Content updates allow you to easily update your default security policy and settings. Content updates equip the ESM Console with the most up-to-date best practices and threat information for accurate exploit and malware protection and can include changes or additions to:
- Default policy rules and settings
- Compatibility rules for third-party products and platforms
- Condition objects
- Protected processes
- Restriction settings
- Trusted signers
- Local static analysis logic
These files are packaged in a ZIP file and are hosted on the Support portal.
To manage content updates, use the following workflows:
Manage Content Updates
Manage Content Updates Content updates are categorized on the Support Portal by ESM version. To update the default policy of the ESM Console, you must ...
Export and Import Policy Files
Export and Import Policy Files From each rule management page on the ESM Console, you can import and export rules. This enables you to: Back ...
Changes to Default Behavior
Review the changes to default behavior in ESM and Traps 4.2 releases. ...
Malware Protection Policy Best Practices
Malware Protection Policy Best Practices The key principle when defining a malware protection policy is to minimize the chance of infection from known and unknown ...
Administrative Privileges For each custom administrative role that you create, you can select the privileges and levels of access for each privilege. The levels of ...
Manage Trusted Signers
Manage Trusted Signers Palo Alto Networks regularly reviews and makes changes to the list of trusted signers and makes the list available with the default ...
Manage Proxy Communication with the Endpoint Security Manager
Manage Proxy Communication with the Endpoint Security Manager To enable the Endpoint Security Manager (ESM) to obtain the most up-to-date security policy and leverage WildFire ...
Malware Protection Flow
Malware Protection Flow To protect the endpoint from malicious and unknown executable files, the malware prevention engine employs four methods of protection: Phase 1: Evaluation ...
Policy Rule Types
Policy Rule Types A complete endpoint security policy comprises policies that target specific methods of protection. The rules that make up each of these policies ...