Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Community Statistics

  • 2,050 Users Online
  • 151K Posts
  • 15.4K Solutions
  • 43.4K Likes

Welcome to Palo Alto Networks LIVEcommunity

Find answers, share solutions, and connect with peers and thought leaders from around the world.
New to LIVEcommunity? Check out our Welcome Guide.

Community Activity

Upgrading from Cortex XDR prevent to XDR pro

Hi All,

 

Finally we will be upgrading our Cortex xdr prevent to the pro version. Though we would be getting professional services support on this, I need to understand the entire project plan for this Can anyone help me understand as I would be leadin

...

AsifSid by L2 Linker
  • 3024 Views
  • 9 replies
  • 0 Likes

PA-220 none licenses or expired issue

We buy the PA-220 by PChome,but not have licenses,

I have some quesion,

1.PA must have LIcenses?,if I have't licenes ,whitch function can i use?(HA or Policy)?

2.Have't licenses can't update software?

Loading Loop upon login to Cortex xSOAR

Hello Team,

We're experiencing an issue upon logging in to cortex where it will just loop the home page. Upon checking, the developer tools we find below error.

450 Unauthorized

This server could not verify that you are authorized to access the docume

...

Xpanse Business Units

Hi,

Currently we have 2 Business Units "Azercell" and "Baktelekom" on "Inventory > Owned IPv4 Ranges" tab. We've created 2 different tags on Tags field named "Azeronline" and "Aztelekom" in that tab . Is it possible that these 2 tags created as 2 sep

...

Using RPA from Cortex XSOAR

Hello LC,

I working on a unique deployment that requires the use of RPA to do a few actions that are not supported by API on the target systems. Has anyone successfully created an integration or similar for Crayon or other RPA systems? I can see that

...

Where is the id_set.json file utilized?

The purpose of id_set.json is defined here https://xsoar.pan.dev/docs/documentation/pack-docs#how-do-you-find-pack-dependencies. So it's kind of like package-lock.json in NodeJS. However, where do we need to use it? I can only see it's being used in

...

TPhan by L0 Member
  • 251 Views
  • 1 replies
  • 0 Likes

Using Cortex with DeTTeCT and dettectinator

I am using the DeTTeCT approach to assessing our coverage against ATT&CK: GitHub - rabobank-cdc/DeTTECT: Detect Tactics, Techniques & Combat Threats. In this approach, you need to start with a set of yaml files that have your datasources and detectio

...

Unveiling the Power of Automation for MSSPs

 

This blog written by Bar Katzir on March 1, 2024.

 

 

Managed security service providers (MSSPs) face the same problems as any security operations team: disparate tools, siloed data sources and inconsistent processes.

 

However, these challenges a

...

Title_Automation-for-MSSPs_palo-alto-networks.jpg
Fig 1_Automation-for-MSSPs_palo-alto-networks.png
emgarcia by Community Team Member
  • 98 Views
  • 0 replies
  • 0 Likes

Untrust WAN to Untrust WAN

Hello,

 

Could anyone help me understand the purpose of the following firewall ruleset Untrust WAN -any to Untrust WAN -any, Application-any, Service:Application-default, Action-Allow, Profile Group:Outbound.

 

Thanks!

rmarath by L0 Member
  • 54 Views
  • 1 replies
  • 0 Likes

CPSP Program Member Confirmation

Hello, 

 

I am both domain administrator and super user in paloalto. And, we are partner. I need to get Micro-Credential for Cloud Security Consultant (PMCC). It needs "CPSP Program Member Confirmation". And, I send request and it says, "Activity req

...

JahidAliyev_0-1710419244646.png
Customer Advisories

Your security posture is important to us. If you’re a Palo Alto Networks customer, be sure to login to see the latest critical announcements and updates in our Customer Advisories area.

Learn how to subscribe to and receive email notifications here.

Listen to PANCast

PANCast is a Palo Alto Networks podcast that provides actionable insights to customers, helping you maximize your investment while improving your cybersecurity posture.

Top Solution Authors
Top Liked Authors
Top Contributors

Latest from our Blog

Unveiling the Power of Automation for MSSPs

This blog written by Bar Katzir on March 1, 2024. Managed security service providers (MSSPs) face the same problems as any security operations team: disparate tools, siloed data sources and inconsiste...

0 Comments