* [Blog](https://origin-researchcenter.paloaltonetworks.com/blog) * [Security Operations](https://origin-researchcenter.paloaltonetworks.com/blog/security-operations/) * [Cybersecurity](https://origin-researchcenter.paloaltonetworks.com/blog/category/cybersecurity-jp/?lang=ja) * Cortex Xpanseで自社攻撃対象領域内のA... # Cortex Xpanseで自社攻撃対象領域内のApache Log4jを管理する方法 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2Fsecurity-operations%2Fcortex-xpanse-finding-apache-log4j%2F%3Flang%3Dja) [](https://twitter.com/share?text=Cortex+Xpanse%E3%81%A7%E8%87%AA%E7%A4%BE%E6%94%BB%E6%92%83%E5%AF%BE%E8%B1%A1%E9%A0%98%E5%9F%9F%E5%86%85%E3%81%AEApache+Log4j%E3%82%92%E7%AE%A1%E7%90%86%E3%81%99%E3%82%8B%E6%96%B9%E6%B3%95&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2Fsecurity-operations%2Fcortex-xpanse-finding-apache-log4j%2F%3Flang%3Dja) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2Fsecurity-operations%2Fcortex-xpanse-finding-apache-log4j%2F%3Flang%3Dja&title=Cortex+Xpanse%E3%81%A7%E8%87%AA%E7%A4%BE%E6%94%BB%E6%92%83%E5%AF%BE%E8%B1%A1%E9%A0%98%E5%9F%9F%E5%86%85%E3%81%AEApache+Log4j%E3%82%92%E7%AE%A1%E7%90%86%E3%81%99%E3%82%8B%E6%96%B9%E6%B3%95&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://origin-researchcenter.paloaltonetworks.com/blog/security-operations/cortex-xpanse-finding-apache-log4j/?lang=ja&ts=markdown) \[\](mailto:?subject=Cortex Xpanseで自社攻撃対象領域内のApache Log4jを管理する方法) Link copied By [Richa Avasthi](https://www.paloaltonetworks.com/blog/author/richa-avasthi/?lang=ja&ts=markdown "Posts by Richa Avasthi"), [Greg Heon](https://www.paloaltonetworks.com/blog/author/greg-heon/?lang=ja&ts=markdown "Posts by Greg Heon") and [Kevan Dunsmore](https://www.paloaltonetworks.com/blog/author/kevan-dunsmore/?lang=ja&ts=markdown "Posts by Kevan Dunsmore") Dec 14, 2021 1 minutes [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-jp/?lang=ja&ts=markdown) [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events-2/?lang=ja&ts=markdown) [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention/?lang=ja&ts=markdown) [Apache Log4J](https://www.paloaltonetworks.com/blog/tag/apache-log4j-ja/?lang=ja&ts=markdown) [Cortex Xpanse](https://www.paloaltonetworks.com/blog/tag/cortex-xpanse-ja/?lang=ja&ts=markdown) [Log4J](https://www.paloaltonetworks.com/blog/tag/log4j-ja/?lang=ja&ts=markdown) This post is also available in: [English (英語)](https://origin-researchcenter.paloaltonetworks.com/blog/security-operations/cortex-xpanse-finding-apache-log4j/ "英語(English)に切り替える") [简体中文 (簡体中国語)](https://origin-researchcenter.paloaltonetworks.com/blog/security-operations/cortex-xpanse-finding-apache-log4j/?lang=zh-hans "簡体中国語(简体中文)に切り替える") # Cortex Xpanseがアタックサーフェス内の脆弱なアプリケーションを見つけるために行っていること |---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | ### 注意 状況は急速に変化しているため、Cortex® Xpanse™では定期的に最新の情報を提供していきます。ご不明点は [cortex-japan-user-contact@paloaltonetworks.com](mailto:cortex-japan-user-contact@paloaltonetworks.com) までお問い合わせください。 | ## 概要 2021年12月9日に[緊急度の高いリモートコード実行の脆弱性が](https://nvd.nist.gov/vuln/detail/CVE-2021-44228)が発見されました。 これは[Apache Log4j 2](https://logging.apache.org/log4j/2.x/)のロギングライブラリに存在する脆弱性で、通称をLog4Shellといい、インターネット上で実際に広く悪用されていることが確認されています(この脆弱性の詳細な分析と推奨される緩和策については [Unit 42ブログ](https://unit42.paloaltonetworks.jp/apache-log4j-vulnerability-cve-2021-44228/)を参照してください)。 Log4jライブラリは非常に多くのJavaベースのアプリケーションで使用されています。オープンソースライブラリや製品で広く使用され、悪用のために必要な技術レベルが低いことから、この脆弱性はとくに懸念されるものです。 この脆弱性による影響を受ける組織はできるだけ早くApache Log4jのバージョン2.16.0またはそれ以上にアップグレードすることを強くお勧めします。 これらの脆弱性が社内で開発されたアプリケーションではなく、Log4jを使用したソフトウェアに組み込まれている場合、自組織への影響をどのように判断すればよいのでしょうか。本稿では、この現在進行系の脅威に対し、組織内の脆弱なアプリケーションを特定するために弊社が行っている対策についてご説明します。 ## 現在のCortex Xpanseの機能 Cortex Xpanseの[Issuesモジュール](https://www.youtube.com/watch?v=YUAb1hFriBw)は、既知の問題を持つソフトウェアベンダ、モデル、バージョンを特定することにより、デジタル攻撃対象領域のセキュリティ脆弱性を検出します。Cortex Xpanseで表示されるイシュー(問題点)は、一連のポリシーに基づいて作成され、そこには脆弱性の性質、深刻度に関する情報のほか、影響を受けるIP、証明書、ドメインなどの、お客様ネットワーク内での場所に関連する情報も含まれています。 ## 組織に潜むLog4j脆弱性を特定するには Cortex Xpanseでは、イシューの種類をカテゴリ またはテーマにそって分類し、閲覧やフィルタリングを容易にしています。今回私たちはSoftware Using Apache Log4j (CVE-2021-44228) (Apache Log4jを使用しているソフトウェア (CVE-2021-44228))という新しいカテゴリを作成しました。このカテゴリには、CVE-2021-44228による影響を受けうるソフトウェアを対象とする既存のポリシーをすべて含めてあります。 [![Cortex Xpanseでは、イシューの種類をカテゴリ またはテーマにそって分類し、閲覧やフィルタリングを容易にしています。今回私たちはSoftware Using Apache Log4j (CVE-2021-44228) (Apache Log4jを使用しているソフトウェア (CVE-2021-44228))という新しいカテゴリを作成しました。このカテゴリには、CVE-2021-44228による影響を受けうるソフトウェアを対象とする既存のポリシーをすべて含めてあります。](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/12/Cortex-Xpanse-Issues-Apache-Log4j-3.png)](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/12/Cortex-Xpanse-Issues-Apache-Log4j-3.png) Cortex Xpanseでは、イシューの種類をカテゴリ またはテーマにそって分類し、閲覧やフィルタリングを容易にしている 新しい分類はすでに利用可能になっています。ただし、注意点として、ここですべての影響を受けるすべてのソフトウェアベンダ、モデル、バージョンをカバーしていない可能性がある点はご承知おきください。状況が刻一刻と変化しており、対象リストが更新され続けているためです。 ## 次にすべきこと 以下のセクションに、CVE-2021-44228に対して脆弱であることが知られているアプリケーションでCortex Xpanseによる検出が可能なものを一覧表示しています。リストは弊社研究開発チームが製品に検出機能を追加するつど更新されます。日本語版はリアルタイム更新されませんので、最新情報についてはこのセクションを英語版で確認するようにしてください。 ## Cortex XpanseにおけるLog4Shellのイシュー \[最終更新日: 12/09/2021 at 7:55pm PST\] ここ数日でかなりの数のベンダがアドバイザリやパッチを公開しています。このセクションには、Log4Shellに関連する信頼度の高いポリシーと低いポリシーの両方が含まれており、製品に新しいポリシーが追加されるたびに最新の情報が提供されます。 一部のデバイス/アプリケーションでは、影響を受けたバージョンのLog4jを使用している可能性が高いことが高い確度で確認されています。以下のアプリケーションはその高い確度で確認された製品のカテゴリーに属しているもので、Cortex XpanseのIssue Policyとして自動的に有効になっています。 * [Apache Solr](https://solr.apache.org/security.html#apache-solr-affected-by-apache-log4j-cve-2021-44228) * [Cisco Identity Services Engine (ISE)](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) * [Cisco Webex Meetings Server](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) * [Dell Wyse Management Suite](https://www.dell.com/support/kbdoc/nl-nl/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability) * [IBM WebSphere Application Server](https://www.ibm.com/support/pages/node/6525706/) * [Oracle E-Business Suite](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) * [Oracle Fusion Middleware](https://www.oracle.com/security-alerts/alert-cve-2021-44228.html) * [SonicWall Email Security](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032) * [VMware Carbon Black EDR](https://community.carbonblack.com/t5/Documentation-Downloads/Log4Shell-Log4j-Remote-Code-Execution-CVE-2021-44228/ta-p/109134) * [VMware Workspace ONE Access](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) 上記以外のデバイス/アプリケーションについてはこのレベルの可視性がなく、影響を受けるバージョンと影響を受けないバージョンの両方が列挙される可能性があります。これらのアプリケーションについては、お客様社内の担当チームで有効化できるポリシーを用意していますので Policiesタブで有効にしてください。これらのポリシーはカスタマーベース全体では自動的に有効はしていません。必要に応じてこれらを「オン」にしていただくようお願いします。 * [Cisco Integrated Management Controller (IMC)](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) * [Cisco Unified Computing System](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd) * [Fortinet Device](https://www.fortiguard.com/psirt/FG-IR-21-245) * [VMware vRealize Automation Appliance](https://www.vmware.com/security/advisories/VMSA-2021-0028.html) ## 問い合わせ先 ご不明な点がございましたら、[cortex-japan-user-contact@paloaltonetworks.com](mailto:cortex-japan-user-contact@paloaltonetworks.com) までお問い合わせください。 *** ** * ** *** ## Related Blogs ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-jp/?lang=ja&ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-ja/?lang=ja&ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud-2/?lang=ja&ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise-2/?lang=ja&ts=markdown), [Secure the Future](https://www.paloaltonetworks.com/blog/category/secure-the-future-2/?lang=ja&ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention/?lang=ja&ts=markdown) [#### ASMの必要性とその先のケア](https://origin-researchcenter.paloaltonetworks.com/blog/2023/06/why-we-need-asm-and-what-should-be-considered/?lang=ja) ### [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must/?lang=ja&ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise-2/?lang=ja&ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention/?lang=ja&ts=markdown) [#### log4j の脆弱性への対応を自動化・迅速化する方法](https://origin-researchcenter.paloaltonetworks.com/blog/security-operations/automating-speeding-your-response-to-log4j-vulnerability/?lang=ja) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-jp/?lang=ja&ts=markdown), [Threat Intelligence](https://www.paloaltonetworks.com/blog/category/threat-intelligence-2/?lang=ja&ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention/?lang=ja&ts=markdown) [#### 最新サイバー脅威を読み解く: ClickFix, Muddled Libra, Unit 42のアトリビューション フレームワーク](https://origin-researchcenter.paloaltonetworks.com/blog/2025/10/decoding-cyberthreats/?lang=ja) ### [Cloud Native Security Platform](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-native-security-platform-ja/?lang=ja&ts=markdown), [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-jp/?lang=ja&ts=markdown), [Data Security](https://www.paloaltonetworks.com/blog/category/data-security-ja/?lang=ja&ts=markdown), [Endpoint](https://www.paloaltonetworks.com/blog/category/endpoint/?lang=ja&ts=markdown), [IoT](https://www.paloaltonetworks.com/blog/category/iot-ja/?lang=ja&ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security-ja/?lang=ja&ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention/?lang=ja&ts=markdown), [Use Cases](https://www.paloaltonetworks.com/blog/security-operations/category/use-cases-ja/?lang=ja&ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases-ja/?lang=ja&ts=markdown) [#### Incident Response Report 2024に見るセキュリティ侵害のトレンド](https://origin-researchcenter.paloaltonetworks.com/blog/2024/12/incident-response-report-2024/?lang=ja) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-jp/?lang=ja&ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-ja/?lang=ja&ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise-2/?lang=ja&ts=markdown), [Secure the Future](https://www.paloaltonetworks.com/blog/category/secure-the-future-2/?lang=ja&ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention/?lang=ja&ts=markdown) [#### Precision AI™ と SASE](https://origin-researchcenter.paloaltonetworks.com/blog/2024/06/precisionai-sase/?lang=ja) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-jp/?lang=ja&ts=markdown), [Endpoint](https://www.paloaltonetworks.com/blog/category/endpoint/?lang=ja&ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-ja/?lang=ja&ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention/?lang=ja&ts=markdown) [#### 分析・検知結果の情報粒度により大きく変わるインシデント対応時間](https://origin-researchcenter.paloaltonetworks.com/blog/2024/04/bring-mttd-and-mttr-closer-to-zero/?lang=ja) ### Subscribe to Security Operations Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language