Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Community Statistics

  • 4,349 Users Online
  • 151K Posts
  • 15.4K Solutions
  • 43.5K Likes

Welcome to Palo Alto Networks LIVEcommunity

Find answers, share solutions, and connect with peers and thought leaders from around the world.
New to LIVEcommunity? Check out our Welcome Guide.

Community Activity

Resolved! Monitor Logs - filtering with wildcard?

Are wildcards supported now when trying to filter logs in Monitor? I saw a post from 2015 asking about it and at the time the answer was "Wildcards are not supported in the traffic log filters."

 

Was hoping that 9 years is enough time to implement t

...

dlcrewse by L1 Bithead
  • 113 Views
  • 2 replies
  • 0 Likes

Reverse proxy for Exchange ActiveSync

We have a Palto Alto cluster and I want to use them as reverse proxy for our Exchange inbound trafic. We activated decryption for this trafic and we want to allow only ActiveSync trafic / application.

 

It did not work with only allow ActiveSync appl

...

karsayor by L0 Member
  • 147 Views
  • 1 replies
  • 0 Likes

Cortex XDR dashboard into Grafana?

 

J.JohnsonRock
L0 Member
 
 

am ‎04-08-2024 11:02 AM

Hello, I don't know if I'm in the right place...

I would like to integrate our Cortex XDR dashboard into Grafana. I know this is possible via an API, but which connec

...

JJohnsonRock_0-1712642428134.png

Allow traffic mikrotik site to site.

Hi everyone. I just installed a firewall at an office. Office A is connected to office B via two site-to-site mikrotiks.
Inside office A there is a server that records the presence of office B employees.
After introducing the PA440 it stopped working..

...

AlessioS by L0 Member
  • 118 Views
  • 1 replies
  • 0 Likes

Resolved! Potentially Dangerous Tool Alert

Hi

Cortex has started blocking a legitimate tool we use: certify.exe, which is part of Certify The Web, that we use to automate certificate renewal from Lets Encrypt.

I have not seen this before. Is there anyway to whitelist this tool?
The precise alert

...

aholdt by L1 Bithead
  • 123 Views
  • 2 replies
  • 0 Likes

XSAOR with HA using Open search Upgrade

Hi Team,

The customer uses the XSOAR in High Availability using OpenSearch. and the number of app servers is 2.

So is it possible to upgrade the XSOAR not stopping the server?

 

For ex) Stop the App server 1 and upgrade the App server 1 first, an s

...

Query for CVE-2024-3400

Hello Team,

 

Work around is for mentioned vul is to install latest Applications and Threats content version

 

Applications and Threats content version 8833-8684 is already installed in our firewall, could you please confirm is our firewall affected?

...

403 forbidden error while importing IDP fiile

Hii,

 

I have been trying to import G suit IDP file in SAML Identity provider on palo alto VM firewall but for infinite time its just showing message "uploading" without showing any error message. when I checked in network tab of inspect element I ca

...

Customer Advisories

Your security posture is important to us. If you’re a Palo Alto Networks customer, be sure to login to see the latest critical announcements and updates in our Customer Advisories area.

Learn how to subscribe to and receive email notifications here.

Listen to PANCast

PANCast is a Palo Alto Networks podcast that provides actionable insights to customers, helping you maximize your investment while improving your cybersecurity posture.

Top Solution Authors
Top Liked Authors
Top Contributors

Latest from our Blog

XSOAR 8 On-Premises Now Available!

This blog written by Alon Yardeni and published on April 15, 2024. We are pleased to announce the support for on-premises deployments for XSOAR 8. New customers of Cortex XSOAR 8 who require an on-pre...

0 Comments

On Credible and Cyber-Contextual Labeling

Blog written by Gal Itzhak and published on April 4,2024. Background Machine learning (ML) powered methods are rapidly taking over the cybersecurity medium, performing a variety of complex tasks, incl...

0 Comments