How to Find Matching Signature for Vulnerabilities

How to Find Matching Signature for Vulnerabilities

33510
Created On 09/26/18 13:44 PM - Last Modified 06/09/23 03:20 AM


Resolution


To find the signatures developed by Palo Alto Networks for certain vulnerabilities, create a Vulnerability Protection Rule.

 

  • Vulnerability rules are created under Vulnerability Protection Profile.

    Vuln10.PNG

  • In the Rule > Threat Name field, add text that is part of a signature name.
  • To filter the search, select all the other fields available to narrow down the search.
  • In the example below, we are searching for signatures having the text "MySQL", the Action is Alert and Severity is either Critical or High.

    Vuln11.PNG

  • Click OK.
  • On the Vulnerability Protection Profile window, enable the option "Find Matching Signature" by checking the check box for a particular rule.

The Exceptions tab shows the results.

Vuln13.png

  • The results show the Rule name, Action to match the Vulnerability rule created.  How many pages of signatures does it match and the count of the signatures is highlighted in bottom right corner.

 

See also:

How to Determine the Number of Threat Signatures on a Palo Alto Networks Firewall

Steps to Change the Default Action for Signatures

 

owner: ssunku



Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClmkCAC&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language