Threat Prevention Services
Threat Prevention Services leverage the visibility of our next-generation firewall to inspect and prevent known threats.
cancel
Showing results for 
Search instead for 
Did you mean: 

Threat Prevention Services

Palo Alto Networks Threat Prevention Services leverage the visibility of our next-generation firewall to inspect all traffic, automatically preventing known threats, regardless of port, protocol or SSL encryption, confronting threats at each phase of the attack. This page provides resources about threat prevention security services to help keep your network secure. Ask your questions or provide insightful answers in the discussion forum specific to Threat Prevention.

Threat Prevention Services Discussions

Need answers? Register or Sign-in to Engage, Share, and Learn.
Author Topic Views Replies
05-24-2022

Country Block and security policy ordering

We are currently setting up policies to block all traffic to\from all countries except a select few. The rules are in place and seem to be working we...

posted in Threat & Vulnerability Discussions

52 1
05-23-2022

Dynamic Updates for Apps went from XML to Binary

Was using the dynamic updates for the app/threat stuff to ingest into my system as it was in an XML file format until recently switched to Binary. Is ...

posted in Threat & Vulnerability Discussions

59 0
05-19-2022

Memory Corruption Exploit

Good day, This may be a silly question we have been getting memory corruption exploit Alerts from a certain endpoint. Client does see them as cause fo...

posted in Threat & Vulnerability Discussions

84 0
05-03-2022

ThreatID 81845 - Generic PHP Webshell File Detection false positives

Anyone else seeing a large number of threat alerts this morning for the new generic signatures added last night? Seeing dozens this morning coming fro...

posted in Threat & Vulnerability Discussions

2200 11
04-25-2022

Uptick in Solarwinds exploit domain flagging

Starting early Saturday morning (4/23) we started getting a large number of DNS threat alerts for 3 domains associated with the Solarwinds exploit. Th...

posted in Threat & Vulnerability Discussions

123 0

Threat Prevention Services Blogs

Using Cortex XSOAR to Deal With MSHTML Zero-Day Vulnerability (CVE-2021-40444)

09-14-2021 — Using Cortex XSOAR to Deal With MSHTML Zero-Day Vulnerability (CVE-2021-40444) Use this Cortex XSOAR playbook to protect against Microsoft's MSHTML Zero-Day Vulnerability (CVE-2021-40444).

Tags: antivirus Cortex XSOAR Investigation and Response threat intelligence threat prevention
Labels: Cortex XSOAR threat prevention
1377 by in Blogs

New Features Introduced in Prisma Access 2.2

09-02-2021 — Learn about the new, powerful features and capabilities offered by Palo Alto Networks' Prisma Access version 2.2.

Tags: prisma access Cloud Managed Prisma Access new features Prisma Access (Panorama Managed) threat prevention vpns wildfire
Labels: cloud managed prisma access New Features Prisma Access threat prevention
1802 1 by in Blogs

New Industry Report Shows Palo Alto Networks NGFWs Outperforms Competitor

09-01-2021 — A recent report proves that the recently launched PA-400 series ML-Powered Next-Generation Firewalls outperform other similar products on the market.

Tags: NGFW PA-400 Series threat intelligence threat prevention
Labels: NGFW threat prevention
1008 2 by in Blogs

Cloud IDS: Threat Detection Service Like Never Before

07-29-2021 — We've partnered with Google Cloud to natively protect the applications you build in the cloud with industry-leading security controls.

Tags: GCP google Google Cloud Platform vm-series Cloud IDS Cortex XSOAR google cloud Google Cloud IDS Splunk Cloud Platform Strata Firewall
Labels: gcp google google cloud platform Strata Firewall threat prevention VM-Series
1967 1 by in Blogs

Four Zero-Day Vulnerabilities in Microsoft Exchange Server

03-10-2021 — Learn more about the active exploitation of four Zero-Day vulnerabilities in Microsoft Exchange Server!

Tags: Cortex Cortex XDR Cortex XSOAR Microsoft Exchange Server threat prevention unit 42 unit42 URL filtering vulnerability XDR XSOAR
Labels: Cortex Cortex XDR Cortex XSOAR threat prevention unit 42 unit42 Vulnerability Vulnerability Protection
2203 2 5 by in Blogs

Threat Prevention Services Articles

Using Cortex XSOAR to deal With Apache Log4j Vulnerability (CVE-2021-44228)

12-12-2021 — Download the new XSOAR playbook responding to the Log4j zero day exploit

Labels: Cortex XSOAR Marketplace XSOAR threat prevention unit 42 Vulnerability Vulnerability Protection XSOAR
4035 2 by in Cortex XSOAR Articles

Wildfire Submission Logs on Prisma Access

11-22-2021 — Verify the WildFire submission logs for Prisma Access deployment via the Panorama and Explore application on the hub.

Tags: pan-os Prisma prisma access wildfire
Labels: Prisma Access Wildfire
545 1 by in Prisma Access Articles

PAN-OS Query Scripts

03-22-2021 — Brief Description This quickplay solution includes a set of scripts and skillets to quickly query the NGFW to determine inbound open policy ports/applications, domain categories, and URL categories. Below is a quick summary of each of the scrip...

Labels: DNS Security Featured NGFW Pan-OS Strata Assess URL Filtering URL Filtering (PAN-DB)
1924 by in Quickplay Solutions Archived Articles

WildFire Decoder Actions BPA Checks

11-14-2019 — AntiVirus - WildFire Decoder Actions - Interpreting BPA Checks - Objects

Labels: antivirus Best Practice Assessment BPA Objects Wildfire
3114 by Retired Member in Best Practice Assessment Objects

Log Forwarding - WildFire Settings BPA Checks

11-14-2019 — Log Forwarding - WildFire Settings - Interpreting BPA Checks - Objects

Tags: best practice assessment BPA log forwarding wildfire
Labels: Best Practice Assessment BPA log forwarding Wildfire
2769 by Retired Member in Best Practice Assessment Objects

Threat Prevention Services Videos

Additional Resources on Beacon

Visit Palo Alto Networks' learning platform, Beacon, for technical knowledge and educational resources related to all of our products.

Please note: You need to be logged into SSO in order to view this content.