<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: log at session end? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/log-at-session-end/m-p/435657#M96089</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70284"&gt;@SThatipelly&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;So the thing to keep in mind is that (in a normal configuration) the firewall will be analyzing the session looking for things like vulnerabilities or malicious files already. If it identifies anything, it'll generate the log for the identification and likely close the session at the same time depending on how you have things configured.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the event that you simply want to know that you have a long-running session being used to transfer files, logging at session start really wouldn't give you any additional information there through traffic logs. It's just going to log the start and end of the session. You really need to be monitoring the current sessions traffic to really can actionable information from that regard, which would generally be done via netflow monitoring or using SNMP/API to monitor the session table.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 22 Sep 2021 03:41:09 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2021-09-22T03:41:09Z</dc:date>
    <item>
      <title>log at session end?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/log-at-session-end/m-p/435574#M96084</link>
      <description>&lt;P&gt;I have around 500 policies having 'log at session end' enabled and 'log at session start' disabled. I know Palo recommends logging at session end only but I also have a concern that for eg. a malicious file export that lasts for 8 hours and 10gigs go unnoticed if the session wasn't logged at the start. I am in a dilemma to enable the logging at start or not. Please shed some light on this.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Sep 2021 18:56:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/log-at-session-end/m-p/435574#M96084</guid>
      <dc:creator>SThatipelly</dc:creator>
      <dc:date>2021-09-21T18:56:46Z</dc:date>
    </item>
    <item>
      <title>Re: log at session end?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/log-at-session-end/m-p/435657#M96089</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70284"&gt;@SThatipelly&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;So the thing to keep in mind is that (in a normal configuration) the firewall will be analyzing the session looking for things like vulnerabilities or malicious files already. If it identifies anything, it'll generate the log for the identification and likely close the session at the same time depending on how you have things configured.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the event that you simply want to know that you have a long-running session being used to transfer files, logging at session start really wouldn't give you any additional information there through traffic logs. It's just going to log the start and end of the session. You really need to be monitoring the current sessions traffic to really can actionable information from that regard, which would generally be done via netflow monitoring or using SNMP/API to monitor the session table.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Sep 2021 03:41:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/log-at-session-end/m-p/435657#M96089</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-09-22T03:41:09Z</dc:date>
    </item>
  </channel>
</rss>

