{"id":8589,"date":"2015-04-01T10:00:55","date_gmt":"2015-04-01T17:00:55","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8589"},"modified":"2015-12-11T09:36:48","modified_gmt":"2015-12-11T17:36:48","slug":"prevent-patient-zero-with-advanced-endpoint-protection-3-2","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/04\/prevent-patient-zero-with-advanced-endpoint-protection-3-2\/","title":{"rendered":"Prevent Patient Zero: A Closer Look at Traps 3.2"},"content":{"rendered":"<h3>Summary<\/h3>\n<p>Existing endpoint security approaches that rely on malware identification can\u2019t prevent sophisticated zero-day attacks because they don\u2019t identify and utilize known malicious signatures, strings, or behaviors. As a result, compromised endpoints must await detection and remediation.<\/p>\n<p>Our Advanced Endpoint Protection solution,Traps, takes a different approach that prevents advanced attacks originating from executables, data files, or network-based exploits\u2014both known and unknown\u2014<em>before<\/em> malicious activity can cause harm to the endpoints in your organization.<\/p>\n<h3>New features in Traps\u00a03.2<\/h3>\n<p><!--more-->Here are some of the exciting new features in Traps\u00a03.2, which <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/03\/announcing-traps-3-2-release\/\">we officially announced this week<\/a>, as well as technical resources to help you learn more about Advanced Endpoint Protection.<\/p>\n<p><strong>New and Improved Protection Modules<\/strong><\/p>\n<p>Our unique focus on exploit and malware technique prevention is the center of our Advanced Endpoint Protection solution, intercepting the attacker at the core of the attack and preventing patient zero. While preventing just one technique would thwart the entire threat, our team continues to develop new prevention modules to prepare for the unthinkable, adding four more modules to the long list of inimitable protection.<\/p>\n<p>For more information, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/32\/endpoint\/newfeaturesguide\/exploit-prevention-features.html\" target=\"_blank\">Exploit Prevention Features<\/a> and <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/32\/endpoint\/newfeaturesguide\/malware-prevention-features.html\" target=\"_blank\">Malware Prevention Features<\/a>.<\/p>\n<p><strong>Unknown Executable Upload to WildFire<\/strong><\/p>\n<p>This feature bridges the gap between endpoint and network security intelligence by enabling you to automatically submit unknown executable files from the ESM (Endpoint Security Manager) to WildFire for further analysis.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:44.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-8590 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint-500x224.png\" alt=\"endpoint\" width=\"500\" height=\"224\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint-500x224.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint-230x103.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint-510x229.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint-88x40.png 88w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint.png 558w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>For more information, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/32\/endpoint\/newfeaturesguide\/malware-prevention-features\/wildfire-features.html#25259\" target=\"_blank\">Unknown File Submission to WildFire<\/a>.<\/p>\n<p><strong>Hash Control, Local Override of WildFire Verdicts<\/strong><\/p>\n<p>A powerful feature that gives the administrator the ability to import local hashes in the ESM and control the global verdicts on their local network, without impacting the global WildFire verdict.<\/p>\n<p>For more information, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/32\/endpoint\/newfeaturesguide\/malware-prevention-features\/wildfire-features.html#22744\" target=\"_blank\">Local Override of WildFire Decisions<\/a>.<\/p>\n<p><strong>Improved Scalability<\/strong><\/p>\n<p>Improvements in scalability and speed enable the Advanced Endpoint Protection solution to support large deployments, with extended support for 50K Traps agents per ESM and multiple ESM Server support.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/enpoint2.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:71.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-8591 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/enpoint2-500x358.png\" alt=\"enpoint2\" width=\"500\" height=\"358\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/enpoint2-500x358.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/enpoint2-230x165.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/enpoint2-418x300.png 418w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/enpoint2-55x40.png 55w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/enpoint2.png 524w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>For more information, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/32\/endpoint\/newfeaturesguide\/management-features\/multi-esm-support.html#28547\" target=\"_blank\">Multi-ESM Support<\/a>.<\/p>\n<p><strong>Restriction Whitelisting<\/strong><\/p>\n<p>Want to apply execution restrictions on your endpoints but fear it will limit your work process? You can now configure restriction whitelists to control your global policies more granularly and to increase business flexibility without the security risk.<\/p>\n<p>For more information, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/32\/endpoint\/newfeaturesguide\/malware-prevention-features\/restrictions-features.html#97161\" target=\"_blank\">Global Whitelist Functionality<\/a>.<\/p>\n<p><strong>WildFire Inspection Reports<\/strong><\/p>\n<p>To provide greater clarity into WildFire hash verdicts, you can now view reports for any executable file that WildFire has previously analyzed. The WildFire report, which is available in PDF format, includes information that you can use to further analyze and manage a WildFire verdict.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/enpoint3.png\"><div style=\"max-width:100%\" data-width=\"366\"><span class=\"ar-custom\" style=\"padding-bottom:70.77%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-8592 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/enpoint3.png\" alt=\"enpoint3\" width=\"366\" height=\"259\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/enpoint3.png 366w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/enpoint3-230x162.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/enpoint3-56x40.png 56w\" sizes=\"auto, (max-width: 366px) 100vw, 366px\" \/><\/span><\/div><\/a><\/p>\n<p>For more information, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/32\/endpoint\/newfeaturesguide\/malware-prevention-features\/wildfire-features.html#75290\" target=\"_blank\">View WildFire Reports<\/a>.<\/p>\n<p><strong>Automated Security Event Analysis<\/strong><\/p>\n<p>Traps prevention kicked in and you want to know more? This forensic feature provides secondary analysis of a Traps security event, by automatically analyzing the memory records to extract data and scan for traces of malicious activity, such as Heap Spray and ROP chains.<\/p>\n<p>For more information, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/32\/endpoint\/endpoint-admin-guide\/forensics\/forensics-overview.html\" target=\"_blank\">Forensics Overview<\/a>.<\/p>\n<p><strong>Customizable Prevention and Notification Pop-Ups<\/strong><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint4.png\"><div style=\"max-width:100%\" data-width=\"465\"><span class=\"ar-custom\" style=\"padding-bottom:55.27%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-8593 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint4.png\" alt=\"endpoint4\" width=\"465\" height=\"257\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint4.png 465w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint4-230x127.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint4-72x40.png 72w\" sizes=\"auto, (max-width: 465px) 100vw, 465px\" \/><\/span><\/div><\/a><\/p>\n<p>You can now customize the title, footer, and display image for\u00a0prevention\u00a0and\u00a0notification\u00a0pop-ups that Traps displays when a security event occurs on the endpoint. Traps displays prevention messages when a file or process violates a security policy and the termination behavior is configured to block the file. Traps displays notification messages when the notify behavior is configured to alert the user.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint5.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:50.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-8594 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint5-500x252.png\" alt=\"endpoint5\" width=\"500\" height=\"252\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint5-500x252.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint5-230x115.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint5-510x257.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint5-79x40.png 79w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/03\/endpoint5.png 593w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p><strong>Traps Localization<\/strong><\/p>\n<p>The Traps Console is available in 7 languages; English, German, French, Spanish, Japanese, Chinese Simplified, and Chinese Traditional.<\/p>\n<p>For more information, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/32\/endpoint\/newfeaturesguide\/traps-features\/traps-localization.html#29027\" target=\"_blank\">Traps Localization<\/a>.<\/p>\n<p><strong>Expanded Support<\/strong><\/p>\n<p>Traps is one of the few products that can protect all applications across nearly every Windows-based platform, both virtual and physical, and even those that no longer have continued support. Traps is now also supported on Windows Vista and Windows Server 2008 and on non-English Windows Operating Systems.<\/p>\n<p>For more information, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/32\/endpoint\/newfeaturesguide\/traps-features\/supported-traps-installations.html#56001\" target=\"_blank\">Supported Traps Installations<\/a>.<\/p>\n<p><strong>Improved Syslog and SIEM integrations<\/strong><\/p>\n<p>You can now integrate your Syslog server with Splunk, a third-party monitoring tool, which you can use to analyze log data. Find the Palo Alto Networks Splunk app that now supports Traps at <a href=\"https:\/\/apps.splunk.com\/app\/491\/\" rel=\"nofollow,noopener\"  target=\"_blank\">https:\/\/apps.splunk.com\/app\/491\/<\/a>.<\/p>\n<h3>Want More?<\/h3>\n<p>Here are a few resources to add to your Advanced Endpoint Protection 3.2 reading list!<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/32\/endpoint\/newfeaturesguide.html\" target=\"_blank\">New Features Guide<\/a>: Your go-to resource for all the new features in 3.2.<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/32\/endpoint\/endpoint-admin-guide.html\" target=\"_blank\">Administrator\u2019s Guide<\/a>: Contains installation procedures and configuration workflows to get you up and running quickly.<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/32\/endpoint\/endpoint-release-notes.html\" target=\"_blank\">Release Notes<\/a>: Provides important information about the Advanced Endpoint Protection 3.2 software including known issues and limitations.<\/li>\n<\/ul>\n<p><strong>Pro tip<\/strong>: On the documentation <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/document-search.html\" target=\"_blank\">search<\/a>, use the <strong>OS Version &gt; 3.2<\/strong> facet to filter results for only documentation about Advanced Endpoint Protection 3.2.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary Existing endpoint security approaches that rely on malware identification can\u2019t prevent sophisticated zero-day attacks because they don\u2019t identify and utilize known malicious signatures, strings, or behaviors. As a result, compromised endpoints &hellip;<\/p>\n","protected":false},"author":77,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[598,587],"tags":[603,532,778,1128],"coauthors":[711],"class_list":["post-8589","post","type-post","status-publish","format-standard","hentry","category-endpoint-2","category-technical-documentation","tag-advanced-endpoint-protection","tag-endpoint","tag-traps","tag-traps-3-2"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8589"}],"version-history":[{"count":12,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8589\/revisions"}],"predecessor-version":[{"id":8666,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8589\/revisions\/8666"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8589"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}