Objects > Custom Objects > Spyware/Vulnerability
The firewall supports the ability to create custom spyware and vulnerability signatures using the firewall threat engine. You can write custom regular expression patterns to identify spyware phone home communication or vulnerability exploits. The resulting spyware and vulnerability patterns become available for use in any custom vulnerability profiles. The firewall looks for the custom-defined patterns in network traffic and takes the specified action for the vulnerability exploit.
Weekly content releases periodically include new decoders and contexts for which you can develop signatures.
You can optionally include a time attribute when defining custom signatures by specifying a threshold per interval for triggering possible actions in response to an attack. Action is taken only after the threshold is reached.
Use the Custom Spyware Signature page to define signatures for Anti-Spyware profiles. Use the Custom Vulnerability Signature page to define signatures for Vulnerability Protection profiles.
Custom Vulnerability and Spyware Signature Settings
Enter a numeric identifier for the configuration (spyware signatures range is 15000-18000; vulnerability signatures range is 41000-45000).
Specify the threat name.
Select this option if you want the custom signature to be available to:
Disable override (Panorama only)
Select this option to prevent administrators from overriding the settings of this signature in device groups that inherit the signature. This selection is cleared by default, which means administrators can override the settings for any device group that inherits the signature.
Enter an optional comment.
Assign a level that indicates the seriousness of the threat.
Assign the default action to take if the threat conditions are met. For a list of actions, see Actions in Security Profiles.
Indicate whether the threat is assessed from the client to server, server to client, or both.
Indicate whether the threat involves the client, server, either, or both. Applies to vulnerability signatures, but not spyware signatures.
Specify the common vulnerability enumeration (CVE) as an external reference for additional background and analysis.
Specify the vendor identifier for the vulnerability as an external reference for additional background and analysis.
Specify the bugtraq (similar to CVE) as an external reference for additional background and analysis.
Add any links to additional analysis or background information. The information is shown when a user clicks on the threat from the ACC, logs, or vulnerability profile.
Select Standard and then Add a new signature. Specify the following information:
Add a condition by clicking Add Or Condition or Add And Condition. To add a condition within a group, select the group and then click Add Condition. Add a condition to a signature so that the signature is generated for traffic when the parameters you define for the condition are true. Select an Operator from the drop-down. The operator defines the type of condition that must be true for the custom signature to match to traffic. Choose from Less Than, Equal To, Greater Than, or Pattern Match operators.
Select Combination and specify the following information:
Select Combination Signatures to specify conditions that define signatures:
Select Time Attribute to specify the following information:
Objects > Security Profiles > Vulnerability Protection
Objects > Security Profiles > Vulnerability Protection A Security policy rule can include specification of a Vulnerability Protection profile that determines the level of protection ...
Customize the Action and Trigger Conditions for a Brute For...
Customize the Action and Trigger Conditions for a Brute Force Signature The firewall includes two types of predefined brute force signatures—parent signatures and child signatures. ...
Prevent Brute Force Attacks
Prevent Brute Force Attacks A brute force attack uses a large volume of requests/responses from the same source or destination IP address to break into ...
Create Threat Exceptions
Create Threat Exceptions Palo Alto Networks defines a recommended default action (such as block or alert) for threat signatures. You can use a threat ID ...
Defining Applications Select Objects Applications to Add a new custom application for the firewall to evaluate when applying policies. New Application Settings Description Configuration Tab ...
Create a Custom Application
Create a Custom Application To safely enable applications you must classify all traffic, across all ports, all the time. With App-ID, the only applications that ...
Objects > Security Profiles > Anti-Spyware Profile
Objects > Security Profiles > Anti-Spyware Profile You can attach an Anti-Spyware profile to a Security policy rule for detecting connections initiated by spyware and ...
Globally Unique Threat IDs
Globally Unique Threat IDs All Palo Alto Networks threat signatures now have permanent, globally unique IDs that you can use to look up threat signature ...
Actions in Security Profiles
Actions in Security Profiles The action specifies how the firewall responds to a threat event. Every threat or virus signature that is defined by Palo ...