A vulnerability profile on the Palo Alto Networks device is configured and added to a security policy. This document describes how to check if the vulnerabilities are being caught and the logs are being triggered in the threat logs under the monitor tab.
Go to any http site with a search bar.
Enter the following in the search bar: <script>test</script>. Then, click the search button.
A vulnerability log should be generated under the threat log. This shows that the vulnerability profile is working properly and generating log entries.