Threat & Vulnerability
This forum provides information regarding how to detect and prevent the impact of vulnerabilities, malware, and other threats through the use of the Palo Alto Networks security platform.
534 PostsThis forum provides information regarding how to detect and prevent the impact of vulnerabilities, malware, and other threats through the use of the Palo Alto Networks security platform.
534 PostsTraps Advanced Endpoint Protection prevents cyber breaches by protecting and enabling users to conduct their daily activities, and automating prevention by autonomously reprogramming itself using threat intelligence gained from WildFire.
21 PostsA forum to ask or share about Data Loss Prevention (DLP) strategy. DLP ensures sensitive or confidential information doesn't leak outside of the corporate network. Let's rethink DPL together.
14 PostsThis forum is to discuss Palo Alto Networks' Next-Generation CASB, an integrated, multi-faceted CASB solution that helps security teams meet the security challenges of today.
15 PostsDiscussions about IoT Security — aka the Internet of Things — a cybersecurity strategy that safeguards against the possibility of cyberattacks which specifically target physical IoT devices that are connected to the network.
29 PostsWelcome to the AI Access Security discussion area! Here, we focus on how AI Access Security facilitates safe Generative AI adoption by providing real-time visibility, streamlined access control, and robust data protection. Join us to share insights and discuss strategies for keeping sensitive information secure in AI applications.
3 PostsWelcome to the Advanced DNS Security discussion area. Here, we focus on delivering real-time, AI-powered protection against DNS-layer threats—ensuring visibility, control, and prevention across all network environments.
1 Posts
Welcome to the Advanced DNS Security discussion area! Here, you can engage in conversations about Advanced DNS Security, explore new insights, and stay updated on ongoing discussions.
Check back regularly for the latest updates and community insigh
...
SCADA, or Supervisory Control and Data Acquisition, systems are critical industrial control systems that monitor and manage sensitive processes. This alert, "Threat ID: 31671 - SCADA ICCP Unauthorized COTP Connection Established," signifies that an u
...
Hello, interested in exporting device list from iot platform.
I see a API endpoint for this but it doesn't have examples or document how to do filtering or page next since the it is capped to 1000 devices per request. please advise.
https://pan.
...
Hello Everyone,
What does Discover Mobile Device Attributes the limitation mean?
==========
IoT Security can learn mobile (cellular) device attributes, add the devices to its inventory, and track them by the IMEI numbers. You can then see vario
...
Hello,
What best practices should organizations follow to secure their PAN-OS management interfaces against vulnerabilities like CVE-2025-0111?
Best Regard,
Kerolina
I think the description of "Threat ID: 31671 - SCADA ICCP Unauthorized COTP Connection Established" is incorrect. Below is the description of the Threat, but it describes a successful connection there doesn't seem to be anything malicious to it. I'm
...
Dear Team,
Please, can anyone help to get the community version of the XSOAR OVA file? Already I have registered but not received any mail
Hello,
I'm sending out a message in a bottle — I'm noticing a very high number of false positives on signatures with a high severity level, whether they are Anti-Spyware or Vulnerability Protection signatures. The issue is that the solution doesn't
...
We are receiving multiple alerts for Packet Buffer Protection (PBP) being triggered on internal-to-internal and internal-to-external traffic. My understanding is that PBP is primarily intended to protect against DoS attacks, which are typically exter
...
How do I setup a Custom Alert is IoT Security to detect a Raspberry pi device. I have the following vendor codes, and I want to setup a custom alert if a raspberry device connects to our network.
Vendor Codes
28:cd:c1
2c:cf:67
B8:27:be
D8:3a:dd
...
Hi everyone,
When it comes to securing firewall management systems—those critical control points in any network—what strategies, best practices, or tools have you found most effective?
Whether it’s role-based access controls, dedicated management net
...
Hello,
What strategies or tools have you found most effective for protecting your firewall management infrastructure?
Best Regard,
Kely
Hello,
What best practices should organizations implement to protect identity and access management (IAM) systems from vulnerabilities like CVE-2023-23397 affecting Microsoft Outlook and Exchange servers?
Best Regard,
Dona
Hello,
I have a question regarding alert in Threat detection - type "virus"
Some endpoints were trying to update VLC player, but it detected as "virus" with this threat ID: 706518286. This is file name: mirror.alwyzon.net/videolan/vlc/3.0.21/win64/v
...