
Palo Alto Networks - Prisma Cloud - 7
[toc] Prisma Cloud - Compute – Overview of Prisma Cloud Compute Prisma Cloud Compute supports an architecture that requires no changes to your host, container engine, or applications. Prisma...
[toc] Prisma Cloud - Compute – Overview of Prisma Cloud Compute Prisma Cloud Compute supports an architecture that requires no changes to your host, container engine, or applications. Prisma...
[toc] Advanced Tools – Prisma Cloud API Prisma Cloud REST API representational state transfer (REST) API that Prisma Cloud supports. Application programming interfaces (APIs) allow one s...
[toc] Prisma Cloud: Integrating with Third-Party Security Applications – Overview of Integration Core Concepts Prisma Cloud can be used to integrate with existing security workflows and with ...
[toc] Remediating Security Issues – Remediation Core Concepts In Prisma Cloud, an alert occurs when an alert rule has been configured that enforces one or more policies and for one or more ac...
[toc] Investigating Alerts with RQL – Prisma Cloud helps visualize entire cloud infrastructure and provides insights into security and compliance risks and provides you with a proprietary quer...
[toc] Manage Prisma Cloud Alerts Core Concepts Prisma Cloud Core Concepts 4 main Prisma Cloud concepts: resource, policy, alert rule, and alert. resource a...
[toc] Prisma Cloud - Generating Report – Generate and Download Compliance Reports Available Compliance Reports in Prisma Cloud Unlike the Asset Inventory Dashboard that aggregates all your...
[toc] Manage Administrators Prisma Cloud Administrator Roles Manage the individuals who can access instance by defining them as users in the system. Create account groups, and assign us...
[toc] Onboarding and Initial Setup Prisma Cloud Overview Prisma Cloud a cloud infrastructure security solution a Security Operations Center (SOC) enablement tool to address risks and ...
[toc] Cortex SOAR Security Orchestration an environment with applications targeted at current security operations team needs Positioning Cortex XSOAR Orchestration Orche...
[toc] AutoFocus: Prioritize, Research, and Mitigate Threats AutoFocus: Introduction .
System Design - Key Concepts Handling the Question Design Algorithms that Scale Key Concepts Horizontal vs. Vertical Scaling Load Balancer ...
[toc] Jackson反序列化漏洞分析 anatomy of a vulnerability class 0x00 前言 analyzed an application which used the Jackson library for deserializing JSONs. 反序列化JSON数据。 JSON is a format that encodes ...
[toc] Create SOCKS Tunnel to route Web Traffic Securely Without a VPN Prerequisites Step 1 (macOS/Linux) — Setting Up the Tunnel Step 1 (Windows) — Setting Up the Tunnel Step 2 — Configu...
pentest kali Tools snort network Network Protocol Port NAT .