Documente Academic
Documente Profesional
Documente Cultură
created by kadak on Oct 11, 2014 6:10 PM, last modified by panagent on Nov 5, 2014 4:11 PM
Overview
This document explains how multiple rules for vulnerability and sypware profiles are processed for the same
severity.
Details
If one vulnerability profile has multiple rules for the same severity then trac takes the top down approach, much
like security policies.
Examples
The following vulnerability profile has 3 rules:
https://live.paloaltonetworks.com/docs/DOC-8106 Page 1 of 4
Vulnerability/Spyware Protection Profile Rules ... | Palo Alto Networks Live 3/24/15, 5:31 AM
If the firewall detects trac with a MEDIUM severity vulnerability, rule 2 will take eect and an ALERT action will
be applied.
https://live.paloaltonetworks.com/docs/DOC-8106 Page 2 of 4
Vulnerability/Spyware Protection Profile Rules ... | Palo Alto Networks Live 3/24/15, 5:31 AM
If the firewall detects trac with a HIGH severity spyware, rule 1 will take eect and an action of ALERT will be
applied.
For file blocking rule order precedence, refer to this document: File Blocking Rulebase and Action Precedence
owner: kadak
314 Views Categories: Objects & Security Profiles Tags: rule, vulnerability_profile, order, spyware_profile
(1 rating)
0 Comments
https://live.paloaltonetworks.com/docs/DOC-8106 Page 3 of 4
Vulnerability/Spyware Protection Profile Rules ... | Palo Alto Networks Live 3/24/15, 5:31 AM
https://live.paloaltonetworks.com/docs/DOC-8106 Page 4 of 4