<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto Networks next-generation firewalls Threat prevention signatures in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-networks-next-generation-firewalls-threat-prevention/m-p/534898#M1043</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That's great thanks for sharing, so your approach based only on the criticality understood, and did you encounter lot of events on the SIEM level ? just to have an idea about the number of alerts triggered!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For me i want at first took a look into the signatures, types, coverage, criticality... etc and after that take a decision if you have any source that can help that will be appreciated man ^^,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;King regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 17 Mar 2023 17:57:45 GMT</pubDate>
    <dc:creator>lonis23i</dc:creator>
    <dc:date>2023-03-17T17:57:45Z</dc:date>
    <item>
      <title>Palo Alto Networks next-generation firewalls Threat prevention signatures</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-networks-next-generation-firewalls-threat-prevention/m-p/534873#M1036</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please currently i'm studying the&amp;nbsp;Palo Alto Networks next-generation firewalls Threat prevention module, and 'm interested in the list of the available signatures (&lt;SPAN&gt;description, severity ranking, Threat type,&amp;nbsp;&lt;/SPAN&gt;). I found that threat vault can give this informations :&amp;nbsp;&lt;A href="https://threatvault.paloaltonetworks.com/" target="_blank"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;&amp;nbsp;but for that we need to provide the specific UTID (Unique Threat ID).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a way to get the list of all the available signatures for the&amp;nbsp;Palo Alto Networks next-generation firewalls Threat prevention module ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Waiting for the response, any help will be appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have nice day,&lt;/P&gt;
&lt;P&gt;Cordially.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 16:24:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-networks-next-generation-firewalls-threat-prevention/m-p/534873#M1036</guid>
      <dc:creator>lonis23i</dc:creator>
      <dc:date>2023-03-17T16:24:56Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Networks next-generation firewalls Threat prevention signatures</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-networks-next-generation-firewalls-threat-prevention/m-p/534877#M1037</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I dont think one exists, however if it did, there would be tens of thousands, most likely. Learn the best practices around threat prevention, like updating the dynamic updates and applying the profiles to policies, etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 16:48:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-networks-next-generation-firewalls-threat-prevention/m-p/534877#M1037</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-03-17T16:48:47Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Networks next-generation firewalls Threat prevention signatures</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-networks-next-generation-firewalls-threat-prevention/m-p/534882#M1041</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;First of all thanks for the quick reply.&lt;/P&gt;
&lt;P&gt;The reason behind my request is that i want to implement some alerts&amp;nbsp; on SIEM level for the most critical signatures of the Threat prevention module of the PALO ALTO&amp;nbsp; PAN-OS firewall. to be able to that i want to see the vailable signatures for this module.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now based of the &lt;A href="https://threatvault.paloaltonetworks.com/" target="_self"&gt;Threat Vault&lt;/A&gt; resource, is the information presented there is only for the "&lt;SPAN&gt;Palo Alto Networks next-generation firewalls Threat prevention signatures" or there is another solution (XDR, ...ect). and if it is the case maybe we can found the class ID for the signatures related to the Firewall threat prevention module!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance for the help,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 17:19:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-networks-next-generation-firewalls-threat-prevention/m-p/534882#M1041</guid>
      <dc:creator>lonis23i</dc:creator>
      <dc:date>2023-03-17T17:19:50Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Networks next-generation firewalls Threat prevention signatures</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-networks-next-generation-firewalls-threat-prevention/m-p/534883#M1042</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I gotcha. I kinda do a similar thing. However first with the threat signatures, I block anything that is medium or higher. Then on my SIEM, I have it only alert on Critical severity events.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 17:25:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-networks-next-generation-firewalls-threat-prevention/m-p/534883#M1042</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-03-17T17:25:37Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Networks next-generation firewalls Threat prevention signatures</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-networks-next-generation-firewalls-threat-prevention/m-p/534898#M1043</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That's great thanks for sharing, so your approach based only on the criticality understood, and did you encounter lot of events on the SIEM level ? just to have an idea about the number of alerts triggered!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For me i want at first took a look into the signatures, types, coverage, criticality... etc and after that take a decision if you have any source that can help that will be appreciated man ^^,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;King regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 17:57:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-networks-next-generation-firewalls-threat-prevention/m-p/534898#M1043</guid>
      <dc:creator>lonis23i</dc:creator>
      <dc:date>2023-03-17T17:57:45Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Networks next-generation firewalls Threat prevention signatures</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-networks-next-generation-firewalls-threat-prevention/m-p/534903#M1044</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Well I think I have a special case, because most of all my services that are externally accessible are whitelisted. But for those that are not, I dont get many. You kinda just have to filter through the noise. Since every environment is different, I would say start with your internal zones first when it comes to alerting. It should be reasonable quiet. Then add the external stuff and just start to recognize the 'noise' rather than anything else.&lt;/P&gt;
&lt;P&gt;Here are a few things I use to try to limit my external exposure footprint.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Whitelist countries that can connect to my external IP's
&lt;UL&gt;
&lt;LI&gt;We only allow the US&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Use the External Dynamic Lists to help block others
&lt;UL&gt;
&lt;LI&gt;Palo Alto has 4 that are great as well as the SpamHaus ones
&lt;UL&gt;
&lt;LI&gt;&lt;A href="http://www.spamhaus.org/drop/drop.txt" target="_blank"&gt;http://www.spamhaus.org/drop/drop.txt&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="http://www.spamhaus.org/drop/edrop.txt" target="_blank"&gt;http://www.spamhaus.org/drop/edrop.txt&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Make sure to use Applications instead of ports (sometimes not possible)
&lt;UL&gt;
&lt;LI&gt;SSL instead of 443, etc&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Enable Telemetry
&lt;UL&gt;
&lt;LI&gt;This allows usage stats to be sent to Palo Alto so they can use their Machine learning to create new threat profies etc. This helps everyone out (kind of a way to giving back to the community)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The idea is to make is as difficult as possible for an adversary so they go after someone else. Also realize that most ways companies get compromised is from the inside, someone clicks a link or attachment, etc. so dont forget to secure that as well!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 18:28:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-networks-next-generation-firewalls-threat-prevention/m-p/534903#M1044</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-03-17T18:28:18Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Networks next-generation firewalls Threat prevention signatures</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-networks-next-generation-firewalls-threat-prevention/m-p/534942#M1047</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you very much for taking the time to answer and also for the valuable informations that you shared with us&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, this really helpful man,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;</description>
      <pubDate>Sat, 18 Mar 2023 13:10:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-networks-next-generation-firewalls-threat-prevention/m-p/534942#M1047</guid>
      <dc:creator>lonis23i</dc:creator>
      <dc:date>2023-03-18T13:10:44Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Networks next-generation firewalls Threat prevention signatures</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-networks-next-generation-firewalls-threat-prevention/m-p/535063#M1052</link>
      <description>&lt;P&gt;Anytime! Please dont hesitate to ask additional questions, etc.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Mar 2023 13:00:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-networks-next-generation-firewalls-threat-prevention/m-p/535063#M1052</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-03-20T13:00:58Z</dc:date>
    </item>
  </channel>
</rss>

