Skip to content

Commit 44a8deb

Browse files
JV0812jpipkin1
andauthored
Update docs/integrations/cloud-security-monitoring-analytics/palo-alto-networks-11.md
Co-authored-by: John Pipkin (Sumo Logic) <[email protected]>
1 parent a3fa86f commit 44a8deb

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/integrations/cloud-security-monitoring-analytics/palo-alto-networks-11.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -199,7 +199,7 @@ import CreateMonitors from '../../reuse/apps/create-monitors.md';
199199
| `Palo Alto Networks 11 - Monitor High-Risk Applications for Traffic Logs` | This alert is triggered when a threat is detected in high risk application by analyzing traffic logs. It helps network team track application usage patterns and identify unusual real-time behavior. By monitoring traffic flows, this aids in optimizing network performance and ensuring adherence to security policies, thereby reducing potential risks and maintaining efficient operations. | Critical | Count > 1|
200200
| `Palo Alto Networks 11 - Detect Unauthorized or Shadow IT Usage for Traffic Logs` | This alert is triggered when an unauthorized or shadow IT activity is detected by surveying the network traffic. By examining traffic logs, this detects unsanctioned applications that bypass formal approval processes, helping the IT team manage these applications effectively. This ensures that such applications do not disrupt network performance or compromise compliance standards, safeguarding the organization's network environment. | Critical | Count > 0 |
201201
| `Palo Alto Networks 11 - Detect Unauthorized or Shadow IT Usage for Threat Logs` | This alert is triggered when an unauthorized or shadow IT activity that may introduce security threats into the network is detected. By analyzing threat logs, this identifies unsanctioned applications that could potentially exploit vulnerabilities or bypass security controls. This vigilance helps security teams proactively mitigate risks, maintain network integrity, and ensure compliance with regulatory requirements. | Critical | Count > 0 |
202-
| `Palo Alto Networks 11 - Detect Tunneled Applications & Evasion Attempts` | This alert is triggered if applications uses tunneling techniques to bypass security controls, as well as any evasion attempts are detected. This strengthens security measures by revealing hidden threats and ensuring transparent network operations. | Critical | Count > 0 |
202+
| `Palo Alto Networks 11 - Detect Tunneled Applications & Evasion Attempts` | This alert is triggered if applications use tunneling techniques to bypass security controls, as well as any evasion attempts are detected. This strengthens security measures by revealing hidden threats and ensuring transparent network operations. | Critical | Count > 0 |
203203
| `Palo Alto Networks 11 - Alert on Traffic to Embargoed Locations` | This alert is triggered when traffic directed towards embargoed or restricted locations is identified. It supports regulatory compliance and reduces the risk of inadvertently communicating with prohibited regions. | Critical | Count > 0 |
204204
| `Palo Alto Networks 11 - Alert on Threats to Embargoed Locations` | This alert is triggered when a potential threat targeting embargoed locations within your network is identified. It enhances protection for sensitive areas and helps maintain compliance with international and organizational policies regarding restricted locations. | Critical | Count > 0 |
205205

0 commit comments

Comments
 (0)