<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA Web Proxy has more than syslog / logs on current PA FW in Web Proxy Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/web-proxy-discussions/pa-web-proxy-has-more-than-syslog-logs-on-current-pa-fw/m-p/1221738#M57</link>
    <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1168210653"&gt;@Kakada_Sao16&lt;/a&gt;&amp;nbsp;, Please keep in mind that this is a tech forum and most of solutions come from not directly working professionals for Palo Alto that assist each other in the best way possible. What you have seems like a design issue as having a rule for Proxy To Internet seems strange as you are allowing your PA firewall/Proxy to talk to Internet as a user for me if going to internet should match 1 rule if allowed/blocked based better on a AD group&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":thinking_face:"&gt;🤔&lt;/span&gt;&amp;nbsp; The only way to match 2 rules for me if you have the so called proxy to internet rule before the client rule and there to be the so called "appshift"&amp;nbsp; as maybe the first rules matches all web browser traffic and then the application gets detected which is bad design&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm1aCAC" target="_blank"&gt;How to Prevent Application Shift - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suggest involving Palo Alto Professional Services (PS) or a partner company as this will also probably be outside the scope of the Palo Alto Support TAC team to assist you with.&lt;/P&gt;</description>
    <pubDate>Tue, 25 Feb 2025 11:49:37 GMT</pubDate>
    <dc:creator>nikoolayy1</dc:creator>
    <dc:date>2025-02-25T11:49:37Z</dc:date>
    <item>
      <title>PA Web Proxy has more than syslog / logs on current PA FW</title>
      <link>https://live.paloaltonetworks.com/t5/web-proxy-discussions/pa-web-proxy-has-more-than-syslog-logs-on-current-pa-fw/m-p/1219731#M56</link>
      <description>&lt;P&gt;Dear PA team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA Firewall and PA Web proxy are integration with SIEM.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Before: &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;When my PC run though connecting on PA firewall has only 1 log ( End Traffic , Deny Access, Permit...) for each session.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 1.&amp;nbsp; Traffic End -&amp;gt; Feb 2, 2025, 10:15:00 AM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Now:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;When my PC point connectivity to PA Proxy there have 2 or more for each session.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example: Duplicate logs&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;1. Traffic End -&amp;gt; Feb 2, 2025, 10:15:00 AM&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;2. Traffic End -&amp;gt; Feb 2, 2025, 10:15:00 AM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On Proxy where Security Policy we defined &lt;STRONG&gt;Allow User to proxy&lt;/STRONG&gt; and &lt;STRONG&gt;Allow Proxy to Internet.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We concern with SIEM consumption resource performance and licensing cost. When has more logs on PA Web proxy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do we have solution to fix this case? To ensure it has as same as log on PA FW for each session.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2025 03:38:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/web-proxy-discussions/pa-web-proxy-has-more-than-syslog-logs-on-current-pa-fw/m-p/1219731#M56</guid>
      <dc:creator>Kakada_Sao16</dc:creator>
      <dc:date>2025-02-07T03:38:54Z</dc:date>
    </item>
    <item>
      <title>Re: PA Web Proxy has more than syslog / logs on current PA FW</title>
      <link>https://live.paloaltonetworks.com/t5/web-proxy-discussions/pa-web-proxy-has-more-than-syslog-logs-on-current-pa-fw/m-p/1221738#M57</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1168210653"&gt;@Kakada_Sao16&lt;/a&gt;&amp;nbsp;, Please keep in mind that this is a tech forum and most of solutions come from not directly working professionals for Palo Alto that assist each other in the best way possible. What you have seems like a design issue as having a rule for Proxy To Internet seems strange as you are allowing your PA firewall/Proxy to talk to Internet as a user for me if going to internet should match 1 rule if allowed/blocked based better on a AD group&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":thinking_face:"&gt;🤔&lt;/span&gt;&amp;nbsp; The only way to match 2 rules for me if you have the so called proxy to internet rule before the client rule and there to be the so called "appshift"&amp;nbsp; as maybe the first rules matches all web browser traffic and then the application gets detected which is bad design&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm1aCAC" target="_blank"&gt;How to Prevent Application Shift - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suggest involving Palo Alto Professional Services (PS) or a partner company as this will also probably be outside the scope of the Palo Alto Support TAC team to assist you with.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 11:49:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/web-proxy-discussions/pa-web-proxy-has-more-than-syslog-logs-on-current-pa-fw/m-p/1221738#M57</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2025-02-25T11:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: PA Web Proxy has more than syslog / logs on current PA FW</title>
      <link>https://live.paloaltonetworks.com/t5/web-proxy-discussions/pa-web-proxy-has-more-than-syslog-logs-on-current-pa-fw/m-p/1224373#M59</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/153031"&gt;@nikoolayy1&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;let us further check with them. thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 01:32:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/web-proxy-discussions/pa-web-proxy-has-more-than-syslog-logs-on-current-pa-fw/m-p/1224373#M59</guid>
      <dc:creator>Kakada_Sao16</dc:creator>
      <dc:date>2025-03-21T01:32:01Z</dc:date>
    </item>
  </channel>
</rss>

