Chapter 6: Anti-Phishing with User Credential Detection

In this chapter, you will learn how we can mitigate phishing attacks and prevent users from using their corporate credentials outside company-approved web resources (for example, using their corporate username and password on Facebook).

In this chapter, we're going to cover the following main topics:  

  • Preparing the firewall for credential detection
  • Using IP user mapping for credential detection
  • Using group mapping for credential detection
  • Using domain credential filter

Technical requirements

This chapter will cover topics concerning usernames and passwords. User ID integration is required so a lab containing Write Active Directory (AD), and preferably a Read-Only Domain Controller ...

Get Securing Remote Access in Palo Alto Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.