Palo Alto Networks Knowledgebase: How to Check if the Vulnerability Module is Working Properly

How to Check if the Vulnerability Module is Working Properly

4404
Created On 02/07/19 23:38 PM - Last Updated 02/07/19 23:39 PM
Device Management Initial Configuration Installation QoS Zone and DoS Protection
Resolution

Overview

A vulnerability profile on the Palo Alto Networks device is configured and added to a security policy. This document describes how to check if the vulnerabilities are being caught and the logs are being triggered in the threat logs under the monitor tab.

 

Details

  1. Go to any http site with a search bar.
  2. Enter the following in the search bar: <script>test</script>. Then, click the search button.

A vulnerability log should be generated under the threat log. This shows that the vulnerability profile is working properly and generating log entries.
Vulnerability-Log.png

 

owner: shasnain

 



Attachments
Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm15CAC&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Attachments
Choose Language