Date

By Source

By Technology

By Services

By Audience

Displaying 2611 to 2640 of 9521

Build IPsec between Andriod phone and Palo Alto firewall

To connect an Android/IOS phone with a Palo Alto Networks firewall, we can use the predefined VPN app on the phone.  The GlobalProtect app is not required.   Step 1: Enable X-Auth and enter Group Name and Password in the GlobalProtect Gateway configuration:     Step 2. On your phone either

pankaj.kumar,
  • 0
  • 1

SSL Decryption behavior with Application Override

Overview Consider the following custom application and application override rule.  We have configured a custom application for TCP ports 80 and 443.  Application override is happening for traffic to port 80,443 from DMZ to L3-Untrust.       Consider the following decryption rule: Here we are decrypting all traffic coming from

pankaj.kumar,
  • 0
  • 0

Checksum of dynamic updates

Did you know that the Palo Alto Networks firewall verifies the checksum of the dynamic update file while we upload the file to the firewall manually?   How can you test this?   You  can test as follows:    Change the dynamic update file and try to upload it to the

pankaj.kumar,
  • 0
  • 0

MT3.2 Beta Testers

The new version of the Migration Tool 3.2 is in Beta right now. There are some features not added to it yet but we need your help in order to test major features like Cisco NATS for version prior than 8.3, we added support for Global, Static and Nat statements

alestevez,
  • 0
  • 0

Communication between two VSYS via a transit VSYS

Communication between two vsys via a transit vsys is not supported. Packet will be dropped by the firewall. Flow basic will show "packet dropped, from/to zone unavailable for policy lookup" Firewall will not be able to find the destination zone.   Workaround Lets say vsys1 wants to communicate to vsys

pankaj.kumar,
  • 0
  • 0

Captive Portal for IPV6 Address

We can configure captive portal for websites that are using the IPV6 address. The configuration is similar to that of IPV4 address. Here in the topology: We have a web server abcd.com which has an IPV6 address.  Both the Palo Alto Networks firewall (PA) and the test system have IPV6

pankaj.kumar,
  • 0
  • 0

Using uPN (userPrincipalName) to retrieve ip-to-user or user-group mapping

Question Can uPN (userPrincipalName) be used for retrieving ip-to-user mapping or user-group mapping?   Answer   Currently, only the 'sAMAccountName' value is supported to retrieve the user-group mapping and ip-to-user mapping; uPN is not supported.   Feature Request FR ID : 3405, is open for this feature. If you require this feature, you may contact your account team or SE team to vote for this feature.   Note: uPN can be used for authentication but not to retrieve mappings.

crajariyap,
  • 0
  • 0

What's new in MineMeld 0.9.10

Release Date: 2016-05-12   How to update: Updating MineMeld   We are working on a new major feature, this is just a maintenance release: - Bug fixes - UI performance improvements

lmori,
  • 0
  • 0

How to Open a Case on GlobalProtect Remote User VPN Connection Issues

This document shows how to collect preliminary information required by TAC to start working on GlobalProtect (GP) connection issues as soon as a case is opened.   GlobalProtect involves four major components, so whenever there is an issue, we require logs taken from all these devices at one time. Taking

Sai_Srivastava_Tumuluri,
  • 0
  • 0

Pro-Tips: Unknown Applications

What can we do with the 'unknown' applications?   What is the unknown-tcp or unknown-udp that sometimes shows up in traffic logs? In terms of App-ID, these are connections where not enough data, or data that did not match any known applications's behavior, were transferred and App-ID was unable to

reaper,
  • 0
  • 0

Best Practices: Preventing Ransomware in Government Networks

Governments globally, like their commercial counterparts, are currently grappling with ransomware. The FBI receives calls from U.S. state and local governments, especially law enforcement, many of whom are apparently paying the ransom, to report the attacks. In the U.S., some victims have paid over $24 million in 2015 according to IC3 statistics. The U.S. Department of Homeland Security (DHS) reports that 29 agencies have noted over 300 ransomware-related incidents in the last 9 months. In those cases, luckily the attacks were unsuccessful, but in some cases, attackers are using government as the …

Pamela WarrenLuke Amery,
  • 0
  • 0

6 Key Challenges in Securing SaaS Applications

SaaS applications pose a significant security challenge. You do not necessarily want to clamp down on their use because they have become a valuable tool for many of your company’s employees. Using cloud storage applications such as Box to upload a few files or using collaboration tools such as Microsoft Office 365 to create documents is an important part of their everyday routine. On the other hand, you cannot allow them to proliferate without control because they will expose your organization to potentially disastrous security and compliance risks, including data …

Anuj Sawani,
  • 0
  • 0

Now on Security Roundtable: What the C-Suite Should Know about the Rise of Ransomware

With ransomware on the rise, executives have many questions on their minds. What do I need to know about ransomware? To what extent is ransomware covered by cyber insurance? And most importantly, what can be done to prevent these attacks from happening in the first place? At Ignite Conference 2016, Gus Coldebella of Fish & Richardson, Erin Nealy Cox of Stroz Friedberg and Sean Duca of Palo Alto Networks provided a C-level view of the latest attack vectors. Watch what this panel of experts had to say about the rise …

Cristina Salmastlian,
  • 0
  • 0

Don’t Put Off Till Tomorrow What You Should Start Today (Part 2)

In the first blog of this series we reviewed perceptions and current states of preparation for the EU legislative changes and how they impact your cyber security strategies, drawing on information that was collected during the registration process for a webinar run for practitioners with ISACA. News Flash: On May 4, 2016, the European Union (EU)’s General Data Protection Regulation (GDPR) was published in the Official Journal of the EU.  The regulation will enter into force 20 days after its publication, on May 25, 2016.  Its provisions will be directly …

Greg Day,
  • 0
  • 0

Palo Alto Networks Academy Collaborates with VetsinTech

Last week Palo Alto Networks Academy collaborated with VetsinTech to host a product training session exclusively for veterans. Mark McLaughlin gave the welcome address and spoke about the importance of cybersecurity and how its impact and necessity is growing by leaps and bounds in both government and industry. 

Shoba Trivadi,
  • 0
  • 0

STIX and TAXII support

Hi all,   Anyone used minemeld with STIX and TAXII?  While we pretty familure with STIX/TAXII - only just booted minemeld for the first time.   Cheers,   Scotty

ScottyAU,
  • 0
  • 0

Network Security Management For Dummies

Today’s enterprise security deployments require a network security management solution that provides the following: • Centralized administration with automated and stream-lined management and configuration processes • Greater network visibility with comprehensive reporting across the entire network security environment • Prioritization of critical threats to enable faster, more effective incident response

  • 2
  • 7890

Unit 42 Report - Ransomware: Unlocking the Lucrative Criminal Business Model

Ransomware, specifically cryptographic ransomware, has quickly become one of the greatest cyberthreats facing organizations around the world. This criminal business model has proven to be highly effective in generating revenue for cyber adversaries in addition to causing significant operational impact to affected organizations. It is largely victim agnostic, spanning the globe and affecting all major industry verticals. Small organizations, large enterprises, individual home users – all are potential targets.

Santa Clara, CA, USA
  • 1
  • 7700

Ransomware: Unlocking the Lucrative Criminal Business Model

Read Unit 42's in-depth report on ransomware history, evolution and effective defenses.

Santa Clara, CA, USA
  • 0
  • 1308

Executive Summary - Ransomware: Unlocking the Lucrative Criminal Business Model

The business model behind crimeware has changed. In the past, attackers typically profited from their malicious endeavors by stealing identities, or credit card numbers, and selling them on underground markets for a small fee. In recent years, the price for stolen records has plummeted, falling from $25 per record in 2011 to only $6 in 2016.1 This has necessitated new sources of income for cyber attackers, with many of them turning to ransomware due to recent advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data. Unit 42, the Palo Alto Networks® threat research team, reviews the past, present and future of ransomware in this report, including strategies for preventing this critical threat.

Santa Clara, CA, USA
  • 1
  • 2011

The Computer Virus That Haunted Early AIDS Researchers

After booting up their computers one day in late March, scores of employees at MedStar, a sprawling health-care system with ten hospitals in the Washington-Baltimore area, were greeted with a menacing ransom note. Their computer systems had been taken over, the note said, and vital files had been locked away. “You have just 10 days to send us the Bitcoin,” the hackers wrote, after demanding about 19,000 dollars’ worth. “After 10 days we will remove your private key and it’s impossible to recover your files.”

  • 0
  • 872

Address Object issues Migration tool 3.3.5

I have been working on a project to remove one vsys off a 5050 to a dedicated 3060. The 5050 is multi tenancy. I have found that when doing this migration, if there are any address objects installed on a policy that have IP address for their name, the migration

Ebtech173,
  • 0
  • 0

Winning Together in the Commercial Market

At Ignite 2016, Joshua Hoffman, Vice President of Worldwide Inside Sales, and I sat down and recorded a video explaining one of our top global priorities: our commercial market strategy. It is abundantly clear to both Joshua and I that in order to win in the commercial segment we must work together with you, our partners, which is why we wanted to share the video with you. Before you watch the video, allow us to provide you with a little bit of context. We define the commercial market segment as …

Ron Myers,
  • 0
  • 0

How the Financial Services Industry Can Prevent Ransomware

There has been much media coverage of ransomware over the past several months. The healthcare industry has been in this spotlight most recently, but financial services is certainly not immune to this threat. Back in mid-2014, a U.S. brokerage house fell victim to CryptoWall, which both encrypted and exfiltrated data from that institution. Although there have not been many public disclosures of ransomware incidents at financial institutions as of late, CryptoWall ransomware was one of the top 3 threats to the industry in both 2014 and 2015 based on research …

Lawrence Chin,
  • 0
  • 5

Palo Alto Networks Joins Forces with the White House and Industry Partners to Support Veterans and their Families

Last Thursday I had the distinct honor to attend a special White House event celebrating the 5th anniversary of Joining Forces, an initiative that First Lady Michelle Obama and Dr. Jill Biden launched in 2011 in order to support service members, veterans, and their families through wellness, education, and employment opportunities.  Joining Forces works closely with both the public and private sectors to ensure that service members, veterans and their families have the tools they need to succeed throughout their lives. The primary objectives of Joining Forces include: Bringing attention …

John Davis,
  • 0
  • 0

How To (Effectively) Prevent Ransomware Infections

Today’s security deployments are quickly becoming unmanageable. Multiple user interfaces, too many security policies, and mountains of data from many different sources create the complexity of today’s cyber security environment. Combined with the global shortage of security personnel this situation calls for streamlined management solutions that empower network security administrators to do more with less.

  • 1
  • 971

Bucbi Ransomware Gets a Big Makeover

Two-year-old Bucbi ransomware is making a comeback, with new targeted attacks and a new brute force technique.

  • 0
  • 800

Unable to delete Invalid Service Objects

Hello    I am migrating from netscreen to PA. In MT, in getting invalid services, so I fixed it with search and replace option. Now these services are not in used but when I am trying to delete then nothing is happening.     Similarly other issue is: there is

ghostrider,
  • 0
  • 0

Firewall does WildFire Registration even though WildFire is Not Configured on the Firewall

Symptoms Even though the Palo Alto Networks firewall is not configured with the WildFire feature, it automatically does WildFire public cloud registration when passive DNS monitoring is enabled in the Anti-Spyware profile. Diagnosis Passive DNS is an opt-in feature that enables the firewall to act as a passive DNS sensor and send

rashobana,
  • 0
  • 0

Configuring Windows 2008 R2 RADIUS Authentication

In order to authenticate the Palo Alto Networks firewall and Panorama administrators with the RADIUS server (Win2K8 R2), first you need to take action on the firewall.    First let's work on the firewall.    Create an authentication profile for the RADIUS server. Server Profile –       Radius

bguntur,
  • 0
  • 0
Displaying 2611 to 2640 of 9521