Device > Dynamic Updates
Table of Contents
Expand all | Collapse all
-
- Firewall Overview
- Features and Benefits
- Last Login Time and Failed Login Attempts
- Message of the Day
- Task Manager
- Language
- Alarms
- Commit Changes
- Save Candidate Configurations
- Revert Changes
- Lock Configurations
- Global Find
- Threat Details
- AutoFocus Intelligence Summary
- Configuration Table Export
- Change Boot Mode
-
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > Devices
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > Mobile Network Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Packet Broker Profile
- Objects > Schedules
-
-
- Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > VLANs
- Network > Virtual Wires
-
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
-
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device Setup Ace
- Device > Setup > DLP
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
- Device > Device Quarantine
-
- Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Certificate Management > SSH Service Profile
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
- Device > Policy Recommendation > IoT
- Device > Policy > Recommendation SaaS
-
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
-
- Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Server Profiles > SCP
- Panorama > Scheduled Config Export
- Panorama > Device Registration Auth Key
Device > Dynamic Updates
- Device > Dynamic Updates
- Panorama > Dynamic Updates
Palo Alto Networks regularly posts updates that include new and
modified applications, threat protection, device dictionary files
for IoT Security, and GlobalProtect data files through dynamic updates.
The firewall can retrieve these updates and use them to enforce
policy, without requiring configuration changes. Application and some
antivirus updates are available without a subscription; other are
tied to your subscriptions.
You can view the latest updates, read the release notes for each
update, and then select the update you want to download and install.
You can also revert to a previously installed version of an update.
Setting a schedule for dynamic updates allows you to define the
frequency at which the firewall checks for and downloads or installs
new updates. Particularly for Applications and Threats content updates,
you might want to set a schedule that staggers new and modified
application updates behind threat updates; this gives you more time
to assess how new and modified applications impact your security
policy, while ensuring that the firewall is always equipped with
the latest threat protections.
Dynamic Updates Options | Description |
---|---|
Version | Lists the versions that are currently available
on the Palo Alto Networks Update Server. To check if a new software
release is available from Palo Alto Networks, click Check Now.
The firewall uses the service route to connect to the Update Server
and checks for new content release versions and, if there are updates
available, displays them at the top of the list. |
Last checked | Displays the date and time that the firewall
last connected to the update server and checked if an update was
available. |
Schedule | Allows you to schedule the frequency for
retrieving updates. You can define how often and when the
dynamic content updates occur—the Recurrence and time—and
whether to Download Only or to Download
and Install scheduled updates For Antivirus and
Applications and Threats updates, you have the option to set a minimum
Threshold of time that a content update must be available before
the firewall installs it. Very rarely, there can be an error in
a content update and this threshold ensures that the firewall only
downloads content releases that have been available and functioning
in customer environments for the specified amount of time. For
Applications and Threats content updates, you can also set a threshold
that applies specifically to content updates with new and modified
applications. An extended application threshold gives you more time
to assess and adjust your security policy based on changes that
new or modified applications introduce. For WildFire updates,
you have the option to retrieve signatures in real-time, allowing
you to access the signatures as soon as they are generated. Signatures
that are downloaded during a sample check are saved in the firewall
cache, and are available for fast (local) look-ups. In addition,
to maximize coverage, the firewall also automatically downloads
an additional signature package on a regular basis when real-time
signatures is enabled. These supplemental signatures are added to
the firewall cache and remain available until they become stale
and are refreshed or are overwritten by new signatures. For
guidance on how to best enable Application and Threat content updates
to achieve both constant application availability and the latest
threat protection, review the Best Practices for Application
and Threat Updates |
File Name | List the filename; it includes the content
version information. |
Features | Lists what type of signatures the content
version might include. For Applications and Threats content
release versions, this field might display an option to review Apps, Threats.
Click this option to view new application signatures made available
since the last content release version installed on the firewall.
You can also use the New Applications dialog
to Enable/Disable new applications. You might
choose to disable a new application included in a content release
if you want to avoid any policy impact from an application being
uniquely identified (an application might be treated differently before
and after a content installation if a previously unknown application
is identified and categorized differently). For Device Dictionary,
this field is IoT, short for IoT Security,
the cloud Security service that uses the device dictionary as a
critical component in the accurate enforcement of Security policy
rules based on Device-ID. |
Type | Indicates whether the download includes
a full database update or an incremental update. |
Size | Displays the size of the content update
package. |
SHA256 | The checksum used to verify the integrity
of the file. |
Release Date | The date and time Palo Alto Networks made
the content release available. |
Downloaded | A check mark in this column indicates that
the corresponding content release version has been downloaded to
the firewall. |
Currently Installed | A check mark in this column indicates that
the corresponding content release version is currently running on
the firewall. |
Action | Indicates the current action you can take
for the corresponding software image as follows:
|
Documentation | Provides a link to the release notes for
the corresponding version. |
Remove the previously downloaded content
release version from the firewall. | |
Upload | If the firewall does not have access to
the Palo Alto Networks Update Server, you can manually download
dynamic updates from the Palo Alto Networks Support site in the
Dynamic Updates section. After you download an update to your computer, Upload the
update to the firewall. You then select Install From
File and select the file you downloaded. |
Install From File | After you manually upload an update file
to the firewall, use this option to install the file. In the Package Type drop-down,
select the type of update you are installing (Application
and Threats, Antivirus, or WildFire),
click OK, select the file you want to install
and then click OK again to start the installation. |