Date

By Source

By Technology

By Services

By Audience

Displaying 9151 to 9180 of 9935

UIA with Active Directory Quick Start Guide - Japanese

[This document is written in Japanese] Active Directoryを使用している環境に対して Pan-agentを使用したユーザ識別機能を 迅速に展開する際に役に立つクイックスタートガイドです。 このガイドには、Pan-agentのインストール方法の他、サーバ側や主要クライアントOSごとの設定方法 に加えて、Microsoft グループポリシーオブジェクト (GPO) 機能を使用したドメインクライアントに対する WMI / NetBIOS一括設定変更方法なども記載しています。 ☆Pan-AgentソフトウェアをWindows Vista, Windows7, Windows2008 OSに導入 する場合は、UAC(ユーザ・アカウント制御) 機能の無効化、またはエージェントの インストール時および管理プログラムの実行時、"管理者として実行" オプションを 有効にする必要があります。 ☆Sep 6, 2012 グループポリシー操作に関する注意事項を追記しました。 owner: ahayashi

Akira,
  • 0
  • 1

How to Request a new App-ID

To request a new App-ID signature for a common, widely-used internet application:   Go to Submit an Application and complete the form. Provide as much detail as possible. If the application cannot be obtained for testing, further details may be requested including a packet capture of the application traffic to

nrice,
  • 0
  • 2

Palo Alto Networks Credited with Discovering a Critical Microsoft Vulnerability Included in June Microsoft Security Bulletin

Vulnerability in Microsoft Windows Object Linking and Embedding (OLE) Automation Could Allow Remote Code Execution

  • 0
  • 167

BrightCloud Category Descriptions

Overview If you are not sure how to classify a site, this document may help you. BrightCloud Web Filtering Service Category List If a site falls under more than one category, the most relevant category may be assigned. For a full list of Categories, please see this doc: BrightCloud Categories,

jbrozycki,
  • 0
  • 0

Palo Alto Networks Researcher Discovers Critical Microsoft Vulnerability

The Threat Research Team at Palo Alto Networks has been at it again, discovering yet another critical Microsoft vulnerability.  The vulnerability (MS11-038) is addressed in today’s patch Tuesday release, and you can read the Microsoft summary here. The vulnerability involves a weakness in Microsoft OLE automation

  • 0
  • 0

How to Load Partial Configurations

Details PAN-OS allows loading part of a configuration file in three ways: Merge node at dst in x.xml onto node at src in candidate config. > configure # load config partial from x.xml from-xpath to-xpath mode merge Replace node at src in candidate config with node at dst

nrice,
  • 0
  • 1

United Kingdom's Leading Direct Order Shopping Company Trusts Palo Alto Networks to Protect Customer Transactions

JD Williams & Company Achieves PCI Compliance and Reduces Costs with Palo Alto Networks Next-Generation Firewalls

  • 0
  • 184

European Workers: More Social, But Not (Necessarily) Less Productive

We recently published data that analyzed application activity in more than 1,250 organizations worldwide and confirmed what most assumed to be the case: that Facebook is indeed the dominant player in social networking, consuming 87% of all social networking bandwidth observed. However, what was somewhat surprising is that social networking has not slowed the usage of webmail (personal use email) or IM. Quite the contrary, in fact, compared with 12 months ago these application categories are very healthy with IM traffic, as a percentage of overall traffic more than doubling; …

Matt Keil,
  • 0
  • 0

The Man-in-the-Mailbox

As reported today in the New York Times, Google has acknowledged the discovery of a scheme to steal Gmail passwords and eavesdrop on the affected email accounts. (You can read more information on this from Google’s blog here) This scheme targeted specific government and military individuals as well as journalists and activists with targeted spear-phishing techniques to lure the target into entering their Gmail passwords.

  • 0
  • 0

Forrester’s Take on the Changing Landscape of IPS

Last week Forrester released their 2011 Market Overview for IPS solutions (read it here), and in it they had some pretty interesting things to say not only about theongoing consolidation of stand-alone IPS, but also about the changing requirements for IPS as a whole. Before we delve into some of the more interesting bits, a little self-promotion is probably in order. We are happy to say that Palo Alto Networks showed very well in this report with the solution being one of theonly vendors to deliver all of the IPS …

  • 0
  • 0

Microsoft Hotmail Exploit Stealing Email – What’s the Exposure?

When asked what personal email you use, most will immediately reply with Gmail, Facebook Mail, or Yahoo Mail while a select few of us will admit to using Microsoft Hotmail. Why? Speculation would be that it is because Hotmail is viewed as “old” and “klunky”. But that is pure speculation.

Matt Keil,
  • 0
  • 0

Hiding in Plain Sight: 41% of the Applications; 36% of the Bandwidth

The 7th Edition of the Palo Alto Networks Application Usage and Risk Report provides insight into application activity that is based on 1,253 application assessments that show what is really happening on the network. Each of the previous six reports have uncovered interesting data points and this version is no different. The most interesting data point we came upon was the [high] number of applications that can use SSL and port hopping as a means of hiding in plain sight. An early mention by Andy Greenberg in Forbes indicates he …

Matt Keil,
  • 0
  • 0

Palo Alto Networks Discovers Adobe Flash Player Vulnerabilities

Palo Alto Networks™, the network security company, today announced that its Threat Research Team was credited with identifying two vulnerabilities — CVE-2011-0621 and CVE-2011-0623— that affect multiple versions of Adobe Flash Player.

  • 0
  • 615

REST API Reporting - Japanese -

This document is written in Japanese. REST API の ACCやカスタムレポートデータの取得に特化した説明資料です。 具体的に取得可能なレポート種類の一覧や、取得した情報のサンプルを掲載しています。 2012年2月更新: PAN-OS 4.1.3よりbotnet レポートの取得に対応した旨を追記 owner: ahayashi

Akira,
  • 0
  • 0

How to Configure the PAN for use with Steel-belted RADIUS

The attached document explains how to Configure the PAN for use with  Juniper Steel-belted RADIUS. owner:

nrice,
  • 0
  • 0

Enterprises Are Blind to up to 36% of Their Network Traffic, According to Largest Global Study of its Kind

New research published by Palo Alto Networks™, the network security company, illuminates the fact that roughly 36% of enterprise network traffic is comprised of hundreds of applications that can evade the controls of conventional security solutions by either using SSL or port-hopping capabilities.

  • 0
  • 142

A Few Thoughts on the Latest Data Breaches

It has been a very busy spring for data breaches, which has exposed not only a shift in how breaches are executed, but also what types of information are being targeted. As with most breaches, some of the details remain murky, but overall we have seen a pattern of sophisticated attacks targeting information and assets that could be used as part of subsequent targeted attacks. This means that enterprises need to not only re-evaluate how they secure their assets, but also take a fresh look at the real value of …

  • 0
  • 0

Packet Flow white paper - Japanese

This document is written in Japanese. パロアルトデバイス内部でのパケットフローに関するホワイトペーパーの和訳です。 パケットフローダイアグラムも含まれます。 2011/5/10: ファイルを更新しました。 2011/5/13: ファイルを修正しました。 owner: kmiwa

kmiwa,
  • 0
  • 1

Special Cases In Which an HA Failover Will Not Occur

Overview   There are  some special cases in which HA failover doesn't happen:   When the peer is in a suspended status. When the device goes to active(failover happens) in last 60 seconds. During commit & dynamic content update process, and also 1 minute after the job has completed.   owner:

kotobe,
  • 0
  • 0

Iron Man and Next-Generation Firewalls

Gartner’s research on next-generation firewalls and how they are changing the enterprise firewall marketplace is pretty compelling. And the recommendation to migrate from traditional firewalls and IPS to next generation firewalls at refresh time is very clear. Here’s your chance to hear from Greg Young, Gartner Research VP, and one of the authors of the 2010 Enterprise Firewall Magic Quadrant. And catch the premier of what is likely to be one of the hottest movies of the year.

  • 0
  • 1118

Would You Recognize a Money Mule If You Saw One?

Money mules are an essential and often overlooked part of financial theft and malware rings. Even after a theft, the hacker still must find a way to get the money back to his account without revealing his true identity or location.  This is where the money mule comes in. In short, the mule acts as a middle-man in the transfer of the stolen funds. In a bit of a twist, the money mule is often unaware that they are facilitating a crime. Hackers will go to great lengths to create …

Palo Alto Networks,
  • 0
  • 0

Palo Alto Networks Named Best Place to Work in Bay Area Two Years Running

Named by Silicon Valley Business Journal As One of the Top Bay Area Businesses

  • 0
  • 983

Overview of URL Filtering

Details URL filtering decisions are made when a session is created through the Palo Alto Networks firewall (a session matches a security rule with a URL filtering profile).   Here's what happens in a typical web-browsing session with URL filtering on a blocked URL: TCP 3-way handshake completes. Client then

nrice,
  • 0
  • 3

Are URL Categorizations Based on the URL Domain or the Full Path?

Overview Categorization is based on the URL path of up to one-level deep. Detail The following examples mean anything before the domain name can be uniquely categorized: example.com a.example.com b.example.com The following examples apply to one level past the domain: example.com/c example.com/d But, does not apply to this example: not

dyang,
  • 0
  • 0

How to Create Tagged Sub-Interfaces

Steps To terminate multiple VLANS on the same physical interface, multiple tagged sub-interfaces need to be created (one per VLAN). From the WebGUI, go to Network > Interfaces link. Next choose  L3 or L2 interface (should be highlighted as shown in above pic for ethernet1/6) and then click on Add

nrice,
  • 0
  • 1

New Method for Detecting SpyEye

As part of our ongoing botnet tracking and research, we have recently discovered a novel approach for detecting the presence of SpyEye in a network. Just in case you aren’t familiar, SpyEye is a rapidly growing banking botnet and a direct rival to Zbot a.k.a. ZeuS. In fact, the SANS reading room has a detailed analysis of how both bots work, and specifically the mechanisms that SpyEye uses to detect and remove ZeuS from an infected machine. http://www.sans.org/reading_room/whitepapers/malicious/clash-titans-zeus-spyeye_33393 The technique we established revolves around the ability to detect the SpyEye …

Palo Alto Networks,
  • 0
  • 0

Protecting Against TCP Split Handshake Evasion

Overview The TCP split handshake evasion technique is designed to confuse content decoder state machines, allowing vulnerability exploits or similar threats to bypass detection from network-based security devices.  The evasion technique works by modifying the standard TCP 3-way handshake in a way that can confuse a decoder state machine.  The

nrice,
  • 0
  • 1

What’s APPening with Live Mesh 2011

If you are not already familiar, Windows Live Mesh 2011 is Microsoft’s file synchronization and remote desktop access application that evolved out of its earlier products, FolderShare and Live Sync. It is a part of Microsoft’s vision for how users will manage their data across multiple devices – using a blend of cloud services and PC-based apps. According to this recent announcement by the Live Mesh team, the service connects 5 million devices, with over 3 million users syncing 2.2 petabytes of data, since being first introduced six months ago. Although it is …

  • 0
  • 0

University of Westminster Upgrades Network Security to Palo Alto Networks

Palo Alto Networks' PA-5050 Next-Generation Firewalls Increase Application Visibility and Control and Make Application Usage Secure for the University Of Westminster

  • 0
  • 204
Displaying 9151 to 9180 of 9935