[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-08-30。"],[[["\u003cp\u003eThis page outlines the process for investigating threat alerts generated by Cloud IDS, focusing on reviewing the details and taking action.\u003c/p\u003e\n"],["\u003cp\u003eAlert details include fields like \u003ccode\u003ethreat_id\u003c/code\u003e, \u003ccode\u003ename\u003c/code\u003e, \u003ccode\u003ealert_severity\u003c/code\u003e, \u003ccode\u003esource_ip_address\u003c/code\u003e, \u003ccode\u003edestination_ip_address\u003c/code\u003e, and many other identifiers in the JSON alert logs, providing comprehensive information on each threat.\u003c/p\u003e\n"],["\u003cp\u003eThe Palo Alto Networks Threat Vault can be searched using CVEs, threat IDs, threat names, or categories found in the alert logs to gain deeper insights into specific threats.\u003c/p\u003e\n"],["\u003cp\u003eFor file-based threats, the associated file hashes can be checked on VirusTotal and compared in the Threat Vault to determine if they are malicious or if it may be a signature collision or false positive.\u003c/p\u003e\n"],["\u003cp\u003eFor actionable results on traffic that is not considered malicious, there is the option to add Threat Exceptions in Cloud IDS or to block the traffic using Google Cloud Armor or Cloud NGFW rules.\u003c/p\u003e\n"]]],[],null,["# Investigate Threat Alerts\n\nThis page provides details about how to investigate the threat alerts that Cloud IDS\ngenerates.\n\nReview alert details\n--------------------\n\nYou can review the following JSON fields in the [alert log](/intrusion-detection-system/docs/logging):\n\n- `threat_id` - Unique Palo Alto Networks threat identifier.\n- `name` - Threat name.\n- `alert_severity` - Severity of the threat. One of `INFORMATIONAL`, `LOW`, `MEDIUM`, `HIGH`, or `CRITICAL`.\n- `type` - Type of the threat.\n- `category` - Sub-type of the threat.\n- `alert_time` - Time when the threat was discovered.\n- `network` - Customer network in which the threat was discovered.\n- `source_ip_address` - Suspected traffic's source IP address. When you use a Google Cloud load balancer, the true client IP address is not available, and this address is the IP address of your load balancer.\n- `destination_ip_address` - Suspected traffic's destination IP address.\n- `source_port` - Suspected traffic's source port.\n- `destination_port` - Suspected traffic's destination port.\n- `ip_protocol` - Suspected traffic's IP protocol.\n- `application` - Suspected traffic's application type---for example, SSH.\n- `direction` - Suspected traffic's direction (client-to-server or server-to-client).\n- `session_id` - An internal numerical identifier applied to each session.\n- `repeat_count` - Number of sessions with the same source IP, destination IP, application, and type seen within 5 seconds.\n- `uri_or_filename` - URI or filename of the relevant threat, if applicable.\n- `cves` - a list of CVEs associated with the threat\n- `details` - Additional information about the type of threat, taken from Palo Alto Networks' ThreatVault.\n\nSearch the Palo Alto Networks Threat Vault\n------------------------------------------\n\nUse the following instructions to search for Common Vulnerabilities and Exposures (CVEs),\nthreat IDs, threat names, and threat categories.\n\n1. If you don't already have an account, create an account on Palo Alto Networks'\n [LiveCommunity](https://live.paloaltonetworks.com/).\n\n2. Access the Palo Alto Networks\n [Threat Vault](https://www.paloaltonetworks.com/blog/threat-vault/)\n using your account.\n\n3. In the Threat Vault, search for any of the following values based on information from\n your threat alert:\n\n - One or more \u003cvar translate=\"no\"\u003eCVE\u003c/var\u003e from the `cves` field\n - \u003cvar translate=\"no\"\u003eTHREAT_ID\u003c/var\u003e from the `threat_id` field\n - \u003cvar translate=\"no\"\u003eTHREAT_NAME\u003c/var\u003e from the `name` field\n - \u003cvar translate=\"no\"\u003eCATEGORY\u003c/var\u003e from the `category` field\n4. Verify that the signature status says **Released** and not **Disabled**.\n\n 1. If **Disabled**, the signature is no longer valid and is disabled. When Cloud IDS catches up on updates from Palo Alto Networks, the signature stops generating alerts.\n5. If a file triggered the finding, perform the following steps:\n\n 1. Search for the hashes that are associated with the signature on the VirusTotal website to determine whether any of them are malicious.\n 2. If the hash of the file triggering the signature is known, compare it to those in Threat Vault. If they don't match it's a [signature collision](https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm3SCAS), which means that the file and the malicious sample might contain the same byte values in the same byte offsets. If they do match and the file isn't malicious, it's a false positive and you can disregard the threat alert..\n6. If a command-and-control or DNS threat triggered the finding, perform the following steps:\n\n 1. Identify the destination domain that triggered the signature on outbound communications from an endpoint.\n 2. Investigate the reputation of domains and IP addresses involved to develop a broad understanding of the potential threat level.\n7. If the traffic has a business impact and you are convinced that the traffic isn't\n malicious, or if you are willing to accept the risk, you can add\n [Threat Exceptions](/intrusion-detection-system/docs/configuring-ids#optional_configure_threat_exceptions)\n to your Cloud IDS endpoint to disable the threat ID, .\n\n8. Implement a [Cloud Armor rule](/armor/docs/rules-language-reference) or a\n [Cloud NGFW rule](/firewall/docs/firewall-policies-rule-details) to\n block the malicious traffic using the connection source and destination IP addresses\n in the finding."]]