Integration Steps
- Log in to Palo Alto Firewall: Access your firewall via the Web Interface (GUI). Go to the
Objects tab.
- Create an External Dynamic List:
- Navigate to
Objects > External Dynamic Lists.
- Click
Add to create a new EDL.
- Configure the EDL:
- Name: ThreatHive_Blocklist
- Type: IP List
- Source: https://threathive.net/hiveblocklist.txt
- Recurring: Yes
- Update Frequency: 15 minutes
- Certificate Profile: Optional – you can use the default or validate the HTTPS cert manually.
- Description: Malicious IP feed from ThreatHive.net
- Click
OK to save.
- Commit your changes.
- Create a Security Policy to Use the EDL:
- Go to
Policies > Security.
- Edit an existing rule or click
Add to create a new rule.
- Set up the rule:
- Name: Block_ThreatHive_IPs
- Source: Use any, or limit to specific zones.
- Destination: In
Destination Address, click Add and select ThreatHive_Blocklist.
- Application/Service: Optional — any is fine.
- Action: Deny (or Drop).
- Enable logging: At session end.
- Commit the configuration.
- Monitor the Impact:
- Go to
Monitor > Traffic or Monitor > Threat to see which IPs are being blocked.
- Use the filter with the rule name or address object.
- Optional Tips:
- Whitelist exceptions with higher-priority allow rules above your block rule.
- Test first in "alert" mode (set action to “Allow” but log) to observe behavior before blocking.
- Add a log-forwarding profile to trigger alerts to your SIEM, syslog, or email.