Routine Security Alert Management
Table of Contents
Expand all | Collapse all
-
- Firewall and PAN-OS Support of IoT Security
- IoT Security Prerequisites
- Onboard IoT Security
- Onboard IoT Security on VM-Series with Software NGFW Credits
-
- DHCP Data Collection by Traffic Type
- Firewall Deployment Options for IoT Security
- Configure a Pre-PAN-OS 10.0 Firewall with a DHCP Server
- Configure a Pre-PAN-OS 10.0 Firewall for a Local DHCP Server
- Use a Tap Interface for DHCP Visibility
- Use a Virtual Wire Interface for DHCP Visibility
- Use SNMP Network Discovery to Learn about Devices from Switches
- Use Network Discovery Polling to Discover Devices
- Use ERSPAN to Send Mirrored Traffic through GRE Tunnels
- Use DHCP Server Logs to Increase Device Visibility
- Plan for Scaling when Your Firewall Serves DHCP
- Prepare Your Firewall for IoT Security
- Configure Policies for Log Forwarding
- Control Allowed Traffic for Onboarding Devices
- Support Isolated Network Segments
- IoT Security Integration with Prisma Access
- IoT Security Licenses
- Offboard IoT Security Subscriptions
-
- Introduction to IoT Security
- IoT Security Integration with Next-generation Firewalls
- IoT Security Portal
- Vertical-themed Portals
- Device-to-Site Mapping
- Sites and Site Groups
- Networks
- Network Segments Configuration
- Reports
- IoT Security Integration Status with Firewalls
- IoT Security Integration Status with Prisma Access
- Data Quality Diagnostics
- Authorize On-demand PCAP
- IoT Security Integrations with Third-party Products
- IoT Security and FedRAMP
Routine Security Alert Management
Respond to security alerts by tracking and managing mitigation
efforts and take preventive steps before an attack occurs.
Regularly monitor the notes added to
the Alert Events list for the high-level security alerts you’re
tracking. This is an efficient way for team members to coordinate
efforts and check on the status.
Review low-severity alerts on a daily basis. Select the ones
that you find acceptable and resolve them all with a few simple
clicks as explained in the previous section.
On a weekly or monthly basis, download all the alerts and all
the resolved alerts. Use the data there to make a status report
to show what your team has done.
In addition to reacting to alerts that already occurred, you can proactively address
vulnerabilities before an attack takes place. On DashboardsSecurity Dashboard, check the Active Vulnerabilities to Date entry in the Risk panel.
Click Active Vulnerabilities to Date to open the VulnerabilitiesAll Vulnerabilities page.
By default, the IoT Security portal sorts vulnerabilities by
severity, displaying the most severe vulnerabilities first. When
you click a vulnerability name, the Vulnerability Details page for
it opens. There you can see which devices are vulnerable so you
can take steps to remove the vulnerability before it’s exploited
in an attack.