<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VM series log not detected in Azure Sentinel in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vm-series-log-not-detected-in-azure-sentinel/m-p/466078#M102648</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/206695"&gt;@nurulams0&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;From my knowledge you cannot ship syslogs directly to Azure Sentinel (LogAnalytics), you need to have "Microsoft Monitoring Agent" running on a Linux server. What this agent is actually doing is&lt;/P&gt;
&lt;P&gt;- it running syslog server that will receive logs from Palo FWs&lt;/P&gt;
&lt;P&gt;- it will do some parsing and ship the logs over HTTPS to Azure LogAnalytics Workspace&lt;/P&gt;
&lt;P&gt;It is importent to note that Azure requires logs to use CEF format in order to properly parse the logs. By default PAN FWs are not using CEF, but allows you to define custom format, so you need to manually define formatting for each log type - &lt;A href="https://docs.paloaltonetworks.com/resources/cef.html" target="_blank"&gt;https://docs.paloaltonetworks.com/resources/cef.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Are you using same server running MS Monitoring Agent (OMS) for both on-prem and VM firewalls?&lt;/P&gt;
&lt;P&gt;- Have you made any changes to OMS agent syslog settings to listend on different port and protocols?&lt;/P&gt;
&lt;P&gt;- Are you able to confirm that logs are received by the server running OMS agent? I usually prefer to run tcpdump so I can see with my own eys that packets from firewall are indeed ariving.&lt;/P&gt;
&lt;P&gt;- If they are not ariving to the syslog server, have you checked if there is no firewall in the path? Note that Palo Alto App-ID for syslog is defining different default port for syslog over TCP, so if traffic is passing over PAN FW, which is allowing syslog app on default port it is probably blocking it&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Astardzhiev_0-1644998648260.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/39165i886A5657CA4B0DC8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Astardzhiev_0-1644998648260.png" alt="Astardzhiev_0-1644998648260.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 16 Feb 2022 08:04:30 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2022-02-16T08:04:30Z</dc:date>
    <item>
      <title>VM series log not detected in Azure Sentinel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-series-log-not-detected-in-azure-sentinel/m-p/464887#M102542</link>
      <description>&lt;P&gt;Here’s the problem statement:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1] If Syslog UDP 514 is configured in PAN FW on-prem and vm-series, There were missing logs in AZ Sentinel, Incomplete logs is experienced and there were packets fragmentation.&lt;/P&gt;&lt;P&gt;2] MS Sentinel support recommended to changed syslog transport UDP to TCP 514.&lt;/P&gt;&lt;P&gt;3] If Syslog TCP 514 is configured in PAN FW, On-prem able to send syslog in Azure Sentinel and confirmed from Azure sentinel Azure side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;However all VM-series logs were not detected in Azure Sentinel, although FW is sending syslog traffic.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 14:26:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-series-log-not-detected-in-azure-sentinel/m-p/464887#M102542</guid>
      <dc:creator>nurulams0</dc:creator>
      <dc:date>2022-02-10T14:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: VM series log not detected in Azure Sentinel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-series-log-not-detected-in-azure-sentinel/m-p/466078#M102648</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/206695"&gt;@nurulams0&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;From my knowledge you cannot ship syslogs directly to Azure Sentinel (LogAnalytics), you need to have "Microsoft Monitoring Agent" running on a Linux server. What this agent is actually doing is&lt;/P&gt;
&lt;P&gt;- it running syslog server that will receive logs from Palo FWs&lt;/P&gt;
&lt;P&gt;- it will do some parsing and ship the logs over HTTPS to Azure LogAnalytics Workspace&lt;/P&gt;
&lt;P&gt;It is importent to note that Azure requires logs to use CEF format in order to properly parse the logs. By default PAN FWs are not using CEF, but allows you to define custom format, so you need to manually define formatting for each log type - &lt;A href="https://docs.paloaltonetworks.com/resources/cef.html" target="_blank"&gt;https://docs.paloaltonetworks.com/resources/cef.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Are you using same server running MS Monitoring Agent (OMS) for both on-prem and VM firewalls?&lt;/P&gt;
&lt;P&gt;- Have you made any changes to OMS agent syslog settings to listend on different port and protocols?&lt;/P&gt;
&lt;P&gt;- Are you able to confirm that logs are received by the server running OMS agent? I usually prefer to run tcpdump so I can see with my own eys that packets from firewall are indeed ariving.&lt;/P&gt;
&lt;P&gt;- If they are not ariving to the syslog server, have you checked if there is no firewall in the path? Note that Palo Alto App-ID for syslog is defining different default port for syslog over TCP, so if traffic is passing over PAN FW, which is allowing syslog app on default port it is probably blocking it&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Astardzhiev_0-1644998648260.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/39165i886A5657CA4B0DC8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Astardzhiev_0-1644998648260.png" alt="Astardzhiev_0-1644998648260.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 08:04:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-series-log-not-detected-in-azure-sentinel/m-p/466078#M102648</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-02-16T08:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: VM series log not detected in Azure Sentinel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-series-log-not-detected-in-azure-sentinel/m-p/997786#M122503</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;i'm facing the same issue, i've 2 palo alto vm sending logs to a linux server that then forwards them to azure sentinel, from sentinel side they're receiving no logs for 2 months (they told me that before it was working and nobody changed anything).&lt;/P&gt;
&lt;P&gt;i'm sending only the configuration, user-id and global protect logs, following the syslog configuration:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MAerre_0-1733934528624.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/64623iE7879DD7106E9A82/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MAerre_0-1733934528624.png" alt="MAerre_0-1733934528624.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;i noticed i'm using BSD format instead of CED as you stated.&lt;/P&gt;
&lt;P&gt;i've double checked the linux server (which i'm able to ping) config and service but seem running, do you with could be useful to change to CEF format on palo alto side?&lt;/P&gt;
&lt;P&gt;is there a way to understand if the fw is sending the logs?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thank you&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2024 16:34:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-series-log-not-detected-in-azure-sentinel/m-p/997786#M122503</guid>
      <dc:creator>MAerre</dc:creator>
      <dc:date>2024-12-11T16:34:06Z</dc:date>
    </item>
  </channel>
</rss>

