How to Search for Threat Information

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Community Team Member

threat-pan-live.jpg

 

As the attack surface keeps getting bigger and attacks are becoming more and more sophisticated, threats are a huge concern for any security professional.

 

The amount of information you get might be overwhelming and it might be difficult to know where to start.

 

So let's start with the Threat Logs. You will find these inside the WebGUI > Monitor > Threat tab. There, you'll see events ranging from informational to critical in severity. See the example below, where I'll use a Critical event as an example.

 

kiwi_3-1660745804062.png

 

 

  1. Click the magnifying glass in the first column of the logs to show the Detailed Log View. This view shows you the Threat Details. Inside the Threat Details, you'll see the Threat Type, the Threat Name, the Threat ID, Severity, Repeat Count, URL, and Pcap ID. Please record the Threat ID to obtain more information later (13235). 

    kiwi_4-1660745909624.png
  2. To the right of the name of the threat itself is a small dropdown arrow which will show 'Exception' and 'Autofocus' when you click it. If you click Exception the Threat Details will popup, which shows additional information such as Name, ID, Description, Severity, CVE, Bugtraq ID, Vendor ID, and Reference link to the CVE info. You can also exempt Security Profiles or IP addresses in the lower part of the window.  If you click the Autofocus menu you'll get a graphical overview of threat intelligence that AutoFocus compiles to help you assess the pervasiveness and risk of the threat. To view the AutoFocus Intelligence Summary window, you must first have an active AutoFocus subscription and enable AutoFocus threat intelligence (select Device > Setup > Management and edit the AutoFocus settings).

    kiwi_6-1660746499810.png

     

  3.  You can also filter out specific entries and leave out informational and low risk threat logs. To filter, first click on the severity, and in the search window at the top of the screen, change the severity level to what you'd like to see. In this example we would like to see all the critical events so we used the filter (severity eq critical).  Apply the filter by clicking the arrow at the top right.

    kiwi_7-1660746951882.png

     

Alternatively, you have the ability to see all the same information about a specific threat if you visit our threat vault at https://threatvault.paloaltonetworks.com and search on the Threat ID. Using the example from earlier, you can search on 13235.

 

kiwi_8-1660747339753.png

 

 

Note: You can also go to the threat vault directly from the information in the threat logs using the 'View in Threat Vault' link.

 

kiwi_9-1660747530371.png

 

 

For more information on how to use the threat vault check out the following video:

 

 

If you're looking for a more automated threat intelligence platform then I recommend checking out MineMeld or Cortex XSOAR.

 

  • Minemeld — an open-source application that streamlines the aggregation, enforcement and sharing of threat intelligence. MineMeld is available for all users directly on GitHubWith an extensible modular architecture, anyone can add to the MineMeld functionality by contributing code to the open-source repository
  • Cortex XSOAR— Cortex XSOAR is the industry's most comprehensive security orchestration automation and response platform

 

Additional information:

  • Unit42 -For even more information about Threats and what the Palo Alto Networks Unit 42 Threat Research Center has been up to along with their Blogs, which are very informative
  • Threat Vault: An in-depth look at Threat Vault

 

Thank you for taking the time to read this blog.
Don't forget to hit the Like (thumbs up) button and to Subscribe to the LIVEcommunity Blog area.
 
Stay secure!
Kiwi out
  • 6983 Views
  • 0 comments
  • 0 Likes
Register or Sign-in
Labels