Threat Prevention Services
Threat Prevention Services leverage the visibility of our next-generation firewall to inspect and prevent known threats.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Threat Prevention Services

Palo Alto Networks Threat Prevention Services leverage the visibility of our next-generation firewall to inspect all traffic, automatically preventing known threats, regardless of port, protocol or SSL encryption, confronting threats at each phase of the attack. This page provides resources about threat prevention security services to help keep your network secure. Ask your questions or provide insightful answers in the discussion forum specific to Threat Prevention.

Discussions

Need answers? Register or Sign-in to Engage, Share, and Learn.
Author Topic Views Replies
07-07-2025

Threat ID: 31671 - SCADA ICCP Unauthorized COTP Connection Established

SCADA, or Supervisory Control and Data Acquisition, systems are critical industrial control systems that monitor and manage sensitive processes. This ... — Read more

posted in Threat & Vulnerability Discussions

306 0
06-04-2025

Threat ID 31671 - SCADA ICCP Unauthorized COTP Connection Established

I think the description of "Threat ID: 31671 - SCADA ICCP Unauthorized COTP Connection Established" is incorrect. Below is the description of the Thre... — Read more

posted in Threat & Vulnerability Discussions

1025 0
06-01-2025

I'm not able get community Edition

Dear Team, Please, can anyone help to get the community version of the XSOAR OVA file? Already I have registered but not received any mail

posted in Threat & Vulnerability Discussions

2827 2
05-20-2025

High alert with signature

Hello, I'm sending out a message in a bottle — I'm noticing a very high number of false positives on signatures with a high severity level, whether ... — Read more

posted in Threat & Vulnerability Discussions

1455 0
05-15-2025

Packet Buffer Protection (PBP)

We are receiving multiple alerts for Packet Buffer Protection (PBP) being triggered on internal-to-internal and internal-to-external traffic. My under... — Read more

posted in Threat & Vulnerability Discussions

2613 1

Blogs

Palo Alto Networks Leads in C2 Threat Prevention

05-13-2025 — At its core, Command-and-Control (C2) refers to the covert communication link established between a compromised system and the attacker’s remote infrastructure. — Read more

Labels: Cloud-Delivered Security Services Threat Prevention
1340 3 by in Community Blogs

Announcing the Fuel Workshop Series and YouTube Playlist

09-03-2024 — Fuel User Group has a new Workshop series and YouTube playlist to familiarize customers with Palo Alto Networks ecosystem. Fuel User Group has a new Workshop series and YouTube playlist to familiarize customers with Palo Alto Networks ecosystem. — Read more

Labels: Best Practices Fuel Fuel User Group Fuel Workshop network security ngfw Threat Prevention
3034 2 by in Community Blogs

Always Innovating in NetSec Series: User Experience, Threat Coverage and Management

01-09-2024 — In this edition, we have exciting announcements around innovations in AI Operations (AIOps) & Management, Advanced WildFire (Malware Analysis and Prevention) and Software Firewalls. This wide range of innovations cover areas of improving user expe... — Read more

Labels: Advanced WildFire AIOPS Always Innovating Next-Generation Firewalls ngfw Panorama Threat Prevention WildFire
3201 1 by in Community Blogs

Cobalt Strike Attack Detection & Defense Technology Overview

03-09-2023 — Learn about a range of detection techniques for stopping Cobalt Strike attacks, including signature-based, machine learning, and dynamic heuristics detection engines. Cobalt Strike Attack Detection & Defense Technology Overview — Read more

Labels: Cobalt Strike Next-Generation Firewalls ngfw Threat Threat Prevention Unit 42
30621 5 by in Community Blogs

Using Cortex XSOAR to Deal With MSHTML Zero-Day Vulnerability (CVE-2021-40444)

09-14-2021 — Using Cortex XSOAR to Deal With MSHTML Zero-Day Vulnerability (CVE-2021-40444) Use this Cortex XSOAR playbook to protect against Microsoft's MSHTML Zero-Day Vulnerability (CVE-2021-40444). — Read more

Labels: Cortex XSOAR Threat Prevention
6159 by in Community Blogs

Articles

Palo Alto Networks 7-byte Custom Signature Minimum Removed in Newer Versions and Why it Matters!

05-30-2025 — Using the capability of the Palo Alto NGFW and Prisma Access to write custom application and Vulnerability signatures helps Security engineers to implement many custom protections, specific to their network environment. — Read more

Labels: Firewall PAN-OS Threat Vulnerability
607 3 2 by in General Articles

How to Write Palo Alto Networks Custom Vulnerability and Application Signatures with Examples

05-30-2025 — Palo Alto Networks NGFW and Prima Access have many predefined IPS vulnerability signatures but sometimes extra custom signatures are needed that are specific to the application being protected as this need internal domain knowledge. Provided are s... — Read more

Labels: Custom Signatures Next-Generation Firewall. NGFW PAN-OS Prisma Access Vulnerability
937 4 5 by in General Articles

Threat Vector | Rethinking Cloud Security Strategies

02-06-2025 — Cloud security is more complex than ever. Organizations move fast, but security teams often struggle to keep up. In this episode of Threat Vector, host David Moulton speaks with Amol Mathur, SVP of Products for Prisma Cloud at Palo Alto Networks, ... — Read more

Labels: AI Automation Cloud Security cloud threats cloud-native data integration dynamic workloads incident response machine learning platformization proactive security Security Operations security silos security workflows shift-left security SOC Threat Prevention Threat Vector unified platform
759 by in Threat Vector

Secure AI Applications by Design. AI Runtime Security, Now Available.

09-16-2024 — Palo Alto Networks is pleased to announce the official rollout of our latest Secure AI by Design product portfolio, so you can embrace AI with confidence. AI Runtime Security is now available to secure the next generation of AI applications. It is... — Read more

Labels: AI Runtime Security AI Security Precision AI Threat Prevention
1848 by in AI Runtime Articles

Nominated Discussion: Verdict "malicious" and action "allow"

05-21-2024 — This Nominated Discussion Article is based on the post "Verdict "malicious" and action "allow"". — Read more

Labels: Advanced WildFire Vulnerability Protection WildFire Wildfire License
2263 1 by in General Articles

Videos

Digital Learning Courses

Access Palo Alto Networks learning platform to gain free technical insights and educational materials across our full suite of products.

Please note: SSO login is necessary to access the content.