Learn More About Threat Signatures

Advanced Threat Prevention

Learn More About Threat Signatures

Table of Contents

Learn More About Threat Signatures

Where Can I Use This?
What Do I Need?
  • Prisma Access
  • NGFW
  • Advanced Threat Prevention or Threat Prevention License
  1. Find the threat ID for threats the firewall detects.
    • To see each threat event the firewall detects based on threat signatures, select
      . You can find the ID for a threat entry listed in the ID column, or select the log entry to view log details, including the Threat ID.
    • To see an overview of top threats on the network, select
      Threat Activity
      and take a look at the Threat Activity widget. The ID column displays the threat ID for each threat displayed.
    • To see details for threats that you can configure as threat exceptions (meaning, the firewall enforces the threat differently than the default action defined for the threat signature), select
      Security Profiles
      Anti-Spyware/Vulnerability Protection
      or modify a profile and click the
      tab to view configured exceptions. If no exceptions are configured, you can filter for threat signatures or select
      Show all signatures

Recommended For You