How to check for Dynamic Updates installation history
3852
Created On 09/23/21 23:54 PM - Last Modified 05/10/24 00:03 AM
Objective
- To Verify the installation history of Dynamic Updates packages.
- This allows to determine what content was present in the device when a given IPS signature triggered.
Environment
- Palo Alto Firewalls
- Supported PAN-OS
- Content Update
Procedure
To check installation history use the following PAN-OS CLI commands:
-
Antivirus
Antivirus version from paninstaller_content:
> grep before-context 2 pattern 'done installing RPM:. panup-all-antivirus' mp-log paninstaller_content.log*
Antivirus version from System Logs:
> show log system direction equal backward query equal "(description contains 'Antivirus version')"
-
WildFire
WildFire version from paninstaller_content:
> grep before-context 2 pattern 'done installing RPM:. panupv3-all-wildfire' mp-log paninstaller_content.log*
WildFire version from System Logs:
> show log system direction equal backward query equal "(description contains 'WildFire version')"
-
Content
Content version from paninstaller_content:
> grep before-context 2 pattern 'done installing RPM:. panupv2-all-contents' mp-log paninstaller_content.log*
Content version from System Logs:
> show log system direction equal backward query equal "(description contains 'Content version')"