<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Log forwarding from Cloud NGFW in Azure to Log Analytics Workspace for Sentinel in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/log-forwarding-from-cloud-ngfw-in-azure-to-log-analytics/m-p/1243302#M2412</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="134" data-end="219"&gt;I’m planning to replace Azure Firewall with Cloud NGFW in Azure, managed through SCM.&lt;/P&gt;
&lt;P data-start="134" data-end="219"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="221" data-end="389"&gt;In addition to using Strata Logging Service (SLS), we also need to forward firewall logs to an Azure Log Analytics Workspace for Microsoft Sentinel (SIEM/SOAR).&lt;/P&gt;
&lt;P data-start="221" data-end="389"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="391" data-end="456"&gt;Based on my research, there appear to be two possible approaches:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Option 1 -&amp;nbsp;Cloud NGFW for Azure and Sentinel Integration&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-articles/cloud-ngfw-for-azure-and-sentinel-integration/ta-p/1221654" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-articles/cloud-ngfw-for-azure-and-sentinel-integration/ta-p/1221654&lt;/A&gt;&lt;/P&gt;
&lt;P data-start="613" data-end="801"&gt;This option looks ideal because Cloud NGFW logs would be sent directly to a Log Analytics Workspace inside the Azure environment, without additional configuration or external dependencies.&lt;/P&gt;
&lt;P data-start="613" data-end="801"&gt;However, I would like to confirm if this integration also apply when Cloud NGFW is managed by SCM.(not using local rule stack).&lt;/P&gt;
&lt;P data-start="613" data-end="801"&gt;Also wondering if the Cloud NGFW can forward specic logs (e.g. forward traffic/threat logs only, not URL/decryption logs).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Option 2 -&amp;nbsp;Setup Forwarding to Microsoft Sentinel&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/prisma-access/integration/microsoft-integrations-with-prisma-access/set-up-syslog-forwarding-to-microsoft-sentinel" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/prisma-access/integration/microsoft-integrations-with-prisma-access/set-up-syslog-forwarding-to-microsoft-sentinel&lt;/A&gt;&lt;/P&gt;
&lt;P data-start="1181" data-end="1290"&gt;This option is documented under Prisma Access, so I’m unsure if it also applies to Cloud NGFW managed by SCM.&lt;/P&gt;
&lt;P data-start="1292" data-end="1502"&gt;I would prefer to avoid this approach because I assume traffic flow is inefficient:&lt;BR data-start="1367" data-end="1370" /&gt;Cloud NGFW → SLS (over the Internet) → Sentinel (over the Internet)&lt;/P&gt;
&lt;P data-start="1292" data-end="1502"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Given these considerations, which option would be best for an SCM-managed Cloud NGFW deployment?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 09 Dec 2025 01:06:36 GMT</pubDate>
    <dc:creator>A.Hwang</dc:creator>
    <dc:date>2025-12-09T01:06:36Z</dc:date>
    <item>
      <title>Log forwarding from Cloud NGFW in Azure to Log Analytics Workspace for Sentinel</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/log-forwarding-from-cloud-ngfw-in-azure-to-log-analytics/m-p/1243302#M2412</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="134" data-end="219"&gt;I’m planning to replace Azure Firewall with Cloud NGFW in Azure, managed through SCM.&lt;/P&gt;
&lt;P data-start="134" data-end="219"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="221" data-end="389"&gt;In addition to using Strata Logging Service (SLS), we also need to forward firewall logs to an Azure Log Analytics Workspace for Microsoft Sentinel (SIEM/SOAR).&lt;/P&gt;
&lt;P data-start="221" data-end="389"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="391" data-end="456"&gt;Based on my research, there appear to be two possible approaches:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Option 1 -&amp;nbsp;Cloud NGFW for Azure and Sentinel Integration&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-articles/cloud-ngfw-for-azure-and-sentinel-integration/ta-p/1221654" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-articles/cloud-ngfw-for-azure-and-sentinel-integration/ta-p/1221654&lt;/A&gt;&lt;/P&gt;
&lt;P data-start="613" data-end="801"&gt;This option looks ideal because Cloud NGFW logs would be sent directly to a Log Analytics Workspace inside the Azure environment, without additional configuration or external dependencies.&lt;/P&gt;
&lt;P data-start="613" data-end="801"&gt;However, I would like to confirm if this integration also apply when Cloud NGFW is managed by SCM.(not using local rule stack).&lt;/P&gt;
&lt;P data-start="613" data-end="801"&gt;Also wondering if the Cloud NGFW can forward specic logs (e.g. forward traffic/threat logs only, not URL/decryption logs).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Option 2 -&amp;nbsp;Setup Forwarding to Microsoft Sentinel&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/prisma-access/integration/microsoft-integrations-with-prisma-access/set-up-syslog-forwarding-to-microsoft-sentinel" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/prisma-access/integration/microsoft-integrations-with-prisma-access/set-up-syslog-forwarding-to-microsoft-sentinel&lt;/A&gt;&lt;/P&gt;
&lt;P data-start="1181" data-end="1290"&gt;This option is documented under Prisma Access, so I’m unsure if it also applies to Cloud NGFW managed by SCM.&lt;/P&gt;
&lt;P data-start="1292" data-end="1502"&gt;I would prefer to avoid this approach because I assume traffic flow is inefficient:&lt;BR data-start="1367" data-end="1370" /&gt;Cloud NGFW → SLS (over the Internet) → Sentinel (over the Internet)&lt;/P&gt;
&lt;P data-start="1292" data-end="1502"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Given these considerations, which option would be best for an SCM-managed Cloud NGFW deployment?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 01:06:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/log-forwarding-from-cloud-ngfw-in-azure-to-log-analytics/m-p/1243302#M2412</guid>
      <dc:creator>A.Hwang</dc:creator>
      <dc:date>2025-12-09T01:06:36Z</dc:date>
    </item>
  </channel>
</rss>

