* [Blog](https://www.paloaltonetworks.com.au/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com.au/blog/corporate/) * [Announcement](https://www.paloaltonetworks.com.au/blog/category/announcement/) * Cortex XDR Delivers Unmat... # Cortex XDR Delivers Unmatched 100% Detection in MITRE Evals 2024 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2024%2F12%2Fhistoric-results-in-the-2024-mitre-attck-enterprise-evaluations%2F) [](https://twitter.com/share?text=Cortex+XDR+Delivers+Unmatched+100%25+Detection+in+MITRE+Evals+2024&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2024%2F12%2Fhistoric-results-in-the-2024-mitre-attck-enterprise-evaluations%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2024%2F12%2Fhistoric-results-in-the-2024-mitre-attck-enterprise-evaluations%2F&title=Cortex+XDR+Delivers+Unmatched+100%25+Detection+in+MITRE+Evals+2024&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com.au/blog/2024/12/historic-results-in-the-2024-mitre-attck-enterprise-evaluations/&ts=markdown) \[\](mailto:?subject=Cortex XDR Delivers Unmatched 100% Detection in MITRE Evals 2024) Link copied By [Scott Simkin](https://www.paloaltonetworks.com/blog/author/scott-simkin/?ts=markdown "Posts by Scott Simkin") Dec 11, 2024 7 minutes [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) [Cortex MITRE](https://www.paloaltonetworks.com/blog/tag/cortex-mitre/?ts=markdown) [Cortex XDR](https://www.paloaltonetworks.com/blog/tag/cortex-xdr/?ts=markdown) [MITRE ATT\&CK](https://www.paloaltonetworks.com/blog/tag/mitre-attck/?ts=markdown) [MITRE Engenuity](https://www.paloaltonetworks.com/blog/tag/mitre-engenuity/?ts=markdown) This post is also available in: [简体中文 (Chinese (Simplified))](https://www.paloaltonetworks.com.au/blog/2024/12/historic-results-in-the-2024-mitre-attck-enterprise-evaluations/?lang=zh-hans "Switch to Chinese (Simplified)(简体中文)") [繁體中文 (Chinese (Traditional))](https://www.paloaltonetworks.com.au/blog/2024/12/historic-results-in-the-2024-mitre-attck-enterprise-evaluations/?lang=zh-hant "Switch to Chinese (Traditional)(繁體中文)") [Français (French)](https://www.paloaltonetworks.com.au/blog/2024/12/mitre-attck-cortex-xdr-domine-la-phase-6-avec-une-note-de-100-en-detection/?lang=fr "Switch to French(Français)") [Deutsch (German)](https://www.paloaltonetworks.com.au/blog/2024/12/cortex-xdr-siegt-in-runde-6-der-mitre-attck-bewertungen-dank-100-prozentiger-erkennung/?lang=de "Switch to German(Deutsch)") [Italiano (Italian)](https://www.paloaltonetworks.com.au/blog/2024/12/cortex-xdr-offre-il-100-di-rilevamento-nel-sesto-round-mitre-attck/?lang=it "Switch to Italian(Italiano)") [日本語 (Japanese)](https://www.paloaltonetworks.com.au/blog/2024/12/historic-results-in-the-2024-mitre-attck-enterprise-evaluations/?lang=ja "Switch to Japanese(日本語)") [한국어 (Korean)](https://www.paloaltonetworks.com.au/blog/2024/12/historic-results-in-the-2024-mitre-attck-enterprise-evaluations/?lang=ko "Switch to Korean(한국어)") [Português (Portuguese (Brazil))](https://www.paloaltonetworks.com.au/blog/2024/12/cortex-xdr-oferece-100-de-deteccao-inigualavel-na-6a-rodada-do-mitre-attck/?lang=pt-br "Switch to Portuguese (Brazil)(Português)") [Español (Spanish)](https://www.paloaltonetworks.com.au/blog/2024/12/cortex-xdr-consigue-una-deteccion-del-100-inigualable-en-la-6-a-ronda-de-mitre-attck/?lang=es "Switch to Spanish(Español)") Palo Alto Networks Cortex XDR made history in this year's MITRE ATT\&CK Evaluations as the first participant ever to achieve 100% detection with technique-level detail and no configuration changes or delays. Technique-level detections represent the gold standard, equipping security analysts with the precise information needed to identify an attack. This is the second year in a row Cortex XDR has achieved 100% detection with no configuration changes or delays, demonstrating unmatched consistency. ![2024 Enterprise ATT\&CK Evaluations](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/12/Enterprise2024_glow-230x230.png)Cortex XDR achieved the highest prevention rate among all vendors with zero false positives -- a critical distinction for endpoint security. At the prevention stage, even one false positive can disrupt legitimate business processes, impacting productivity. This year's evaluation was more rigorous than ever, incorporating false positive testing, macOS support and expanded Linux scenarios. Notably, vendor participation dropped from 29 to 19, with several prominent vendors opting out. Of the vendors tested, two-thirds detected less than 50% of the attack steps -- underscoring the heightened rigor of this year's evaluation. We are incredibly proud of our world-class threat research and engineering teams for delivering exceptional endpoint security, empowering our customers to stay ahead of adversaries, like those simulated in this evaluation. ![Industry-Best Detection Coverage](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/12/detection-chart_1200x628-1-1-230x120.jpg) ### Cortex XDR: Industry-Best Endpoint Security Performance in MITRE ATT\&CK Round 6 Cortex XDR excelled in both detection and prevention scenarios of the evaluation, setting a new benchmark for endpoint security and redefining what organizations should expect from their cybersecurity solutions. In the three detection scenarios, Cortex XDR achieved a historic 100% technique-level detection of all simulated attack steps with no configuration changes or delayed detections. These results reaffirm our commitment to providing the most comprehensive defense for every major OS -- Windows, macOS and Linux. MITRE ATT\&CK Evaluations also test prevention, assessing a solution's ability to block attacks before they can cause damage. This is the essence of real-world endpoint security -- prevent as much as possible and detect everything else quickly and accurately. In Round 6, Cortex XDR prevented 8 out of 10 attack steps while maintaining zero false positives. False positives at the prevention stage can disrupt critical business operations with the potential for significant financial damage. Cortex XDR's ability to combine unmatched prevention accuracy with zero disruptions makes it the ideal endpoint security solution for the world's largest and most demanding organizations. While there were two attack steps in the prevention test that didn't meet the criteria for MITRE to count as a block, our actual action during these steps would have protected our customers and stopped a breach. * In step three, the attack attempted an SSH connection from a suspicious host in China, which was supposed to be followed by MITRE's attack step. We blocked the suspicious SSH connection, stopping the attack at an earlier stage. * In step five, the attack attempted to encrypt data, and the encryption action was immediately reversed by the Cortex XDR agent. We stopped the attack, delivering the only outcome that matters, which is keeping customers safe. ![Top Prevention with Zero False Positives](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/12/prevention-chart_1200x628-1-230x120.jpg) ## What Is the MITRE ATT\&CK Evaluation? The MITRE ATT\&CK Evaluation is the most rigorous test in cybersecurity, designed to measure how well endpoint security solutions detect and prevent real-world threats. [MITRE ATT\&CK studies and emulates attacks](https://www.paloaltonetworks.com/blog/security-operations/mitre-attck-2024-raising-the-bar-for-security-testing/) conducted by sophisticated adversaries, making it a true benchmark for security effectiveness. This year's Enterprise 2024 Evaluation focused on two distinct and highly relevant attack sources: * **Ransomware** : Exploring behaviors common in ransomware campaigns, such as abusing legitimate tools, encrypting data and disabling critical services or processes. MITRE chose to emulate the techniques of two notorious ransomware as a service threat groups -- [CLOP](https://unit42.paloaltonetworks.com/clop-ransomware/)and [LockBit](https://unit42.paloaltonetworks.com/lockbit-2-ransomware/). * **Democratic People's Republic of Korea (DPRK)**: Simulating attacks on macOS systems, inspired by the DPRK's use of modular malware to elevate privileges and target credentials. ### How Does Palo Alto Networks Monitor Prominent Threats like Ransomware and DPRK? As an extension of Unit 42, the Palo Alto Networks Cortex Threat Research team monitors the ever-evolving threat landscape and transforms its findings into actionable intelligence, directly enhancing Cortex XDR's detection and prevention capabilities. Over the past year, as part of their daily efforts to study the tactics, techniques and procedures (TTPs) of threat actors, the team zeroed-in on DPRK-linked APT groups, uncovering new campaigns and malware used to infiltrate organizations worldwide. The DPRK is known for its double-pronged cyberwarfare strategy, centered on espionage and large-scale cybercriminal activities aimed at generating revenue for the North Korean regime. Our research highlights the DPRK's increasing focus on targeting macOS users and endpoints, along with persistent efforts to steal cryptocurrencies and sensitive information from organizations worldwide across various industries. Highlights of the team's research have been shared with the community and are available in the [Unit 42 Threat Research Center](https://unit42.paloaltonetworks.com/category/threat-research/), including the following research articles: * [Threat Assessment: North Korean Threat Groups](https://unit42.paloaltonetworks.com/threat-assessment-north-korean-threat-groups-2024/) * [Contagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malware](https://unit42.paloaltonetworks.com/north-korean-threat-actors-lure-tech-job-seekers-as-fake-recruiters/) * [Gleaming Pisces Poisoned Python Packages Campaign Delivers PondRAT Linux and MacOS Backdoors](https://unit42.paloaltonetworks.com/gleaming-pisces-applejeus-poolrat-and-pondrat/) * [Unraveling Sparkling Pisces's Tool Set: KLogEXE and FPSpy](https://unit42.paloaltonetworks.com/kimsuky-new-keylogger-backdoor-variant/) The team has also published several research articles on the most menacing ransomware gangs active in 2024. This research highlights the evolution of these groups, showcasing their increasing sophistication and aggression. The research further demonstrates how Cortex XDR's detection and prevention capabilities can automatically disrupt these operations and stop the encryption of sensitive information. To learn more about these ransomware groups, please see the following articles: * [Threat Assessment: Howling Scorpius (Akira Ransomware)](https://unit42.paloaltonetworks.com/threat-assessment-howling-scorpius-akira-ransomware/) * [From RA Group to RA World: Evolution of a Ransomware Group](https://unit42.paloaltonetworks.com/ra-world-ransomware-group-updates-tool-set/) * [Threat Assessment: BianLian](https://unit42.paloaltonetworks.com/bianlian-ransomware-group-threat-assessment/) ### How Did the Test Change This Year? This year's MITRE ATT\&CK Evaluation introduced significant changes to reflect the evolving threat landscape and better measure endpoint security effectiveness. * **Expanded Endpoint Coverage**: For the first time, the test included a broader range of endpoint platforms, targeting Windows, Linux and macOS environments. This expanded scope ensured that solutions were tested against diverse operating systems, providing a more comprehensive view of defensive capabilities. * **Inclusion of False Positives**: Another major addition was the inclusion of false positive tracking, a critical factor in real-world deployments. Vendors were not only evaluated on their ability to detect threats but also on avoiding inaccurate detections that could overwhelm security teams or disrupt business critical processes. By incorporating these changes, MITRE executed its most challenging and realistic evaluation to date. ### Consistency Matters --- Cortex XDR Delivers Exceptional Results Year After Year Palo Alto Networks is committed to delivering the highest quality of cybersecurity technology to our customers, which requires exceptional talent and investment in research and engineering. Our teams are proud to put their work through the rigors of MITRE ATT\&CK Evaluations year after year, demonstrating to the world the impact of their hard work. Since 2022 Cortex XDR has led the industry in detection results in MITRE evaluations. We believe every year's attack simulation provides unique insight into the threat actors of the world and the cybersecurity industry's stance in defending against them. For that reason, we keep a public record of all MITRE ATT\&CK Evaluation results [in our interactive dashboard](https://app.powerbi.com/view?r=eyJrIjoiNWRhYzY1YjItOTAxZC00MGM5LThlNzYtOTYxNzViYzM1ZGY2IiwidCI6IjgyOTNjZmRmLThjMjQtNDY1NS1hMzA3LWVhMjFjZDNiMjJmZiIsImMiOjF9) for easy comparison year over year. Thanks to MITRE and all of our customers who run Cortex XDR to defend their endpoints. We're honored to be your cybersecurity partner of choice. Head over to our [MITRE results page](https://www.paloaltonetworks.com/cortex/cortex-xdr/mitre) to learn more about our performance in this test, and [contact us to schedule a demo](https://www.paloaltonetworks.com/cortex/cortex-xdr-request-demo) when you are ready to see Cortex XDR in action. *** ** * ** *** ## Related Blogs ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Reports](https://www.paloaltonetworks.com/blog/category/reports/?ts=markdown) [#### MITRE ATT\&CK Evaluations --- Cortex XDR Among Elite in Endpoint Security](https://www.paloaltonetworks.com.au/blog/2025/02/mitre-attck-evaluations-cortex-xdr-among-elite-endpoint-security/) ### [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown) [#### MITRE ATT\&CK 2024: Raising the Bar for Security Testing](https://www.paloaltonetworks.com.au/blog/security-operations/mitre-attck-2024-raising-the-bar-for-security-testing/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Palo Alto Networks Excels in MITRE Managed Services Evaluation](https://www.paloaltonetworks.com.au/blog/2024/06/unit-42-mdr-in-mitre-managed-services-evaluation/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### ONLY Cortex Delivers 100% Protection and Detection in MITRE Engenuity](https://www.paloaltonetworks.com.au/blog/2023/09/mitre-engenuity-attck-evaluations-results/) ### [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) [#### Palo Alto Networks and MITRE ATT\&CK® Evaluations: Enterprise 2025](https://www.paloaltonetworks.com.au/blog/security-operations/palo-alto-networks-and-mitre-attck-evaluations-enterprise-2025/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Reports](https://www.paloaltonetworks.com/blog/category/reports/?ts=markdown) [#### A Leader in the 2025 Gartner Magic Quadrant for EPP --- 3 Years Running](https://www.paloaltonetworks.com.au/blog/2025/07/named-a-leader-gartner-magic-quadrant/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com.au/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language