Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Community Statistics

  • 3,511 Users Online
  • 151K Posts
  • 15.5K Solutions
  • 43.6K Likes

Welcome to Palo Alto Networks LIVEcommunity

Find answers, share solutions, and connect with peers and thought leaders from around the world.
New to LIVEcommunity? Check out our Welcome Guide.

Community Activity

Cortex XDR Upgrade from Pro to per GB

Hello dear community, 

 

we would like to ingest logs for more visibility. 

Actually we have Cortex XDR Pro. 

How does the upgrade path look like to get the ability to ingest FW and Windows Event logs? 

How much more we need to pay and how does the l

...

RFeyertag by L4 Transporter
  • 121 Views
  • 2 replies
  • 0 Likes

Resolved! Panorama import local managed device issue

 

I added a PA to panorama test lab with version 9.1.11 them import configuration. However I am unable to push config from panorama to PA and I found below errors which showing customized application is in use, then I need to delete many objects and p

...

TonyTam by L1 Bithead
  • 5842 Views
  • 4 replies
  • 0 Likes

Automation rule to add IP address to EDL

Is it possible to create an automation script or rule to add a remote IP address to an EDL in Cortex XDR?  I'm exploring the best way to handle this.  For example, after the recent CVE-2024-3400 disclosure, I patched my firewalls, and all is good.  H

...

DDoS Profiles

How does one go about getting the realistic values for your environment to plug into the DDoS profile or even the zone protection profile? How do you see how many SYNs you are getting per second/min etc?

Errors after deploying template from Panorama

Hi all,

I am seeing the below errors after deploying templates to Palo's when attempting to commit HA configuration.

I have applied the HA IP so unsure why that is stating ip-address to be configured?

 

Also what is best way to resolve these dynamic

...

MAllen_0-1713886027548.png
MAllen_1-1713886065327.png
M.Allen by L0 Member
  • 63 Views
  • 2 replies
  • 0 Likes

Detect and Restrict Powershell cmdlets

Hello everyone,

I would like to know if any of you have struggled with support and technical cases with the need I show below.

I would like to know what you can tell me or give me your opinion about taking action against powershell cmdlets.

After sev

...

B2B VPN IKEv2 Fail with Amazon Private Cloud Peer

Setting up a VPN with a vendor. It came up the first time and test data was passed. It was a couple of weeks after testing before the tunnel would actually be used. When that time came we could not get the tunnel up. IKEv2 fails. I know nothing chang

...

pnelson by L2 Linker
  • 111 Views
  • 1 replies
  • 0 Likes

Need Help on Configuring GlobalProtect VPN

Hello there,

 

I am working on setting up GlobalProtect VPN for our organization and could use some advice. We have a mixed environment with Windows, macOS, and Linux machines, and we're looking to ensure a seamless experience for our users.

 

Specif

...

Customer Advisories

Your security posture is important to us. If you’re a Palo Alto Networks customer, be sure to login to see the latest critical announcements and updates in our Customer Advisories area.

Learn how to subscribe to and receive email notifications here.

Listen to PANCast

PANCast is a Palo Alto Networks podcast that provides actionable insights to customers, helping you maximize your investment while improving your cybersecurity posture.

Top Solution Authors
Top Liked Authors
Top Contributors

Latest from our Blog

Implement Your Own Webhook Endpoint

By Vinay Kumar M, Senior Staff Engineer Summary There are numerous security concerns while using 3rd party Webhooks Providers like pipedream, webhook.site, etc. However, a lesser known alternative is ...

0 Comments

How To Use The CNS REST API

By Vinay Kumar M, Senior Staff Engineer Summary As a Prisma Cloud user, you have access to a specific Prisma Cloud stack. When a user logs in to a stack, it gets a JWT token to access that specific st...

0 Comments

Network Analyzer Query via REST API

By Vinay Kumar M, Senior Staff Engineer Purpose The API which is to be used for Performing Config Search with Network RQL's - 'config from network ...' Symptom /search/config API - https://pan.dev/pri...

0 Comments