<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best practice for reducing Log ingestion  for DNS traffic logs to 3rd party log servers in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-reducing-log-ingestion-for-dns-traffic-logs-to/m-p/575090#M115547</link>
    <description>&lt;P&gt;thanks.. in the end we will be filtering out internal dns logs towards sentinel using filters on the syslog traffic. The dns logs will still be visible on panorama (30 day retention) and ngfw should still alert on dodgy dns traffic and this will be sent to sentinel via the threat type logs.&lt;/P&gt;</description>
    <pubDate>Wed, 31 Jan 2024 14:23:19 GMT</pubDate>
    <dc:creator>PA_nts</dc:creator>
    <dc:date>2024-01-31T14:23:19Z</dc:date>
    <item>
      <title>Best practice for reducing Log ingestion  for DNS traffic logs to 3rd party log servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-reducing-log-ingestion-for-dns-traffic-logs-to/m-p/574039#M115390</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;Need some opinions please..&lt;/P&gt;
&lt;P&gt;I have a client who wants to ingest their PAN logs (panorama managed) into Sentinel. &lt;BR /&gt;However looking at the log data we will be ingesting around 40-50GB of log traffic per day which from a costing perspective is going to be super expensive.&lt;/P&gt;
&lt;P&gt;Dissecting the log data I can see majority of log data are Traffic logs, and that DNS logs within traffic logs, (app = dns-base) are making up around 55% of all traffic log data. We do not have a DNS security license. so essentially 55% of all logs to sentinel will be dns logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is your view on me suggesting the following:&lt;/P&gt;
&lt;P&gt;To exclude the DNS logs from being sent to Sentinel Log Collector (still logged on Panorama though)&lt;BR /&gt;This will be done by doing a filter for Traffic Type logs and using the following filter expression ' no (app eq dns-base) '&lt;BR /&gt;This means that the DNS logs will still be visible in Panorama but will not be forwarded towards the Sentinel Log Collector and greatly reduce the amount of log ingestion into Sentinel.&lt;/P&gt;
&lt;P&gt;My other question, if i do this, to what extent am i limiting my security layer on sentinel? On my FWs, the app/threat and url filtering (licensed)&amp;nbsp; will still alert on dodgy DNS requests and this will be sent to the Sentinel Collection via the Threat type logs - correct?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just need clarification so that we can say any 'alerts' triggered by PAN that are DNS related will still be ingested into Sentinel.&lt;/P&gt;
&lt;P&gt;Alternatively, Is there a best practice guide for configuring dns logging (no dns security license) in this instance? (i cannot seem to find anything that matches my end goal)&lt;BR /&gt;How are your setups doing this with reducing dns log volume.&lt;/P&gt;
&lt;P&gt;Any thoughts?&lt;/P&gt;
&lt;P&gt;thanks in adv&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 07:30:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-reducing-log-ingestion-for-dns-traffic-logs-to/m-p/574039#M115390</guid>
      <dc:creator>PA_nts</dc:creator>
      <dc:date>2024-01-23T07:30:26Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for reducing Log ingestion  for DNS traffic logs to 3rd party log servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-reducing-log-ingestion-for-dns-traffic-logs-to/m-p/574178#M115413</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;DNS logs are pretty handy when it comes to incident response. Each packet is usually less than 1kb, so not sure if that is 55% of your traffic? If it is, it could be data exfiltration via DNS? Definitely something to look into.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 22:18:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-reducing-log-ingestion-for-dns-traffic-logs-to/m-p/574178#M115413</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-01-23T22:18:32Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for reducing Log ingestion  for DNS traffic logs to 3rd party log servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-reducing-log-ingestion-for-dns-traffic-logs-to/m-p/574242#M115420</link>
      <description>&lt;P&gt;Hi, I don't think it is data exfiltration via DNS.. we have around 20M DNS log events per day (big environment). and log size according to PAN per event on average is about 1500bytes. so it amounts to alot of DNS log traffic. I will try and see who the top talkers are on DNS (src/dest) and try and limit that way instead.. but the crux of the matter is, client will have to exempt some logs in order to minimize log storage issues. its a work in progress. thanks&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 07:17:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-reducing-log-ingestion-for-dns-traffic-logs-to/m-p/574242#M115420</guid>
      <dc:creator>PA_nts</dc:creator>
      <dc:date>2024-01-24T07:17:44Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for reducing Log ingestion  for DNS traffic logs to 3rd party log servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-reducing-log-ingestion-for-dns-traffic-logs-to/m-p/575086#M115545</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/306035"&gt;@PA_nts&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;possibly your client could consider to store DNS logs in Azure ADX. ADX can store a large volume of logs and is cheaper than Sentinel. With necessary permissions it is possible to query ADX logs directly from Sentinel.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this scenario all logs would be sent from Panorama to Sentinel except of DNS logs that would be sent to ADX. In the case of incident investigation ADX logs could be accessed from single Sentinel console.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 12:55:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-reducing-log-ingestion-for-dns-traffic-logs-to/m-p/575086#M115545</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2024-01-31T12:55:06Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for reducing Log ingestion  for DNS traffic logs to 3rd party log servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-reducing-log-ingestion-for-dns-traffic-logs-to/m-p/575090#M115547</link>
      <description>&lt;P&gt;thanks.. in the end we will be filtering out internal dns logs towards sentinel using filters on the syslog traffic. The dns logs will still be visible on panorama (30 day retention) and ngfw should still alert on dodgy dns traffic and this will be sent to sentinel via the threat type logs.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 14:23:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-reducing-log-ingestion-for-dns-traffic-logs-to/m-p/575090#M115547</guid>
      <dc:creator>PA_nts</dc:creator>
      <dc:date>2024-01-31T14:23:19Z</dc:date>
    </item>
  </channel>
</rss>

