* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [Announcement](https://www2.paloaltonetworks.com/blog/category/announcement-zh-hant/?lang=zh-hant) * 唯有 Cortex 能在 MITRE Engenu... # 唯有 Cortex 能在 MITRE Engenuity 中展現 100% 的防護和偵測能力 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2023%2F10%2Fmitre-engenuity-attck-evaluations-results%2F%3Flang%3Dzh-hant) [](https://twitter.com/share?text=%E5%94%AF%E6%9C%89+Cortex+%E8%83%BD%E5%9C%A8+MITRE+Engenuity+%E4%B8%AD%E5%B1%95%E7%8F%BE+100%25+%E7%9A%84%E9%98%B2%E8%AD%B7%E5%92%8C%E5%81%B5%E6%B8%AC%E8%83%BD%E5%8A%9B&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2023%2F10%2Fmitre-engenuity-attck-evaluations-results%2F%3Flang%3Dzh-hant) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2023%2F10%2Fmitre-engenuity-attck-evaluations-results%2F%3Flang%3Dzh-hant&title=%E5%94%AF%E6%9C%89+Cortex+%E8%83%BD%E5%9C%A8+MITRE+Engenuity+%E4%B8%AD%E5%B1%95%E7%8F%BE+100%25+%E7%9A%84%E9%98%B2%E8%AD%B7%E5%92%8C%E5%81%B5%E6%B8%AC%E8%83%BD%E5%8A%9B&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2023/10/mitre-engenuity-attck-evaluations-results/?lang=zh-hant&ts=markdown) \[\](mailto:?subject=唯有 Cortex 能在 MITRE Engenuity 中展現 100% 的防護和偵測能力) Link copied By [Peter Havens](https://www.paloaltonetworks.com/blog/author/peter-havens/?lang=zh-hant&ts=markdown "Posts by Peter Havens") Oct 15, 2023 1 minutes [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hant/?lang=zh-hant&ts=markdown) [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles-zh-hant/?lang=zh-hant&ts=markdown) [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events-zh-hant/?lang=zh-hant&ts=markdown) [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-zh-hant/?lang=zh-hant&ts=markdown) This post is also available in: [English (英語)](https://www2.paloaltonetworks.com/blog/2023/09/mitre-engenuity-attck-evaluations-results/ "Switch to 英語(English)") [简体中文 (簡體中文)](https://www2.paloaltonetworks.com/blog/2023/10/mitre-engenuity-attck-evaluations-results/?lang=zh-hans "Switch to 簡體中文(简体中文)") [Français (法語)](https://www2.paloaltonetworks.com/blog/2023/11/mitre-engenuity-attck-evaluations-results/?lang=fr "Switch to 法語(Français)") [Deutsch (德語)](https://www2.paloaltonetworks.com/blog/2023/11/mitre-engenuity-attck-evaluations-results/?lang=de "Switch to 德語(Deutsch)") [Italiano (義大利語)](https://www2.paloaltonetworks.com/blog/2023/11/mitre-engenuity-attck-evaluations-results/?lang=it "Switch to 義大利語(Italiano)") [日本語 (日語)](https://www2.paloaltonetworks.com/blog/2023/10/mitre-engenuity-attck-evaluations-results/?lang=ja "Switch to 日語(日本語)") [한국어 (韓語)](https://www2.paloaltonetworks.com/blog/2023/10/mitre-engenuity-attck-evaluations-results/?lang=ko "Switch to 韓語(한국어)") [Português (葡萄牙語(巴西))](https://www2.paloaltonetworks.com/blog/2023/11/mitre-engenuity-attck-evaluations-results/?lang=pt-br "Switch to 葡萄牙語(巴西)(Português)") [Español (西班牙語)](https://www2.paloaltonetworks.com/blog/2023/11/mitre-engenuity-attck-evaluations-results/?lang=es "Switch to 西班牙語(Español)") ### 根據新發佈的 2023 MITRE Engenuity ATT\&CK 評估結果,Cortex XDR 是唯一能夠提供 100% 防護和 100% 分析涵蓋率、達到零設定變更和零延遲偵測的產品。 第五輪 MITRE Engenuity ATT\&CK 評估的結果已經公佈,儘管每家廠商都聲稱取得 100% 的成績,但是真相在於細節,數據也不會說謊。Cortex 是今年唯一提供 100% 預防和分析偵測的一家廠商。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2023/09/word-image-304515-1.png) 直接來自 [MITRE Engenuity ATT\&CK 評估](https://attackevals.mitre-engenuity.org/results/enterprise?vendor=paloaltonetworks&vendor=microsoft&vendor=crowdstrike&evaluation=turla&scenario=1)網站的圖例展示 2023 年 Turla 評估的第一個偵測測試結果。 在不斷演進的網路安全形勢中,比對手更早一步採取行動從未如此重要。攻擊者會不斷尋求全新且複雜的方法來突破防禦機制。這是一場高風險的遊戲,其中的規則不斷變化,而落後的後果可能是災難性的。 這就是 MITRE Engenuity 憑藉其企業 ATT\&CK 評估而發揮功效之處,可說是在混亂中提供一盞明燈。對於資訊安全長、安全專業人員以及任何負責保護企業數位資產的人員來說,這些評估已成為非常寶貴的資源。針對業界的端點安全解決方案在面對足智多謀的網路破壞者時會如何表現,這些評估可提供如同試金石一般的檢驗或效能評估。 但是,MITRE Engenuity ATT\&CK 評估到底是什麼?為什麼我們應該要關心結果?這些年度評估模擬我們這個時代一些最活躍、最惡名昭彰的威脅組織所採用的策略、技術和程序 (TTP)。MITRE Engenuity 紅隊邀請網路安全解決方案供應商防禦精心設計的攻擊 (僅偵測模式和預防模式),以提供對三種功能的見解: 1. **可視性** -- 解決方案可以看到什麼 2. **偵測** -- 解決方案可以準確地識別哪些動作是惡意的 3. **保護** -- 解決方案可以防止哪些惡意行為 今年共有 29 家廠商參與這些評估,數量相當驚人,這不但是對其價值的肯定,也反映 MITRE Engenuity 在評估中投入的心力,以確保他們能提供具有挑戰性和競爭性的活動。 ## 第 5 輪 (Turla) 今年是第五次的年度評估,而這次 MITRE Engenuity 紅隊的重點在於模仿 [Turla](https://unit42.paloaltonetworks.com/tag/turla/) 採用的方法,也就是我們的 [Unit 42 威脅研究人員所廣泛研究過](https://unit42.paloaltonetworks.com/turla-pensive-ursa-threat-assessment/)的威脅組織。Turla 是一個資金極為雄厚且技術高超的俄羅斯威脅組織,遭到攻擊的受害者遍佈超過 45 個國家/地區。他們的目標是政府機構、軍事單位、外交使館以及研究和媒體組織。Turla 的惡名源自於其隱匿的資料外洩策略,包括對於政府網站的水坑攻擊、自訂 Rootkit、精心設計的命令和控制網路基礎結構以及欺騙戰術。透過跟參與者的交談,我們可以清楚得知,今年度 MITRE Engenuity 在攻擊方法的精密度方面取得巨大的進展。 藍隊在 Windows 和 Linux 端點上都部署 Cortex XDR Pro for Endpoint 代理程式。此外其並未部署任何其他的解決方案,而 Cortex XDR 的設定就如同出廠時一般的預設值,唯一的改變是啟用惡意檔案的隔離,並對 Linux 啟用將灰色軟體視為惡意軟體的選項。 ## 關鍵指標和評估標準 今年的評估項目分為 Carbon 和 Snake 兩個僅進行偵測的情境,分別對應 Turla 所建立及使用、引人矚目的工具。接下來是保護階段,反映偵測測試中的技術注入足夠的熵,並注入足夠的熵以確保其不會與偵測測試完全相同。這兩個偵測情境各有 10 個步驟,並由多個子步驟組成,並各自對應到 MITRE ATT\&CK 框架中的實際技術。每家廠商都有機會經歷 143 個子步驟。針對每個子步驟,MITRE Engenuity 團隊都會記錄每個解決方案是否對其採取的動作進行偵測。 其中每一項偵測都會根據觀察到的偵測品質進行分類。 MITRE Engenuity 偵測類別: * **不適用** -- 參與者對於測試中的系統不具有可視性。(如果他們選擇退出 Linux 評估,就會發生這種情況。) * **無**-- 未進行偵測。(沒有與惡意活動相關的遙測) * **遙測**-- 任何能夠顯示所發生事件的功能,由其所收集經過最低限度處理的資料。(此類型的偵測通常只是基本的活動記錄。) * **一般**-- 偵測到異常事件。不過,並未指定 ATT\&CK 策略 (或同等的脈絡)。(此類型的偵測會讓安全分析人員調查及判斷已執行哪些動作及其原因。) * **策略**-- 已指定異常事件的 ATT\&CK 策略 (或同等的脈絡)。(此類型的偵測會判斷動作發生的原因,但仍會讓安全分析人員調查對方已執行哪些動作或技術。) * **技術**-- 已指定異常事件的 ATT\&CK 技術 (或同等的脈絡)。(此類型的偵測會提供必要的脈絡和詳細資訊來回答為何攻擊者會執行此動作,並明確地指出他們會使用哪種動作來達到其目標。) ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2023/09/word-image-304515-2.png) MITRE Engenuity 會有效識別兩種涵蓋類型:遙測涵蓋範圍和「分析涵蓋範圍」。遙測涵蓋範圍會定義為子步驟的數量,其中解決方案會產生遙測偵測以作為其最具價值的偵測。分析涵蓋範圍同樣定義為子步驟的數量,不同的是其包含一般、策略或技術偵測。 值得注意的是所有偵測都可能存在兩種偵測修飾詞的其中一種: * **設定變更** -- 如果觀察到的偵測是在測試的第四天 (也就是廠商有第二次機會偵測到他們在初始測試中遺漏的惡意活動) 所實施,則會註記一個設定變更的修飾詞。 * **延遲偵測** -- 如果未及時觀察到偵測,則會註記一個延遲偵測修飾詞,這表示採取動作的時間以及在廠商的主控台觀察到該偵測的時間存在顯著的延遲。 防護情境包含 129 個子步驟,並且歸類為 13 個主要步驟。每個子步驟的情況各自不同,每個防護子步驟可能被封鎖或未被封鎖,並記錄為以下三種類型之一: * **受保護** -- 惡意活動被封鎖。 * **不適用 (受保護)** -- 當預防步驟中的先前子步驟遭到封鎖,因此無法執行後續子步驟時,就會發生這種情況。 * **無** -- 這代表著惡意活動未被封鎖。 ## Cortex XDR 的表現如何? 這些評估的目的是提供對於這三種能力的深入見解: 1. **可視性** -- 解決方案可以看到什麼 2. **偵測** -- 解決方案可以準確地識別哪些動作是惡意的 3. **保護** -- 解決方案可以防止哪些惡意行為 Cortex XDR 獨自提供 100% 的**防護** ,同時提供 100% 的**可視性** 和 100% 的**分析涵蓋率**(偵測),且不存在任何設定變更和延遲偵測。 此外,我們的偵測品質可說是無與倫比的,在全部 143 項偵測中有 142 項屬於技術水平偵測 -- *幾乎達到最高品質的偵測* 。另外一項偵測被認為是一種策略層級的偵測。「防護」評估中全部的 129 個子步驟都遭到封鎖。其中全部都是透過零「設定變更」和零「延遲偵測」所完成的。事實上,如果我們排除設定變更導致的偵測,Cortex XDR 則是唯一沒有任何遺漏的廠商 (偵測類型,無)。換句話說,Cortex XDR 是*唯一具有 100% 可視性的一家廠商。* ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2023/09/image-15.png) The Palo Alto Networks MITRE Engenuity ATT\&CK Evaluations Dashboard. Snapshot showing results from the 2023 Turla evaluation. [Palo Alto Networks MITRE Engenuity ATT\&CK 評估儀表板](https://app.powerbi.com/view?r=eyJrIjoiNWRhYzY1YjItOTAxZC00MGM5LThlNzYtOTYxNzViYzM1ZGY2IiwidCI6IjgyOTNjZmRmLThjMjQtNDY1NS1hMzA3LWVhMjFjZDNiMjJmZiIsImMiOjF9)。顯示 2023 年 Turla 評估結果的快照。 今年評估的結果反映出 Palo Alto Networks 持續在對抗性研究和端點安全工程方面投入大量的心力,並且運用這些知識來協助我們的客戶在日益惡化的網路世界中確保自身的安全無虞。 ## 關於 100% 的說明 如果您已經注意 ATT\&CK 評估已有一段時間,您可能會覺得 100% 很平常。但是不要因此而感到困惑;當其他解決方案聲稱在今年達到 100% 的評估時,實際上只代表他們在所有重要步驟中都至少進行一項偵測和/或預防。只有 Cortex 為每一個單獨的惡意動作 (即子步驟) 提供這些偵測。 100% 的偵測和預防是我們所有人都應該努力達到的標準。正如 Forrester 的Allie Mellen 在去年的評估後指出的那樣,「[偵測已知威脅行動者所發動的攻擊應該是安全產品功能的最低要求,而不該是其能力所及的天花板。](https://www.forrester.com/blogs/mitre-attck-evals-getting-100-coverage-is-not-as-great-as-your-vendor-says-it-is/)」1 我們完全同意,而這正是 Cortex XDR 所設定的標準。 儘管如此,Allie 也明確地指出,或許 100% 的偵測並不一定是件好事,因為那些「[針對每項技術進行偵測的解決方案,有可能會產生雜訊、高誤判率,並且發出過多的警示。](https://www.forrester.com/blogs/mitre-attck-evals-getting-100-coverage-is-not-as-great-as-your-vendor-says-it-is/)」我們也認同這個觀點,這就是為什麼我們大量利用機器學習來了解哪些活動代表正常運作,哪些可能是惡意動作。此一論點也藉由 Cortex XDR 獲得進一步證實,因為我們整合來自許多其他關鍵數據來源的額外遙測以提供關鍵的脈絡線索,藉此協助您釐清調查重點。 ## 探索 ATT\&CK 評估結果 在此我們必須跟 MITRE Engenuity 致敬,因為今年的挑戰明顯比前幾年更大。此外,他們也做了許多改進來協助防禦方制定明智的決策,對此我們感到非常欣慰。目前 ATT\&CK 評估結果會發佈於 MITRE Engenuity 網站上,讓您可以[同時比較三家廠商的評估結果](https://attackevals.mitre-engenuity.org/results/enterprise?evaluation=turla&scenario=1)。您可以選擇三種評估情境中的任一個情境,並且最多選擇三家廠商。依預設,顯示的結果會包含延遲偵測以及因設定變更而導致的結果。不過,您也可以查看移除這些修飾詞後的偵測結果。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2023/09/word-image-304515-4.png) 來自 [MITRE Engenuity ATT\&CK 評估網站](https://attackevals.mitre-engenuity.org/results/enterprise?vendor=paloaltonetworks&vendor=microsoft&vendor=crowdstrike&evaluation=turla&scenario=1),防護評估結果。只有 Cortex XDR 具備 100% 防禦能力。 我們多年來一直都聽到有人說 ATT\&CK 的評估結果,由於沒有數據視覺化工具可以查看所有廠商的結果,因此相當難以了解。為了解決這個問題,我們建立一個工具來協助您探索今年以及往年的結果。利用這個工具,您可以選擇您感興趣的廠商以及已模擬的特定攻擊者。所有產生的圖表都是直接從 MITRE Engenuity 為每個參與廠商提供的 JSON 檔案所建立的。您可以自行探索 [ATT\&CK 評估結果](https://www.paloaltonetworks.com/mitre-results),並由數據來決定能夠為您的企業提供防禦的最佳選擇。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2023/09/word-image-304515-5.png) [Palo Alto Networks MITRE Engenuity ATT\&CK 評估儀表板](https://app.powerbi.com/view?r=eyJrIjoiNWRhYzY1YjItOTAxZC00MGM5LThlNzYtOTYxNzViYzM1ZGY2IiwidCI6IjgyOTNjZmRmLThjMjQtNDY1NS1hMzA3LWVhMjFjZDNiMjJmZiIsImMiOjF9)。顯示 5 年間所有評估結果的快照,繪製技術層級偵測和封鎖的子步驟。 1. *Forrester® 和 Allie Mellen。「首席分析師。」MITRE ATT\&CK 評估:獲得100% 的涵蓋率並不像廠商所說的那麼好,Forrester®,2022 年,https://www.forrester.com/blogs/mitre-attck-evals-getting-100-coverage-is-not-as-great-as-your-vendor-says-it-is/。2023 年 9 月 19 日存取。* *** ** * ** *** ## Related Blogs ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hant/?lang=zh-hant&ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-zh-hant/?lang=zh-hant&ts=markdown) [#### Palo Alto Networks 宣布支援 NVIDIA 企業級 AI Factory](https://www2.paloaltonetworks.com/blog/2026/01/support-nvidia-enterprise-ai-factory/?lang=zh-hant) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hant/?lang=zh-hant&ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events-zh-hant/?lang=zh-hant&ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features-zh-hant/?lang=zh-hant&ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-zh-hant/?lang=zh-hant&ts=markdown) [#### 隆重推出 Cortex Cloud --- 即時雲端安全的未來](https://www2.paloaltonetworks.com/blog/2025/03/announcing-innovations-cortex-cloud/?lang=zh-hant) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hant/?lang=zh-hant&ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-zh-hant/?lang=zh-hant&ts=markdown) [#### 徹底簡化網路安全](https://www2.paloaltonetworks.com/blog/2024/11/ai-copilot-simplified-security/?lang=zh-hant) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hant/?lang=zh-hant&ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events-zh-hant/?lang=zh-hant&ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-zh-hant/?lang=zh-hant&ts=markdown) [#### Forrester 將 Palo Alto Networks 評選為攻擊範圍管理領導者](https://www2.paloaltonetworks.com/blog/2024/10/forrester-names-palo-alto-networks-a-leader-in-attack-surface-management/?lang=zh-hant) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hant/?lang=zh-hant&ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles-zh-hant/?lang=zh-hant&ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events-zh-hant/?lang=zh-hant&ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features-zh-hant/?lang=zh-hant&ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-zh-hant/?lang=zh-hant&ts=markdown) [#### Forrester 將 Palo Alto Networks 評選為 XDR 領導者](https://www2.paloaltonetworks.com/blog/2024/07/forrester-names-palo-alto-networks-a-leader-in-xdr/?lang=zh-hant) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hant/?lang=zh-hant&ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-zh-hant/?lang=zh-hant&ts=markdown) [#### 測試防火牆效能和靈活性的極限](https://www2.paloaltonetworks.com/blog/2023/12/firewall-performance-and-flexibility/?lang=zh-hant) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language