Sei sulla pagina 1di 4

Vulnerability/Spyware Protection Profile Rules

| Palo Alto Networks Live

3/24/15, 5:31 AM

Vulnerability/Spyware Protection Profile Rules Order

Version 7

created by kadak on Oct 11, 2014 6:10 PM, last modified by panagent on Nov 5, 2014 4:11 PM

Overview

This document explains how multiple rules for vulnerability and sypware profiles are processed for the same severity.

Details

If one vulnerability profile has multiple rules for the same severity then trac takes the top down approach, much like security policies.

Examples The following vulnerability profile has 3 rules:

Vulnerability/Spyware Protection Profile Rules

| Palo Alto Networks Live

3/24/15, 5:31 AM

Profile Rules | Palo Alto Networks Live 3/24/15, 5:31 AM If the firewall detects tra ffi

If the firewall detects tra c with a MEDIUM severity vulnerability, rule 2 will take eect and an ALERT action will be applied.

The following spyware profile has 3 rules:

Vulnerability/Spyware Protection Profile Rules

| Palo Alto Networks Live

There are no comments on this document.

3/24/15, 5:31 AM

SubscriptionsCopyright © 2007-2013 Palo Alto Networks

|

page | About Jive | Help © 2007-2012 Jive Software | https://live.paloaltonetworks.com/docs/DOC-8106 Page 4 of 4