Advanced Threat Prevention Discussions
Welcome to the Advanced Threat Prevention discussion area. Here, we explore Precision AI-powered protection that stops zero-day malware, exploits, and command-and-control attacks in real time—ensuring proactive defense and resilience against today’s most sophisticated threats.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Advanced Threat Prevention Discussions
Welcome to the Advanced Threat Prevention discussion area. Here, we explore Precision AI-powered protection that stops zero-day malware, exploits, and command-and-control attacks in real time—ensuring proactive defense and resilience against today’s most sophisticated threats.
About Advanced Threat Prevention Discussions
Welcome to the Advanced Threat Prevention discussion area. Here, we explore Precision AI-powered protection that stops zero-day malware, exploits, and command-and-control attacks in real time—ensuring proactive defense and resilience against today’s most sophisticated threats.

Discussions

Office 365 - Poodle Vunerabilties

Threat ID - 37144 

 

Question or insight about Microsoft practices with not hardening against poodle.

 

Why am I still getting alerts for these vulnerabilities, is it because I don't have proper SSL forward proxy yet enabled? Or is it because my Office 3

...

CZaloba by L0 Member
  • 3599 Views
  • 0 replies
  • 0 Likes

ACC risk factor

Looking at our ACC tab, I see that SMTP traffic has a risk of 5.  We only accept SMTP from our Symantec.cloud smart host.  It is then decrypted coming into our firewall and scanned again.  We do not decrypt outgoing SMTP, but we do have an anti-virus

...

Resolved! Cascading URL Filters?

To the world, creating Security rule for a specific user (call it, a rule to permit access dodgy website access), what's involved in "cascading" the rule - so, if there's no matches on that rule, that same user would be challenged against a General W

...

CVE-2017-6770

Hi ,

 

I would like to know whether Palo alto able to detect this CVE-2017-6770 since i cant find this  in threatvault .  

 

Is there any preventive solution from Palo Alto to safely guard this vulnerable from being taken advantage of?

 

Thanks.