Skip to content

Palo Alto Firewall

Palo Alto Firewall

About

Reactive security can’t keep up with today’s threats — or prepare you for tomorrow’s. We’ve changed the game by making network security intelligent and proactive. Driven by innovation, our award-winning security features the world's first ML-Powered NGFW and empowers you to stay ahead.

Product Details

Vendor URL: Palo Alto Firewall

Product Type: Firewall

Product Tier: Tier II

Integration Method: Syslog

Integration URL: Palo Alto Firewall - Cyderes Documentation

Log Guide: Sample Logs by Log Type

Parser Details

Log Format: Syslog (CSV)

Expected Normalization Rate: 90-100%

Data Label: PAN_FIREWALL

UDM Fields (list of all UDM fields leveraged in the Parser):

Log File Field UDM Field
application security_result.about.application
bytesReceived network.received_bytes
bytesSent network.sent_bytes
category,threatCategory security_result.description
clientHostname network.dhcp.client_hostname
clientHostname principal.hostname
clientMac principal.mac
destinationZone target.cloud.availability_zone
deviceName,serverHostname intermediary.hostname
deviceName,tgthost target.hostname
domain,userdomain principal.administrative_domain
dstAddress target.ip
dstCountry target.location.country_or_region
dstPort target.port
GlobalProtect security_result.about.labels
httpMethod network.http.method
natDstAddress target.nat_ip
natDstPort target.nat_port
natSrcAddress principal.nat_ip
natSrcPort principal.nat_port
param,tgthost target.url
protocol network.ip_protocol
ruleName security_result.rule_name
serverHostname network.dhcp.sname
sourceZone principal.cloud.availability_zone
srcAddress principal.ip
srcCountry principal.location.country_or_region
srcPort principal.port
srcUserName principal.user.userid
srcUserName,userbysource target.user.email_addresses
subtype,type metadata.product_event_type
summary,threatContentName security_result.summary
urlFile target.file.full_path
userAgent network.http.user_agent
userbysource target.user.userid
verdict security_result.about.labels[verdict]
yiaddr network.dhcp.ciaddr

Product Event Types

type,subtype severity UDM Event Classification alerting enabled
dhcp NETWORK_DHCP
GLOBAL_PROTECT, TRAFFIC, THREAT NETWORK_CONNECTION
logout USER_LOGOUT
SYSTEM GENERIC_EVENT
USERID USER_LOGIN
wildfire-virus, wildfire, virus, vulnerability TRUE
critical TRUE

Log Sample

<14>Nov 11 15:09:01 sysloghost 1,2021/11/11 15:09:01,ffffffffffff,THREAT,url,2305,2021/11/11 15:09:01,10.10.5.5,10.4.2.60,10.0.22.16,10.4.2.60,outbound,domain\username,,web-browsing,vsys1,trust,untrust,ae1.1000,ethernet1/1,domain Logs,2021/11/11 15:09:01,4072537,1,64051,443,16392,443,0x140b000,tcp,alert,"site",(9999),low-risk,informational,client-to-server,uid,0xa000000000000000,10.0.0.0-10.255.255.255,United States,0,,0,,,1,,,,,,,,0,130,0,0,0,,sysloghostname,,,,get,0,,0,2021/11/11 15:03:15,N/A,unknown,AppThreat-0-0,0x0,0,random,,"business-and-economy,low-risk",01-ffffffffffff,

Sample Parsing

metadata.event_timestamp = "2021-11-11T15:09:01Z"
metadata.event_type = "NETWORK_CONNECTION"
metadata.vendor_name = "Palo Alto Networks"
metadata.product_name = "NGFW"
metadata.product_event_type = "THREAT - url"
metadata.ingested_timestamp = "2021-11-11T21:09:21.499744Z"
principal.hostname = "host"
principal.user.userid = "username"
principal.ip = "10.10.5.5"
principal.port = 64051
principal.mac = "ff:ff:ff:ff:ff:ff"
principal.administrative_domain = "domain"
principal.nat_ip = "10.0.22.16"
principal.nat_port = 16392
principal.cloud.availability_zone = "trust"
principal.asset.hostname = "host"
principal.asset.ip = "10.10.5.5"
principal.asset.mac = "ff:ff:ff:ff:ff:ff"
target.hostname = "hostname"
target.ip = "10.4.2.60"
target.port = 443
target.url = "site"
target.file.full_path = "site"
target.location.country_or_region = "United States"
target.cloud.availability_zone = "untrust"
target.asset.ip = "10.4.2.60"
intermediary.hostname = "sysloghostname"
security_result.about.application = "web-browsing"
security_result.rule_name = "outbound"
security_result.summary = "(9999)"
security_result.description = "low-risk - AppThreat-0-0"
security_result.action = "ALLOW"
security_result.severity = "LOW"
network.ip_protocol = "TCP"
network.http.method = "GET"
network.http.user_agent = "1"

Parser Alerting

Alerting criteria is listed in the Product Event Types table above. There is an override in this parser which will set all parser-based alerts to LOW severity.

Rules

Coming Soon