Creating Custom Application and Threat Signatures

Creating Custom Application and Threat Signatures

Created On 09/25/18 18:09 PM - Last Modified 06/02/23 15:01 PM


Palo Alto Networks next-generation firewall


Desired coverage not provided by current IPS signatures. 


This article provides documentation, in PDF form, related to creating custom application and custom vulnerability signatures. This documentation contains regex basics, details for each custom signature context, and walk-through examples for signature creation.

Further resources have also been provided in the 'Additional Information' section.

Additional Information

Additional Article Resources:


Additional links with other use cases and useful information:

  • Print
  • Copy Link

Choose Language