Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The Palo Alto threat injection is composed of a one-shot injection of the tables firewall.paloalto.traffic learn more and firewall.all.traffic learn more. It is , which are also used in the Use Case: Firewall Monitoring. The events of the file are sent at a frequency of 1 second.

...