How to Find Matching Signature for Vulnerabilities
39036
Created On 09/26/18 13:44 PM - Last Modified 06/09/23 03:20 AM
Resolution
To find the signatures developed by Palo Alto Networks for certain vulnerabilities, create a Vulnerability Protection Rule.
- Vulnerability rules are created under Vulnerability Protection Profile.
- In the Rule > Threat Name field, add text that is part of a signature name.
- To filter the search, select all the other fields available to narrow down the search.
- In the example below, we are searching for signatures having the text "MySQL", the Action is Alert and Severity is either Critical or High.
- Click OK.
- On the Vulnerability Protection Profile window, enable the option "Find Matching Signature" by checking the check box for a particular rule.
The Exceptions tab shows the results.
- The results show the Rule name, Action to match the Vulnerability rule created. How many pages of signatures does it match and the count of the signatures is highlighted in bottom right corner.
See also:
How to Determine the Number of Threat Signatures on a Palo Alto Networks Firewall
Steps to Change the Default Action for Signatures
owner: ssunku