The Palo Alto Networks® next-generation firewall protects and defends your network from commodity threats and advanced persistent threats (APTs). The multi-pronged detection mechanisms of the firewall include a signature-based (IPS/Command and Control/Antivirus) approach, heuristics-based (bot detection) approach, sandbox-based (WildFire) approach, and Layer 7 protocol analysis-based (App-ID) approach.
Commodity threats are exploits that are less sophisticated and more easily detected and prevented using a combination of antivirus, anti-spyware, and vulnerability protection features along with URL filtering and Application identification capabilities on the firewall.
Advanced threats are perpetuated by organized cyber adversaries who use sophisticated attack vectors to target your network, most commonly for intellectual property theft and financial data theft. These threats are more evasive and require intelligent monitoring mechanisms for detailed host and network forensics on malware. The Palo Alto Networks next-generation firewall together with WildFire™ and Panorama™ provide a comprehensive solution that intercepts and breaks the attack chain and provides visibility to prevent security infringement on your network infrastructure—both mobile and virtualized.
After you implement your threat prevention configurations, Export Configuration Table Data to create a PDF or CSV report of your configurations to use for internal review or for auditing.
- Set Up Antivirus, Anti-Spyware, and Vulnerability Protection
- Create Threat Exceptions
- Set Up Data Filtering
- Set Up File Blocking
- Applications and Threat Content Updates
- Best Practices for Application and Threat Content Updates
- Best Practices for Securing Your Network from Layer 4 and Layer 7 Evasions
- Prevent Brute Force Attacks
- Customize the Action and Trigger Conditions for a Brute Force Signature
- Enable Evasion Signatures
- Prevent Credential Phishing
- Use DNS Queries to Identify Infected Hosts on the Network
- Monitor Blocked IP Addresses
- Learn More About and Assess Threats
- Share Threat Intelligence with Palo Alto Networks
- Content Delivery Network Infrastructure for Dynamic Updates
- Threat Prevention Resources
Best Practices for Application and Threat Content Updates
Learn the best practices for keeping application and threat content signatures up-to-date seamlessly. ...
Threat Signature Categories
Threat Signatures There are three types of Palo Alto Networks threat signatures, each designed to detect different types of threats as the firewall scans network ...
Applications and Threat Updates
Applications and Threats content updates equip Palo Alto Networks next-gen firewalls with the very latest threat prevention and application identification technology. ...
Configure Application and Threat Content Updates
Take these steps to activate a Threat Prevention license and to set the schedule for a Palo Alto Networks next-gen firewall to get the latest ...
Workflow to Best Incorporate New and Modified App-IDs
Workflow to Best Incorporate New and Modified App-IDs Refer to this master workflow to first set up Application and Threat content updates, and then to ...
App-ID To safely enable applications on your network, the Palo Alto Networks next-generation firewalls provide both an application and web perspective—App-ID and URL Filtering—to protect ...
Threat Details Monitor > Logs > Threat ACC > Threat Activity Objects > Security Profiles > Anti-Spyware/Vulnerability Protection Use the Threat Details dialog to learn ...
Best Practices for Content Updates—Security-First
Follow these best practices to deploying content updates in a security-first network, where threat prevention is top priority. ...
Install Content and Software Updates
Install Content and Software Updates To ensure that you are always protected from the latest threats (including those that have not yet been discovered), you ...