HTTP Response Codes

Showing results for 
Show  only  | Search instead for 
Did you mean: 
L4 Transporter
100% helpful (2/2)

Brief Description

HTTP response status codes indicate whether a specific HTTP request has been successfully completed. Responses are grouped in five classes: informational responses, successful responses, redirects, client errors, and server errors. Monitoring HTTP status codes assist customers in locking down HTTP responses to prevent fingerprinting and helping create more effective App-ID signatures. These configured Threat Prevention custom signatures will log HTTP response status codes.


Target Audience

This skillet is intended for Palo Alto Networks SEs, PSEs, Partners, and Customers


Skillet Details


Github Location:

Github Branches: master

PAN-OS Supported: 7.x, 8.x, 9.x

Type of Skillet: panos/xml

Collections: Configuration


Full Description

This HTTP Status code Skillet will create custom threat prevention signatures that will log all HTTP status codes in PAN-OS logs. It is designed to help customers determine misconfigurations and help with more focused Application ID (App-ID) signatures.


As you interact with a website, you make the request and the server responds. Status codes let us know whether the request was a success, a failure, or something in-between. Upon creating the custom threat prevention signatures, you can immediately start to utilize them for a few use cases:


  • Build more granular security rules based on the response codes
  • Mine HTTP 200 to better understand how the application works to build better App-IDs and/or rules.
  • HTTP 4XX client errors can indicate an application issue like a broken link or potential scanning activity.
  • HTTP 5XX client made a valid request but the server didn’t complete it – server problem.


Consider resetting these responses so an attacker does not get positive feedback that the application was impacted. Also, match the URL for the session and provide that to the app team to harden the code. If you have not fully adopted App-ID, then there is most likely a “catch-all” rule that exists that will be similar to this one.


In PAN-OS 8.1, rule count and first/last seen features were introduced. Correlating this data with the HTTP status codes, you can create more granular rules for your applications and not only see if those rules are being hit, but you can also filter on that rule in the traffic logs as well. As you keep building more App-ID centric rule in your security policy, see a decline in hit count for your “catch-all” rule and eventually be able to disable it with confidence. Disabling the catch-all rule prevents scanning tools such as Shodan and port scanners from footprinting your web application. This means that an attacker must actually know the proper URL for your hosted application to access it – a bar that any valid user will automatically pass.


Rate this article:
L3 Networker



Additional Infos how easy you can add a Skillet to the existing fw config without external tools.


Add the bold lines to the skillet xml snippet. version depends on your PANOS verison, mine was 10.0.0

<?xml version="1.0"?>
<config urldb="paloaltonetworks" version="10.0.0">

Skillet Content



Go in the PAN webUI to Setup->Operations->Import named configuration snapshot and import the skillet xmlfile with the additional lines.

Change to cli on PAN an enter:

load config partial mode merge from-xpath vulnerability to-xpath /config/shared/threats/vulnerability from SkilletXmFile.xml


After that refresh the browser and commit the changes. Thats it


happy day



Register or Sign-in
Article Dashboard
Version history
Last Updated:
‎02-28-2021 08:15 AM
Updated by: