STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Palo Alto Networks ALG Security Technical Implementation Guide

V-228851

CAT II (Medium)

The Palo Alto Networks security platform must automatically update malicious code protection mechanisms.

Rule ID

SV-228851r1018773_rule

STIG

Palo Alto Networks ALG Security Technical Implementation Guide

Version

V3R4

CCIs

CCI-004964, CCI-001247

Discussion

Remote access is access to DOD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include broadband and wireless connections. Remote access methods include, for example, proxied remote encrypted traffic (e.g., TLS gateways, web content filters, and webmail proxies).

Check Content

Go to Device >> Dynamic Updates.
If no entries for Applications and Threats are present, this is a finding.
If the Applications and Threats entry states Download Only, this is a finding.

This can be downgraded if a manual process is used. If a manual process is used, compare the Applications and Threats database for the most recent version.
Go to Dashboard >> General Information, if the application, threat, and URL filtering definition versions are not the most current ones listed on the vendor support site, this is a finding.

Fix Text

Go to Device >> Dynamic Updates; select "Check Now" at the bottom of the page to retrieve the latest signatures.
To schedule automatic signature updates. Note: The steps provided below do not account for local change management policies.
Go to Device >> Dynamic Updates; select the text to the right of Schedule.
In the "Applications and Threat Updates Schedule" window; complete the required information.
In the "Recurrence" field, select Daily.
In the "Time" field, enter the time at which you want the device to check for updates.
For the Action, select "Download and Install".
Select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen. Select "OK" when the confirmation dialog appears.

If using Dynamic Updates is not possible due to mission requirements, implement a manual process.