Palo Alto Networks IDPS Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-NET-000391-IDPS-00213
Group -
The Palo Alto Networks security platform must continuously monitor outbound communications traffic for unusual/unauthorized activities or conditions.
If outbound communications traffic is not continuously monitored for unusual/unauthorized activities or conditions, there will be times when hostile activity may not be noticed and defended against...Rule Medium Severity -
SRG-NET-000392-IDPS-00214
Group -
SRG-NET-000392-IDPS-00215
Group -
SRG-NET-000392-IDPS-00216
Group -
SRG-NET-000392-IDPS-00218
Group -
SRG-NET-000392-IDPS-00219
Group -
SRG-NET-000511-IDPS-00012
Group -
The Palo Alto Networks security platform must enable Antivirus, Anti-spyware, and Vulnerability Protection for all authorized traffic.
The flow of all communications traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. Restricting the flow of communications...Rule Medium Severity -
The Palo Alto Networks security platform must capture traffic of detected/dropped malicious code.
Associating event outcome with detected events in the log provides a means of investigating an attack or suspected attack. The logs should identify what servers, destination addresses, application...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.