Objects > Custom Objects > Spyware/Vulnerability
Table of Contents
10.0 (EoL)
Expand all | Collapse all
-
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > Devices
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > Mobile Network Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Decryption > Forwarding Profile
- Objects > Schedules
-
-
- Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > VLANs
- Network > Virtual Wires
-
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
-
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device > Setup > DLP
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
- Device > Device Quarantine
-
- Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Certificate Management > SSH Service Profile
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
- Device > Policy Recommendation
-
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
-
- Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Server Profiles > SCP
- Panorama > Scheduled Config Export
End-of-Life (EoL)
Objects > Custom Objects > Spyware/Vulnerability
The firewall supports the ability to create custom spyware
and vulnerability signatures using the firewall threat engine. You
can write custom regular expression patterns to identify spyware
phone home communication or vulnerability exploits. The resulting
spyware and vulnerability patterns become available for use in any
custom vulnerability profiles. The firewall looks for the custom-defined
patterns in network traffic and takes the specified action for the
vulnerability exploit.
Weekly content releases periodically include new decoders
and contexts for which you can develop signatures.
You can optionally include a time attribute when defining custom
signatures by specifying a threshold per interval for triggering
possible actions in response to an attack. Action is taken only after
the threshold is reached.
Use the Custom Spyware Signature page
to define signatures for Anti-Spyware profiles. Use the Custom
Vulnerability Signature page to define signatures for
Vulnerability Protection profiles.
Custom Vulnerability
and Spyware Signature Settings | Description |
---|---|
Configuration Tab | |
Threat ID | Enter a numeric identifier for the configuration
(spyware signatures range is 15000-18000 and 6900001 - 7000000;
vulnerability signatures range is 41000-45000 and 6800001-6900000). |
Name | Specify the threat name. |
Shared | Select this option if you want the custom
signature to be available to:
|
Disable override (Panorama only) | Select this option to prevent administrators
from overriding the settings of this signature in device groups
that inherit the signature. This selection is cleared by default,
which means administrators can override the settings for any device
group that inherits the signature. |
Comment | Enter an optional comment. |
Severity | Assign a level that indicates the seriousness
of the threat. |
Default Action | Assign the default action to take if the
threat conditions are met. For a list of actions, see Actions
in Security Profiles. |
Direction | Indicate whether the threat is assessed
from the client to server, server to client, or both. |
Affected System | Indicate whether the threat involves the
client, server, either, or both. Applies to vulnerability signatures,
but not spyware signatures. |
CVE | Specify the common vulnerability enumeration
(CVE) as an external reference for additional background and analysis. |
Vendor | Specify the vendor identifier for the vulnerability
as an external reference for additional background and analysis. |
Bugtraq | Specify the bugtraq (similar to CVE) as
an external reference for additional background and analysis. |
Reference | Add any links to additional analysis or
background information. The information is shown when a user clicks
on the threat from the ACC, logs, or vulnerability profile. |
Signatures Tab | |
Standard Signature | Select Standard and
then Add a new signature. Specify the following information:
Add
a condition by clicking Add Or Condition or Add
And Condition. To add a condition within a group, select
the group and then click Add Condition. Add
a condition to a signature so that the signature is generated for
traffic when the parameters you define for the condition are true.
Select an Operator from the drop-down. The
operator defines the type of condition that must be true for the
custom signature to match to traffic. Choose from Less Than, Equal
To, Greater Than, or Pattern Match operators.
|
| |
Combination Signature | Select Combination and
specify the following information: Select Combination
Signatures to specify conditions that define signatures:
Select Time
Attribute to specify the following information:
|