by looking at the front panel in the datasheet only, I see a USB-C? Can I surmise that this is where the power supply can connect to the firewall?
Hello All, I've been seeing the following message on our Cortex XDR Dashboard for the past few days: "We are experiencing a problem, data may not be up to date. Please try again in a few minutes." There's also a link to Download support file included. Has anyone else encountered this issue or have any insights into what might be causing it? ...
We are migrating all of our servers from VMWare to Azure Local and was wondering if there was anything special we needed to do during the migration process. I am looking for full documentation for step by step procedure to complete this migration with minimal impact.
We have internally developed scripts that we would like to create XDR exclusions or alert level reduction for based on if they contain code signing certificates. I don't know how to go about doing this or if it's even possible. The idea here is to not need to update exclusions based on hashes any time the scripts are changed and to be more se...
We have been using PA-User-ID Agent for years an it was working fine. The Agent is connecting to Domain-Controller Log and maps user-name and ip-address of successful logins for firewall-policy usage. Yesterday we changed GPOs on the Domain Controller to enable Kerberos-Ticket Logging and since then we received unwanted mappings: A user starting...
Hi, I am using GlobalProtect GlobalProtect App version 6.2.8-263. It is the latest version i could download from network. When i am using connectioni got bluescreen crash whch i can reasume to: Bugcheck code: 0x1E This is MODE_EXCEPTION_NOT_HANDLED, which means that a kernel-mode component threw an exception that was not handled. Excep...
HI all, I am encountering an issue with the Palo Alto Networks VM-Series firewall (VM-SERIES-2, VM Mode) running on Amazon AWS with software version 11.1.10-h5. The error message is: Request made to the server "license.api.paloaltonetworks.com" returned with HTTP response code : 404. The device certificate is valid and correctly retrieved from t...
Has anyone succeeded in using Keycloak as idP with Globalprotect? We're having issues with the windows clients receiving "You are already logged in" while trying to log in, which also make the gp app hang. The GP app for macOS never experience this. We've also experienced with openconnect on Ubuntu (since Palo's own ubuntu GP app does not work a...
Hello,Can you please explain the difference between the causality chain of the 2 attached photos?What exactly are the executions?
In today's dynamic threat landscape, securing web traffic is one of the biggest challenges organizations face. Traditional web proxies often fail to provide comprehensive protection, leaving you vulne...
By: @lizwang Co-Author: @tbolatiwa Most software, whether benign or malicious, is built upon existing code. This inherent reuse has long given adversaries a powerful advantage, allowing them to replic...
By: @ssingh29 Co-Author: @tbolatiwa Attackers today are using sophisticated AI-driven tactics to evade traditional defenses and deceive even the most vigilant users. Phishing attacks, in particular, h...
By: @aechano Co-Author: @tbolatiwa Imagine a trusted employee clicks a legitimate-looking link. In a fraction of a second, an invisible chain of redirects begins. A stealthy, automated system analyzes...

