Vulnerability Protection - Strict Profile - Interpreting BPA Checks
The video provides information about Vulnerability Protection Strict Profile and how to clone the predefined strict Vulnerability Protection Strict Profile.
Attaching a Vulnerability Protection profile to all allowed traffic protects against buffer overflows, illegal code execution, and other attempts to exploit client- and server-side vulnerabilities. The best practice profile is a clone of the predefined strict profile with single packet capture settings enabled.
For more information about Vulnerability Strict Profile, please review the following articles:
Vulnerability Protection Profiles (TechDocs - PAN-OS Administrator's Guide)
https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-admin/policy/security-profiles/vulnerability-protection-profiles
Objects - Security Profiles - Vulnerability Protection (TechDocs - PAN-OS Web Interface Reference)
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-web-interface-help/objects/objects-security-profiles-vulnerability-protection.html
Comments
Post a Comment