Tuesday, November 11, 2025

Threat ID Vulnerability profile override (exception)

 Palo Alto Networks defines a recommended default action (such as block or alert) for threat signatures. You can use a threat ID to exclude a threat signature from enforcement or modify the action that is enforced for that threat signature. For example, you can modify the action for threat signatures that are triggering false positives on your network.

Configure threat exceptions for antivirus, vulnerability, spyware, and DNS signatures to change enforcement for a threat. However, before you begin, make sure the threats are being properly detected and enforced based on the default or best practice signature settings for an optimum security posture:

Get the latest Antivirus, Threats and Applications, and WildFire signature updates (for the firewall).

Set Up Antivirus, Anti-Spyware, and Vulnerability Protection and apply these security profiles to your security policy.


For SCM, adding or updating a Vulnerability profile override (exception) has to be done in the Overrides section. We are all used to editing the profile and making the change in the exceptions tab, but as we saw you can’t do that in SCM. 

  1. To add an override, click Add Override
  2. Search for the Threat ID or Name
  3. Check the box to select the Threat
  4. Change the Action to Allow
  5. Click + to add the IP address
  6. Check the box to select which profile to want to add it to
  7. Save 

To update an override, in the Overrides section, click on the Threat ID

  1. Click on the name of the Profile
  2. Click + to add an IP address or – to delete one
  3. Save the update
  4. Save the override of the Threat ID

Strata Cloud Manager

Exclude anti-virus signature from enforcement

Select <Configuraiton > <NGFW and Prisma Access>  <Security Services> <WildFire and Antivirus> 

Add Profile or select an existing WildFire and Antivirus profile from which you want to exclude a threat signature and go to the Advanced Settings tab.

From the Signature Exceptions menu, Add Exception and provide the Threat ID for the threat signature you want to exclude from enforcement. You can optionally add notes to the signature exception.


Save the signature exception when you are finished.

A valid threat signature ID auto-populates the threat name field. You can view a complete list of active signature exceptions as well as Delete entries that are no longer necessary.




    1. Repeat to add additional exceptions or click Save after all of your threat exceptions have been added.
  1. Modify enforcement for vulnerability and spyware signatures (except DNS signatures; while they are a type of spyware signature, DNS signatures are handled through the DNS Security subscription in Prisma Access).
    1. Select ConfigurationNGFW and Prisma AccessSecurity ServicesAnti-Spyware or ConfigurationNGFW and Prisma AccessSecurity ServicesVulnerability Protection, depending upon the signature type.
    2. Add Profile or select an existing Anti-Spyware or Vulnerability Protection profile from which you want to modify the signature enforcement, and then select Add Override.
    3. Search for spyware or vulnerability signatures by providing the relevant Match Criteria. This automatically filters the available signatures and displays the results in the Matching Signatures section.
    4. Select the check box for the signature(s) whose enforcement you want to modify.
    5. Provide the updated ActionPacket Capture, and IP Addresses that you want the modified enforcement rules to apply to for the selected signatures.
    6. Save your updated signature enforcement configuration.
    7. You can view a complete list of Overrides including various statistics, as well as Delete entries that are no longer necessary.

No comments:

Post a Comment

Global Protect Troubleshooting

Global Protect Components Certificate Management Connections Authentication Debugging https://www.youtube.com/watch?v=0Z48WHvyW0Q authentica...