Changes to the LIVEcommunity experience are coming soon... Here's what you need to know.
Welcome to the Custom Signatures discussion forum. This forum exists as a resource for security professionals to discuss the creation process of custom signatures in their PAN-OS appliance. Please feel free to engage with other community members and Palo Alto Networks staff. Ideas, questions, research, and observations regarding the process of custom signature creation are all actively encouraged.
For an introduction to the forum, please see the sticky!
Disclaimer:
This forum is provided for Live Community members to discuss and share information pertaining to custom signatures. Please use the information from this forum at your own risk and make sure to test and verify any signature and code presented here. For information on contacting Palo Alto Networks support, click here.
The purpose of this board is to discuss everything related to custom signature creation in PAN-OS devices. Pal...
10-19-2015 Posted by rcoleHelloI am trying to create a custom object / custom spyware signature based on dns-req-section that would aler...
03-21-2019 Posted by Tim_BieldersDue to the constraints placed on us by management, we don't support Chrome, and early on, I created a custom a...
02-24-2021 Posted by brian.saloumHi all,I have been asked to create a new Application signature to block any access to /abc/*But when adding th...
02-21-2021 Posted by Noam.Rottercreating a custom snort signature on Palo alto Firewall but didn’t found the concern context operator for matc...
10-07-2020 Posted by Mohammed_YasinHello.I'm trying to write a custom app and vulnerability signature. Signatures are based on UDP-payload.When I...
02-14-2021 Posted by MCervenkaJust seeking a Custom App-ID forWindows Update Delivery Optimization (WUDO).
05-06-2019 Posted by DonJarmonHi,Is anyone tried to block PUBG and Fortnite? I tried everything its not able to, please suggest the step wou...
10-26-2020 Posted by asifkhandimensiondataIt's possible to block custom file hash-256It's possible to block custom file hash-256 in Palo alto.Please let...
09-14-2020 Posted by Mohammed_YasinI'm trying to write a custom threat signature. The pattern matches just fine if I send it using netcat, but it...
09-15-2020 Posted by John.PetrucciAny way we can achieve this by creating custom signature that allows only valid http requests to URLs and not ...
07-22-2020 Posted by pshah1I have a requirement, where the customer wants to allow only the below url:https://chrome.google.com/webstore/...
07-14-2020 Posted by saprakashI am looking for a way to identify NAT-T traffic on an IPSEC connection and define a custom app for it. To ide...
07-02-2020 Posted by tbrockmeyeHello,I'm looking for a proper way to allow the iOS Ring app to connect back to the video feed from an iOS dev...
04-25-2018 Posted by SethArnoffHi Team,These are the below sign identified in our network and want to know the reason for this trigger.Please...
05-14-2020 Posted by VeerendraI want to stop the MortiAgent malware by applying /using snort rule & also using yara rule?How to configur...
05-07-2020 Posted by Mohammed_YasinSubject | Likes |
---|---|
1 | |
1 |