<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article SOC Duck in Log Forwarding Articles</title>
    <link>https://live.paloaltonetworks.com/t5/log-forwarding-articles/soc-duck/ta-p/281590</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Duck 1.jpg" style="width: 327px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20907i4A77ED4E8C0F2F98/image-dimensions/327x261/is-moderation-mode/true?v=v2" width="327" height="261" role="button" title="Duck 1.jpg" alt="Duck 1.jpg" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Duck 2.jpg" style="width: 371px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20908iCA9BFA9B6C3AD5DC/image-dimensions/371x262/is-moderation-mode/true?v=v2" width="371" height="262" role="button" title="Duck 2.jpg" alt="Duck 2.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Description:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Build your own visual alert DUCKhickey that integrates with the Palo Alto Networks platform using the HTTP Log Forwarding feature in PAN-OS 8.X and above. I configured the SOC Duck in the Black Hat NOC to trigger and light up with threat alerts. The alerts are configurable for how and when the SOC Duck is triggered.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Purpose:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;This is for experimental purposes only—to create a cool &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN style="font-weight: 400;"&gt;thing&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN style="font-weight: 400;"&gt;. This is not intended to be used in a production environment and is supported as best effort. If you happen to make this production ready or utilize this in your Operations Center, please let us know!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Components List:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;If you attended the Black Hat USA conference in 2019, then you would have received a kit of components from the Palo Alto Networks booth in the Expo Hall. If you want to build your own then here is what you will need to get started:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;"&gt;&lt;SPAN style="font-weight: 400;"&gt;Sacrificial Rubber Ducky&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;"&gt;&lt;SPAN style="font-weight: 400;"&gt;ESP32 Development Board&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;"&gt;&lt;SPAN style="font-weight: 400;"&gt;LEDs&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;"&gt;&lt;SPAN style="font-weight: 400;"&gt;Arduino IDE Open-source Software&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Getting Started:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;If you are brand new to Arduino and need a kick-start on how to get the things to connect &lt;/SPAN&gt;&lt;A title="Arduino core for the ESP32 | GitHub | Palo Alto Networks" href="https://github.com/espressif/arduino-esp32" target="_blank" rel="noopener"&gt;&lt;SPAN style="font-weight: 400;"&gt;START HERE&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="font-weight: 400;"&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.espressif.com/projects/esp-idf/en/latest/get-started/" target="_blank" rel="noopener"&gt;&lt;SPAN style="font-weight: 400;"&gt;Official Documentation for ESP-IDF (Espressif IoT Development Framework)&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Flash the Firmware:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Once you are able to establish communication with your ESP32 development board then upload &lt;/SPAN&gt;&lt;A title="Code for Black Hat Projects | GitHub | Palo Alto Network" href="https://github.com/PaloAltoNetworks/BlackHat" target="_blank" rel="noopener"&gt;&lt;SPAN style="font-weight: 400;"&gt;this firmware &lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="font-weight: 400;"&gt;to it. This will set up the ESP32 as an HTTP web server. Follow the README in order to get this set up successfully.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Duck 3.jpg" style="width: 414px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20909i754DC1910523E00B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Duck 3.jpg" alt="Duck 3.jpg" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-OS Configuration:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Within the Palo Alto Networks web interface, navigate to &lt;/SPAN&gt;&lt;STRONG&gt;Device &amp;gt; HTTP&lt;/STRONG&gt;&lt;SPAN style="font-weight: 400;"&gt; and add an HTTP Server Profile:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Duck 4.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20910iE4E5124BFB9B86ED/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Duck 4.jpg" alt="Duck 4.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Name: &lt;/STRONG&gt;&lt;SPAN style="font-weight: 400;"&gt;Give it a wicked cool name or you can use what I have &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Address: &lt;/STRONG&gt;&lt;SPAN style="font-weight: 400;"&gt;You will input the IP address that the ESP32 displays within the IDE serial monitor&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Protocol: &lt;/STRONG&gt;&lt;SPAN style="font-weight: 400;"&gt;HTTP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Port: &lt;/STRONG&gt;&lt;SPAN style="font-weight: 400;"&gt;80&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;TLS: &lt;/STRONG&gt;&lt;SPAN style="font-weight: 400;"&gt;None&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Certificate Profile: &lt;/STRONG&gt;&lt;SPAN style="font-weight: 400;"&gt;None&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;HTTP Method: &lt;/STRONG&gt;&lt;SPAN style="font-weight: 400;"&gt;GET&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;After this is complete, make sure to Test Server Connection to verify your configuration information is correct.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Click the Tab for Payload Format&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;You can choose any log type listed. The payload format will be the same for any log type you choose to configure.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Duck 5.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20911i8EB4C5CABC4251C0/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Duck 5.jpg" alt="Duck 5.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Name: &lt;/STRONG&gt;&lt;SPAN style="font-weight: 400;"&gt;Again, cool name or stick with mine&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;URI Format: &lt;/STRONG&gt;&lt;SPAN style="font-weight: 400;"&gt;This will be the URL path that you want triggered. ‘/alert’ is the default&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;Note:&lt;/I&gt;&lt;/STRONG&gt; &lt;I&gt;&lt;SPAN style="font-weight: 400;"&gt;If you want to add some security you can update the ‘/alert’ URI&amp;nbsp; and add random characters into the URI. Example: ‘/HiS99s0aPeUNrWns/alert’. This will need to be updated within the .ino file (the firmware you loaded onto your SOC Duck) as well as in the URI Format in the PAN-OS web interface.&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;HTTP Headers: &lt;/STRONG&gt;&lt;SPAN style="font-weight: 400;"&gt;content-type&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Value: &lt;/STRONG&gt;&lt;SPAN style="font-weight: 400;"&gt;text/html&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Payload is left blank on purpose.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Click OK&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Repeat these steps for each log type you want to define.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Duck 6.jpg" style="width: 975px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20912i16D6090DC3812D0A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Duck 6.jpg" alt="Duck 6.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Click OK&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Navigate to Objects &amp;gt; Log Forwarding &lt;/STRONG&gt;&lt;SPAN style="font-weight: 400;"&gt;and add a Log Forwarding Profile&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Duck 7.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20913i9C62395AE8BFCDB2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Duck 7.jpg" alt="Duck 7.jpg" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Create the log forwarding profile match list. This is where you will configure the log type(s) that will trigger the SOC Duck. Attach the HTTP Server Profile that you created in the previous step here.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Duck 8.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20914i2080EAD2F4EFF0F2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Duck 8.jpg" alt="Duck 8.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Repeat steps if you want to add additional filters. For my use case, I am filtering on threat logs with a high and critical severity as well as malicious WildFire verdicts.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Click OK&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Navigate to Policies &amp;gt; Security &amp;gt;&amp;nbsp; Security Policy Rule &lt;/STRONG&gt;&lt;SPAN style="font-weight: 400;"&gt;you want to attach the Log Forwarding Profile to &lt;/SPAN&gt;&lt;STRONG&gt;&amp;gt; Actions &amp;gt; Log Setting&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Duck 9.jpg" style="width: 975px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20915i24153FAAA90A1F37/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Duck 9.jpg" alt="Duck 9.jpg" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Click OK&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Commit Changes&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Duck 10.jpg" style="width: 561px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20916i54B63E868D601763/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Duck 10.jpg" alt="Duck 10.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;If all went well the log type and filter you defined should now trigger your SOC Duck!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Written By: &lt;/STRONG&gt;&lt;SPAN style="font-weight: 400;"&gt;Sandra Wenzel &amp;amp; Dan Ward, Consulting Engineers for Palo Alto Networks&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Tue, 13 Aug 2019 18:33:10 GMT</pubDate>
    <dc:creator>Jamiefitzgerald</dc:creator>
    <dc:date>2019-08-13T18:33:10Z</dc:date>
    <item>
      <title>SOC Duck</title>
      <link>https://live.paloaltonetworks.com/t5/log-forwarding-articles/soc-duck/ta-p/281590</link>
      <description>&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Build your own visual alert DUCKhickey that integrates with the Palo Alto Networks platform using the HTTP Log Forwarding feature in PAN-OS 8.X and above. I configured the SOC Duck in the Black Hat NOC to trigger and light up with threat alerts. The alerts are configurable for how and when the SOC Duck is triggered.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 18:33:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/log-forwarding-articles/soc-duck/ta-p/281590</guid>
      <dc:creator>Jamiefitzgerald</dc:creator>
      <dc:date>2019-08-13T18:33:10Z</dc:date>
    </item>
  </channel>
</rss>

