Set Up Antivirus, Anti-Spyware, and Vulnerability Protection
Every Palo Alto Networks next-generation firewall comes with predefined Antivirus, Anti-Spyware, and Vulnerability Protection profiles that you can attach to Security policy rules. There is one predefined Antivirus profile, default, which uses the default action for each protocol (block HTTP, FTP, and SMB traffic and alert on SMTP, IMAP, and POP3 traffic). There are two predefined Anti-Spyware and Vulnerability Protection profiles:
- default—Applies the default action to all client and server critical, high, and medium severity spyware/vulnerability protection events. It does not detect low and informational events.
- strict—Applies the block response to all client and server critical, high and medium severity spyware/vulnerability protection events and uses the default action for low and informational events.
To ensure that the traffic entering your network is free from threats, attach the predefined profiles to your basic web access policies. As you monitor the traffic on your network and expand your policy rulebase, you can then design more granular profiles to address your specific security needs.
Use the following workflow to set up the default Antivirus, Anti-Spyware, and Vulnerability Protection Security Profiles.
Palo Alto Networks defines a default action for all anti-spyware and vulnerability protection signatures. To see the default action, select ObjectsSecurity ProfilesAnti-Spyware or ObjectsSecurity ProfilesVulnerability Protection and then select a profile. Click the Exceptions tab and then click Show all signatures to view the list of the signatures and the corresponding default Action. To change the default action, create a new profile and specify an Action, and/or add individual signature exceptions to Exceptions in the profile.
- Verify that you have a Threat Prevention subscription.The Threat Prevention subscription bundles the antivirus, anti-spyware, and vulnerability protection features in one license. To verify that you have an active Threat Prevention subscription, select DeviceLicenses and verify that the Threat Prevention expiration date is in the future.
- Download the latest content.
- Select DeviceDynamic Updates and click Check Now at the bottom of the page to retrieve the latest signatures.
- In the Actions column, click Download and install the latest Antivirus updates and then download and then Install the latest Applications and Threats updates.
- Schedule content updates.As a best practice, schedule the firewall to download and install Antivirus updates daily and Applications and Threats updates weekly.
- Select DeviceDynamic Updates and then click Schedule to automatically retrieve signature updates for Antivirus and Applications and Threats.
- Specify the frequency and timing for the updates:
- download-only—The firewall automatically downloads the latest updates per the schedule you define but you must manually Install them.
- download-and-install—The firewall automatically downloads and installs the updates per the schedule you define.
- Click OK to save the update schedule; a commit is not required.
- (Optional) Define a Threshold to indicate the minimum number of hours after an update becomes available before the firewall will download it. For example, setting the Threshold to 10 means the firewall will not download an update until it is at least 10 hours old regardless of the schedule.
- (HA only) Decide whether to Sync
To Peer, which enables peers to synchronize content
updates after download and install (the update schedule does not
sync across peers; you must manually configure the schedule on both
peers).There are additional considerations for deciding if and how to Sync To Peer depending on your HA deployment:
- Active/Passive HA—If the firewalls are using the MGT port for content updates, then schedule both firewalls to download and install updates independently. However, if the firewalls are using a data port for content updates, then the passive firewall will not download or install updates unless and until it becomes active. To keep the schedules in sync on both firewalls when using a data port for updates, schedule updates on both firewalls and then enable Sync To Peer so that whichever firewall is active downloads and installs the updates and also pushes the updates to the passive firewall.
- Active/Active HA—If the firewalls are using the MGT interface for content updates, then select download-and-install on both firewalls but do not enable Sync To Peer. However, if the firewalls are using a data port, then select download-and-install on both firewalls and enable Sync To Peer so that if one firewall goes into the active-secondary state, the active-primary firewall will download and install the updates and push them to the active-secondary firewall.
- (Optional) Create custom security profiles for
antivirus, anti-spyware, and vulnerability protection.Alternatively, you can use the predefined default or strict profiles.
- To create custom Antivirus Profiles, select ObjectsSecurity ProfilesAntivirus and Add a new profile.
- To create custom Anti-Spyware Profiles, select ObjectsSecurity ProfilesAnti-Spyware and Add a new profile.
- To create custom Vulnerability Protection Profiles, select ObjectsSecurity ProfilesVulnerability Protection and Add a new profile.
- Attach security profiles to your Security policy rules.When you configure the firewall with a Security policy rule that uses a Vulnerability Protection profile to block connections, the firewall automatically blocks that traffic in hardware (see Monitor Blocked IP Addresses).
- Select PoliciesSecurity and select the rule you want to modify.
- In the Actions tab, select Profiles as the Profile Type.
- Select the security profiles you created for Antivirus, Anti-Spyware, and Vulnerability Protection.
- Commit your changes.Click Commit.
Create Threat Exceptions
Create Threat Exceptions Palo Alto Networks defines a recommended default action (such as block or alert) for threat signatures. You can use a threat ID ...
Take a Threat Packet Capture
Take a Threat Packet Capture To configure the firewall to take a packet capture (pcap) when it detects a threat, enable packet capture on Antivirus, ...
Prevent Brute Force Attacks
Prevent Brute Force Attacks A brute force attack uses a large volume of requests/responses from the same source or destination IP address to break into ...
Enable Threat Packet Capture
Enable Threat Packet Capture Objects > Security Profiles To enable the firewall to capture packets when it detects a threat, enable the packet capture option ...
How to Create Data Center Best Practice Security Profiles
Use Security Profiles to protect against vulnerabilities, spyware, viruses, bad file types, and unknown threats. ...
Actions in Security Profiles
Actions in Security Profiles The action specifies how the firewall responds to a threat event. Every threat or virus signature that is defined by Palo ...
Create Best Practice Security Profiles for the Internet Gat...
Use these File Blocking settings as a best practice at your internet gateway. ...
Threat Signature Categories
Threat Signatures There are three types of Palo Alto Networks threat signatures, each designed to detect different types of threats as the firewall scans network ...
Objects > Security Profiles
Objects > Security Profiles Security profiles provide threat protection in Security Policy. Each Security policy rule can include one or more Security Profiles. The following ...