AutoFocus is a cloud-based threat intelligence service that enables you to easily identify critical attacks, so that you can triage effectively and take action without requiring additional IT resources. AutoFocus correlates threat data from your network, industry, and global intelligence feeds, and surfaces what’s most important. This includes giving you a direct pipeline to actionable intelligence from Unit 42, the Palo Alto Networks threat research team—AutoFocus lets you know if adversaries and campaigns discovered by Unit 42 have targeted your network, or networks like yours.
|March 2020||AutoFocus™ now embeds a WildFire analysis report, with new threat data contexts, (including a causality chain visualization, a WildFire verdict rationale, and a breakdown of detected IoCs, behaviors, and sample processes), directly into your AutoFocus sample details page.|
|November 2019||Introducing AutoFocus™ 2.0! In this November release, we made a multitude of updates to AutoFocus, including a refreshed user interface with a modern look and feel, a streamlined search with options that are quicker and easier to use, and support for custom threat indicator feeds, which enable you to create EDL and URL lists with actionable threat data so that you can better safeguard your network.|
|May 2019||AutoFocus shows you the malicious domains that DNS Security has identified through machine learning and predictive analytics.|
|March 2019||More WildFire Data! See hashes for files that were found to be embedded within another document, and the compilation timestamp for an executable (unusual timestamps can indicate tampering).|
|Feb 2019||AutoFocus displays all the categories that PAN-DB—the URL Filtering cloud—has assigned to a URL, including the URL's risk category (high, medium, or low).|
|Nov 2018||Investigate script-based malware, which has become a common vector of attack.|
|Oct 2018||Check out some usability updates we've made to widgets and reports.|
Get visibility into files that have undergone dynamic unpacking—this means they've been encoded using custom or open source file compression or packing tools.
|Looking for more?||See what else we've been working on...|