{"id":9195,"date":"2015-07-02T05:00:14","date_gmt":"2015-07-02T12:00:14","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9195"},"modified":"2015-12-11T09:42:48","modified_gmt":"2015-12-11T17:42:48","slug":"get-started-with-threat-prevention","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/07\/get-started-with-threat-prevention\/","title":{"rendered":"Get Started with Threat Prevention"},"content":{"rendered":"<h3 class=\"p1\">How does the Palo Alto Networks Next-Generation Firewall prevent threats?<\/h3>\n<p class=\"p2\">The Palo Alto Networks Next-Generation Firewall protects and defends your network from commodity threats and advanced persistent threats (APTs). The firewall\u2019s multi-pronged detection mechanisms include a signature-based (IPS\/Command and Control\/Antivirus) approach, heuristics-based (bot detection) approach, sandbox-based (WildFire) approach, and Layer 7 protocol analysis-based (App-ID) approach.<!--more--><\/p>\n<h3 class=\"p2\">Fantastic! Where can I read more about <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/threat-prevention.html\" target=\"_blank\">threat prevention<\/a>?<\/h3>\n<p class=\"p2\">Here are some resources from our 6.1 documentation to get you started:<\/p>\n<ul>\n<li class=\"p2\"><a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/threat-prevention\/set-up-security-profiles-and-policies.html#80784\" target=\"_blank\">Set Up Security Profiles and Policies<\/a><\/li>\n<li class=\"p2\"><span class=\"s4\"><a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/threat-prevention\/prevent-brute-force-attacks.html#94766\" target=\"_blank\">Prevent Brute Force Attacks<\/a><\/span><\/li>\n<li class=\"p2\"><span class=\"s4\"><a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/threat-prevention\/best-practices-for-securing-your-network-from-layer-4-and-layer-7-evasions.html#16594\" target=\"_blank\">Best Practices for Securing Your Network from Layer 4 and Layer 7 Evasions<\/a><\/span><\/li>\n<li class=\"p2\"><span class=\"s4\"><a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/threat-prevention\/enable-passive-dns-collection-for-improved-threat-intelligence.html#16805\" target=\"_blank\">Enable Passive DNS Collection for Improved Threat Intelligence<\/a><\/span><\/li>\n<li class=\"p2\"><span class=\"s4\"><a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/threat-prevention\/use-dns-queries-to-identify-infected-hosts-on-the-network.html#51978\" target=\"_blank\">Use DNS Queries to Identify Infected Hosts on the Network<\/a><\/span><\/li>\n<li class=\"p2\"><span class=\"s4\"><a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/threat-prevention\/content-delivery-network-infrastructure-for-dynamic-updates.html#37397\" target=\"_blank\">Content Delivery Network Infrastructure for Dynamic Updates<\/a><\/span><\/li>\n<li class=\"p2\"><span class=\"s4\"><a href=\"https:\/\/live.paloaltonetworks.com\/docs\/DOC-5534\" target=\"_blank\">Creating Custom Threat Signatures<\/a><\/span><\/li>\n<li class=\"p2\"><span class=\"s8\"><a href=\"https:\/\/live.paloaltonetworks.com\/docs\/DOC-3094\" target=\"_blank\">Threat Prevention Deployment<\/a><\/span><\/li>\n<li class=\"p2\"><a href=\"https:\/\/live.paloaltonetworks.com\/docs\/DOC-5078\" target=\"_blank\"><span class=\"s8\">Understanding DoS Protection<\/span><\/a><\/li>\n<\/ul>\n<p class=\"p2\">To view a list of Threats and Applications that Palo Alto Networks products can identify, use the following links:<\/p>\n<ul>\n<li class=\"p4\"><span class=\"s3\"><a href=\"http:\/\/apps.paloaltonetworks.com\/applipedia\/\" target=\"_blank\"><span class=\"s4\">Applipedia<\/span><\/a><\/span>\u2014Provides details on the applications that Palo Alto Networks can identify.<\/li>\n<li class=\"p4\"><span class=\"s3\"><a href=\"https:\/\/threatvault.paloaltonetworks.com\/\" target=\"_blank\"><span class=\"s4\">Threat Vault<\/span><\/a><\/span>\u2014Lists threats that Palo Alto Networks products can identify. You can search by Vulnerability, Spyware, or Virus. Click the Details icon next to the ID number for more information about a threat.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>How does the Palo Alto Networks Next-Generation Firewall prevent threats? The Palo Alto Networks Next-Generation Firewall protects and defends your network from commodity threats and advanced persistent threats (APTs). The firewall\u2019s multi-pronged &hellip;<\/p>\n","protected":false},"author":77,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5,587,108],"tags":[197,52,145,69],"coauthors":[711],"class_list":["post-9195","post","type-post","status-publish","format-standard","hentry","category-firewall","category-technical-documentation","category-threat-prevention-2","tag-apts","tag-ips","tag-next-generation-firewall","tag-wildfire"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9195"}],"version-history":[{"count":9,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9195\/revisions"}],"predecessor-version":[{"id":11406,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9195\/revisions\/11406"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9195"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}