<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: syslog reports (web usage) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/278087#M75556</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/111187"&gt;@au_igs&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You appear to be looking at just two of the log databases when you filter your syslog messages, the Threat and Traffic databases.&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is a completely separate set of logs on the firewall in the URL database. This is where all of the URLs visited are actually located.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 22 Jul 2019 12:30:19 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2019-07-22T12:30:19Z</dc:date>
    <item>
      <title>syslog reports (web usage)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/277236#M75435</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do daily scripted syslog reports for traffic through the firewall. PA syslog messages are pretty good actually. However, the only messages that have something that resembles URL is the messages of the "THREAT url" pattern. Now, I accasionally need to do a web usage report for some managers on what their employees are doing. For that I need full URLs for the session along with more information, eg user agent, type of HTML request (get/post) etc. Not just for THREAT pattern, but for the normal traffic pattern (TRAFFIC start/end) as well. PA capable of that at all?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TRAFFIC end&lt;BR /&gt;TRAFFIC start&lt;BR /&gt;THREAT url&lt;BR /&gt;TRAFFIC drop&lt;BR /&gt;TRAFFIC deny&lt;BR /&gt;THREAT vulnerability&lt;BR /&gt;THREAT spyware&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2019 06:15:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/277236#M75435</guid>
      <dc:creator>au_igs</dc:creator>
      <dc:date>2019-07-18T06:15:39Z</dc:date>
    </item>
    <item>
      <title>Re: syslog reports (web usage)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/277351#M75446</link>
      <description>you'll need to use an off-device tool (like a SIEM) to combine these logs as they are not part of the same log database, if you rely on automation 

if this only needs to happen every once in a while you could consider, rather than deploying a SIEM, to access the 'Unified' log view, filter the information you need and export that data as a CSV</description>
      <pubDate>Thu, 18 Jul 2019 09:30:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/277351#M75446</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-07-18T09:30:52Z</dc:date>
    </item>
    <item>
      <title>Re: syslog reports (web usage)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/277506#M75469</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/111187"&gt;@au_igs&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I would recommend installing a SIEM anyways if you don't already have one if you are interacting with Syslog at all already. Graylog (Free/Paid) or Splunk (Paid) would be my go-to for something like this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your request isn't entirely clear but does your firewall actually log the URL information for all of your traffic to begin with, or not? In most environments you wouldn't actually be setup to log every visited URL from your firewall, which would diminish the effectfullness of the requested report. You'd want to look at your URL logs on the firewall and ensure you are actually logging the accessed URL for the traffic you wish to log, and possibly make some configuration changes to your URL FIltering profile if you are not seeing the logs you require recorded on the firewall.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2019 16:44:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/277506#M75469</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-07-18T16:44:01Z</dc:date>
    </item>
    <item>
      <title>Re: syslog reports (web usage)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/277966#M75531</link>
      <description>&lt;P&gt;Hi, thank you for your reply. I really appriciate the help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I already have the syslog server and the siem configured and all is well in that regard. Syslog is recieveing fine and logs are really easy to read and very well structured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem I'm having is the web usage reporting. Because now we no longer have the internet proxy (which used to log users' activity) I need to get that information from the syslog messages coming from the PA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I search for the "TRAFFIC,start" (or TRAFFIC,end) pattern, there is no destination URL in the syslog message line. Only destination IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I search for the "THREAT,url" patterrn, I get the destination URL and can do some sort of web usage reporting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I understand all webfiltering&amp;nbsp;activity&amp;nbsp;logs as "THREAT,url". However, it only llogs if the action is set to&amp;nbsp;anything but "allow". When action is set to "allow", PA logs nothing at at all. Therefore we had to set all to "alert"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The TRAFFIC,start messages contain plenty of https (443) traffic, but do not log URLs. I was wandering if the TREAT message are included in the TRAFFIC messages (do they double up?) or the TRAFFIC messages include tflows that are not filtered for some reason. Below are the stats for a day. And the numbers just do not stack up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;4076679&amp;nbsp; TRAFFIC end&lt;BR /&gt;3468509&amp;nbsp; TRAFFIC start&lt;BR /&gt;1235392&amp;nbsp; THREAT url&lt;BR /&gt;&amp;nbsp;483048&amp;nbsp; TRAFFIC drop&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2103&amp;nbsp; TRAFFIC deny&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 517&amp;nbsp; THREAT vulnerability&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5&amp;nbsp; THREAT spyware&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2019 02:10:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/277966#M75531</guid>
      <dc:creator>au_igs</dc:creator>
      <dc:date>2019-07-22T02:10:10Z</dc:date>
    </item>
    <item>
      <title>Re: syslog reports (web usage)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/277967#M75532</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/111187"&gt;@au_igs&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;So the URL logs are a completely seperate thing; they aren't located in the Traffic or Threat logs unless it's being recorded because a threat or something of the like was identified.&lt;/P&gt;&lt;P&gt;You actually want to ensure that the firewall is configured to send the URL logs to your SIEM and that the URL Filtering profile assigned to outbound traffic is set to at least 'alert' on every single category so the URL actually gets recorded. You then would have to utilize an extractor to record the actual fields within the message to the proper tag and then build your report in correlation with the Traffic logs and the URL logs if you want a report similar to what your proxy was likely building.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2019 02:16:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/277967#M75532</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-07-22T02:16:39Z</dc:date>
    </item>
    <item>
      <title>Re: syslog reports (web usage)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/278000#M75537</link>
      <description>&lt;P&gt;yes we did that. We set all categories to "alert" so we are recording URLs for all categories. When searching the syslog file for the "inside,outside" and "THREAT,url" I get the URLs in field 32 fine. Extracting it and matching to source IP&amp;nbsp;is really easy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;however, there is a lot of traffic going through the firewall with the "inside,outside" and "TRAFFIC,start" pattern. And lots of it on 80 and 443. Logically all that traffic should match the URL Filtering profile, right? Does that mean we have overlapping rules that do not have URL Filtering profile&amp;nbsp;applied to them?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From your comment I reason that all "inside,outside" should match "THREAT,url" and there should not be "TRAFFIC,start" (or end) Am I missing correct? logically. Or am I missing somthing.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2019 06:27:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/278000#M75537</guid>
      <dc:creator>au_igs</dc:creator>
      <dc:date>2019-07-22T06:27:19Z</dc:date>
    </item>
    <item>
      <title>Re: syslog reports (web usage)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/278087#M75556</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/111187"&gt;@au_igs&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You appear to be looking at just two of the log databases when you filter your syslog messages, the Threat and Traffic databases.&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is a completely separate set of logs on the firewall in the URL database. This is where all of the URLs visited are actually located.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2019 12:30:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/278087#M75556</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-07-22T12:30:19Z</dc:date>
    </item>
    <item>
      <title>Re: syslog reports (web usage)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/278246#M75581</link>
      <description>&lt;P&gt;I would think so too. Is there a way to pass this information onto the syslog server?&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2019 23:36:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/278246#M75581</guid>
      <dc:creator>au_igs</dc:creator>
      <dc:date>2019-07-22T23:36:27Z</dc:date>
    </item>
    <item>
      <title>Re: syslog reports (web usage)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/281223#M75932</link>
      <description>&lt;P&gt;finally after a lot of searching I found it. URL logs are, in fact, exported as part of the&amp;nbsp;THREAT string. Only they are reported as THREAT,url&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClqKCAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClqKCAS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it's really strange. I don't know why PA do it that way, but it is what it is&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2019 01:30:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-reports-web-usage/m-p/281223#M75932</guid>
      <dc:creator>au_igs</dc:creator>
      <dc:date>2019-08-06T01:30:58Z</dc:date>
    </item>
  </channel>
</rss>

