<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Threat logs in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28065#M20485</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No actually I think my boss is trying to find out all the PA can do and use it to its fullest extent&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 22 Jul 2015 12:36:32 GMT</pubDate>
    <dc:creator>jdprovine</dc:creator>
    <dc:date>2015-07-22T12:36:32Z</dc:date>
    <item>
      <title>Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28048#M20468</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can the threats logs be sent to a 3rd party syslog server?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Jul 2015 20:59:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28048#M20468</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-07-16T20:59:02Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28049#M20469</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes it's possible. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can add a 3rd party syslog server under "Device" -&amp;gt; "Server Profiles" -&amp;gt; "Syslog". Then under "Objects" -&amp;gt; "Log Forwarding" you can specify which profiles you want to send to your syslog-server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Staffan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Jul 2015 06:59:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28049#M20469</guid>
      <dc:creator>staffan</dc:creator>
      <dc:date>2015-07-17T06:59:42Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28050#M20470</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I know how to set up log forwarding and am doing it but those are added to the security policies. What I am asking is if you go to monitor\threat can those be monitored &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Jul 2015 12:06:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28050#M20470</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-07-17T12:06:30Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28051#M20471</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently, the system only allows to see if Monitor Tab was accessed. You can see these events at Monitor-&amp;gt;Logs-&amp;gt;System.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, it does not provide information if any sub-options of the tab were used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Val&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Jul 2015 20:03:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28051#M20471</guid>
      <dc:creator>Sobolenko</dc:creator>
      <dc:date>2015-07-17T20:03:24Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28052#M20472</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't believe that the point of what I am trying to do is being understood. I know how to set up syslogs,but I want to know if there is a way to send the information from the&amp;nbsp; monitor---&amp;gt; logs--&amp;gt;threat can be sent to a syslog to be analyzed. I am trying to do some automation of the process&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Jul 2015 14:40:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28052#M20472</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-07-20T14:40:19Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28053#M20473</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, threat logs are sent to syslog as well. Like in Splunk, it is pan_threat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is setup under the log forwarding profile you setup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-0 jiveImage" src="https://live.paloaltonetworks.com/legacyfs/online/20372_pastedImage_0.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Jul 2015 14:49:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28053#M20473</guid>
      <dc:creator>googol</dc:creator>
      <dc:date>2015-07-20T14:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28054#M20474</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So googol if you choose traffic - any, does that include all the other settings such as threat?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Jul 2015 15:00:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28054#M20474</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-07-20T15:00:18Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28055#M20475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you asking about event correlation?&amp;nbsp; That's done via a SEIM like ArcSight or QRadar.&amp;nbsp; Via a syslog profile you can forward the threat logs to a SEIM which in turn will correlate all relevant logs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Jul 2015 16:05:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28055#M20475</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2015-07-20T16:05:05Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28056#M20476</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We currently send the information from our syslogs to a seim server to analyze the information but I was asked if we could be more grandular on the type of threat information that is being sent to the seim server from the palot alto&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Jul 2015 16:50:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28056#M20476</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-07-20T16:50:07Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28057#M20477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, setup configuring syslogs in my understanding means not only to configure syslog profile, but also setup log forwarding profile as googol says and configure policies to log forward to your syslog server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure that you have configured your security policies with Threat Prevention Profiles, DDoS profiles&amp;nbsp; so you can see events in Logs-&amp;gt;Threat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After all that configured, you will be able to visualize logs that you configured on syslog server in syslog format. You can use simple Kiwi Syslog to do a quick test.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Jul 2015 21:05:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28057#M20477</guid>
      <dc:creator>Sobolenko</dc:creator>
      <dc:date>2015-07-20T21:05:05Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28058#M20478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes it is going to a syslog server and we are using seim to sort and view the logs but I wanted to know if its possible to send more granular or specific threat logs to the syslog servers &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Jul 2015 21:08:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28058#M20478</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-07-20T21:08:02Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28059#M20479</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you please explain what do you mean by "more granular"? You will receive threat logs "as is" and in pre-established format. There is no way you can enhance them. Your SIEM can apply correlations and alerts, but they will be based only on the information received from PA. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jul 2015 13:55:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28059#M20479</guid>
      <dc:creator>Sobolenko</dc:creator>
      <dc:date>2015-07-21T13:55:41Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28060#M20480</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My boss asked me if it was possible to apply a filter to the threat logs before they are sent to the syslog just like you can add a filter when you are in monitor---&amp;gt;logs---&amp;gt;threat. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jul 2015 14:06:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28060#M20480</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-07-21T14:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28061#M20481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the 'Log Forwarding" profile that &lt;A href="https://live.paloaltonetworks.com/u1/30393"&gt;googol&lt;/A&gt; included a screen shot of you can elect which threats you wanted to send to your SEIM/Syslog.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Further within the SEIM you can use REGEX to parse the fields and filter exactly the records you're looking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For instance a "Threat" log with a threat type of "virus" of a "medium" severity can be filtered to either be included or excluded in your SEIM:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2015/07/21 09:49:53,*DEVICE SN*,THREAT,virus,*A BUNCH OF STUFF SEPARATED BY ALPHA NUMERIC CHARACTERS SEPARATED BY COMMAS* ,Virus/Win32.ramnit.aztfn(2022885),any,medium,server-to-client,*MORE STUFF FOLLOWS*&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here was a log example from our SEIM.&amp;nbsp; You'd have to use REGEX to parse through the log message to the relevant fields but you could filter to the log types you're wanting this way as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jul 2015 16:33:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28061#M20481</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2015-07-21T16:33:36Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28062#M20482</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As Brandon replied, it is best way to apply filtering on SIEM side. There is no way you can filter it on PA level, the only thing you can do is just select certain severity level to be sent to SIEM. But in that case you are not filtering - you simply not sending these logs to SIEM.&lt;/P&gt;&lt;P&gt;What SIEM do you use? Splunk to be proven good, I tried the others commercials and free - Splunk still best for PA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jul 2015 21:19:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28062#M20482</guid>
      <dc:creator>Sobolenko</dc:creator>
      <dc:date>2015-07-21T21:19:04Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28063#M20483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I thought that was going to be the case but my boss asked me to investigate and I was unable to find a way to do it that is why I posted on this board&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jul 2015 12:30:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28063#M20483</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-07-22T12:30:42Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28064#M20484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think maybe his boss is worried about storage retention, just guessing, that's why he's trying to not even send certain ones.&amp;nbsp; The point of the SIEM though is to have all logs and let the correlation engine decide based upon all possible related information to bring to the front the most relevant logs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jul 2015 12:34:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28064#M20484</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2015-07-22T12:34:31Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28065#M20485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No actually I think my boss is trying to find out all the PA can do and use it to its fullest extent&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jul 2015 12:36:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28065#M20485</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-07-22T12:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28066#M20486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Following what you were asking before:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sending filters that you establish from the threat logs to your syslog SIEM:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IE..( subtype eq vulnerability ) and ( threatid eq 34804 ) and ( app eq web-browsing ) and ( action eq alert ) and ( severity eq medium ) and ( rule eq 'OBB -&amp;nbsp; Alw Guest Netwrk to Inet' )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What would be the point of sending this specifically?&amp;nbsp; Wouldn't it just be easier to use the native functions within the respective tools?&amp;nbsp; IE...the "clickable" filtering in the Palo UI and the regex parsing within your SIEM?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jul 2015 12:43:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28066#M20486</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2015-07-22T12:43:15Z</dc:date>
    </item>
    <item>
      <title>Re: Threat logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28067#M20487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't know just trying to do what my boss asked. So I will just tell him that it has to be done on the seim side&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jul 2015 12:46:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-logs/m-p/28067#M20487</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-07-22T12:46:35Z</dc:date>
    </item>
  </channel>
</rss>

