Date

By Source

By Technology

By Services

By Audience

Displaying 2581 to 2610 of 9521

URL Filtering Log Quota in Logging and Reporting Settings

Symptoms When you navigate to Device > Setup > Management > Logging and Reporting settings, there is no provision to set the log quota for URL filtering logs.   Diagnosis URL filtering log database is a part of the threat database. Solution Because URL filtering log database is a part

rchougale,
  • 0
  • 0

Palo Alto Networks to Present at Upcoming Investor Conferences

Palo Alto Networks (NYSE: PANW), the next-generation security company, today announced that its management will be presenting at the following financial community events:

Santa Clara, CA
  • 0
  • 464

Using Delete Password under Manage Data Protection

Issue   What is deleted when 'Delete Password' is used under Manage Data Protection?   To restrict access to captured data within the Data Filtering logs gathered as a result of matching Data Filtering patterns, many administrators use the "Set Password" functionality under Device -> Setup -> Content-ID -> Content-ID

rcole,
  • 0
  • 0

Register for Upcoming Spark User Summits from Fuel User Group

Don’t miss your chance to join Fuel User Group at its upcoming Spark User Summit one-day events, where attendees will hear subject matter experts discuss PAN-OS 7.1, the latest threat intelligence updates, virtualization and more. Spark User Summit attendance and Fuel User Group membership are provided free of cost: join today.

Megan Scofield,
  • 0
  • 0

VM-Series for AWS GovCloud: Securely Enabling “Cloud First” for Government Agencies

“Cloud first” is rapidly becoming a key initiative for organizations and agencies in both the public and private sector. As far back as 2010, cloud first was included as part of a comprehensive effort to increase the operational efficiency of federal technology assets, as outlined in the U.S. Chief Information Officer’s “25-Point Implementation Plan to Reform Federal IT Management.” Since the release of that 2010 initiative, numerous other federal governments have followed suit, adopting a ‘cloud first’ approach, including the U.K. and Australia. In this case, the U.S. CIO’s Cloud …

Matt Keil,
  • 0
  • 0

Migration Tool with ScreenOS VPN Tunnels

We are migrating from Juniper SSGs to PA-3020s. A basic config imports just fine but we've imported configs for several different devices (SSG 140s) and on all of them, VPN information is missing after import. No ike proposals, no ike gateway, no vpn details. Migration Tool version 3.3.10. Suggestions? Are we missing something?

PattyB,
  • 0
  • 0

how to export configuration file from Migration tool 3.1?

  Hi All,   I am new to PaloALto MT, i am using MT 3.1 and facing problem to export the configuration file from tool.   I tried it from eport tab but i am unable to do mapping (unable to move the things from left window (inputs) to right

Gururaj,
  • 0
  • 0

PBF for Office 365

Hi all,   One of our startegic customer is requesting the possibility to route just the O365 traffic to a specific link and after researching about this I think that the best is using MineMeld to automatically feed a list of application IP adrress but I did't find any documentation describing how

rrunge1,
  • 0
  • 1

Hot Cybersecurity Topics for Financial Institutions from the FS-ISAC Summit

Earlier this month, the Financial Services Information Sharing and Analysis Center (FS-ISAC) held its annual summit in Miami. Attended by over 1,100 individuals, this was a highly concentrated gathering of information security and information technology (IT) professionals from the financial services industry. At the FS-ISAC Summit, I had the opportunity to attend some sessions, speak with a number of attendees, and get a sense of what’s top of mind. In this post, I’ll touch on a few topics that cropped up on multiple occasions during my travels through the summit.

Lawrence Chin,
  • 0
  • 5

Get Your Copy of “Network Security Management for Dummies”

Palo Alto Networks is happy to announce the availability of a new “Network Security Management for Dummies” book. It is the latest addition to a series of books that explain the ins and outs of network and cyber security – and it’s available to you for free. Our new book focuses on the importance of deploying a network security management solution when managing multiple firewalls, multiple security vendors, or both.

Joerg Sieber,
  • 0
  • 0

Ransomware Is Not a “Malware Problem” – It’s a Criminal Business Model

Today Unit 42 published our latest paper on ransomware, which has quickly become one of the greatest cyberthreats facing organizations around the world. As a business model, ransomware has proven to be highly effective in generating revenue for cybercriminals in addition to causing significant operational impact to affected organizations. It is largely victim agnostic, spanning the globe and affecting all major industry verticals. Small organizations, large enterprises, individual home users – all are potential targets. Ransomware has existed in various forms for decades; but, in the last three years, criminals …

Ryan Olson,
  • 0
  • 0

팔로알토, 차세대 보안 플랫폼 출시

팔로알토 네트웍스가 보안 위협 선제방어를 위한 차세대 보안 플랫폼(Next-Generation Security Platform)에 정보 유출 방지 기능을 대폭 강화한 PAN-OS 7.1버전을 출시했다.

  • 0
  • 768

DotW: Can I Obtain the CVE in the PA event Log?

This week's Discussion of the Week (DotW) covers a question from the Live Community that comes up from time to time, Can I Obtain the CVE in the PA event Log?   User "Chuck555555" posed this question to the Live Community, where other members have chimed in to assist. User

jdelio,
  • 0
  • 0

Palo Alto Networks Honored in CRN’s 2016 Women of the Channel and Power 100 Lists

Congratulations to our own Kandyce Tripp, Global Head of Channel Operations, and Melissa Nacerino, Director, Americas Channel Marketing, for making the 2016 Women of the Channel list and the Power 100 list. CRN’s “Women Of The Channel” project recognizes influential women leaders with extraordinary expertise and vision. CRN’s Power 100 is a subset of the CRN Women of the Channel who have earned a special distinction based on their exemplary record of success and their level of influence in the channel. 

Chad Berndtson,
  • 0
  • 0

Warren Rogers Associates

As an industry leader in retail fuel monitoring and diagnostics, Warren Rogers Associates (Warren Rogers) manages thousands of data collection devices installed at service stations across the U.S. Because these devices reside alongside its customers’ business systems that handle credit and debit card data, Warren Rogers had to guarantee it would prevent cardholder data from being collected to ensure PCI DSS compliance.

  • 1
  • 1663

Fuel Monitoring Pioneer Takes Next-Generation Security to the Cloud With Palo Alto Networks

SANTA CLARA, Calif. – May 10, 2016 – Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced that Warren Rogers Associates, an industry leader in retail fuel monitoring and diagnostics, has successfully deployed the Palo Alto Networks Next-Generation Security Platform in AWS to prevent successful cyber breaches within its cloud-based data center and ensure PCI compliance for thousands of remote data collection devices at fueling stations across the United States.

  • 0
  • 486

Closing the Generation Gaps

Today, there is a mix of generations coming and going in the workforce. Here’s a quick snapshot: Exiting: Baby Boomers (1940s through 1960s), Remaining: Generation X (1960s to the 1980s), and Entering: Generation Y/Millennials (1980s to the early 2000s).   In school, I recall my business professors warning us about

LindseyNguyen,
  • 0
  • 0

The Heroes without Capes: Cybersecurity Professionals

Imagine this:   Millions of bad guys known as “hackers” are using techniques like advanced persistent threats (APTs) trying to gain access to private or sensitive data for their own selfish purposes.   The good guys known as “cybersecurity professionals” use next-generation platforms such as Palo Alto Networks’ to successfully

LindseyNguyen,
  • 0
  • 0

Week 20 Recap

Greetings, Live Community—   Open Registration in the Live Community What's a Palo Alto Networks serial number or support contract got to do with it? Well, if you have neither, no worries — you can still join the Live Community. Get access to over 30,000 other community members to ask questions

editeur,
  • 0
  • 0

ACC shows data even after clearing all logs

Symptoms Cleared all logs from web interface of the Palo Alto Networks firewall at Device > Log settings > Manage logs.         We still see data in the Application Command Center (ACC).   Diagnosis Clearing logs from web interface will not clear ACC data. Solution Clear the

rchougale,
  • 0
  • 0

NIST CYBERSECURITY EDUCATION GRANTS

cHECK OUT THE FOLLOWING LINK FOR INFORMATION ON GRANTS IN CYBERSECURITY EDUCATION BY NIST:   http://nist.gov/itl/acd/nist-ramps-up-cybersecurity-education-and-workforce-development-with-new-grants.cfm

strivadi,
  • 0
  • 0

Could not create configuration import bundle of device groups for device

Symptoms After importing the device config to the Panorama and then doing "Export or push device config bundle" under Panorama>Setup>Operations we see the following error.   Diagnosis We see the error when we skip the 'commit' before doing "Export or push device config bundle". Solution Please follow the article to import the device config

rchougale,
  • 0
  • 0

DigiCert High Assurance EV Root CA Intermediate Certificate

Symptoms When decryption is enabled on the Palo Alto Networks firewall, the end user might be presented with a forward untrust certificate from the Palo Alto Networks firewall. Normally, we'd expect to see the forward trust certificate for DigiCert High Assurance EV Root CA intermediate certificate used on the end

rchougale,
  • 0
  • 0

Error: Failed to find PANGP virtual adapter interface when connecting to GlobalProtect

Symptoms This error is usually seen when the GlobalProtect client is upgraded or GlobalProtect is not installed correctly. Diagnosis Solution Please follow these steps.   Disable WMI services : run - services.msc - Windows Management Instrumentation(WMI) - stop the service. Delete the files under C:\Windows\System32\wbem\Repository Open regedit Go to HKEY_LOCAL_MACHINE >

rchougale,
  • 0
  • 1

Palo Alto Networks News of the Week – May 14

We’ve rounded up the top Palo Alto Networks news from the past week right here. In case you missed it, our Unit 42 threat intelligence team shared “Ransomware: Unlocking the Lucrative Criminal Business Model” which discusses the history of ransomware attacks and what future trends will define the next phase of ransomware preparedness.. Our subject matter experts also checked in on how how to prevent successful ransomware attacks in financial services and healthcare environments. And for more on the subject, you can head to Security Roundtable, where our latest expert …

Anna Lough,
  • 0
  • 0

A Word on Endpoint Security (For Those In the Know)

Endpoint security is an essential element of any organization’s strategy for detecting and preventing damaging attacks. There has been a lot of discussion in the infosec world about how to use endpoint security tools to provide the best possible protection. At Palo Alto Networks, advanced endpoint protection is a core component of our strategy to provide a true next-generation security platform. Traps, our endpoint security product, is a cornerstone of the automated breach prevention capabilities in our platform. Most endpoint security products are designed to detect and stop malware based …

Sebastian Goodwin,
  • 0
  • 1

Palo Alto Networks Signs Coordinated Vulnerability Disclosure Manifesto, Showcasing Industry’s Contributions to EU Cybersecurity Efforts

Today in Amsterdam, Palo Alto Networks joined more than two dozen other companies and organizations in signing a “Coordinated Vulnerability Disclosure Manifesto.” The Manifesto is a declaration signaling that cooperation between organizations and the cybersecurity community can be helpful in finding and fixing ICT vulnerabilities. In coordinated vulnerability disclosure, vulnerabilities are reported to the owner of the information system, affording the organization the opportunity to diagnose and remedy the vulnerability before detailed information is disclosed to third parties or the public. This helps to minimize opportunities for cyber criminals to …

Rene Bonvanie,
  • 0
  • 0

Ransomware is not a 'malware problem,' it's a criminal business model

As a business model, ransomware has proven to be highly effective in generating revenue for cybercriminals in addition to causing significant operational impact to affected organizations, according to the latest report on malware published by Unit42.

  • 0
  • 704

Algorithm used by GlobalProtect for IPSec

Global protect uses the following alogrithms for IPSec:   Encryption: aes-128.cbc aes-128-gcm aes-256-gcm   Authentication: sha1   However prior to PAN-OS 7.0.X we didn't have control on the algorithm to be used for GlobalProtect. From PAN-OS 7.0.x, we have the control to select a particular algorithm.   From  PAN-OS 7.0.x onwards,

pankaj.kumar,
  • 0
  • 0

Flapping IPSec Tunnel

ISSUE: IPsec tunnel is not flapping or IPsec tunnel is up but not passing traffic.   CAUSE: One of the reasons for the tunnel flapping or not passing traffic is if the SPI number is not stable. A software bug may be the issue, lifetime for phase 1 and phase

pankaj.kumar,
  • 0
  • 0
Displaying 2581 to 2610 of 9521