With Vulnerability Protection,
stop attackers from exploiting system flaws and gaining unauthorized
access to your network. This type of protection zeros in on inbound
threats, where an attacker is attempting to exploit a system flaw
to breach your network.
A Vulnerability
Protection security profile is active only when you attach
it to a security policy rule.
Security
profiles give you a way to take specific actions on traffic that
matches a security policy rule. Each type of security profile addresses
a use case (for example, web access controls or C2 attack detection),
and has it’s own set of features that you can use to control traffic
based on the unique needs of your business.
Scroll here to
see:
How to enable a security
profile
How to check profile usage
Security profile dashboard highlights
Enable a security profile
Use the profile’s dashboard to create
and manage your profiles:
Review the best practice profiles.
Add a new profile.
Update existing profiles.
Several profiles include
inline access to resources you can use to inform your updates, including
the latest threat content relesae updtes, the Threat Vault threat database,
and PAN-DB, the URL Filtering cloud database.
Create and manage overrides—Overrides give you a way
to specify that a profile treats certain traffic differently than
it would by default.
Add the profile to a profile group (go to Security ServicesProfile Groups).
A profile group is a collection of profiles, and it can
include one profile from each type.
Reference the profile group in a security rule.
A security profile is active only when it’s in a profile
group, that’s attached to a security rule.
Check profile usage
On each profile’s dashboard, you can check
to see the number of security rules using the profile:
Security profiles—Dashboard highlights
Each security profile has it’s own dashboard—from
a profile dashboard, you can create new profiles and overrides,
assess profile and override usage, and tap in to the latest Palo
Alto Network’s threat data (including content releases, the Threat
Vault, and PAN-DB) to check coverage and take action.