Automation/API Discussions

Threads in this discussion area are now read-only. If you have a question about Automation/API products please visit our product discussions.

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Automation/API Discussions

Threads in this discussion area are now read-only. If you have a question about Automation/API products please visit our product discussions.

About Automation/API Discussions

Threads in this discussion area are now read-only. If you have a question about Automation/API products please visit our product discussions.

Discussions

Trouble with Custom MSRPC Based AppID

I am trying to create a number of custom MSRPC based App's using the msrpc-req-bind-data contact. I have set msrpc as the parent app, dynamic TCP and UDP for the ports, and the signatures are set to the session scope. I pulled the hex for the BIND request interfaces directly from Wireshark running on the AD server.See below screenshot for the si...

mfs by L0 Member
  • 3914 Views
  • 2 replies
  • 0 Likes

Perl Scripting to FW

So I got help from support and they gave me this nifty Perl example on how to get output from the firewalls.However, I need to assign that output from the show command to a variable for further manipulation. That was the whole purpose.Does anyone know how to assign the outputs from the show commands to a variable?Thanks!And below is the script ...

zyang by L1 Bithead
  • 9027 Views
  • 10 replies
  • 0 Likes

Data Leak Protection, searching for passwords.

Does anyone use data filtering for passwords discovery? Basically i want to know and stop if possible when someone logs into their external email service like Google Email and upload say a passwords.txt file full of usernames and passwords OR inputs in the body of the email usernames and passwords and sends it out. I also use Websense which is m...

WebServices SDK Download

I have been going through some documents which mention the Palo Alto WebServices SDK tool that can use the API to backup and perform basic reporting tasks. Is this tool still available for download? Cannot find the download links anywhere...

CloudStack Palo Alto Plugin Enhancement Opportunity

Hi All,We are looking for developers involved in the CloudStack Palo Alto Plugin to add some required functionality. Assuming the price is right, we are happy to engage one of the developers to implement this for us to speed up the features that we need. Palo Alto support instructed us to post this query here as this forum is monitored by develo...

TyMiller by Not applicable
  • 7834 Views
  • 2 replies
  • 0 Likes

Script to restart management server process on firewalls

Hello All,I have a hot case(248797) where customer has upgraded panorama from 5.1.x to 6.0.x where in log forwarding process has stopped from firewalls after upgrade.After some troubleshooting I did notice that firewalls show as connected but below command for log-collector status show as No>debug management-server log-collector-agent-statusw...

custom signature

Hi,I am trying to making a custom signature. I am trying to make it using the the context gdbremote-req-context for the tcp stream as seen below. Is this the correct methodology or should I be using something different?This is for IBM Netezza. A database collaboration software platform.Robert

Phone Number Regex

Hello team! I hope everyone is doing great. I have a customer who wants to use Data Pattern Regex to block phone numbers with 10 digits or more, I've been doing research and contacted some of our engineers but have not been able to get to do it. Can anyone help me out with this?Thanks Team!

Crazy Browser-RegEx Help

Does anyone know how I can block all traffic coming from "Crazy Browser" clients. Our OWA accounts keep getting hacked and the IIS logs indicate this could be the method. Can you creaet a custom sig based off user agent string ? Any ideas ?Thanks!Tommy

Blocking credentials from being submitted to a malicious site

Hi all. We are trying to come up with a way to prevent our users from entering their credentials on bogus websites. The problem starts with a phishing email being received that contains a link to a malicious site and asks them to log in or update their info. Users click the link and then proceed to enter their username and password and submit...

tsteuber by Not applicable
  • 4756 Views
  • 5 replies
  • 1 Likes

Custom Application Signature

Hi All,I want to ask about custom application signatureSo i got an issue for this application.when i see in the monitor traffic log the Application will be capture as OracleThis oracle application is generalization for all of client application oracle like toad,cs21 and so onSo if the client application name is Toad, when comes to traffic log Pa...

  • 1031 Posts
  • 68 Subscriptions