\When a vulnerability is identified/posted, Palo Alto Networks will do a reverse engineer for that vulnerability, to understand how the vulnerability could possibly be exploited to, and then build possible protection. It’s not an simple task to create an appropriate signature. Hence, need to gather the right information about the vulnerability ( as much as possible) to build an IPS vulnerability signature, also Palo Alto Networks should take care about the false positives and performance implications in creating the signature.
So, please wait for further updates on this.
You are watching the correct place to see when the update is available.
As HULK mentions, your sales engineer would be the best source for advance notice.
The sales engineer could also help you craft a manual work around if a vulnerability is a particularly high risk for your environment. You do need to be careful about these custom signatures as one of the reasons PA takes some time to produce a signature is to avoid a false positive that blocks production necessary traffic. The quick fixes based on initial information do carry a risk of blocking legitimate work on your network.
You need to measure your exposure risk for the particular vulnerability against the potential time lost in blocking legitimate traffic.
You can review the process in the documentation on creating a custom threat signature.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!