- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Content translations are temporarily unavailable due to site maintenance. We apologize for any inconvenience. Visit our blog to learn more.
01-06-2025 03:55 PM
Threat Prevention goes beyond a typical intrusion prevention system (IPS) to inspect all traffic for threats (regardless of port, protocol, or encryption), and automatically blocks known vulnerabilities, malware, exploits, spyware, and command-and-control. Customers can easily automate workflows to rapidly apply IPS signatures in popular formats such as Snort and Suricata, and take advantage of our enhanced threat coverage.
Suricata is an open-source intrusion detection system developed by the Open Information Security Foundation. It can identify complex malicious patterns in network traffic using customizable rules, and therefore it is able to detect sophisticated attacks beyond basic signature-based detection.
Suricata is supported by a large community contributing to its development. Therefore, Suricata is used by many organizations as a complementary security tool to create custom signatures, which are tailored to their environment.
Being an open source tool, it can be easily integrated into Palo Alto Networks next gen firewalls, using Panorama version 10.0 or higher.
Let us review the process of signature conversion, which is a 3-step process.
Let us dive directly into this 3-steps demo …
01-07-2025 12:24 AM
Hi @kvarshney ,
Great explanation in the video !
Thanks,
-Kim.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!