![snort rules examples snort rules examples](https://image2.slideserve.com/4571858/snort-rules1-l.jpg)
Click on Add and provide appropriate details as shown in below screenshotĢ.Navigate to Objects tab -> Custom Objects -> Spyware.This signature will become part of the Spyware profile added to the appropriate Policy.
![snort rules examples snort rules examples](https://image2.slideserve.com/4571858/snort-rules-n.jpg)
![snort rules examples snort rules examples](https://image.slideserve.com/1217064/snort-rules5-l.jpg)
The Anti-Spyware feature detects and prevents spyware and malware network communications. A custom profile can contain one or more rules and exceptions that define which vulnerability protection signatures to include. In addition to the predefined Vulnerability Protection profiles, you can create custom profiles tailored to the environment you want to protect. Vulnerabilities can be system and service specific or generic and are not bound to a specific port, but to a protocol or application. The Vulnerability Protection feature detects and prevents network-borne attacks against vulnerabilities on client and server systems. This document provides a general overview of creating Custom Threat Signatures from SNORT Signatures on the Palo Alto Networks Firewall using three use cases.