<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best Practices of log filter in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-of-log-filter/m-p/198997#M59022</link>
    <description>&lt;P&gt;There could be elements on the web&amp;nbsp;site that is being blocked by the firewall. Examples could be flash content if flash is not member of the allowed application group or ads identified as malware. These will be listed in your firewall logs. If you find nothing there then I would suspect client browser trouble.&lt;/P&gt;</description>
    <pubDate>Tue, 06 Feb 2018 11:56:08 GMT</pubDate>
    <dc:creator>TerjeLundbo</dc:creator>
    <dc:date>2018-02-06T11:56:08Z</dc:date>
    <item>
      <title>Best Practices of log filter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-of-log-filter/m-p/198439#M58900</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a network admin, when user escalates that he cannot access some specify website, what's the best way to find the property log which was triggered by use's browsing activity?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Of course we can apply filer as "username", but even though, we will still got a lot of logs in a very short time period.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What's your best practice?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 07:00:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-of-log-filter/m-p/198439#M58900</guid>
      <dc:creator>qd_056</dc:creator>
      <dc:date>2018-02-02T07:00:13Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices of log filter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-of-log-filter/m-p/198510#M58911</link>
      <description>&lt;P&gt;Find the IP address of the web site and&amp;nbsp;look in the unified log with the following filter:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;( addr.dst in x.x.x.x ) and ( action neq allow ) and ( action neq alert )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This shold get you all the traffic to that web site that has been blocked either by policy (deny rule) or threat prevention.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 12:27:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-of-log-filter/m-p/198510#M58911</guid>
      <dc:creator>TerjeLundbo</dc:creator>
      <dc:date>2018-02-02T12:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices of log filter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-of-log-filter/m-p/198519#M58917</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/81365"&gt;@qd_056&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I'd actually recommend that you not filter by username, just because if a user-id drop was part of the issue you won't see the traffic at that point. As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/53120"&gt;@TerjeLundbo&lt;/a&gt;&amp;nbsp;pointed out you can target the specific destination address and look for log entries outside of 'allow' or 'alert' with the commands stated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd actually make a further recommendation that you&amp;nbsp;create a rule specific to that users source IP address with a deny 'any' 'any' policy that mimics the interzone-default policy and enable logging. This allows you to log any traffic that may potentially be running into the default security policy without generating un-needed logs by enabling logging across the default interzone-default policy where you would likely generate more logs than actually desired.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 14:04:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-of-log-filter/m-p/198519#M58917</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-02-02T14:04:57Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices of log filter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-of-log-filter/m-p/198960#M59014</link>
      <description>&lt;P&gt;I raised this concern since we met a issue is, we have a application group include web-broswing, and this group is allowed to be access by all trust clients.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But when user tried to access some specific website, they cannot display that page property, looks like CSS cannot be loaded.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So for such case, how can I know the root cause of this issue from log?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2018 08:59:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-of-log-filter/m-p/198960#M59014</guid>
      <dc:creator>qd_056</dc:creator>
      <dc:date>2018-02-06T08:59:37Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices of log filter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-of-log-filter/m-p/198997#M59022</link>
      <description>&lt;P&gt;There could be elements on the web&amp;nbsp;site that is being blocked by the firewall. Examples could be flash content if flash is not member of the allowed application group or ads identified as malware. These will be listed in your firewall logs. If you find nothing there then I would suspect client browser trouble.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2018 11:56:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-of-log-filter/m-p/198997#M59022</guid>
      <dc:creator>TerjeLundbo</dc:creator>
      <dc:date>2018-02-06T11:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices of log filter</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-of-log-filter/m-p/199015#M59025</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Here is what I usually do when I get those requests:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ask the user what the URL was and what they were trying to click on.&lt;/P&gt;&lt;P&gt;I then reproduce the issue either on my machine or a test machinethat has little traffic outbound.&lt;/P&gt;&lt;P&gt;Filter the Unified logs by the source IP, as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;mentioned, if the user-id dropped, you might miss something.&lt;/P&gt;&lt;P&gt;Then recreate what the user was attempting and look for any blocks.&lt;/P&gt;&lt;P&gt;I look for URL blocks first, then move to application blocks due to ssl decrypting&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Those are the big steps.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2018 15:05:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-of-log-filter/m-p/199015#M59025</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-02-06T15:05:34Z</dc:date>
    </item>
  </channel>
</rss>

