<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Cloud NGFW for Azure and Sentinel Integration in Cloud NGFW for Azure Articles</title>
    <link>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-articles/cloud-ngfw-for-azure-and-sentinel-integration/ta-p/1221654</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Title_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66170i96BAEDD72B3CB0D1/image-size/large?v=v2&amp;amp;px=999" role="button" title="Title_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" alt="Title_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Background&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Cloud NGFW for Azure&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;Cloud NGFW for Azure by Palo Alto Networks is a Native ISV service that enables advanced protection for applications and workloads running in Azure. It offers application-level control, intrusion prevention, URL filtering, and more. Cloud NGFW can identify and control network traffic based on applications, users, content, and other deep packet inspection methods helping secure inbound, outbound, and lateral traffic flows. It is built to provide first-party experience in Microsoft Azure by natively integrating into Azure Portal leveraging Entra ID and Azure Resource Manager. Cloud NGFW resources and its attributes can be accessed using Azure APIs including AzureRM Terraform provider, Azure CLI, and PowerShell.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 1_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66157i10A39DB0E3A409F0/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 1_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" alt="Fig 1_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For logging and monitoring, Cloud NGFW supports forwarding the firewall logs to Log Analytics Workspace. This enables operators to store TRAFFIC, THREAT, and DECRYPTION logs and leverage them within Azure and external systems. Logs can be exported to &lt;/SPAN&gt;&lt;STRONG&gt;Azure Storage&lt;/STRONG&gt;&lt;SPAN&gt; for backup or to keep longer-term data that doesn’t need to be in Log Analytics. Logs can also be exported to third-party Security Information and Event Management (SIEM) tools for further analysis if you are using a solution outside of Azure.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Sentinel&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;Azure offers its own cloud-native SIEM&lt;/SPAN&gt;&lt;STRONG&gt; Sentinel&lt;/STRONG&gt;&lt;SPAN&gt; which takes full advantage of cloud scalability, flexibility, and integration with other Microsoft and third-party services.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Sentinel can ingest data from various network security devices such as firewalls, IDS/IPS systems, VPN logs, and proxy servers. It analyzes traffic patterns and network activities to detect suspicious behaviors (e.g., unusual inbound/outbound traffic, and malware communication attempts).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 2_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66158iF66BD178DAEB4820/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 2_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" alt="Fig 2_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Sentinel uses built-in analytics to detect threats like brute-force attacks, port scans, DDoS attempts, and network anomalies. It combines this with intelligence from both Microsoft and third-party threat feeds to improve detection capabilities.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Cloud NGFW Integration with Sentinel&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cloud NGFW for Azure integration is included in &lt;/SPAN&gt;&lt;A href="https://github.com/Azure/Azure-Sentinel/tree/master/Solutions" target="_blank"&gt;&lt;SPAN&gt;Sentinel Solutions&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; allowing operators to map the Log Analytics Workspace containing the firewall logs and ingest them into Sentinel.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Who is it for?&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;Customers who are looking to use Sentinel for incident management and response and have deployed Cloud NGFW to secure applications and workloads deployed within Microsoft Azure environments.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;What are the benefits of this solution?&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;The solution offers native ingestion of Cloud NGFW firewall logs into Sentinel and enables operators to easily use and build workbooks, hunting queries, and analytics rules to improve incident investigation and proactive threat hunting.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;How to get it?&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;The solution can be found in the &lt;/SPAN&gt;&lt;A href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/paloaltonetworks.cloudngfw-sentinel-solution?tab=overview" target="_blank"&gt;&lt;SPAN&gt;Azure Marketplace&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; and includes the following:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 3_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66159i4468C605A486296A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 3_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" alt="Fig 3_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;What does it include?&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;3 Analytic Rules for surfacing threats that are detected by CloudNGFW&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;2 Hunting Queries for identifying potential security issues that may not be classified as direct threats&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;And 2 Workbooks for visualizing the data that is processed by Cloud NGFW&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Workbooks&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;The &lt;/SPAN&gt;&lt;STRONG&gt;Overview&lt;/STRONG&gt;&lt;SPAN&gt; workbook helps gain insights and comprehensive monitoring into Azure Cloud NGFW by Palo Alto Networks by analyzing traffic and activities. This workbook correlates all Palo Alto data with threat events to identify suspicious entities and relationships. You can learn about trends across user and data traffic, drill down into threat logs, and filter results.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Vulnerability events over time:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 4_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66160i3F1FC9BF143B5DEA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 4_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" alt="Fig 4_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Traffic events and actions:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 5_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66161i1F2C62D5CDA34F67/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 5_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" alt="Fig 5_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;URL Filtering summaries:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 6_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66162i48F2600A4D00328D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 6_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" alt="Fig 6_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Network Threats &lt;/STRONG&gt;&lt;SPAN&gt;Workbook includes multiple dashboards analyzing threat events. It correlates data between threats, applications, and time. It allows for easy tracking of malware, vulnerability, and virus activity detected and recorded by Cloud NGFW.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Network threats by type and severity:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 7_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66163i36F440F9936F00CF/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 7_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" alt="Fig 7_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 8_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66164i4A505BF856B23083/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 8_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" alt="Fig 8_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Vulnerability events:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 9_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" style="width: 872px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66165iFFEE3C550279C88B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 9_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" alt="Fig 9_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Threat events:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 10_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66166i77F9A4C5A079B4E2/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 10_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" alt="Fig 10_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Analytics Rules&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;The offer includes the following analytics rules.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 11_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66167iC9E927D280E2EE6A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 11_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" alt="Fig 11_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Possible internal to external port scanning&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;Identifies a list of internal Source IPs (10.x.x.x Hosts) that have triggered 10 or more non-graceful TCP server resets from one or more Destination IPs which results in an "app = incomplete" designation. The server resets coupled with an "Incomplete" app designation can be an indication of internal to external port scanning or probing attack. Once the rule threshold is met an incident will be created automatically.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 12_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66168iE97C962169C23EC0/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 12_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" alt="Fig 12_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Users may also configure an automated response triggered by the alert.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Potential beaconing&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Identifies beaconing patterns from Palo Alto Network traffic logs based on recurrent timedelta patterns.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The query leverages various KQL functions to calculate time deltas and then compares it with total events observed in a day to find percentage of beaconing.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This outbound beaconing pattern to untrusted public networks should be investigated for any malware callbacks or data exfiltration attempts.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Reference Blog:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="http://www.austintaylor.io/detect/beaconing/intrusion/detection/system/command/control/flare/elastic/stack/2017/06/10/detect-beaconing-with-flare-elasticsearch-and-intrusion-detection-systems/" target="_blank"&gt;http://www.austintaylor.io/detect/beaconing/intrusion/detection/system/command/control/flare/elastic/stack/2017/06/10/detect-beaconing-with-flare-elasticsearch-and-intrusion-detection-systems/&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/detect-network-beaconing-via-intra-request-time-delta-patterns/ba-p/779586" target="_blank"&gt;https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/detect-network-beaconing-via-intra-request-time-delta-patterns/ba-p/779586&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Threats from unusual IPs&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Identifies Palo Alto Threat signatures from unusual IP addresses which are not historically seen.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This detection is also leveraged and required for MDE and PAN Fusion scenario&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs.microsoft.com/Azure/sentinel/fusion-scenario-reference#network-request-to-tor-anonymization-service-followed-by-anomalous-traffic-flagged-by-palo-alto-networks-firewall" target="_blank"&gt;https://docs.microsoft.com/Azure/sentinel/fusion-scenario-reference#network-request-to-tor-anonymization-service-followed-by-anomalous-traffic-flagged-by-palo-alto-networks-firewall&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Hunting Queries&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;High-risk ports&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Identifies network connections whose ports are frequent targets of attacks and should not cross network boundaries or reach untrusted public networks.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Consider updating the firewall policies to block the connections.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Potential beaconing&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Identifies beaconing patterns from PAN traffic logs based on recurrent timedelta patterns.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Reference Blog:&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/detect-network-beaconing-via-intra-request-time-delta-patterns/ba-p/779586" target="_blank"&gt;https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/detect-network-beaconing-via-intra-request-time-delta-patterns/ba-p/779586&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 13_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66169i3668D1E40B6B05DC/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 13_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" alt="Fig 13_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Mon, 24 Feb 2025 17:31:31 GMT</pubDate>
    <dc:creator>abudilovskiy</dc:creator>
    <dc:date>2025-02-24T17:31:31Z</dc:date>
    <item>
      <title>Cloud NGFW for Azure and Sentinel Integration</title>
      <link>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-articles/cloud-ngfw-for-azure-and-sentinel-integration/ta-p/1221654</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Cloud NGFW for Azure by Palo Alto Networks is a Native ISV service that enables advanced protection for applications and workloads running in Azure. It offers application-level control, intrusion prevention, URL filtering, and more. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Title_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66172i52DA2D60743378E3/image-size/large?v=v2&amp;amp;px=999" role="button" title="Title_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" alt="Title_CNGFW Azure and Sentinel Integration_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 17:31:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-articles/cloud-ngfw-for-azure-and-sentinel-integration/ta-p/1221654</guid>
      <dc:creator>abudilovskiy</dc:creator>
      <dc:date>2025-02-24T17:31:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cloud NGFW for Azure and Sentinel Integration</title>
      <link>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-articles/cloud-ngfw-for-azure-and-sentinel-integration/tac-p/1243382#M26</link>
      <description>&lt;P&gt;Is this sloution applicable when the Cloud NGFW is managed by SCM?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Dec 2025 23:54:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-articles/cloud-ngfw-for-azure-and-sentinel-integration/tac-p/1243382#M26</guid>
      <dc:creator>A.Hwang</dc:creator>
      <dc:date>2025-12-08T23:54:12Z</dc:date>
    </item>
  </channel>
</rss>

