Strata Cloud Manager now allows custom application signatures based on SNORT and
Suricata, enabling integration of open-source threat intelligence to detect and prevent
attacks.
Snort and Suricata are third party open-source intrusion prevention system (IPS)
tools that utilize specialized rule formats to identify potential threats. Because
organizations that share threat intelligence often distribute security advisories
using these rule formats, the additional coverage can reveal threats that might not
be apparent on any single IPS system. The IPS Signature Converter functionality
allows you to leverage these open-source rules for immediate threat protection on
Palo Alto Networks Strata Cloud Manager by translating the IPS signatures from Snort
and Suricata into custom threat signatures.
After the Snort or Suricata rules are converted, you can use these signatures to
enforce security policies by incorporating the converted signatures into your
Vulnerability Protection and Anti-Spyware Security Profiles.
By leveraging this conversion process, you can quickly adapt and implement a wide
range of threat detection rules from the open-source community, enhancing your
network's security posture with up-to-date and comprehensive threat
intelligence.