: Vulnerability Protection
Focus
Focus

Vulnerability Protection

Table of Contents

Vulnerability Protection

With Vulnerability Protection, stop attackers from exploiting system flaws and gaining unauthorized access to your network. This type of protection zeros in on inbound threats, where an attacker is attempting to exploit a system flaw to breach your network.
A Vulnerability Protection security profile is active only when you attach it to a security policy rule.
Security profiles give you a way to take specific actions on traffic that matches a security policy rule. Each type of security profile addresses a use case (for example, web access controls or C2 attack detection), and has it’s own set of features that you can use to control traffic based on the unique needs of your business.
Scroll here to see:
  • How to enable a security profile
  • How to check profile usage
  • Security profile dashboard highlights

Enable a security profile

  1. Use the profile’s dashboard to create and manage your profiles:
    • Review the best practice profiles.
    • Add a new profile.
    • Update existing profiles.
      Several profiles include inline access to resources you can use to inform your updates, including the latest threat content relesae updtes, the Threat Vault threat database, and PAN-DB, the URL Filtering cloud database.
    • Create and manage overrides—Overrides give you a way to specify that a profile treats certain traffic differently than it would by default.
  2. Add the profile to a profile group (go to Security ServicesProfile Groups).
    A profile group is a collection of profiles, and it can include one profile from each type.
  3. Reference the profile group in a security rule.
    A security profile is active only when it’s in a profile group, that’s attached to a security rule.

Check profile usage

On each profile’s dashboard, you can check to see the number of security rules using the profile:

Security profiles—Dashboard highlights

Each security profile has it’s own dashboard—from a profile dashboard, you can create new profiles and overrides, assess profile and override usage, and tap in to the latest Palo Alto Network’s threat data (including content releases, the Threat Vault, and PAN-DB) to check coverage and take action.