* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [Announcement](https://www2.paloaltonetworks.com/blog/category/announcement-zh-hant/?lang=zh-hant) * Cortex XDR 在 MITRE ATT�... # Cortex XDR 在 MITRE ATT\&CK 第 6 輪中提供無與倫比的 100% 偵測 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2024%2F12%2Fhistoric-results-in-the-2024-mitre-attck-enterprise-evaluations%2F%3Flang%3Dzh-hant) [](https://twitter.com/share?text=Cortex+XDR+%E5%9C%A8+MITRE+ATT%26%23038%3BCK+%E7%AC%AC+6+%E8%BC%AA%E4%B8%AD%E6%8F%90%E4%BE%9B%E7%84%A1%E8%88%87%E5%80%AB%E6%AF%94%E7%9A%84+100%25+%E5%81%B5%E6%B8%AC&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2024%2F12%2Fhistoric-results-in-the-2024-mitre-attck-enterprise-evaluations%2F%3Flang%3Dzh-hant) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2024%2F12%2Fhistoric-results-in-the-2024-mitre-attck-enterprise-evaluations%2F%3Flang%3Dzh-hant&title=Cortex+XDR+%E5%9C%A8+MITRE+ATT%26%23038%3BCK+%E7%AC%AC+6+%E8%BC%AA%E4%B8%AD%E6%8F%90%E4%BE%9B%E7%84%A1%E8%88%87%E5%80%AB%E6%AF%94%E7%9A%84+100%25+%E5%81%B5%E6%B8%AC&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2024/12/historic-results-in-the-2024-mitre-attck-enterprise-evaluations/?lang=zh-hant&ts=markdown) \[\](mailto:?subject=Cortex XDR 在 MITRE ATT\&CK 第 6 輪中提供無與倫比的 100% 偵測) Link copied By [Scott Simkin](https://www.paloaltonetworks.com/blog/author/scott-simkin/?lang=zh-hant&ts=markdown "Posts by Scott Simkin") Dec 30, 2024 1 minutes [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hant/?lang=zh-hant&ts=markdown) This post is also available in: [English (英語)](https://www2.paloaltonetworks.com/blog/2024/12/historic-results-in-the-2024-mitre-attck-enterprise-evaluations/ "Switch to 英語(English)") [简体中文 (簡體中文)](https://www2.paloaltonetworks.com/blog/2024/12/historic-results-in-the-2024-mitre-attck-enterprise-evaluations/?lang=zh-hans "Switch to 簡體中文(简体中文)") [Français (法語)](https://www2.paloaltonetworks.com/blog/2024/12/mitre-attck-cortex-xdr-domine-la-phase-6-avec-une-note-de-100-en-detection/?lang=fr "Switch to 法語(Français)") [Deutsch (德語)](https://www2.paloaltonetworks.com/blog/2024/12/cortex-xdr-siegt-in-runde-6-der-mitre-attck-bewertungen-dank-100-prozentiger-erkennung/?lang=de "Switch to 德語(Deutsch)") [Italiano (義大利語)](https://www2.paloaltonetworks.com/blog/2024/12/cortex-xdr-offre-il-100-di-rilevamento-nel-sesto-round-mitre-attck/?lang=it "Switch to 義大利語(Italiano)") [日本語 (日語)](https://www2.paloaltonetworks.com/blog/2024/12/historic-results-in-the-2024-mitre-attck-enterprise-evaluations/?lang=ja "Switch to 日語(日本語)") [한국어 (韓語)](https://www2.paloaltonetworks.com/blog/2024/12/historic-results-in-the-2024-mitre-attck-enterprise-evaluations/?lang=ko "Switch to 韓語(한국어)") [Português (葡萄牙語(巴西))](https://www2.paloaltonetworks.com/blog/2024/12/cortex-xdr-oferece-100-de-deteccao-inigualavel-na-6a-rodada-do-mitre-attck/?lang=pt-br "Switch to 葡萄牙語(巴西)(Português)") [Español (西班牙語)](https://www2.paloaltonetworks.com/blog/2024/12/cortex-xdr-consigue-una-deteccion-del-100-inigualable-en-la-6-a-ronda-de-mitre-attck/?lang=es "Switch to 西班牙語(Español)") Cortex XDR 在今年的 MITRE ATT\&CK 評估中創造歷史,成為有史以來第一個在每個模擬攻擊步驟中都能透過技術層級細節達到 100% 偵測的參與者。技術層級偵測代表黃金標準,為安全分析師提供識別攻擊所需的精確資訊。Cortex XDR 還連續第二年在沒有任何設定變更或延遲的情況下達到 100% 偵測,展現無與倫比的一致性。 在所有廠商中,唯有 Cortex XDR 達到最高的防禦率且誤判率為零,這是區別端點安全性的關鍵所在。在防禦階段中,即使是誤判也會擾亂合法的業務程序而影響生產力。 在納入誤判測試、macOS 支援和擴展的 Linux 情境之後,今年的評估比以往都更加嚴格。值得注意的是,參與的廠商從 29 家下降到 19 家,其中幾家知名廠商更選擇退出。在所有接受測試的廠商中,有三分之二的攻擊步驟偵測率不到 50%,凸顯今年的評估確實更加嚴格的事實。 我們為我們世界一流的威脅研究和工程團隊感到無比自豪,他們提供卓越的端點安全性,讓我們的客戶能夠領先於對手,就像本次評估中所模擬的那樣。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/12/detection-chart_1200x628-2-230x120.jpg) ### Cortex XDR:MITRE ATT\&CK 第 6 輪業界最佳端點安全效能 Cortex XDR 在評估的偵測和防禦場景中皆表現優異,不但為端點安全性樹立新基準,更重新定義企業對其網路安全解決方案的期望。 在這三種偵測場景中,Cortex XDR 創造歷史,成為史上第一個在所有模擬攻擊步驟中都能達到 100% 技術層級偵測且未發生任何延遲或變更設定的解決方案。這些結果再次證明我們為每個主要作業系統 (Windows、macOS 和 Linux) 提供最全面防禦的承諾。 MITRE ATT\&CK 評估也能針對防禦進行測試,以評估解決方案在攻擊者造成損害之前阻止攻擊的能力。這是真實世界端點安全性的本質:盡可能進行防禦,並快速且精確地偵測其他所有威脅。 在第 6 輪中,Cortex XDR 阻止 10 個攻擊步驟中的其中 8 個,並維持零誤判率。防禦階段的誤判可能會擾亂關鍵業務營運,並可能造成重大財務損失。Cortex XDR 能夠將無與倫比的防禦準確性與零中斷相互結合,讓其對於全球規模最大、要求最嚴格的企業來說,能成為最理想的端點安全解決方案。 雖然防禦測試中有兩個攻擊步驟並不符合 MITRE 視為封鎖的標準,但我們在這些步驟中的實際行動將能夠保護我們的客戶並阻止數據洩露。 * 在第三個步驟中,攻擊者嘗試從中國的一個可疑主機建立 SSH 連線,這原本應該是接續 MITRE 攻擊步驟的行動。我們封鎖了可疑的 SSH 連線,在早期階段就阻止攻擊。 * 在第五個步驟中,攻擊者嘗試加密數據,但加密動作很快就遭到 Cortex XDR 代理程式逆轉。我們不但阻止攻擊,更達到唯一重要的結果,也就是確保客戶的安全無虞。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/12/prevention-chart_1200x628-1-1-230x120.jpg) ## 什麼是 MITRE ATT\&CK 評估? MITRE ATT\&CK 評估是網路安全領域中最嚴格的測試,旨在衡量端點安全解決方案在真實世界中偵測及防禦威脅的成效。[MITRE ATT\&CK 評估也會研究及模擬高階對手的攻擊行動](https://www.paloaltonetworks.com/blog/security-operations/mitre-attck-2024-raising-the-bar-for-security-testing/),讓其成為衡量安全效用的真正基準。 今年的企業 2024 評估重點在於兩個截然不同卻高度相關的攻擊來源: * **勒索軟體** :探索勒索軟體活動中常見的行為,例如濫用合法工具、加密數據以及停用關鍵服務或程序。MITRE 選擇模仿兩個惡名昭彰的勒索軟體即服務威脅團體 -- [CLOP](https://unit42.paloaltonetworks.com/clop-ransomware/)和 [LockBit](https://unit42.paloaltonetworks.com/lockbit-2-ransomware/)。 * **朝鮮民主主義人民共和國 (北韓)**:模擬對於 macOS 系統的攻擊,其靈感來自於北韓使用模組化惡意軟體提升權限並竊取憑證的手法。 ### Palo Alto Networks 如何監控勒索軟體和北韓等重大威脅? 作為 Unit 42 的延伸,Palo Alto Networks Cortex 威脅研究團隊負責監控不斷演變的威脅形勢,並將其發現轉變成可採取行動的情報,以直接增強 Cortex XDR 的偵測和防禦能力。 在過去一年裡,除了研究威脅行動者策略、技術和程序 (TTP) 等日常工作以外,該團隊更聚焦於與北韓有關的 APT 團體,揭露用於滲透全球企業的新型攻擊活動和惡意軟體。 北韓以其雙管齊下的網路戰策略而聞名,其重點在於間諜活動以及旨在為北韓政權創造收益的大規模網路犯罪活動。我們的研究凸顯北韓對於 macOS 使用者和端點的日益關切,並持續努力從全球各產業的企業竊取加密貨幣和敏感資訊。 我們已將該團隊的研究重點與整個社群分享,並可透過 [Unit 42 威脅研究中心](https://unit42.paloaltonetworks.com/category/threat-research/)取得,包括以下研究文章: * [威脅評估:北韓威脅團體](https://unit42.paloaltonetworks.com/threat-assessment-north-korean-threat-groups-2024/) * [富有感染力的訪談:北韓威脅行動者引誘科技業求職者安裝 BeaverTail 和 InvisibleFerret 惡意軟體的新變種](https://unit42.paloaltonetworks.com/north-korean-threat-actors-lure-tech-job-seekers-as-fake-recruiters/) * [Gleaming Pisces 利用中毒的 Python 套件來傳遞 PondRAT Linux 和 MacOS 的後門程式](https://unit42.paloaltonetworks.com/gleaming-pisces-applejeus-poolrat-and-pondrat/) * [揭露 Sparkling Pisces 的工具組:KLogEXE 和 FPSpy](https://unit42.paloaltonetworks.com/kimsuky-new-keylogger-backdoor-variant/) 該團隊還針對活躍於 2024 年最具威脅性的勒索軟體集團發佈多篇研究文章。這些研究強調這些威脅團體的演進,展示他們日益成熟的複雜度和攻擊手法。該研究進一步展示 Cortex XDR 的偵測和防禦功能如何自動中斷這些操作,並阻止敏感資訊的加密。 若要深入了解這些勒索軟體集團,請參閱以下文章: * [威脅評估:Howling Scorpius (Akira 勒索軟體)](https://unit42.paloaltonetworks.com/threat-assessment-howling-scorpius-akira-ransomware/) * [從 RA 集團到 RA 世界:勒索軟體團體的演變](https://unit42.paloaltonetworks.com/ra-world-ransomware-group-updates-tool-set/) * [威脅評估: BianLian](https://unit42.paloaltonetworks.com/bianlian-ransomware-group-threat-assessment/) ### 今年的測試有何變化? 今年的 MITRE ATT\&CK 評估引入重大變化,以反映不斷演變的威脅形勢並且能更精確地衡量端點安全效用。 * \*\*擴大端點涵蓋範圍:\*\*該測試首次涵蓋更廣泛的端點平台並鎖定 Windows、Linux 和 macOS 環境為目標。擴大的範圍確保了解決方案能夠針對不同的作業系統進行測試,以針對防禦能力提供更全面的檢視。 * \*\*納入誤判的情況:\*\*另一個主要新增項目就是誤判追蹤,這也是真實世界部署的關鍵因素。除了展現偵測威脅的能力以外,被評估的廠商還應避免因為偵測不夠準確而使安全團隊不堪負荷或擾亂關鍵業務程序。 在納入這些變動後,MITRE 執行迄今為止最具挑戰性和真實性的評估。 ### 一致性至關重要 --- Cortex XDR 年復一年地達到卓越的成效 Palo Alto Networks 致力於為客戶提供最高品質的網路安全技術,這需要卓越的人才以及在研究和工程方面的投資。我們的團隊很自豪能夠年復一年地通過 MITRE ATT\&CK 的嚴格評估,向世界展示他們辛勤工作的成效。 自 2022 年以來,Cortex XDR 在 MITRE 評估中的偵測結果一直處於業界領先地位。我們認為,每年的攻擊模擬都能針對全球威脅行動者提供獨特的見解,同時展現網路安全產業在防範這些威脅時的態勢。因此,[我們在互動式儀表板](https://app.powerbi.com/view?r=eyJrIjoiNWRhYzY1YjItOTAxZC00MGM5LThlNzYtOTYxNzViYzM1ZGY2IiwidCI6IjgyOTNjZmRmLThjMjQtNDY1NS1hMzA3LWVhMjFjZDNiMjJmZiIsImMiOjF9)中保留所有 MITRE ATT\&CK 評估結果的公開記錄,以便進行逐年比較。 感謝 MITRE 以及所有執行 Cortex XDR 來保護其端點的客戶。我們很榮幸能成為您的網路安全合作夥伴首選。 當您準備好觀看 Cortex XDR 的實際應用時,[請聯絡我們安排示範](https://www.paloaltonetworks.com/cortex/cortex-xdr-request-demo)。 *** ** * ** *** ## Related Blogs ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hant/?lang=zh-hant&ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-zh-hant/?lang=zh-hant&ts=markdown) [#### Palo Alto Networks 宣布支援 NVIDIA 企業級 AI Factory](https://www2.paloaltonetworks.com/blog/2026/01/support-nvidia-enterprise-ai-factory/?lang=zh-hant) ### [AI](https://www.paloaltonetworks.com/blog/category/ai-2/?lang=zh-hant&ts=markdown), [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hant/?lang=zh-hant&ts=markdown) [#### 利用 Palo Alto Networks 和 NVIDIA 保護 AI 工廠安全](https://www2.paloaltonetworks.com/blog/2025/10/secure-ai-factory-palo-alto-networks-nvidia/?lang=zh-hant) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hant/?lang=zh-hant&ts=markdown) [#### 2025 年 Unit 42 事件回應報告 --- 攻擊轉向業務中斷](https://www2.paloaltonetworks.com/blog/2025/04/incident-response-report-attacks-shift-disruption/?lang=zh-hant) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hant/?lang=zh-hant&ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events-zh-hant/?lang=zh-hant&ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features-zh-hant/?lang=zh-hant&ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-zh-hant/?lang=zh-hant&ts=markdown) [#### 隆重推出 Cortex Cloud --- 即時雲端安全的未來](https://www2.paloaltonetworks.com/blog/2025/03/announcing-innovations-cortex-cloud/?lang=zh-hant) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hant/?lang=zh-hant&ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-zh-hant/?lang=zh-hant&ts=markdown) [#### 徹底簡化網路安全](https://www2.paloaltonetworks.com/blog/2024/11/ai-copilot-simplified-security/?lang=zh-hant) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hant/?lang=zh-hant&ts=markdown) [#### 宣佈推出 Prisma Cloud AI-SPM:AI 支援的應用程式的安全性和合規性](https://www2.paloaltonetworks.com/blog/cloud-security/prisma-cloud-ai-spm/?lang=zh-hant) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language