Palo Alto Networks Security Profiles allow administrators to define how the firewall inspects and handles various types of traffic. Tuning these profiles and adding exceptions can help reduce false positives and tailor security enforcement to the specific needs of an organization.
Use the Threat logs to identify the Threat ID of the signature you want to create an exception for. Navigate to
Monitor > Logs > Threat
and note the Threat ID.
Depending on the type of Security Profile (e.g., Antivirus, Anti-Spyware, Vulnerability Protection), navigate to the appropriate profile:
Objects > Security Profiles > Antivirus
Objects > Security Profiles > Anti-Spyware
Objects > Security Profiles > Vulnerability Protection
Edit the desired profile and navigate to the Exceptions tab. Click on Show all signatures to view all available signatures.
Locate the signature using the Threat ID and check the
Enable
box. Then, set the desired action (e.g.,
Allow
,
Alert
,
Drop
) for that signature.
After configuring the exceptions, commit the changes to apply them to the firewall's configuration.
sequenceDiagram participant Admin participant Firewall participant ThreatLog Admin->>ThreatLog: Review Threat Logs ThreatLog-->>Admin: Identify Threat ID Admin->>Firewall: Navigate to Security Profile Firewall-->>Admin: Display Profile Settings Admin->>Firewall: Add Exception for Threat ID Firewall-->>Admin: Confirm Exception Added Admin->>Firewall: Commit Changes Firewall-->>Admin: Apply New Configuration
In Palo Alto Networks firewalls, you can create exceptions within Security Profiles—specifically in Vulnerability Protection and Anti-Spyware profiles—that apply to specific source or destination IP addresses. This allows you to tailor threat detection actions for particular IPs without affecting the broader traffic.
By default, when you create a threat exception for a specific signature (identified by a Threat ID), the modified action (such as "alert" or "allow") applies to all traffic matching that signature. However, by specifying IP address exemptions, you can limit this modified action to traffic involving particular source or destination IP addresses. Traffic not matching these IPs will continue to be subject to the default action defined in the Security Profile.
Key Points:
Monitor > Logs > Threat
to find the Threat ID triggering false positives.
Objects > Security Profiles > Vulnerability Protection
or
Anti-Spyware
.
sequenceDiagram participant Client participant Firewall participant Server Client->>Firewall: Initiates session alt Source/Destination IP matches exemption Firewall->>Firewall: Apply exception action (e.g., alert) else Firewall->>Firewall: Apply default action (e.g., block) end Firewall->>Server: Forward or block traffic based on action