Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The Palo Alto threat injection is composed of a one-shot injection of the tables firewall.paloalto.threattraffic learn more and firewall.all.traffic learn more. It is used in the Use Case: Firewall Monitoring. The events of the file in the table are sent at a frequency of 1 second.

...

Info

Stop data injection

You can always stop the synthetic data injection by clicking on the Stop synthetic data button.

...

Info

More information

Refer to Exchange article to know more about this content.