How to check for Dynamic Updates installation history

How to check for Dynamic Updates installation history

3852
Created On 09/23/21 23:54 PM - Last Modified 05/10/24 00:03 AM


Objective


  • To Verify the installation history of Dynamic Updates packages.
  • This allows to determine what content was present in the device when a given IPS signature triggered.


Environment


  • Palo Alto Firewalls
  • Supported PAN-OS
  • Content Update


Procedure


To check installation history use the following PAN-OS CLI commands:

  1. Antivirus

Antivirus version from paninstaller_content:
> grep before-context 2 pattern 'done installing RPM:. panup-all-antivirus' mp-log paninstaller_content.log*
Antivirus version from System Logs:
> show log system direction equal backward query equal "(description contains 'Antivirus version')"
  1. WildFire

WildFire version from paninstaller_content:

> grep before-context 2 pattern 'done installing RPM:. panupv3-all-wildfire' mp-log paninstaller_content.log*
WildFire version from System Logs:
> show log system direction equal backward query equal "(description contains 'WildFire version')"
  1. Content

Content version from paninstaller_content:

> grep before-context 2 pattern 'done installing RPM:. panupv2-all-contents' mp-log paninstaller_content.log*
Content version from System Logs:
> show log system direction equal backward query equal "(description contains 'Content version')"

 



Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000oMXMCA2&lang=en_US&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail