Skip to content

Palo Alto Networks IDPS Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000391-IDPS-00213

    Group
  • The Palo Alto Networks security platform must continuously monitor outbound communications traffic for unusual/unauthorized activities or conditions.

    If outbound communications traffic is not continuously monitored for unusual/unauthorized activities or conditions, there will be times when hostile activity may not be noticed and defended against...
    Rule Medium Severity
  • SRG-NET-000392-IDPS-00214

    Group
  • SRG-NET-000392-IDPS-00215

    Group
  • SRG-NET-000392-IDPS-00216

    Group
  • SRG-NET-000392-IDPS-00218

    Group
  • SRG-NET-000392-IDPS-00219

    Group
  • SRG-NET-000511-IDPS-00012

    Group
  • The Palo Alto Networks security platform must enable Antivirus, Anti-spyware, and Vulnerability Protection for all authorized traffic.

    The flow of all communications traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. Restricting the flow of communications...
    Rule Medium Severity
  • The Palo Alto Networks security platform must capture traffic of detected/dropped malicious code.

    Associating event outcome with detected events in the log provides a means of investigating an attack or suspected attack. The logs should identify what servers, destination addresses, application...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules