<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Check logs for large number of IP Addresses in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/check-logs-for-large-number-of-ip-addresses/m-p/521200#M577</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/218171"&gt;@murali438&lt;/a&gt;&amp;nbsp;Thanks for that suggestion. I hadn't thought of that, and I gave it a try. Unfortunately, 1 million records are only enough to get a snapshot of a couple of hours on our network. I need to search all the logs that the firewall has at once. This may help me in other ways, though, so I appreciate the idea.&lt;/P&gt;</description>
    <pubDate>Mon, 14 Nov 2022 20:38:25 GMT</pubDate>
    <dc:creator>SSargent_ICTWA</dc:creator>
    <dc:date>2022-11-14T20:38:25Z</dc:date>
    <item>
      <title>Check logs for large number of IP Addresses</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/check-logs-for-large-number-of-ip-addresses/m-p/520821#M559</link>
      <description>&lt;P&gt;I received a list of over 600 IP addresses associated with a botnet from a reliable threat intelligence source. I would like to check our logs for traffic to or from these addresses but creating a filter with that many IP addresses seems unwieldy. Does anyone know a better way?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2022 16:06:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/check-logs-for-large-number-of-ip-addresses/m-p/520821#M559</guid>
      <dc:creator>SSargent_ICTWA</dc:creator>
      <dc:date>2022-11-09T16:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: Check logs for large number of IP Addresses</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/check-logs-for-large-number-of-ip-addresses/m-p/520994#M565</link>
      <description>&lt;P&gt;You can export the logs to a CSV format and use local search.&lt;/P&gt;
&lt;P&gt;By default it exports&amp;nbsp;&lt;SPAN&gt;2,000 rows but you can change it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/monitoring/view-and-manage-logs/export-logs#idc460365f-2ddb-4e52-9dee-889a2cbbd17d" target="_blank"&gt;Export Logs (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 10:20:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/check-logs-for-large-number-of-ip-addresses/m-p/520994#M565</guid>
      <dc:creator>murali438</dc:creator>
      <dc:date>2022-11-11T10:20:37Z</dc:date>
    </item>
    <item>
      <title>Re: Check logs for large number of IP Addresses</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/check-logs-for-large-number-of-ip-addresses/m-p/521010#M567</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/206721"&gt;@SSargent_ICTWA&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The PANW free product MineMeld was build to easily incorporate threat intelligence feeds into the firewall.&amp;nbsp; &lt;A href="https://www.paloaltonetworks.com/products/secure-the-network/subscriptions/minemeld" target="_blank"&gt;https://www.paloaltonetworks.com/products/secure-the-network/subscriptions/minemeld&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If your 600 IP addresses can be pulled from a simple HTML list off the Internet, you could create an EDL directly to it without having to use MineMeld.&amp;nbsp; &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once you have the EDL configured (directly or from MineMeld) you can do a lot more:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Automatically block the traffic.&lt;/LI&gt;
&lt;LI&gt;Generate reports on IP addresses that hit the block rule.&lt;/LI&gt;
&lt;LI&gt;Eliminate a lot of manual work in threat hunting your botnets!&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 13:52:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/check-logs-for-large-number-of-ip-addresses/m-p/521010#M567</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-11-11T13:52:57Z</dc:date>
    </item>
    <item>
      <title>Re: Check logs for large number of IP Addresses</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/check-logs-for-large-number-of-ip-addresses/m-p/521200#M577</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/218171"&gt;@murali438&lt;/a&gt;&amp;nbsp;Thanks for that suggestion. I hadn't thought of that, and I gave it a try. Unfortunately, 1 million records are only enough to get a snapshot of a couple of hours on our network. I need to search all the logs that the firewall has at once. This may help me in other ways, though, so I appreciate the idea.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 20:38:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/check-logs-for-large-number-of-ip-addresses/m-p/521200#M577</guid>
      <dc:creator>SSargent_ICTWA</dc:creator>
      <dc:date>2022-11-14T20:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: Check logs for large number of IP Addresses</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/check-logs-for-large-number-of-ip-addresses/m-p/521204#M578</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp;This is a good suggestion. I do have some EDL's configured. In this case, the threat intelligence came in a CSV file attached to an email. I put MineMeld on my roadmap, though, for future testing and possible implementation. It's just a little more involved than justified for this occasional intelligence source.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 20:44:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/check-logs-for-large-number-of-ip-addresses/m-p/521204#M578</guid>
      <dc:creator>SSargent_ICTWA</dc:creator>
      <dc:date>2022-11-14T20:44:01Z</dc:date>
    </item>
    <item>
      <title>Re: Check logs for large number of IP Addresses</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/check-logs-for-large-number-of-ip-addresses/m-p/521206#M579</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/206721"&gt;@SSargent_ICTWA&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are correct.&amp;nbsp; Minemeld is involved.&amp;nbsp; If you have an internal web server, it may be easier to convert the CSV to a simple HTML page and point an EDL to it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 21:03:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/check-logs-for-large-number-of-ip-addresses/m-p/521206#M579</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-11-14T21:03:48Z</dc:date>
    </item>
    <item>
      <title>Re: Check logs for large number of IP Addresses</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/check-logs-for-large-number-of-ip-addresses/m-p/521208#M580</link>
      <description>&lt;P&gt;After trying a few different methods, I used Excel formulas to create a traffic log filter with all 600 addresses. I used the filter directly in the UI and it ran in less than three minutes. Not as unwieldy as I had imagined.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 21:05:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/check-logs-for-large-number-of-ip-addresses/m-p/521208#M580</guid>
      <dc:creator>SSargent_ICTWA</dc:creator>
      <dc:date>2022-11-14T21:05:42Z</dc:date>
    </item>
    <item>
      <title>Re: Check logs for large number of IP Addresses</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/check-logs-for-large-number-of-ip-addresses/m-p/533595#M998</link>
      <description>&lt;P&gt;As a follow up to the suggestion about Minemeld... that's a minefield. Palo Alto "open sourced" it for the developer community to support over a year ago, and it has not received developer community support as far as I can tell. There are no longer any prebuilt Minemeld VM's as promised on the page that is linked in a previous comment. Because it is not supported, the Minemeld codebase is now dependent on outdated, vulnerable Linux components. What a disappointment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the meantime, Palo Alto is eager to sell us a single Cortex license for over $100,000 to supposedly fill this need (without the artificial limitations of the community edition).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just need automated TI EDL's. Neither of these solutions are satisfactory.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 15:20:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/check-logs-for-large-number-of-ip-addresses/m-p/533595#M998</guid>
      <dc:creator>SSargent_ICTWA</dc:creator>
      <dc:date>2023-03-08T15:20:44Z</dc:date>
    </item>
  </channel>
</rss>

