Sunteți pe pagina 1din 4

Vulnerability/Spyware Protection Profile Rules ...

| Palo Alto Networks Live 3/24/15, 5:31 AM

All Places > Knowledge Base > Documents

Vulnerability/Spyware Protection Profile


Rules Order Version 7

created by kadak on Oct 11, 2014 6:10 PM, last modified by panagent on Nov 5, 2014 4:11 PM

Overview
This document explains how multiple rules for vulnerability and sypware profiles are processed for the same
severity.

Details
If one vulnerability profile has multiple rules for the same severity then trac takes the top down approach, much
like security policies.

Examples
The following vulnerability profile has 3 rules:

https://live.paloaltonetworks.com/docs/DOC-8106 Page 1 of 4
Vulnerability/Spyware Protection Profile Rules ... | Palo Alto Networks Live 3/24/15, 5:31 AM

If the firewall detects trac with a MEDIUM severity vulnerability, rule 2 will take eect and an ALERT action will
be applied.

The following spyware profile has 3 rules:

https://live.paloaltonetworks.com/docs/DOC-8106 Page 2 of 4
Vulnerability/Spyware Protection Profile Rules ... | Palo Alto Networks Live 3/24/15, 5:31 AM

If the firewall detects trac with a HIGH severity spyware, rule 1 will take eect and an action of ALERT will be
applied.

For file blocking rule order precedence, refer to this document: File Blocking Rulebase and Action Precedence

owner: kadak

314 Views Categories: Objects & Security Profiles Tags: rule, vulnerability_profile, order, spyware_profile

Average User Rating

(1 rating)

0 Comments

https://live.paloaltonetworks.com/docs/DOC-8106 Page 3 of 4
Vulnerability/Spyware Protection Profile Rules ... | Palo Alto Networks Live 3/24/15, 5:31 AM

There are no comments on this document.

1.866.320.4788 Privacy Policy Legal Notices Site Index Subscriptions


Copyright 2007-2013 Palo Alto Networks

Home | Top of page | About Jive | Help 2007-2012 Jive Software |

https://live.paloaltonetworks.com/docs/DOC-8106 Page 4 of 4

S-ar putea să vă placă și