The Palo Alto Networks security platform must automatically update malicious code protection mechanisms.
An XCCDF Rule
Description
<VulnDiscussion>Remote access is access to DOD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include broadband and wireless connections. Remote access methods include, for example, proxied remote encrypted traffic (e.g., TLS gateways, web content filters, and webmail proxies).</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-228851r1018773_rule
- Severity
- Medium
- References
- Updated
Remediation - Manual Procedure
Go to Device >> Dynamic Updates; select "Check Now" at the bottom of the page to retrieve the latest signatures.
To schedule automatic signature updates. Note: The steps provided below do not account for local change management policies.
Go to Device >> Dynamic Updates; select the text to the right of Schedule.
In the "Applications and Threat Updates Schedule" window; complete the required information.
In the "Recurrence" field, select Daily.
In the "Time" field, enter the time at which you want the device to check for updates.