- play_arrow Event Collection from Third-party Devices
- play_arrow Introduction to Log Source Management
- Introduction to Log Source Management
- Adding a Log Source
- Adding a Log Source by using the Log Sources Icon
- Adding Bulk Log Sources
- Adding Bulk Log Source by using the Log Sources Icon
- Editing Bulk Log Sources
- Editing Bulk Log Sources by using the Log Sources icon
- Adding a Log Source Parsing Order
- Testing Log Sources
- Log Source Groups
- play_arrow Gateway Log Source
- play_arrow Log Source Extensions
- play_arrow Manage Log Source Extensions
- play_arrow Threat Use Cases by Log Source Type
- play_arrow Troubleshooting DSMs
- play_arrow Protocols
- play_arrow Universal Cloud REST API Protocol
- play_arrow Protocols that Support Certificate Management
- play_arrow 3Com Switch 8800
- play_arrow AhnLab Policy Center
- play_arrow Akamai KONA
- Akamai Kona
- Configure an Akamai Kona Log Source by using the HTTP Receiver Protocol
- Configure an Akamai Kona Log Source by using the Akamai Kona REST API Protocol
- Configuring Akamai Kona to Communicate with JSA
- Creating an Event Map for Akamai Kona Events
- Modifying the Event Map for Akamai Kona
- Akamai Kona Sample Event Messages
- play_arrow Amazon AWS Application Load Balancer Access Logs
- Amazon AWS Application Load Balancer Access Logs
- Amazon AWS Application Load Balancer Access Logs DSM Specifications
- Publishing Flow Logs to an S3 Bucket
- Create an SQS Queue and Configure S3 ObjectCreated Notifications
- Configuring Security Credentials for your AWS User Account
- Amazon AWS S3 REST API Log Source Parameters for Amazon AWS Application Load Balancer Access Logs
- Amazon AWS Application Load Balancer Access Logs Sample Event Message
- play_arrow Amazon AWS CloudTrail
- play_arrow Amazon AWS Elastic Kubernetes Service
- Amazon AWS Elastic Kubernetes Service
- Amazon AWS Elastic Kubernetes Service DSM Specifications
- Configuring Amazon Elastic Kubernetes Service to Communicate with JSA
- Configuring Security Credentials for your AWS User Account
- Amazon Web Services Log Source Parameters for Amazon AWS Elastic Kubernetes Service
- Amazon AWS Elastic Kubernetes Service Sample Event Messages
- play_arrow Amazon AWS Network Firewall
- Amazon AWS Network Firewall
- Amazon AWS Network Firewall DSM Specifications
- Create an SQS Queue and Configure S3 ObjectCreated Notifications
- Configuring Security Credentials for Your AWS User Account
- Amazon AWS S3 REST API Log Source Parameters for Amazon AWS Network Firewall
- AWS Network Firewall Sample Event Messages
- play_arrow Amazon AWS Route 53
- Amazon AWS Route 53
- Amazon AWS Route 53 DSM Specifications
- Configuring an Amazon AWS Route 53 Log Source by using the Amazon Web Services Protocol and CloudWatch Logs
- Configuring an Amazon AWS Route 53 Log Source by using an S3 Bucket with an SQS Queue
- Configuring an Amazon AWS Route 53 Log Source by using an S3 Bucket with a Directory Prefix
- Amazon AWS Route 53 Sample Event Messages
- play_arrow Amazon AWS Security Hub
- play_arrow Amazon AWS WAF
- play_arrow Amazon GuardDuty
- Amazon GuardDuty
- Configuring an Amazon GuardDuty Log Source by using the Amazon Web Services Protocol
- Creating an EventBridge Rule for Sending Events
- Creating an Identity and Access (IAM) User in the AWS Management Console
- Configuring an Amazon GuardDuty Log Source by using the Amazon AWS S3 REST API Protocol
- Configuring Amazon GuardDuty to Forward Events to an AWS S3 Bucket
- Amazon GuardDuty Sample Event Messages
- play_arrow Ambiron TrustWave IpAngel
- play_arrow Amazon VPC Flow Logs
- play_arrow APC UPS
- play_arrow Apache HTTP Server
- play_arrow Apple Mac OS X
- play_arrow Application Security DbProtect
- play_arrow Arbor Networks
- play_arrow Arpeggio SIFT-IT
- play_arrow Array Networks SSL VPN
- play_arrow Aruba Networks
- play_arrow Avaya VPN Gateway
- play_arrow BalaBit IT Security
- play_arrow Barracuda
- play_arrow BeyondTrust PowerBroker
- play_arrow BlueCat Networks Adonis
- play_arrow Blue Coat SG
- Blue Coat
- Blue Coat SG
- Creating a Custom Event Format for Blue Coat SG
- Creating a Log Facility
- Enabling Access Logging
- Configuring Blue Coat SG for FTP Uploads
- Syslog Log Source Parameters for Blue Coat SG
- Log File Log Source Parameters for Blue Coat SG
- Configuring Blue Coat SG for Syslog
- Creating Extra Custom Format Key-value Pairs
- Blue Coat SG Sample Event Messages
- play_arrow Blue Coat Web Security Service
- play_arrow Box
- play_arrow Bridgewater
- play_arrow Broadcom
- play_arrow Brocade Fabric OS
- play_arrow Carbon Black
- play_arrow Centrify
- Centrify
- Centrify Identity Platform
- Centrify Identity Platform DSM specifications
- Configuring Centrify Identity Platform to communicate with JSA
- Centrify Infrastructure Services
- Configuring WinCollect Agent to Collect Event Logs from Centrify Infrastructure Services
- Configuring Centrify Infrastructure Services on a UNIX or Linux Device to Communicate with JSA
- play_arrow Check Point
- play_arrow Cilasoft QJRN/400
- play_arrow Cisco
- Cisco
- Cisco ACE Firewall
- Configuring Cisco Aironet to Forward Events
- Cisco ACS
- Cisco ASA
- Cisco AMP
- Cisco CallManager
- Cisco CatOS for Catalyst Switches
- Cisco Cloud Web Security
- Cisco CSA
- Cisco Firepower Management Center
- Cisco Firepower Threat Defense
- Cisco FWSM
- Cisco Identity Services Engine
- Cisco IDS/IPS
- Cisco IOS
- Cisco IronPort
- Cisco Meraki
- Cisco NAC
- Cisco Nexus
- Cisco Pix
- Cisco Stealthwatch
- Cisco Umbrella
- Cisco VPN 3000 Concentrator
- Cisco Wireless LAN Controllers
- Cisco Wireless Services Module
- play_arrow Citrix
- play_arrow Cloudera Navigator
- play_arrow Cloudflare Logs
- Cloudflare Logs
- Cloudflare Logs DSM Specifications
- Configure Cloudflare to send Events to JSA when you use the HTTP Receiver Protocol
- Configuring Cloudflare Logs to Send Events to JSA when you use the Amazon S3 REST API Protocol
- Create an SQS Queue and Configure S3 ObjectCreated Notifications
- Configuring Security Credentials for Your AWS User Account
- HTTP Receiver Log Source Parameters for Cloudflare Logs
- Amazon AWS S3 REST API Log Source Parameters for Cloudflare Logs
- Cloudflare Logs Sample Event Messages
- play_arrow CloudPassage Halo
- play_arrow CloudLock Cloud Security Fabric
- play_arrow Correlog Agent for IBM Z/OS
- play_arrow CrowdStrike Falcon
- play_arrow CRYPTOCard CRYPTO-Shield
- play_arrow CyberArk
- play_arrow CyberGuard Firewall/VPN Appliance
- play_arrow Damballa Failsafe
- play_arrow DG Technology MEAS
- play_arrow Digital China Networks (DCN)
- play_arrow Enterprise-IT-Security.com SF-Sherlock
- play_arrow Epic SIEM
- play_arrow ESET Remote Administrator
- play_arrow Exabeam
- play_arrow Extreme
- Extreme
- Extreme 800-Series Switch
- Extreme Dragon
- Extreme HiGuard Wireless IPS
- Extreme HiPath Wireless Controller
- Extreme Matrix Router
- Extreme Matrix K/N/S Series Switch
- Extreme NetSight Automatic Security Manager
- Extreme NAC
- Configuring Extreme Stackable and Stand-alone Switches
- Extreme Networks ExtremeWare
- Extreme XSR Security Router
- play_arrow F5 Networks
- play_arrow Fair Warning
- play_arrow Fasoo Enterprise DRM
- play_arrow Fidelis XPS
- play_arrow FireEye
- play_arrow Forcepoint
- play_arrow ForeScout CounterACT
- play_arrow Fortinet FortiGate
- Fortinet FortiGate Security Gateway
- Configuring a Syslog Destination on Your Fortinet FortiGate Security Gateway Device
- Configuring a Syslog Destination on Your Fortinet FortiAnalyzer Device
- Fortinet FortiGate Security Gateway Sample Event Messages
- Configuring JSA to Categorize App Ctrl Events for Fortinet Fortigate Security Gateway
- play_arrow Foundry FastIron
- play_arrow FreeRADIUS
- play_arrow Generic
- play_arrow Google Cloud Audit Logs
- play_arrow Genua Genugate
- play_arrow Google Cloud Platform Firewall
- play_arrow Google G Suite Activity Reports
- Google G Suite Activity Reports
- Google G Suite Activity Reports DSM Specifications
- Configuring Google G Suite Activity Reports to Communicate with JSA
- Assigning a Role to a User
- Creating a Service Account with Viewer Access
- Granting API Client Access to a Service Account
- Google G Suite Activity Reports Log Source Parameters
- Google G Suite Activity Reports Sample Event Messages
- Troubleshooting Google G Suite Activity Reports
- play_arrow Great Bay Beacon
- play_arrow H3C Technologies
- play_arrow HBGary Active Defense
- play_arrow HCL BigFix (formerly known as IBM BigFix)
- play_arrow Honeycomb Lexicon File Integrity Monitor (FIM)
- play_arrow Hewlett Packard Enterprise
- play_arrow Huawei
- play_arrow HyTrust CloudControl
- play_arrow IBM
- IBM
- IBM AIX DSMs
- IBMi
- IBM DB2
- IBM BigFix Detect
- IBM Cloud Platform (formerly known as IBM Bluemix Platform)
- IBM CICS
- IBM DataPower
- IBM DLC Metrics
- IBM Federated Directory Server
- IBM MaaS360 Security
- IBM Guardium
- IBM IMS
- IBM Informix Audit
- IBM Lotus Domino
- IBM Privileged Session Recorder
- IBM Proventia
- IBM RACF
- IBM SAN Volume Controller
- IBM Security Directory Server
- IBM Security Identity Governance
- IBM Security Network IPS (GX)
- IBM Network Security (XGS)
- IBM Security Trusteer
- IBM Security Trusteer Apex Advanced Malware Protection
- IBM Security Trusteer Apex Local Event Aggregator
- IBM Sense
- IBM SmartCloud Orchestrator
- IBM Tivoli Access Manager for E-business
- IBM Web Sphere Application Server
- IBM WebSphere DataPower
- IBM Z/OS
- IBM zSecure Alert
- play_arrow ISC BIND
- play_arrow Illumio Adaptive Security Platform
- play_arrow Imperva Incapsula
- play_arrow Imperva SecureSphere
- play_arrow Infoblox NIOS
- play_arrow IT-CUBE AgileSI
- play_arrow Itron Smart Meter
- play_arrow Juniper Networks
- Juniper Networks
- Juniper Networks AVT
- Juniper Networks DDoS Secure
- Juniper Networks DX Application Acceleration Platform
- Juniper Networks EX Series Ethernet Switch
- Juniper Networks IDP
- Juniper Networks Infranet Controller
- Juniper Networks Firewall and VPN
- Juniper Networks Junos OS
- Juniper Networks Network and Security Manager
- Juniper Networks Secure Access
- Juniper Networks Security Binary Log Collector
- Juniper Networks Steel-Belted Radius
- Juniper Networks VGW Virtual Gateway
- Juniper Networks Junos OS WebApp Secure
- Juniper Networks WLC Series Wireless LAN Controller
- play_arrow Kaspersky
- play_arrow Kisco Information Systems SafeNet/i
- play_arrow Kubernetes Auditing
- play_arrow Lastline Enterprise
- play_arrow Lieberman Random Password Manager
- play_arrow LightCyber Magna
- play_arrow Linux
- play_arrow LOGbinder
- play_arrow McAfee
- play_arrow MetaInfo MetaIP
- play_arrow Microsoft
- Microsoft
- Microsoft 365 Defender
- Microsoft Azure Active Directory
- Microsoft Azure Platform
- Microsoft Azure Security Center
- Microsoft DHCP Server
- Microsoft DNS Debug
- Microsoft Endpoint Protection
- Microsoft Exchange Server
- Microsoft Hyper-V
- Microsoft IAS Server
- Microsoft IIS Server
- Microsoft ISA
- Microsoft Office 365
- Microsoft Office 365 Message Trace
- JDBC Log Source Parameters for Microsoft Operations Manager
- Microsoft SharePoint
- Microsoft SQL Server
- JDBC Log Source Parameters for Microsoft System Center Operations Manager
- Microsoft Windows Security Event Log
- play_arrow Motorola Symbol AP
- play_arrow Name Value Pair
- play_arrow NCC Group DDoS Secure
- play_arrow NetApp Data ONTAP
- play_arrow Netgate pfSense
- play_arrow Netskope Active
- play_arrow NGINX HTTP Server
- play_arrow Niksun
- play_arrow Nokia Firewall
- play_arrow Nominum Vantio
- play_arrow Nortel Networks
- Nortel Networks
- Nortel Multiprotocol Router
- Nortel Application Switch
- Nortel Contivity
- Nortel Ethernet Routing Switch 2500/4500/5500
- Nortel Ethernet Routing Switch 8300/8600
- Nortel Secure Router
- Nortel Secure Network Access Switch
- Nortel Switched Firewall 5100
- Nortel Switched Firewall 6000
- Nortel Threat Protection System (TPS)
- Nortel VPN Gateway
- play_arrow Novell EDirectory
- play_arrow Observe IT JDBC
- play_arrow Okta
- play_arrow Onapsis Security Platform
- play_arrow OpenBSD
- play_arrow Open LDAP
- play_arrow Open Source SNORT
- play_arrow OpenStack
- play_arrow Oracle
- play_arrow OSSEC
- play_arrow Pirean Access: One
- play_arrow PostFix Mail Transfer Agent
- play_arrow ProFTPd
- play_arrow Proofpoint Enterprise Protection and Enterprise Privacy
- play_arrow Pulse Secure
- play_arrow Pulse Secure Infranet Controller
- play_arrow Pulse Secure Pulse Connect Secure
- play_arrow Radware
- play_arrow Raz-Lee ISecurity
- play_arrow Redback ASE
- play_arrow Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Security for Kubernetes DSM Specifications
- Configuring Red Hat Advanced Cluster Security for Kubernetes to Communicate with JSA
- HTTP Receiver Log Source Parameters for Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Security for Kubernetes Sample Event Messages
- play_arrow Resolution1 CyberSecurity
- play_arrow Riverbed
- play_arrow RSA Authentication Manager
- play_arrow SafeNet DataSecure
- play_arrow Salesforce
- play_arrow Samhain Labs
- play_arrow SAP Enterprise Threat Detection
- SAP Enterprise Threat Detection
- SAP Enterprise Threat Detection DSM Specifications
- SAP Enterprise Threat Detection Alert API Log Source Parameters for SAP Enterprise Threat Detection
- Creating a Pattern Filter on the SAP Server
- Troubleshooting the SAP Enterprise Threat Detection Alert API
- SAP Enterprise Threat Detection Sample Event Message
- play_arrow Seculert
- play_arrow Sentrigo Hedgehog
- play_arrow SolarWinds Orion
- play_arrow SonicWALL
- play_arrow Sophos
- play_arrow Sourcefire Intrusion Sensor
- play_arrow Splunk
- play_arrow Squid Web Proxy
- play_arrow SSH CryptoAuditor
- play_arrow Starent Networks
- play_arrow STEALTHbits
- play_arrow Sun
- play_arrow Suricata
- play_arrow Sybase ASE
- play_arrow Symantec
- play_arrow SysFlow
- play_arrow ThreatGRID Malware Threat Intelligence Platform
- play_arrow TippingPoint
- play_arrow Top Layer IPS
- play_arrow Townsend Security LogAgent
- play_arrow Trend Micro
- play_arrow Tripwire
- play_arrow Tropos Control
- play_arrow Universal CEF
- play_arrow Universal LEEF
- play_arrow Vectra Networks Vectra
- play_arrow Venustech Venusense
- play_arrow Verdasys Digital Guardian
- play_arrow Vericept Content 360 DSM
- play_arrow VMware
- play_arrow Vormetric Data Security
- play_arrow WatchGuard Fireware OS
- play_arrow Websense
- play_arrow Zscaler Nanolog Streaming Service
- play_arrow Zscaler Private Access
- play_arrow JSA Supported DSMs
ON THIS PAGE
Creating a Syslog Destination on Your Palo Alto PA Series Device
Forwarding Palo Alto Cortex Data Lake (Next Generation Firewall) LEEF events to JSA
Creating a Forwarding Policy on Your Palo Alto PA Series Device
Creating ArcSight CEF Formatted Syslog Events on Your Palo Alto PA Series Networks Firewall Device
Palo Alto Networks PA Series
Use the JSA DSM for Palo Alto PA Series to collect events from Palo Alto PA Series, Next Generation Firewall logs, and Prisma Access logs, by using Cortex Data Lake.
To send events from Palo Alto PA Series to JSA, complete the following steps:
If automatic updates are not enabled, download the most recent version of the following RPMs from the Juniper Downloads.
- DSMCommon RPM
- TLS Syslog Protocol RPM
- Palo Alto PA Series DSM RPM
Configure your Palo Alto PA Series device to send events to JSA.
If JSA does not automatically detect the Palo Alto PA Series as a log source, add a Palo Alto PA Series log source on the JSA Console.
Palo Alto PA DSM Specifications
The following table identifies the specifications for the Palo Alto PA Series DSM:
Specification | Value |
---|---|
Manufacturer | Palo Alto Networks |
DSM name | Palo Alto PA Series |
RPM file name | DSM-PaloAltoPaSeries-JSA_version-build_number.noarch.rpm |
Event format | LEEF for PAN-OS v3.0 to v9.1, and Prisma Access v2.1 CEF for PAN-OS v4.0 to v6.1. (CEF:0 is supported) |
JSA recorded log types | Traffic Threat Config System HIP Match Data WildFire Authentication Tunnel Inspection Correlation URL Filtering User-ID SCTP File Data GTP HIP Match IP-Tag Global Protect - Note: To use this log type, you must enable the EventStatus field in Palo Alto. Decryption |
Automatically discovered? | Yes |
Includes identity? | Yes |
Includes custom properties? | No |
More information |
Creating a Syslog Destination on Your Palo Alto PA Series Device
To send Palo Alto PA Series events to JSA, create a Syslog destination (Syslog or LEEF event format) on your Palo Alto PA Series device.
Palo Alto can send only one format to all Syslog devices. By modifying the Syslog format, any other device that requires Syslog must support that same format.
Log in to the Palo Alto Networks interface.
On the Device tab, click Server Profiles > Syslog, and then click Add.
Create a Syslog destination by following these steps:
In the Syslog Server Profile dialog box, click Add.
Specify the name, server IP address, port, and facility of the JSA system that you want to use as a syslog server.
If you are using Syslog, set the Custom Format column to Default for all log types.
Configure LEEF events by following these steps:
Note:Due to formatting issues, copy the text into a text editor, remove any carriage return or line feed characters, and then paste it into the appropriate field.
Click the Config Log Format tab in the Syslog Server Profile dialog.
Click Config, copy the following text and paste it in the Config Log Format column for the Config log type.
PAN-OS v3.0 - v6.1--
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration|4.0|$result|x7C|cat=$type| usrName=$admin|src=$host|devTime=$cefformatted- receive_time|client=$client| sequence=$seqno|serial=$serial|msg=$cmd
PAN-OS v7.1 - v9.1--
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration|$sender_sw_version| $result|x7C|ReceiveTime=$receive_time| SerialNumber=$serial|cat=$type| devTime=$cef-formatted-receive_time| src=$host|VirtualSystem=$vsys| msg=$cmd|usrName=$admin|client=$client| Result=$result|ConfigurationPath=$path| sequence=$seqno|ActionFlags=$actionflags| BeforeChangeDetail=$before-change-detail| AfterChangeDetail=$after-change-detail| DeviceGroupHierarchyL1=$dg_hier_level_1| DeviceGroupHierarchyL2=$dg_hier_level_2| DeviceGroupHierarchyL3=$dg_hier_level_3| DeviceGroupHierarchyL4=$dg_hier_level_4| vSrcName=$vsys_name| DeviceName=$device_name
Click System, copy one of the following texts applicable to the version you are using and paste it in the System Log Format field for the System log type. If your version is not listed, omit this step.
PAN-OS v3.0 - v6.1--
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PANOS Syslog Integration|4.0|$eventid|x7C| cat=$type|Subtype=$subtype|devTime=$cefformatted- receive_time|sev=$severity| Severity=$number-of-severity|msg=$opaque| Filename=$object
PAN-OS v7.1 - v9.1--
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration|$sender_sw_version| $eventid|x7C|ReceiveTime=$receive_time| SerialNumber=$serial|cat=$type| Subtype=$subtype|devTime=$cef-formattedreceive_ time|VirtualSystem=$vsys| Filename=$object|Module=$module| sev=$number-of-severity| Severity=$severity|msg=$opaque| sequence=$seqno|ActionFlags=$actionflags| DeviceGroupHierarchyL1=$dg_hier_level_1| DeviceGroupHierarchyL2=$dg_hier_level_2| DeviceGroupHierarchyL3=$dg_hier_level_3| DeviceGroupHierarchyL4=$dg_hier_level_4| vSrcName=$vsys_name| DeviceName=$device_name
Click Threat, copy one of the following texts applicable to the version you are using, paste it in the Threat Log Format filed for the Threat log type. If your version is not listed, omit this step.
PAN-OS v3.0 - v6.1--
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks| PAN-OS Syslog Integration|4.0| $threatid|x7C|cat=$type|Subtype=$subtype| src=$src|dst=$dst|srcPort=$sport| dstPort=$dport|proto=$proto| usrName=$srcuser|SerialNumber=$serial| srcPostNAT=$natsrc|dstPostNAT=$natdst| RuleName=$rule|SourceUser=$srcuser| DestinationUser=$dstuser| Application=$app|VirtualSystem=$vsys| SourceZone=$fromDestinationZone=$to| IngressInterface=$inbound_if| EgressInterface=$outbound_if| LogForwardingProfile=$logset| SessionID=$sessionid| RepeatCount=$repeatcnt| srcPostNATPort=$natsport| dstPostNATPort=$natdport| Flags=$flags|URLCategory=$category| sev=$severity|Severity=$numberof- severity|Direction=$direction| ContentType=$contenttype|action=$action| Miscellaneous=$misc
PAN-OS v7.1--
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration|$sender_sw_version| $threatid|x7C|ReceiveTime=$receive_time| SerialNumber=$serial|cat=$type| Subtype=$subtype|devTime=$cefformatted- receive_time|src=$src| dst=$dst|srcPostNAT=$natsrc| dstPostNAT=$natdst|RuleName=$rule| usrName=$srcuser|SourceUser=$srcuser| DestinationUser=$dstuser| Application=$app|VirtualSystem=$vsys| SourceZone=$from|DestinationZone=$to| IngressInterface=$inbound_if| EgressInterface=$outbound_if| LogForwardingProfile=$logset| SessionID=$sessionid| RepeatCount=$repeatcnt|srcPort=$sport| dstPort=$dport|srcPostNATPort=$natsport| dstPostNATPort=$natdport|Flags=$flags| proto=$proto|action=$action| Miscellaneous=$misc|ThreatID=$threatid| URLCategory=$category|sev=$numberof- severity|Severity=$severity| Direction=$direction|sequence=$seqno| ActionFlags=$actionflags| SourceLocation=$srcloc| DestinationLocation=$dstloc| ContentType=$contenttype| PCAP_ID=$pcap_id|FileDigest=$filedigest| Cloud=$cloud|URLIndex=$url_idx| UserAgent=$user_agent|FileType=$filetype| identSrc=$xff|Referer=$referer| Sender=$sender|Subject=$subject| Recipient=$recipient|ReportID=$reportid| DeviceGroupHierarchyL1=$dg_hier_level_1| DeviceGroupHierarchyL2=$dg_hier_level_2| DeviceGroupHierarchyL3=$dg_hier_level_3| DeviceGroupHierarchyL4=$dg_hier_level_4| vSrcName=$vsys_name| DeviceName=$device_name
PAN-OS v8.0 - 9.1--
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration|$sender_sw_version| $threatid|x7C|ReceiveTime=$receive_time| SerialNumber=$serial|cat=$type| Subtype=$subtype|devTime=$cefformatted- receive_time|src=$src| dst=$dst|srcPostNAT=$natsrc| dstPostNAT=$natdst|RuleName=$rule| usrName=$srcuser|SourceUser=$srcuser| DestinationUser=$dstuser| Application=$app|VirtualSystem=$vsys| SourceZone=$from|DestinationZone=$to| IngressInterface=$inbound_if| EgressInterface=$outbound_if| LogForwardingProfile=$logset| SessionID=$sessionid| RepeatCount=$repeatcnt|srcPort=$sport| dstPort=$dport|srcPostNATPort=$natsport| dstPostNATPort=$natdport|Flags=$flags| proto=$proto|action=$action| Miscellaneous=$misc|ThreatID=$threatid| URLCategory=$category|sev=$numberof- severity|Severity=$severity| Direction=$direction|sequence=$seqno| ActionFlags=$actionflags| SourceLocation=$srcloc| DestinationLocation=$dstloc| ContentType=$contenttype| PCAP_ID=$pcap_id|FileDigest=$filedigest| Cloud=$cloud|URLIndex=$url_idx| RequestMethod=$http_method| Subject=$subject| DeviceGroupHierarchyL1=$dg_hier_level_1| DeviceGroupHierarchyL2=$dg_hier_level_2| DeviceGroupHierarchyL3=$dg_hier_level_3| DeviceGroupHierarchyL4=$dg_hier_level_4| vSrcName=$vsys_name| DeviceName=$device_name| SrcUUID=$src_uuid|DstUUID=$dst_uuid| TunnelID=$tunnelid|MonitorTag=$monitortag| ParentSessionID=$parent_session_id| ParentStartTime=$parent_start_time| TunnelType=$tunnel| ThreatCategory=$thr_category| ContentVer=$contentver
Click Traffic, copy one of the following texts applicable to the version you are using and paste it in the Traffic Log Format field for the Traffic log type. If your version is not listed, omit this step.
PAN-OS v3.0 - v6.1--
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration|4.0|$action|x7C|cat=$type| src=$src|dst=$dst|srcPort=$sport| dstPort=$dport|proto=$proto| usrName=$srcuser| SerialNumber=$serial| Type=$type|Subtype=$subtype| srcPostNAT=$natsrc|dstPostNAT=$natdst| RuleName=$rule|SourceUser=$srcuser| DestinationUser=$dstuser| Application=$app| VirtualSystem=$vsys| SourceZone=$from|DestinationZone=$to| IngressInterface=$inbound_if| EgressInterface=$outbound_if| LogForwardingProfile=$logset| SessionID=$sessionid| RepeatCount=$repeatcnt| srcPostNATPort=$natsport| dstPostNATPort=$natdport|Flags=$flags| totalBytes=$bytes|totalPackets=$packets| ElapsedTime=$elapsed| URLCategory=$category| dstBytes=$bytes_received| srcBytes=$bytes_sent|action=$action
PAN-OS v7.1--
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration|$sender_sw_version|$action| x7C|cat=$type|ReceiveTime=$receive_time| SerialNumber=$serial|Type=$type| Subtype=$subtype|devTime=$cefformatted- receive_time|src=$src| dst=$dst|srcPostNAT=$natsrc| dstPostNAT=$natdst|RuleName=$rule| usrName=$srcuser|SourceUser=$srcuser| DestinationUser=$dstuser| Application=$app|VirtualSystem=$vsys| SourceZone=$from|DestinationZone=$to| IngressInterface=$inbound_if| EgressInterface=$outbound_if| LogForwardingProfile=$logset| SessionID=$sessionid| RepeatCount=$repeatcnt|srcPort=$sport| dstPort=$dport|srcPostNATPort=$natsport| dstPostNATPort=$natdport| Flags=$flags|proto=$proto| action=$action|totalBytes=$bytes| dstBytes=$bytes_received| srcBytes=$bytes_sent| totalPackets=$packets| StartTime=$start|ElapsedTime=$elapsed| URLCategory=$category|sequence=$seqno| ActionFlags=$actionflags| SourceLocation=$srcloc| DestinationLocation=$dstloc| dstPackets=$pkts_received| srcPackets=$pkts_sent| SessionEndReason=$session_end_reason| DeviceGroupHierarchyL1=$dg_hier_level_1| DeviceGroupHierarchyL2=$dg_hier_level_2| DeviceGroupHierarchyL3=$dg_hier_level_3| DeviceGroupHierarchyL4=$dg_hier_level_4| vSrcName=$vsys_name| DeviceName=$device_name| ActionSource=$action_source
PAN-OS v8.0 - 9.1--
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration|$sender_sw_version|$action| x7C|cat=$type|ReceiveTime=$receive_time| SerialNumber=$serial|Type=$type| Subtype=$subtype|devTime=$cefformatted- receive_time|src=$src| dst=$dst|srcPostNAT=$natsrc| dstPostNAT=$natdst|RuleName=$rule| usrName=$srcuser|SourceUser=$srcuser| DestinationUser=$dstuser| Application=$app|VirtualSystem=$vsys| SourceZone=$from|DestinationZone=$to| IngressInterface=$inbound_if| EgressInterface=$outbound_if| LogForwardingProfile=$logset| SessionID=$sessionid| RepeatCount=$repeatcnt|srcPort=$sport| dstPort=$dport|srcPostNATPort=$natsport| dstPostNATPort=$natdport| Flags=$flags|proto=$proto| action=$action|totalBytes=$bytes| dstBytes=$bytes_received| srcBytes=$bytes_sent| totalPackets=$packets| StartTime=$start|ElapsedTime=$elapsed| URLCategory=$category|sequence=$seqno| ActionFlags=$actionflags| SourceLocation=$srcloc| DestinationLocation=$dstloc| dstPackets=$pkts_received| srcPackets=$pkts_sent| SessionEndReason=$session_end_reason| DeviceGroupHierarchyL1=$dg_hier_level_1| DeviceGroupHierarchyL2=$dg_hier_level_2| DeviceGroupHierarchyL3=$dg_hier_level_3| DeviceGroupHierarchyL4=$dg_hier_level_4| vSrcName=$vsys_name| DeviceName=$device_name| ActionSource=$action_source| SrcUUID=$src_uuid|DstUUID=$dst_uuid| TunnelID=$tunnelid|MonitorTag=$monitortag| ParentSessionID=$parent_session_id| ParentStartTime=$parent_start_time| TunnelType=$tunnel
If you are using versions other than PAN-OS 3.0 - 6.1, click HIP Match, copy one of the following texts applicable to the version you are using, and paste it in the HIP Match Log Format field for the HIP Match log type.
PAN-OS v7.1--
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration|$sender_sw_version| $matchname|x7C|ReceiveTime=$receive_time| SerialNumber=$serial|cat=$type| Subtype=$subtype|devTime=$cefformatted- receive_time| usrName=$srcuser|VirtualSystem=$vsys| identHostName=$machinename|OS=$os| identSrc=$src|HIP=$matchname| RepeatCount=$repeatcnt|HIPType=$matchtype| sequence=$seqno|ActionFlags=$actionflags| DeviceGroupHierarchyL1=$dg_hier_level_1| DeviceGroupHierarchyL2=$dg_hier_level_2| DeviceGroupHierarchyL3=$dg_hier_level_3| DeviceGroupHierarchyL4=$dg_hier_level_4| vSrcName=$vsys_name| DeviceName=$device_name
PAN-OS v8.0 - 9.1--
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration|$sender_sw_version| $matchname|x7C|ReceiveTime=$receive_time| SerialNumber=$serial|cat=$type| Subtype=$subtype|devTime=$cefformatted- receive_time| usrName=$srcuser|VirtualSystem=$vsys| identHostName=$machinename|OS=$os| identsrc=$src|HIP=$matchname| RepeatCount=$repeatcnt|HIPType=$matchtype| sequence=$seqno|ActionFlags=$actionflags| DeviceGroupHierarchyL1=$dg_hier_level_1| DeviceGroupHierarchyL2=$dg_hier_level_2| DeviceGroupHierarchyL3=$dg_hier_level_3| DeviceGroupHierarchyL4=$dg_hier_level_4| vSrcName=$vsys_name| DeviceName=$device_name| VirtualSystemID=$vsys_id|srcipv6=$srcipv6| startTime=$cef-formatted-time_generated
If you are using PAN-OS 8.0 - 9.1, copy the following text and paste it in the Custom Format column for the URL Filtering log type.
PAN-OS v8.0 - 9.1-
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration| $sender_sw_version|$threatid|x7C|ReceiveTime=$receive_time|SerialNumber=$serial| cat=$type|Subtype=$subtype|devTime=$cef-formatted-receive_time|src=$src|dst=$dst| srcPostNAT=$natsrc|dstPostNAT=$natdst|RuleName=$rule|usrName=$srcuser|SourceUser=$srcuser| DestinationUser=$dstuser|Application=$app|VirtualSystem=$vsys|SourceZone=$from| DestinationZone=$to|IngressInterface=$inbound_if|EgressInterface=$outbound_if| LogForwardingProfile=$logset|SessionID=$sessionid|RepeatCount=$repeatcnt|srcPort=$sport| dstPort=$dport|srcPostNATPort=$natsport|dstPostNATPort=$natdport|Flags=$flags| proto=$proto|action=$action|Miscellaneous=$misc|ThreatID=$threatid|URLCategory=$category| sev=$number-of-severity|Severity=$severity|Direction=$direction|sequence=$seqno| ActionFlags=$actionflags|SourceLocation=$srcloc|DestinationLocation=$dstloc| ContentType=$contenttype|PCAP_ID=$pcap_id|FileDigest=$filedigest|Cloud=$cloud| URLIndex=$url_idx|RequestMethod=$http_method|UserAgent=$user_agent|identSrc=$xff| Referer=$referer|Subject=$subject|DeviceGroupHierarchyL1=$dg_hier_level_1| DeviceGroupHierarchyL2=$dg_hier_level_2|DeviceGroupHierarchyL3=$dg_hier_level_3| DeviceGroupHierarchyL4=$dg_hier_level_4|vSrcName=$vsys_name|DeviceName=$device_name| SrcUUID=$src_uuid|DstUUID=$dst_uuid|TunnelID=$tunnelid|MonitorTag=$monitortag| ParentSessionID=$parent_session_id|ParentStartTime=$parent_start_time|TunnelType=$tunnel| ThreatCategory=$thr_category|ContentVer=$contentver
If you are using PAN-OS 8.0 - 9.1, copy the following text and paste it in the Custom Format column for the Data log type.
PAN-OS v8.0 - 9.1--
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration| $sender_sw_version|$threatid|x7C|ReceiveTime=$receive_time|SerialNumber=$serial| cat=$type|Subtype=$subtype|devTime=$cef-formatted-receive_time|src=$src|dst=$dst| srcPostNAT=$natsrc|dstPostNAT=$natdst|RuleName=$rule|usrName=$srcuser|SourceUser=$srcuser| DestinationUser=$dstuser|Application=$app|VirtualSystem=$vsys|SourceZone=$from| DestinationZone=$to|IngressInterface=$inbound_if|EgressInterface=$outbound_if| LogForwardingProfile=$logset|SessionID=$sessionid|RepeatCount=$repeatcnt|srcPort=$sport| dstPort=$dport|srcPostNATPort=$natsport|dstPostNATPort=$natdport|Flags=$flags| proto=$proto|action=$action|Miscellaneous=$misc|ThreatID=$threatid|URLCategory=$category| sev=$number-of-severity|Severity=$severity|Direction=$direction|sequence=$seqno| ActionFlags=$actionflags|SourceLocation=$srcloc|DestinationLocation=$dstloc| ContentType=$contenttype|PCAP_ID=$pcap_id|FileDigest=$filedigest| Cloud=$cloud|URLIndex=$url_idx|RequestMethod=$http_method|Subject=$subject| DeviceGroupHierarchyL1=$dg_hier_level_1|DeviceGroupHierarchyL2=$dg_hier_level_2| DeviceGroupHierarchyL3=$dg_hier_level_3|DeviceGroupHierarchyL4=$dg_hier_level_4| vSrcName=$vsys_name|DeviceName=$device_name|SrcUUID=$src_uuid|DstUUID=$dst_uuid| TunnelID=$tunnelid|MonitorTag=$monitortag|ParentSessionID=$parent_session_id| ParentStartTime=$parent_start_time|TunnelType=$tunnel|ThreatCategory=$thr_category| ContentVer=$contentver
If you are using PAN-OS 8.0 - 9.1, copy the following text and paste it in the Custom Format column for the Wildfire log type.
PAN-OS v8.0 - 9.1--
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration| $sender_sw_version|$threatid|x7C|ReceiveTime=$receive_time|SerialNumber=$serial| cat=$type|Subtype=$subtype|devTime=$cef-formatted-receive_time|src=$src|dst=$dst| srcPostNAT=$natsrc|dstPostNAT=$natdst|RuleName=$rule|usrName=$srcuser|SourceUser=$srcuser| DestinationUser=$dstuser|Application=$app|VirtualSystem=$vsys|SourceZone=$from| DestinationZone=$to|IngressInterface=$inbound_if|EgressInterface=$outbound_if| LogForwardingProfile=$logset|SessionID=$sessionid|RepeatCount=$repeatcnt|srcPort=$sport| dstPort=$dport|srcPostNATPort=$natsport|dstPostNATPort=$natdport|Flags=$flags| proto=$proto|action=$action|Miscellaneous=$misc|ThreatID=$threatid|URLCategory=$category| sev=$number-of-severity|Severity=$severity|Direction=$direction|sequence=$seqno| ActionFlags=$actionflags|SourceLocation=$srcloc|DestinationLocation=$dstloc| ContentType=$contenttype|PCAP_ID=$pcap_id|FileDigest=$filedigest| Cloud=$cloud|URLIndex=$url_idx|RequestMethod=$http_method|FileType=$filetype| Sender=$sender|Subject=$subject|Recipient=$recipient|ReportID=$reportid| DeviceGroupHierarchyL1=$dg_hier_level_1|DeviceGroupHierarchyL2=$dg_hier_level_2| DeviceGroupHierarchyL3=$dg_hier_level_3|DeviceGroupHierarchyL4=$dg_hier_level_4| vSrcName=$vsys_name|DeviceName=$device_name|SrcUUID=$src_uuid|DstUUID=$dst_uuid| TunnelID=$tunnelid|MonitorTag=$monitortag|ParentSessionID=$parent_session_id| ParentStartTime=$parent_start_time|TunnelType=$tunnel|ThreatCategory=$thr_category| ContentVer=$contentver
If you are using PAN-OS 8.0 - 9.1, copy the following text and paste it in the Custom Format column for the Authentication log type.
PAN-OS v8.0 - 9.1--
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration|$sender_sw_version|$event|x7C|ReceiveTime=$receive_time| SerialNumber=$serial|cat=$type|Subtype=$subtype|devTime=$cef-formatted-receive_time| ServerProfile=$serverprofile|LogForwardingProfile=$logset|VirtualSystem=$vsys| AuthPolicy=$authpolicy|ClientType=$clienttype|NormalizeUser=$normalize_user| ObjectName=$object|FactorNumber=$factorno|AuthenticationID=$authid|src=$ip| RepeatCount=$repeatcnt|usrName=$user|Vendor=$vendor|msg=$event|sequence=$seqno| DeviceGroupHierarchyL1=$dg_hier_level_1|DeviceGroupHierarchyL2=$dg_hier_level_2| DeviceGroupHierarchyL3=$dg_hier_level_3|DeviceGroupHierarchyL4=$dg_hier_level_4| vSrcName=$vsys_name|DeviceName=$device_name|AdditionalAuthInfo=$desc| ActionFlags=$actionflags
If you are using PAN-OS 8.0 - 9.1, copy the following text and paste it in the Custom Format column for the User-ID log type.
PAN-OS v8.0 - 9.1--
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration|$sender_sw_version|$subtype|x7C|ReceiveTime=$receive_time| SerialNumber=$serial|cat=$type|Subtype=$subtype|devTime=$cef-formatted-receive_time| FactorType=$factortype|VirtualSystem=$vsys|DataSourceName=$datasourcename| DataSource=$datasource|DataSourceType=$datasourcetype|FactorNumber=$factorno| VirtualSystemID=$vsys_id|TimeoutThreshold=$timeout|src=$ip|srcPort=$beginport| dstPort=$endport|RepeatCount=$repeatcnt|usrName=$user|sequence=$seqno|EventID=$eventid| FactorCompletionTime=$factorcompletiontime|DeviceGroupHierarchyL1=$dg_hier_level_1| DeviceGroupHierarchyL2=$dg_hier_level_2|DeviceGroupHierarchyL3=$dg_hier_level_3| DeviceGroupHierarchyL4=$dg_hier_level_4|vSrcName=$vsys_name|DeviceName=$device_name| ActionFlags=$actionflags
If you are using PAN-OS 8.0 - 9.1, copy the following text and paste it in the Custom Format column for the Tunnel Inspection log type.
PAN-OS v8.0 - 9.1--
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration|$sender_sw_version|$action|x7C|ReceiveTime=$receive_time|SerialNumber=$serial| cat=$type|Subtype=$subtype|devTime=$cef-formatted-receive_time|src=$src|dst=$dst| srcPostNAT=$natsrc|dstPostNAT=$natdst|RuleName=$rule|usrName=$srcuser|SourceUser=$srcuser| DestinationUser=$dstuser|Application=$app|VirtualSystem=$vsys|SourceZone=$from| DestinationZone=$to|IngressInterface=$inbound_if|EgressInterface=$outbound_if| LogForwardingProfile=$logset|SessionID=$sessionid|RepeatCount=$repeatcnt| srcPort=$sport|dstPort=$dport|srcPostNATPort=$natsport|dstPostNATPort=$natdport| Flags=$flags|proto=$proto|action=$action|sequence=$seqno|ActionFlags=$actionflags| DeviceGroupHierarchyL1=$dg_hier_level_1|DeviceGroupHierarchyL2=$dg_hier_level_2| DeviceGroupHierarchyL3=$dg_hier_level_3|DeviceGroupHierarchyL4=$dg_hier_level_4| vSrcName=$vsys_name|DeviceName=$device_name|TunnelID=$tunnelid|MonitorTag=$monitortag| ParentSessionID=$parent_session_id|ParentStartTime=$parent_start_time|TunnelType=$tunnel| totalBytes=$bytes|dstBytes=$bytes_received|srcBytes=$bytes_sent|totalPackets=$packets| dstPackets=$pkts_received|srcPackets=$pkts_sent|MaximumEncapsulation=$max_encap| UnknownProtocol=$unknown_proto|StrictChecking=$strict_check| TunnelFragment=$tunnel_fragment|SessionsCreated=$sessions_created| SessionsClosed=$sessions_closed|SessionEndReason=$session_end_reason| ActionSource=$action_source|startTime=$start|ElapsedTime=$elapsed
If you are using PAN-OS 8.0 - 9.1, copy the following text and paste it in the Custom Format column for the Correlation log type.
PAN-OS v8.0 - 9.1--
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PANOS Syslog Integration|8.0|$category|ReceiveTime=$receive_time| x7C|SerialNumber=$serial|cat=$type|devTime=$cef-formatted-receive_time|startTime=$cefformatted- time_generated|Severity=$severity|VirtualSystem=$vsys|VirtualSystemID=$vsys_id| src=$src|SourceUser=$srcuser|msg=$evidence|DeviceGroupHierarchyL1=$dg_hier_level_1| DeviceGroupHierarchyL2=$dg_hier_level_2|DeviceGroupHierarchyL3=$dg_hier_level_3| DeviceGroupHierarchyL4=$dg_hier_level_4|vSrcName=$vsys_name|DeviceName=$device_name| ObjectName=$object_name|ObjectID=$object_id
If you are using PAN-OS 8.1 - 9.1, copy the following text, and paste it in the Custom Format column for the SCTP log type.
PAN-OS v8.1 - 9.1
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration|$sender_sw_version|$action| x7C|ReceiveTime=$receive_time|SerialNumber=$serial|cat=$type|genTime=$time_generated| src=$src|dst=$dst|VirtualSystem=$vsys|SourceZone=$from|DestinationZone=$to| IngressInterface=$inbound_if|EgressInterface=$outbound_if|SessionID=$sessionid| RepeatCount=$repeatcnt|srcPort=$sport|dstPort=$dport|proto=$proto|action=$action| DeviceGroupHierarchyL1=$dg_hier_level_1|DeviceGroupHierarchyL2=$dg_hier_level_2| DeviceGroupHierarchyL3=$dg_hier_level_3|DeviceGroupHierarchyL4=$dg_hier_level_4| vsysName=$vsys_name|DeviceName=$device_name|sequence=$seqno|AssocID=$assoc_id| PayloadProtoID=$ppid|sev=$num_of_severity|SCTPChunkType=$sctp_chunk_type| SCTPVerTag1=$verif_tag_1|SCTPVerTag2=$verif_tag_2|SCTPCauseCode=$sctp_cause_code| DiamAppID=$diam_app_id|DiamCmdCode=$diam_cmd_code|DiamAVPCode=$diam_avp_code| SCTPStreamID=$stream_id|SCTPAssEndReason=$assoc_end_reason|OpCode=$op_code| CPSSN=$sccp_calling_ssn|CPGlobalTitle=$sccp_calling_gt|SCTPFilter=$sctp_filter| SCTPChunks=$chunks|SrcSCTPChunks=$chunks_sent|DstSCTPChunks=$chunks_received| Packets=$packets|srcPackets=$pkts_sent|dstPackets=$pkts_received
If you are using PAN-OS 9.x, copy the following text, and paste it in the Custom Format column for the IPTag log type.
content_copy zoom_out_mapLEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration|$sender_sw_version| $event_id|x7C|cat=$type|devTime=$cef-formatted-receive_time|ReceiveTime=$receive_time| SerialNumber=$serial|Subtype=$subtype|GenerateTime=$time_generated| VirtualSystem=$vsys|src=$ip|TagName=$tag_name|EventID=$eventid|RepeatCount=$repeatcnt| TimeoutThreshold=$timeout|DataSourceName=$datasourcename|DataSource=$datasource_type| DataSourceType=$datasource_subtype|sequence=$seqno|ActionFlags=$actionflags| DeviceGroupHierarchyL1=$dg_hier_level_1|DeviceGroupHierarchyL2=$dg_hier_level_2| DeviceGroupHierarchyL3=$dg_hier_level_3|DeviceGroupHierarchyL4=$dg_hier_level_4| vSrcName=$vsys_name|DeviceName=$device_name|VirtualSystemID=$vsys_id
Click OK.
To specify the severity of events that are contained in the Syslog messages, click Log Setting.
For each severity that you want to include in the Syslog message, click the Severity name and select the Syslog destination from the Syslog menu.
Click OK.
Click Commit.
To allow communication between your Palo Alto Networks device and JSA, create a forwarding policy. See Creating a forwarding policy on your Palo Alto PA Series device.
Forwarding Palo Alto Cortex Data Lake (Next Generation Firewall) LEEF events to JSA
To send Palo Alto Cortex Data Lake events to JSA, you must add a TLS Syslog log source in JSA and configure Cortex Data Lake to forward logs to a syslog server.
Add a log source in JSA by using the TLS Syslog protocol. For more information, see TLS Syslog log source parameters for Palo Alto PA Series.
Forward logs from Cortex Data Lake to JSA. For more information, see your Palo Alto documentation.
When forwarding logs from Cortex Data Lake, choose the LEEF log format.
You must enable the cat and EventStatus fields in Palo Alto. The EventStatus field is required to parse Global Protect events in JSA.
Creating a Forwarding Policy on Your Palo Alto PA Series Device
If your JSA Console or Event Collector is in a different security zone than your Palo Alto PA Series device, create a forwarding policy rule.
Log in to Palo Alto Networks.
On the dashboard, click the Policies tab.
Click Policies > Policy Based Forwarding.
Click Add.
Configure the parameters. For descriptions of the policy-based forwarding values, see your Palo Alto Networks Administrator’s Guide.
Creating ArcSight CEF Formatted Syslog Events on Your Palo Alto PA Series Networks Firewall Device
Configure your Palo Alto Networks firewall to send ArcSight CEF formatted Syslog events to JSA.
Log in to the Palo Alto Networks interface.
Click the Device tab.
Select Server Profiles >Syslog, and then click Add.
On the Servers tab, click Add.
Specify the name, server IP address, port, and facility of the JSA system that you want to use as a Syslog server:
The Name is the Syslog server name.
The Syslog Server is the IP address for the Syslog server.
The Transport/Port default is 514.
The Faculty default is LOG_USER.
To select any of the listed log types that define a custom format, based on the ArcSight CEF for that log type, complete the following steps:
Click the Custom Log Format tab and select any of the listed log types to define a custom format based on the ArcSight CEF for that log type. The listed log types are Config, System, Threat, Traffic, and HIP Match.
Click OK twice to save your entries, then click Commit.
To define your own CEF-style formats that use the event mapping table that is provided in the ArcSight document, Implementing ArcSight CEF, you can use the following information about defining CEF style formats:
The Custom Log Format tab supports escaping any characters that are defined in the CEF as special characters. For example, to use a backslash to escape the backslash and equal characters, enable the Escaping check box, specify \=as the Escaped Characters and \as the Escape Character.
The following list displays the CEF-style format that was used during the certification process for each log type. These custom formats include all of the fields, in a similar order, that the default format of the Syslogs display.
Note:Due to PDF formatting, do not copy and paste the message formats directly into the PAN-OS web interface. Instead, paste into a text editor, remove any carriage return or line feed characters, and then copy and paste into the web interface.
Traffic--
content_copy zoom_out_mapCEF:0|Palo Alto Networks|PAN-OS|6.0.0|$subtype|$type|1|rt=$cef-formatted-receive_time deviceExternalId=$serial src=$src dst=$dst sourceTranslatedAddress=$natsrc destinationTranslatedAddress=$natdst cs1Label=Rule cs1=$rule suser=$srcuser duser=$dstuser app=$app cs3Label=Virtual System cs3=$vsys cs4Label=Source Zone cs4=$from cs5Label=Destination Zone cs5=$to deviceInboundInterface=$inbound_if deviceOutboundInterface=$outbound_if cs6Label=LogProfile cs6=$logset cn1Label=SessionID cn1=$sessionid cnt=$repeatcnt spt=$sport dpt=$dport sourceTranslatedPort=$natsport destinationTranslatedPort=$natdport flexString1Label=Flags flexString1=$flags proto=$proto act=$action flexNumber1Label=Total bytes flexNumber1=$bytes in=$bytes_sent out=$bytes_received cn2Label=Packets cn2=$packets PanOSPacketsReceived=$pkts_received PanOSPacketsSent=$pkts_sent start=$cef-formattedtime_ generated cn3Label=Elapsed time in seconds cn3=$elapsed cs2Label=URL Category cs2=$category externalId=$seqno
Threat--
content_copy zoom_out_mapCEF:0|Palo Alto Networks|PAN-OS|6.0.0|$subtype|$type|$number-of-severity|rt=$cefformatted- receive_time deviceExternalId=$serial src=$src dst=$dst sourceTranslatedAddress=$natsrc destinationTranslatedAddress=$natdst cs1Label=Rule cs1=$rule suser=$srcuser duser=$dstuser app=$app cs3Label=Virtual System cs3=$vsys cs4Label=Source Zone cs4=$from cs5Label=Destination Zone cs5=$to deviceInboundInterface=$inbound_if deviceOutboundInterface=$outbound_if cs6Label=LogProfile cs6=$logset cn1Label=SessionID cn1=$sessionid cnt=$repeatcnt spt=$sport dpt=$dport sourceTranslatedPort=$natsport destinationTranslatedPort=$natdport flexString1Label=Flags flexString1=$flags proto=$proto act=$action request=$misc cs2Label=URL Category cs2=$category flexString2Label=Direction flexString2=$direction externalId=$seqno requestContext=$contenttype cat=$threatid filePath=$cloud fileId=$pcap_id fileHash=$filedigest
Config--
content_copy zoom_out_mapCEF:0|Palo Alto Networks|PAN-OS|6.0.0|$result|$type|1|rt=$cef-formatted-receive_time deviceExternalId=$serial dvchost=$host cs3Label=Virtual System cs3=$vsys act=$cmd duser=$admin destinationServiceName=$client msg=$path externalId=$seqno
Optional:--
content_copy zoom_out_mapcs1Label=Before Change Detail cs1=$before-change-detail cs2Label=After Change Detail cs2=$after-change-detail
System--
content_copy zoom_out_mapCEF:0|Palo Alto Networks|PAN-OS|6.0.0|$subtype|$type|$number-of-severity|rt=$cefformatted- receive_time deviceExternalId=$serial cs3Label=Virtual System cs3=$vsys fname=$object flexString2Label=Module flexString2=$module msg=$opaque externalId=$seqno cat=$eventid
HIP Match--
content_copy zoom_out_mapCEF:0|Palo Alto Networks|PAN-OS|6.0.0|$matchtype|$type|1|rt=$cef-formattedreceive_ time deviceExternalId=$serial suser=$srcuser cs3Label=Virtual System cs3=$vsys shost=$machinename src=$src cnt=$repeatcnt externalId=$seqno cat=$matchname cs2Label=Operating System cs2=$os
For more information about Syslog configuration, see the PAN-OS Administrator's Guide on the Palo Alto Networks website (https://www.paloaltonetworks.com).
TLS Syslog log source parameters for Palo Alto PA Series
If JSA does not automatically detect the log source, add a Palo Alto PA Series log source on the JSA Console by using the TLS Syslog protocol.
When you use the TLS Syslog protocol, there are specific parameters that you must configure.
The following table describes the parameters that require specific values to collect TLS Syslog events from Palo Alto PA Series:
Parameter | Value |
---|---|
Log Source type | Palo Alto PA Series |
Protocol Configuration | TLS Syslog |
Log Source Identifier | An IP address or hostname to identify the log source. |
For a complete list of TLS Syslog protocol parameters and their values, see TLS Syslog Protocol Configuration Options.
Palo Alto PA Series Sample Event Message
Use these sample event messages as a way of verifying a successful integration with JSA.
Due to formatting issues, paste the message format into a text editor and then remove any carriage return or line feed characters.
Palo Alto PA Series sample message when you use the Syslog protocol
Sample 1: The following sample event message shows PAN-OS events for a trojan threat event.
<180>May 6 16:43:53 paloalto.paseries.test LEEF:1.0| Palo Alto Networks|PAN-OS Syslog Integration|8.1.6|trojan/ PDF.gen.eiez(268198686)|ReceiveTime=2019/05/06 16:43:53|SerialNumber=001801010877|cat=THREAT| Subtype=virus|devTime=May 06 2019 11:13:53 GMT|src=10.2.75.41|dst=192.168.178.180| srcPostNAT=192.168.68.141|dstPostNAT=192.168.178.180|RuleName=Test-1|usrName=qradar\\user1| SourceUser=qradar\\user1|DestinationUser=|Application=web-browsing|VirtualSystem=vsys1| SourceZone=INSIDE-ZN|DestinationZone=OUTSIDE-ZN|IngressInterface=ethernet1/1| EgressInterface=ethernet1/3|LogForwardingProfile=testForwarder|SessionID=3012|RepeatCount=1| srcPort=63508|dstPort=80|srcPostNATPort=31539|dstPostNATPort=80|Flags=0x406000|proto=tcp| action=alert|Miscellaneous=\"qradar.example.test/du/uploads/08052018_UG_FAQ.pdf\"| ThreatID=trojan/PDF.gen.eiez(268198686)|URLCategory=educational-institutions|sev=3| Severity=medium|Direction=server-to-client|sequence=486021038|ActionFlags=0xa000000000000000| SourceLocation=10.0.0.0-10.255.255.255|DestinationLocation=testPlace|ContentType=| PCAP_ID=0|FileDigest=|Cloud=|URLIndex=5|RequestMethod=|Subject=|DeviceGroupHierarchyL1=12| DeviceGroupHierarchyL2=0|DeviceGroupHierarchyL3=0|DeviceGroupHierarchyL4=0|vSrcName=| DeviceName=testName|SrcUUID=|DstUUID=|TunnelID=0|MonitorTag=|ParentSessionID=0|ParentStartTime=| TunnelType=N/A|ThreatCategory=pdf|ContentVer=Antivirus-2969-3479
JSA field name | Highlighted payload fields |
---|---|
Event ID | The Event ID value is 268198686. Note: Usually the Event ID field from the LEEF header is used. However, for certain event types, more LEEF fields or custom fields such as Subtype, and action might be used to form a unique event ID. |
Category | PA Series Threat Note: The value of the cat field is not used directly as the Category of the event. The value of this field is used to determine a predefined set of category values. For certain event types, more LEEF fields or custom fields can be used to form a unique event Category. |
Device Time | devTime |
Source IP | src |
Destination IP | dst |
Source Port | srcPort |
Destination Port | dstPort |
Post NAT Source IP | srcPostNAT |
Post NAT Destination IP | dstPostNAT |
Post NAT Soure Port | srcPostNATPort |
Post NAT Destination Port | dstPostNATPort |
Protocol | proto |
Sample 2: The following sample event message shows a Prisma event where a session is allowed by a policy.
<14>1 2021-10-26T13:56:21.887Z paloalto.paseries.test logforwarder - panwlogs - LEEF:2.0|Palo Alto Networks|Prisma Access|2.1|allow| | TimeReceived=2021-10-26T13:56:20.000000Z DeviceSN=no-serial cat=traffic SubType=start ConfigVersion=10.0 devTime=2021-10-26T13:56:17.000000Z src=192.168.21.100 dst=172.16.0.3 srcPostNAT=172.16.0.4 dstPostNAT=172.16.0.5 Rule=CG-RN-Guest-to-Internet usrName= DestinationUser= Application=web-browsing VirtualLocation=vsys1 FromZone=FromZone ToZone=untrust InboundInterface=tunnel.101 OutboundInterface=ethernet1/1 LogSetting=to- Cortex-Data-Lake SessionID=49934 RepeatCount=1 srcPort=59532 dstPort=80 sr=49718 dstPostNATPort=80 proto=tcp Bytes=374 srcBytes=300 dstBytes=74 totalPackets=4 SessionStartTime=2021-10-26T13:56:15.000000Z SessionDuration=0 URLCategory=any SequenceNo=13336648 SourceLocation=192.168.0.0-192.168.255.255 DestinationLocation=CA srcPackets=3 dstPackets=1 SessionEndReason=na DGHierarchyLevel1=62 DGHierarchyLevel2=38 DGHierarchyLevel3=53 DGHierarchyLevel4=0 VirtualSystemName= DeviceName=DeviceName ActionSource=frompolicy SourceUUID= DestinationUUID= IMSI=0 IMEI= ParentSessionID=0 ParentStarttime=1970-01-01T00:00:00.000000Z Tunnel=N/A EndpointAssociationID=0 ChunksTotal=0 ChunksSent=0 ChunksReceived=0 RuleUUID=00000000-0000-0000-0000-000000000000 HTTP2Connection=0 LinkChangeCount=0 SDWANPolicyName= LinkSwitches= SDWANCluster= SDWANDeviceType= SDWANClusterType= SDWANSite= DynamicUserGroupName= XForwarded- ForIP= SourceDeviceCategory= SourceDeviceProfile= SourceDeviceModel= SourceDeviceVendor= SourceDeviceOSFamily= SourceDeviceOSVersion= SourceDeviceHost= SourceDeviceMac= DestinationDeviceCategory= DestinationDeviceProfile= DestinationDeviceModel= DestinationDeviceVendor= DestinationDeviceOSFamily= DestinationDeviceOSVersion= DestinationDeviceHost= DestinationDeviceMac= ContainerID= ContainerNameSpace= ContainerName= SourceEDL= DestinationEDL= GPHostID= EndpointSerialNumber= SourceDynamicAddressGroup= DestinationDynamicAddressGroup= HASessionOwner= TimeGeneratedHighResolution=2021-10-26T13:56:17.911000Z NSSAINetworkSliceType= NSSAINetworkSliceDifferentiator= devTimeFormat=YYYY-MM-DD'T'HH:mm:ss.SSSZ
JSA field name | Highlighted payload fields |
---|---|
Event ID | The Event ID value is allow. |
Event Category | PA Series Traffic Note: The value of the cat field is not used directly as the Category of the event. The value of this field is used to determine a predefined set of category values. For certain event types, more LEEF fields or custom fields can be used to form a unique event Category. |
Device Time | devTime |
Source IP | src |
Destination IP | dst |
Source Port | srcPort |
Destination Port | dstPort |
Post NAT Source IP | srcPostNAT |
Post NAT Destination IP | dstPostNAT |
Post NAT Soure Port | sr |
Post NAT Destination Port | dstPostNATPort |
Protocol | proto |
Palo Alto PA Series sample message when you use the TLS Syslog protocol
The following sample event message shows Next Generation Firewall events for version 10.1.
<14>1 2021-08-09T14:00:26.364Z paloalto.paseries.test logforwarder - panwlogs - LEEF:2.0|Palo Alto Networks|Next Generation Firewall|10.1|drop-all| | TimeReceived=2021-08-09T14:00:25.000000Z DeviceSN=001011000011111 cat=gtp SubType=end ConfigVersion=10.1 devTime=2021-08-09T14:00:22.000000Z src=fc00:0:e426:5678:b202:b3ff:fe1e:8329 dst=fc00:5678:90aa:cc33:f202:b3ff:fe1e:8329 srcPostNAT=10.5.5.5 dstPostNAT=192.168.178.180 Rule=allow-all-employees usrName=paloaltonetwork\testUser DestinationUser=paloaltonetwork\tUser Application=adobe-cq VirtualLocation=aaaa1 FromZone=corporate ToZone=corporate InboundInterface=ethernet1/1 OutboundInterface=ethernet1/3 LogSetting=rs-logging SessionID=1111111 RepeatCount=1 srcPort=10273 dstPort=27624 srcPostNATPort=26615 dstPostNATPort=6501 proto=tcp TunnelEventType=51 MobileSubscriberISDN= AccessPointName= RadioAccessTechnology=11 TunnelMessageType=0 MobileIP= TunnelEndpointID1=0 TunnelEndpointID2=0 TunnelInterface=0 TunnelCauseCode=0 VendorSeverity=Unused MobileCountryCode=0 MobileNetworkCode=0 MobileAreaCode=0 MobileBaseStationCode=0 TunnelEventCode=0 SequenceNo=1111111111111111111 SourceLocation=NB DestinationLocation=saint john DGHierarchyLevel1=12 DGHierarchyLevel2=0 DGHierarchyLevel3=0 DGHierarchyLevel4=0 VirtualSystemName= DeviceName=PA-VM IMSI=28 IMEI=datacenter ParentSessionID=1111111 ParentStarttime=1970-01-01T00:00:00.000000Z Tunnel=tunnel Bytes=741493 srcBytes=277595 dstBytes=463898 totalPackets=1183 srcPackets=554 dstPackets=629 PacketsDroppedMax=58 PacketsDroppedProtocol=34 PacketsDroppedStrict=171 PacketsDroppedTunnel=773 TunnelSessionsCreated=537 TunnelSessionsClosed=206 SessionEndReason=unknown ActionSource=unknown startTime=2021-08-09T13:59:51.000000Z SessionDuration=35 TunnelInspectionRule=gtp TunnelRemoteUserIP= TunnelRemoteIMSIID=0 RuleUUID=11a111aa-1a11-1a1a-11a1-1a11a11111a1 DynamicUserGroupName=dynug-4 ContainerID= ContainerNameSpace= ContainerName= SourceEDL= DestinationEDL= SourceDynamicAddressGroup= DestinationDynamicAddressGroup= TimeGeneratedHighResolution=2021-08-09T14:00:22.079000Z NSSAINetworkSliceDifferentiator=0 NSSAINetworkSliceType=0 ProtocolDataUnitsessionID=0 devTimeFormat=YYYY-MM-DDTHH:mm:ss.SSSSSSZ
JSA field name | Highlighted payload fields |
---|---|
Event ID | drop-all (LEEF header Event ID field) Note: Usually the Event ID field from the LEEF header is used. However, for certain event types, more LEEF fields or custom fields such as Subtype, and action might be used to form a unique event ID. |
Category | PA Series GTP Note: The value of the cat field is not used directly as the Category of the event. The value of this field is used to determine a predefined set of category values. For certain event types, more LEEF fields or custom fields can be used to form a unique event Category. |
Device Time | devTime |
Source IPv6 | src |
Destination IPv6 | dst |
Source Port | SrcPort |
Destination Port | dstPort |
Post NAT Source IP | srcPostNAT |
Post NAT Destination IP | dstPostNAT |
Post NAT Soure Port | srcPostNATPort |
Post NAT Destination Port | dstPostNATPort |
Protocol | tcp |
Username | usrName Note: If a username contains the domain as part of its value, the domain portion is removed and only the actual username portion is used. |