Date

By Source

By Technology

By Services

By Audience

Displaying 9151 to 9180 of 11116

What is the Maximum Number of Addresses per Address Group in Panorama?

There is no maximum limit on Panorama. The managed Palo Alto Networks firewalls enforce the maximum number based on their capacity limits. To determine the maximum number of address, address groups, and addresses per group on a Palo Alto Networks firewall enter the following CLI command: show system state |
shasnain,
  • 0
  • 0

How to Allow a Single YouTube Video and Block All Other Videos

How to Allow a Single YouTube Video and Block All Other Videos In this example we only want to allow this one youtube video: https://www.youtube.com/watch?v=hHiRb8t2hLM, and block the rest of YouTube.  Please follow these steps to accomplish this.   Steps Block streaming-media in your URL Filtering Profile. Get there in
jdelio,
  • 0
  • 2

Panorama Commit Error: "certificate unexpected here"

Symptom After a factory reset, a commit from Panorama can result in the following error: Error reads: Commit failed Shared -> certificate unexpected here Cause Shared data is preventing the commit from completing. On Panorama in configure mode run the following command: # show shared shared {   certificate;  
jdelio,
  • 0
  • 2

More of a Good thing: Splunk and Palo Alto Networks

Today we took another step forward with Splunk, introducing a joint solution that takes security intelligence across the enterprise to a new level. Working together, the companies have released the newest Splunk App for Palo Alto Networks, enabling organizations to leverage the unique and context-rich data generated by Palo Alto Networks, including information on APTs from WildFire, in the Splunk application. This enables customers to not only visualize application, user, content and network data, but also to correlate data from other sources to better analyze risk, improve security posture, and …
Chad Kinzelberg,
  • 0
  • 0

How to Customize the PAN-OS User Interface Translation Files

Overview This document describes how to modify and add a custom user interface translation mapping files on the Palo Alto Networks firewall. In order to change the labels and terms that appear on the user interface, follow the instructions in this document. Note: This capability was introduced in PAN-OS 5.0.
cstancill,
  • 0
  • 0

RSA 2013: SSL AS SECURITY MECHANISM AND MASKING AGENT

Palo Alto Networks says SSL by itself represented 5 percent of all bandwidth and the sixth-highest volume of malware logs within known applications. That and other findings from its Application Usage and Threat Report.
  • 0
  • 1647

SSL Decryption Stops Working on Firefox Browser After Changing SSL Decryption Certificate

Symptom After changing the SSL decryption certificate on the Palo Alto Networks firewall, SSL Decryption does not work for the Firefox browser. The Firefox browser shows a certificate error, while SSL decryption for other web browsers continue to work.   Cause The Firefox browser saves cookies in its cache.  
pagmitian,
  • 0
  • 1

Site-to-Site IPSec VPN between Palo Alto Networks Firewall and Cisco Router is Unstable or Intermittent

Symptoms Site-to-Site IPSec VPN has been configured between a Palo Alto Networks firewall and a Cisco router. However, the VPN is unstable or intermittent. Cause The issue may be due to a Dead Peer Detection (DPD) configuration mismatch. Resolution Check and modify the Palo Alto Networks firewall and Cisco router
pagmitian,
  • 0
  • 4

Site-to-Site IPSec VPN Between Palo Alto Networks Firewall and Cisco Router using VTI Not Passing Traffic

Issue Site-to-Site IPSec VPN has been configured between Palo Alto Networks firewall and Cisco router using Virtual Tunnel Interface (VTI). However, the IKE Phase 2 traffic is not being passed between the Palo Alto Networks firewall and Cisco router. In summary, the VPN is down: The Interface Tunnel is Down
pagmitian,
  • 0
  • 6

PA-500 MP Memory Upgrade

  The contents of this article can be found on the Technical Documentations site under Platform Documentation.   See the 'Memory Upgrade Procedure' section under PA-500.     Note: This page has been flagged for archival. Please update your bookmarks.
panagent,
  • 0
  • 3

Cyber-Attackers Most Often Target Nine Business Apps: Research Report

While social networks have a large footprint inside corporate networks, attackers prefer to target business-critical applications.
  • 0
  • 1279

Why Does the Number of Log Rows in the Threat Log Differ from the Count in Threat Report?

Overview The threat log automatically groups similar log events into a single event and provides a Repeat Count value. This decreases the size of the log file, while still providing relevant information.   Details For example, a customer may monitor "HTTP Forbidden Brute Force Attack" threat and see 2 lines
kkondo,
  • 0
  • 0

DNS Queries Are Not Redirected by PBF Rule if DNS-Proxy is Used

Overview Referring to the sample diagram below. DNS-Proxy is configured on the Palo Alto Networks firewall and PBF rule is applied.  The PBF rule is configured so that traffic is redirected to Internet #2 if Internet#1 is down. Issue If Internet #1 goes down in this scenario, DNS queries will
kkondo,
  • 0
  • 4

URL Filter Log Not Generated by Custom URL Category for CSV File

Issue A custom URL category for CSV files is entered into a URL filtering profile for the purposes of monitoring the downloading of a CSV file from a server. However, when the CSV file is accessed and downloaded, a URL filtering log entry is not generated.   Details The following
kkondo,
  • 0
  • 2

GlobalProtect Login Fails When Using a Group in the Allow List

Issue When using a group in the "allow list" for the authentication profile that Global Protect uses, the login attempt fails with the following error: "Reason: User is not in allowlist"   However, the login works fine if the allow list is set to "all" in the authentication profile.  
jteetsel,
  • 0
  • 2

Unexpected Traffic Seen from the User-ID Agent

Issue Unexpected traffic is being seen from the User-ID agent over UDP ports 135 and 137. The application is listed as incomplete, msrpc or netbios-ns. The destination appears to be random public IP addresses. There is a lot of event 10009 events DCOM events in the system log under the
jteetsel,
  • 0
  • 2

How to perform a factory reset on a Palo Alto Networks device

The following steps describe how to perform a factory reset on a Palo Alto Networks device. Note: If running PAN-OS 6.0 and above, review the following link to perform SSH into Maintenance Mode: How to SSH into Maintenance Mode   Steps Connect the Console cable, which is provided by Palo
syaguma,
  • 0
  • 3

How to Load Partial Config for Application Groups

On the Palo Alto Networks device, it is possible to merge part of a config from one device to another device. Example Moving the application groups from device A and adding the application groups to the same section of the config in device B: Export the config from device A.
swhyte,
  • 0
  • 0

Applications and Threats – Analyzed Together for the First Time.

This edition of the Application Usage and Threat Report marks an evolution and an associated name change. For the first time, the report maps application usage and threat activity as seen on enterprise networks between May and December 2012. This report summarizes network traffic assessments performed on more than 3,000 networks, encompassing 1,395 applications, 12.6 petabytes of bandwidth, 5,307 unique threats and 264 million threat logs.
Matt Keil,
  • 0
  • 0

Social Networks Not Major Carrier of Malware, Study Finds

Malware communicating with command and control servers is more commonly associated with custom applications and not social networks, according to an analysis conducted by Palo Alto Networks.
  • 0
  • 1294

Palo Alto Networks Reveals – for the First Time – Data on Applications Attackers Most Often Target

Palo Alto Networks, Inc. (NYSE: PANW) today announced that its management will be presenting at the following events with the financial community.
Santa Clara, CA
  • 0
  • 272

How to Configure a Custom App-ID

In this video, we show how to configure custom App IDs with a live demo. Let us know if you have questions or feedback!         Related Links:   Custom App Signatures-Tech Note https://live.paloaltonetworks.com/docs/DOC-2015   Admin Guide, see p.233 for Data Pattern info https://live.paloaltonetworks.com/docs/DOC-4118 https://live.paloaltonetworks.com/docs/DOC-1499   HTTPFox (http
spolo,
  • 0
  • 1

How to Free Up Disk Space in PAN-OS

Overview When the available disk space in a Palo Alto Networks device becomes too low, new dynamic updates may not install due to lack of space. Starting from PAN-OS 5.0, a new CLI command, delete content cache old-content, was introduced to free some space on the device.   Details In
Phoenix,
  • 0
  • 2

Advanced volatile threat: New name for old malware technique?

There is something worse than advanced persistent threats (APT) out there -- a stealthier attack vector called advanced volatile threats (AVT), says one security company.
  • 0
  • 1393

Mandiant and Palo Alto Networks Partner on Targeted Attack Defense

Mandiant and Palo Alto Networks have teamed up to provide customers with a “holistic approach to thwart advanced attackers,” the companies said Monday.
  • 0
  • 1469

How does Panorama Retrieve the Licenses of Managed Devices?

Panorama contacts the license server and sends the serial number of each managed Palo Alto Networks devices. The license server responds with the licenses for each device.   Panorama will display the licenses for each managed device, but does not automatically install them. To activate a license on a managed
rvanderveken,
  • 0
  • 0

How Log Suppression Works

Overview Log suppression, when enabled, is a feature that instructs the Palo Alto Networks device to combine multiple similar logs into a single log entry on the Monitor > Logs > Traffic page. Clicking on the entry for the log details shows an increased Repeat Count value and the related
Phoenix,
  • 0
  • 1

Bootloader Corruption after Reboot

Issue When a Palo Alto Networks device is rebooted, the following error message appears: Resolution The error indicates that the bootloader has become corrupt. Follow the steps below to recover the bootloader: Press Enter while the continue option is highlighted Select the Bootloader Recovery option At the password prompt enter
sraghunandan,
  • 0
  • 0

How Does Active Directory (AD) Auto Discover Work for Agentless User-ID?

For Agentless User-ID, the Palo Alto Networks device sends a standard query to the DNS server configured on the device. The DNS server must be a local DNS server that's part of the domain or a third-party DNS server that knows all the domain mappings.   Note: PAN-OS User Mapping (Agentless User-ID)
syaguma,
  • 0
  • 4
Displaying 9151 to 9180 of 11116