<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ingest GlobalProtect logs to Cortex in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/ingest-globalprotect-logs-to-cortex/m-p/1251298#M9226</link>
    <description>&lt;P&gt;Hi. We are ingest data from Paloalto Firewall which using GlobalProtect feature and now we need send logs through Broker Vm setup. We can't use native integrations so syslog is only option. We get data and i see that dataset is &amp;gt;&amp;nbsp;dataset = palo_alto_networks_lf_raw&amp;nbsp; and i notice that not work with example some detection rules, so that is not used really in a analytics. So i create parsing rule&amp;gt;&amp;nbsp;&amp;nbsp;[INGEST: vendor="paloalto", product="LF", target_dataset="palo_alto_networks_lf_raw"]&lt;BR /&gt;filter subtype = "globalprotect"&lt;BR /&gt;| alter _target_dataset = "panw_ngfw_globalprotect_raw";&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But it just create new dataset and not see any detection with GlobalProtect rules. So Here is documentation&amp;nbsp;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-5.x-Documentation/Ingest-Next-Generation-Firewall-logs-using-the-Syslog-collector?tocId=WKA70B3hiYYIN49A_l_SHw" target="_blank"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-5.x-Documentation/Ingest-Next-Generation-Firewall-logs-using-the-Syslog-collector?tocId=WKA70B3hiYYIN49A_l_SHw&lt;/A&gt;&amp;nbsp; &amp;nbsp;But now mention any GlobalProtect. So any ideas ?&lt;/P&gt;</description>
    <pubDate>Tue, 31 Mar 2026 13:34:09 GMT</pubDate>
    <dc:creator>T.Nurmi</dc:creator>
    <dc:date>2026-03-31T13:34:09Z</dc:date>
    <item>
      <title>Ingest GlobalProtect logs to Cortex</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/ingest-globalprotect-logs-to-cortex/m-p/1251298#M9226</link>
      <description>&lt;P&gt;Hi. We are ingest data from Paloalto Firewall which using GlobalProtect feature and now we need send logs through Broker Vm setup. We can't use native integrations so syslog is only option. We get data and i see that dataset is &amp;gt;&amp;nbsp;dataset = palo_alto_networks_lf_raw&amp;nbsp; and i notice that not work with example some detection rules, so that is not used really in a analytics. So i create parsing rule&amp;gt;&amp;nbsp;&amp;nbsp;[INGEST: vendor="paloalto", product="LF", target_dataset="palo_alto_networks_lf_raw"]&lt;BR /&gt;filter subtype = "globalprotect"&lt;BR /&gt;| alter _target_dataset = "panw_ngfw_globalprotect_raw";&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But it just create new dataset and not see any detection with GlobalProtect rules. So Here is documentation&amp;nbsp;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-5.x-Documentation/Ingest-Next-Generation-Firewall-logs-using-the-Syslog-collector?tocId=WKA70B3hiYYIN49A_l_SHw" target="_blank"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-5.x-Documentation/Ingest-Next-Generation-Firewall-logs-using-the-Syslog-collector?tocId=WKA70B3hiYYIN49A_l_SHw&lt;/A&gt;&amp;nbsp; &amp;nbsp;But now mention any GlobalProtect. So any ideas ?&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2026 13:34:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/ingest-globalprotect-logs-to-cortex/m-p/1251298#M9226</guid>
      <dc:creator>T.Nurmi</dc:creator>
      <dc:date>2026-03-31T13:34:09Z</dc:date>
    </item>
    <item>
      <title>Re: Ingest GlobalProtect logs to Cortex</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/ingest-globalprotect-logs-to-cortex/m-p/1251508#M9231</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1602113155"&gt;@T.Nurmi&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="167" data-start="0"&gt;Ingesting GlobalProtect logs through the Broker VM Syslog collector is not officially supported for the purpose of automatic parsing and standard analytics detections.&lt;/P&gt;
&lt;P data-end="167" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 data-end="209" data-start="169" data-section-id="1xpkkzl"&gt;Why Your Parsing Rule is Not Working:&lt;/H4&gt;
&lt;P data-end="612" data-start="210"&gt;The parsing rule you created simply moves raw data from one dataset name to another. However, detection rules and the Analytics engine require data to be normalized into specific fields (e.g., source user, public IP, event status) according to a predefined schema. Moving unparsed strings into &lt;CODE data-end="533" data-start="504"&gt;panw_ngfw_globalprotect_raw&lt;/CODE&gt; does not trigger detections because the fields remain unmapped in the raw log.&lt;/P&gt;
&lt;H4 data-end="658" data-start="614" data-section-id="1qer7lb"&gt;Recommended Solution: Native Integration:&lt;/H4&gt;
&lt;P data-end="965" data-start="659"&gt;The only officially supported method to populate the &lt;CODE data-end="741" data-start="712"&gt;panw_ngfw_globalprotect_raw&lt;/CODE&gt; dataset and enable associated GlobalProtect analytics/BIOCs is via the Native Next-Generation Firewall data collector (utilizing CLCS/Strata Logging Service). This method automatically handles all parsing and normalization.&lt;/P&gt;
&lt;H4 data-end="1014" data-start="967" data-section-id="12rlr2b"&gt;Workaround: Custom CEF Format:&lt;/H4&gt;
&lt;P data-end="1198" data-start="1015"&gt;If you cannot use native integration, you must configure a specific Custom Log Format on your Firewall's Syslog Server Profile to ensure the Broker VM and XDR can identify the fields.&lt;/P&gt;
&lt;P data-end="1210" data-start="1200"&gt;&lt;STRONG data-end="1210" data-start="1200"&gt;Steps:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL data-end="1446" data-start="1211"&gt;
&lt;LI data-end="1286" data-start="1211" data-section-id="1vbgrdx"&gt;On the Firewall/Panorama, go to &lt;STRONG data-end="1283" data-start="1246"&gt;Device &amp;gt; Server Profiles &amp;gt; Syslog&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI data-end="1362" data-start="1287" data-section-id="10j463j"&gt;Select your Broker VM profile and go to the &lt;STRONG data-end="1355" data-start="1334"&gt;Custom Log Format&lt;/STRONG&gt; tab.&lt;/LI&gt;
&lt;LI data-end="1446" data-start="1363" data-section-id="1odjvhv"&gt;For the &lt;STRONG data-end="1391" data-start="1374"&gt;GlobalProtect&lt;/STRONG&gt; log type, paste the following (ensure no line breaks):&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="relative w-full mt-4 mb-1"&gt;
&lt;DIV class=""&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="border border-token-border-light border-radius-3xl corner-superellipse/1.1 rounded-3xl"&gt;
&lt;DIV class="h-full w-full border-radius-3xl bg-token-bg-elevated-secondary corner-superellipse/1.1 overflow-clip rounded-3xl lxnfua_clipPathFallback"&gt;
&lt;DIV class="w-full overflow-x-hidden overflow-y-auto pe-11 pt-3"&gt;
&lt;DIV class="relative z-0 flex max-w-full"&gt;
&lt;DIV id="code-block-viewer" class="q9tKkq_viewer cm-editor z-10 light:cm-light dark:cm-light flex h-full w-full flex-col items-stretch ͼ5 ͼj" dir="ltr"&gt;
&lt;DIV class="cm-scroller"&gt;
&lt;DIV class="cm-content q9tKkq_readonly"&gt;&lt;SPAN&gt;CEF:0|PANW|NGFW_CEF|$sender_sw_version|$type|$subtype|5|rt=$receive_time PanOSDeviceSN=$serial PanOSLogTimeStamp=$time_generated PanOSVirtualSystem=$vsys PanOSEventID=$eventid PanOSStage=$stage PanOSAuthMethod=$auth_method PanOSTunnelType=$tunnel_type PanOSSourceUserName=$srcuser PanOSSourceRegion=$srcregion PanOSEndpointDeviceName=$machinename PanOSPublicIPv4=$public_ip PanOSPublicIPv6=$public_ipv6 PanOSPrivateIPv4=$private_ip PanOSPrivateIPv6=$private_ipv6 PanOSHostID=$hostid PanOSDeviceSN=$serialnumber PanOSGlobalProtectClientVersion=$client_ver PanOSEndpointOSType=$client_os PanOSEndpointOSVersion=$client_os_ver PanOSCountOfRepeats=$repeatcnt PanOSQuarantineReason=$reason PanOSConnectionError=$error PanOSDescription=$opaque PanOSEventStatus=$status PanOSGPGatewayLocation=$location PanOSLoginDuration=$login_duration PanOSConnectionMethod=$connect_method PanOSConnectionErrorID=$error_code PanOSPortal=$portal PanOSSequenceNo=$seqno PanOSActionFlags=$actionflags PanOSTimeGeneratedHighResolution=$high_res_timestamp PanOSGatewaySelectionType=$selection_type PanOSSSLResponseTime=$response_time PanOSGatewayPriority=$priority PanOSAttemptedGateways=$attempted_gateways PanOSGateway=$gateway&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class=""&gt;
&lt;H4&gt;&lt;SPAN&gt;&lt;BR /&gt;Important Notes:&lt;/SPAN&gt;&lt;/H4&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;UL data-is-only-node="" data-is-last-node="" data-end="3069" data-start="2681"&gt;
&lt;LI data-end="2791" data-start="2681" data-section-id="1r723du"&gt;This format identifies the vendor as PANW and product as NGFW_CEF, which triggers the standard XDR parser.&lt;/LI&gt;
&lt;LI data-end="2993" data-start="2792" data-section-id="q81czf"&gt;Even with this format, some Behavioral Indicators of Compromise (BIOCs) or Analytics rules may still fail to trigger if they rely on enriched or stitched data only available via native integration.&lt;/LI&gt;
&lt;LI data-is-last-node="" data-end="3069" data-start="2994" data-section-id="kw9oi7"&gt;Ensure your Broker VM Syslog Applet is set to &lt;STRONG data-end="3049" data-start="3042"&gt;CEF&lt;/STRONG&gt; or &lt;STRONG data-end="3068" data-start="3053"&gt;Auto-detect&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking &lt;STRONG&gt;like&lt;/STRONG&gt; and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution"&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2026 14:23:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/ingest-globalprotect-logs-to-cortex/m-p/1251508#M9231</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-04-03T14:23:09Z</dc:date>
    </item>
  </channel>
</rss>

