Skip to main content

Post Quantum Crypto Hunting by Palo Alto Networks

Download With Dependencies

Search for the use of Post Quantum Crypo (PQC) on your network with PAN-OS Vulnerability Signatures using XSOAR.

How to use this pack ?

  1. Install the "PAN-OS_Search_for_Post_Quantum_Crypto_Vuln_Sigs" playbook and ensure any dependancies for log sources are configured
  2. Configure a choice between three log sources using the Playbook inputs.
  3. Configure a notification email address (optional)
  4. Configure a time range that matches the Job windiw (default is 24h)
  5. Configure a number of logs to bring back with a query (default is 100)
  6. Configure a Job matching the interval of the time window to ensure each job search a unique window of time from Logs for Post Quantum Crypto threat signatures


Eric Partington


Cortex XSOAR


Supported ByCommunity
CreatedMay 10, 2023
Last ReleaseMay 10, 2023

Content packs are licensed by the Publisher identified above and subject to the Publisher’s own licensing terms. Palo Alto Networks is not liable for and does not warrant or support any content pack produced by a third-party Publisher, whether or not such packs are designated as “Palo Alto Networks-certified” or otherwise. For more information, see the Marketplace documentation.