<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Syslog miner indicator in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/135374#M99334</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;threat_name == 'HTTP SQL Injection Attempt'&lt;/PRE&gt;
&lt;P&gt;Is no a right solution, log format&amp;nbsp;contains "HTTP SQL Injection Attempt(XXX)" where XXX is the threat id, and multiple theert ids contains the same Threat name&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Schermata 2017-01-02 alle 16.52.57.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/7087i0BD03FB4CCB61932/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Schermata 2017-01-02 alle 16.52.57.png" alt="Schermata 2017-01-02 alle 16.52.57.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Deinitely i need to find a regex match directive not a full equal comparison.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 02 Jan 2017 15:54:06 GMT</pubDate>
    <dc:creator>AlbertoZanon</dc:creator>
    <dc:date>2017-01-02T15:54:06Z</dc:date>
    <item>
      <title>Syslog miner indicator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/135318#M99331</link>
      <description>&lt;P&gt;Hi, i'm trying creating a&amp;nbsp;indicator for SLW injections events , extract src_ip and insert into&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Down below the code attached to the syslogminer class stdlib.syslogMiner&amp;nbsp;, unfortunaltely validate&amp;nbsp;process reports errors with the only suggestions "Condition is invalid", could be either a formatting erro or a logical erro, hard to say.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;conditions:
    type == 'THREAT'
    log_subtype == 'vulnerability'
    severity == 'medium'
    threat_name == 'HTTP SQL Injection Attempt'
    
indicators:
    src_ip
    
fields:&lt;/PRE&gt;
&lt;P&gt;Is there any document how clearly to build indicators? I only forund some examples but not a full hsow-to&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Dec 2016 10:03:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/135318#M99331</guid>
      <dc:creator>AlbertoZanon</dc:creator>
      <dc:date>2016-12-31T10:03:23Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog miner indicator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/135332#M99332</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/39611"&gt;@AlbertoZanon&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;please try this:&lt;/P&gt;
&lt;PRE&gt;conditions:
  - type == 'THREAT'
  - log_subtype == 'vulnerability'
  - severity == 'medium'
  - threat_name == 'HTTP SQL Injection Attempt'
fields:
indicators:
  - src_ip&lt;/PRE&gt;
&lt;P&gt;We should definitely work on the documentation of syslog miner &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;But &lt;EM&gt;conditions&lt;/EM&gt;, &lt;EM&gt;fields&lt;/EM&gt; and &lt;EM&gt;indicators&lt;/EM&gt; should be lists or &lt;EM&gt;null&lt;/EM&gt;. In your case they were map. You can check the YAML format here:&amp;nbsp;&lt;A href="http://yaml-online-parser.appspot.com/" target="_blank"&gt;http://yaml-online-parser.appspot.com/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 01 Jan 2017 08:14:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/135332#M99332</guid>
      <dc:creator>lmori</dc:creator>
      <dc:date>2017-01-01T08:14:04Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog miner indicator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/135334#M99333</link>
      <description>&lt;P&gt;Hi Luigi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;happy ne year! and thanks for the tip; so definitely was a formatting error. Good to know I have to follow full YML directives.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I may just a couple of questions:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1- what's the way to &amp;nbsp;include substring for a specific condition? I would like build a "contains/like" string comparison (regex related) and the code down below seems not valid for minemeld while still passes the YAML online tool check.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;conditions:
  - threat_name =~ '[Ii]njection'&lt;/PRE&gt;
&lt;P&gt;2- I also would like to track specific events by frequency and apply rule only&amp;nbsp;if a specific threshold is reached. Do you suggest using aa new processor prototype or an external pythons script ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 01 Jan 2017 09:59:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/135334#M99333</guid>
      <dc:creator>AlbertoZanon</dc:creator>
      <dc:date>2017-01-01T09:59:37Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog miner indicator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/135374#M99334</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;threat_name == 'HTTP SQL Injection Attempt'&lt;/PRE&gt;
&lt;P&gt;Is no a right solution, log format&amp;nbsp;contains "HTTP SQL Injection Attempt(XXX)" where XXX is the threat id, and multiple theert ids contains the same Threat name&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Schermata 2017-01-02 alle 16.52.57.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/7087i0BD03FB4CCB61932/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Schermata 2017-01-02 alle 16.52.57.png" alt="Schermata 2017-01-02 alle 16.52.57.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Deinitely i need to find a regex match directive not a full equal comparison.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jan 2017 15:54:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/135374#M99334</guid>
      <dc:creator>AlbertoZanon</dc:creator>
      <dc:date>2017-01-02T15:54:06Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog miner indicator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/135397#M99335</link>
      <description>&lt;P&gt;I am not sure if the matching rule-set supports regex, but I definitly want regex here and some more features to configure on syslog.Miner - eg. age_out: and other.&lt;/P&gt;
&lt;P&gt;If you want to test use a ".*" at the end of the string:&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;"HTTP SQL Injection Attempt.*"&amp;nbsp;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;I believe you already tried this, did you?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best, Klaus&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jan 2017 22:26:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/135397#M99335</guid>
      <dc:creator>KlausGroeger</dc:creator>
      <dc:date>2017-01-02T22:26:54Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog miner indicator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/135512#M99336</link>
      <description>&lt;P&gt;I tried to use wildcards in threat_name but did not succeed. Even if threat_name contains a string the use of ':' (colon) is not allowed. So this one would not work:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;- threat_name == 'SCAN: TCP Port Scan(8001)'&lt;/PRE&gt;
&lt;P&gt;We definitely need the ability to use wildcards but I fear YAML does not support it.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2017 10:59:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/135512#M99336</guid>
      <dc:creator>KlausGroeger</dc:creator>
      <dc:date>2017-01-03T10:59:05Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog miner indicator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/136394#M99337</link>
      <description>&lt;P&gt;Hi, * and other regular expressions were already tried out with no luck.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I agree with you that regex and like comparison should be added and indeed xternal YAML components like &lt;A href="http://search.cpan.org/~mschilli/YAML-Logic-0.03/Logic.pm" target="_blank"&gt;YAML::Logic&lt;/A&gt; already got in&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Jan 2017 18:00:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/136394#M99337</guid>
      <dc:creator>AlbertoZanon</dc:creator>
      <dc:date>2017-01-08T18:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog miner indicator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/136398#M99338</link>
      <description>&lt;P&gt;Hi Luigi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have setup some miners to obtain&amp;nbsp;threat intel feeds containing IOCs from our partners in addition to the minemeld base ones like Dshield, Spamhaus etc. and I have also got my PAN FW syslog being successfully processed by minemeld. &amp;nbsp;I want the IOCs from our threat feeds to be matched against my syslog for hits. &amp;nbsp;I then want to be able to investigate these hits and look at the detail of the traffic. &amp;nbsp;I tried writing an indicator rule and applying it to my panos syslog miner to match dest_ip as the indicator but must have got something wrong as the number of matches was growing too quickly. &amp;nbsp;Can you provide some doco/guidance on using indicator rules or something to help me&amp;nbsp;identify IOC hits in my syslog and investigate the detail.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Chad.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2017 00:34:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/136398#M99338</guid>
      <dc:creator>chadwalker</dc:creator>
      <dc:date>2017-01-09T00:34:55Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog miner indicator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/136585#M99339</link>
      <description>&lt;P&gt;Problem is not about YAML itself, YAML is just a way to express conditions. Conditions are boolean expressions based on simplified JMESPath expressions. You can check for a string inside a field with something like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;conditions:
  - type == 'THREAT'
  - log_subtype == 'spyware'
  - contains(threat_name, 'ZeroAccess') == true
fields: null
indicators:
  - src_ip&lt;/PRE&gt;</description>
      <pubDate>Mon, 09 Jan 2017 19:39:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/136585#M99339</guid>
      <dc:creator>lmori</dc:creator>
      <dc:date>2017-01-09T19:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog miner indicator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/136586#M99340</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/39611"&gt;@AlbertoZanon&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;please could you post a screenshot of the syslog miner rulebase ? or you could share the file named /opt/minemeld/local/config/&amp;lt;miner name&amp;gt;_rules.yml&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;luigi&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2017 19:43:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/136586#M99340</guid>
      <dc:creator>lmori</dc:creator>
      <dc:date>2017-01-09T19:43:09Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog miner indicator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/136615#M99341</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11678"&gt;@lmori&lt;/a&gt;, I changed the code uing contains directive as suggested and the hit mach are starting ramping up. For sure a wiki/doc is definetely useful for this section &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Schermata 2017-01-10 alle 00.40.41.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/7211iF298390D5422CD0C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Schermata 2017-01-10 alle 00.40.41.png" alt="Schermata 2017-01-10 alle 00.40.41.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/opt/minemeld/local/config/panos_syslog_miner_rules.ym&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;BR /&gt;- conditions: [type == 'THREAT', log_subtype == 'vulnerability', 'contains(threat_name,&lt;BR /&gt; ''HTTP SQL Injection Attempt'') == true']&lt;BR /&gt; fields: null&lt;BR /&gt; indicators: [src_ip]&lt;BR /&gt; name: sql_injection&lt;BR /&gt;- conditions: [type == 'TRAFFIC', src_location == 'IT']&lt;BR /&gt; fields: null&lt;BR /&gt; indicators: [src_ip]&lt;BR /&gt; name: test_traffic&lt;BR /&gt;- conditions: [type == 'THREAT', src_zone == 'FIBRA', dest_port != '22']&lt;BR /&gt; fields: null&lt;BR /&gt; indicators: [src_ip, url_idx]&lt;BR /&gt; name: test_threat&lt;BR /&gt;- conditions: [type == 'THREAT', log_subtype == 'vulnerability', severity == 'informational',&lt;BR /&gt; 'contains(threat_name, ''SSH2 Login Attempt'') == true']&lt;BR /&gt; fields: null&lt;BR /&gt; indicators: [src_ip]&lt;BR /&gt; name: ssh_login&lt;BR /&gt;
&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2017 23:44:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/136615#M99341</guid>
      <dc:creator>AlbertoZanon</dc:creator>
      <dc:date>2017-01-09T23:44:30Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog miner indicator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/136787#M99342</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/39611"&gt;@AlbertoZanon&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;rules looks fine, but if you are looking for a way to match PAN-OS syslog messages against indicators you should look into syslogMatcher node. The syslogMatcher node can also send the details of the matched PAN-OS session to logstash for archival.&lt;/P&gt;
&lt;P&gt;syslogMiner is useful if you want to build your own EDL with indicators extracted from PAN-OS logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What scenario are you interested in ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;luigi&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2017 15:29:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/136787#M99342</guid>
      <dc:creator>lmori</dc:creator>
      <dc:date>2017-01-10T15:29:42Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog miner indicator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/136813#M99343</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;at this stage I'm not interested&amp;nbsp;in logstash + Kibana/Elasticsearch as long term repository, so syslogMiner node type seems good enough.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Next step is to build up a processor logic so to evaluate indicators and metrics. Any useful docs to look around?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My wishes are:&lt;/P&gt;
&lt;P&gt;- extract useful indicators +&amp;nbsp;fields (ie generated_time) &amp;nbsp;[done thanks&amp;nbsp;to your&amp;nbsp;suggestions]&lt;/P&gt;
&lt;P&gt;- evaluate indicators against scripted conditions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some possible conditions&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1) accept indicators and create output EDL only if the same same value&amp;nbsp;is seeen at least a couple&amp;nbsp;of time form the same ruleid/threatid&lt;/P&gt;
&lt;P&gt;2) accept indicatos and create&amp;nbsp;&lt;SPAN&gt;output EDL only if the same value is seen from&amp;nbsp;different indicators rules&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2017 17:47:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/136813#M99343</guid>
      <dc:creator>AlbertoZanon</dc:creator>
      <dc:date>2017-01-10T17:47:39Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog miner indicator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/137516#M99344</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/39611"&gt;@AlbertoZanon&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;1) is not possible today. I would think that the best place to implement that logic is inside the syslog miner. Basically an indicator would be created only if some temporal logic is satisfied.&lt;/P&gt;
&lt;P&gt;2) what do you mean by "different indicator rules"? different syslog miner rules or different feeds ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks !&lt;/P&gt;
&lt;P&gt;luigi&lt;/P&gt;</description>
      <pubDate>Sat, 14 Jan 2017 06:09:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/137516#M99344</guid>
      <dc:creator>lmori</dc:creator>
      <dc:date>2017-01-14T06:09:06Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog miner indicator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/180501#M99345</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11678"&gt;@lmori&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Can syslog miner receive log from Palo Alto Networks NGFW platforms only&lt;/STRONG&gt;?&lt;/P&gt;
&lt;P&gt;I try send syslog CEF (correlated rule alert) from ArcSight SIEM to my hosted Minemeld. I captured traffic via tcpdump, Minemeld server get traffic from SIEM. But I &lt;U&gt;not&lt;/U&gt; found any log on Minemeld&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need to send Cyber Attack alert from rule on SIEM via syslog into &lt;U&gt;Minemeld&lt;/U&gt;.&lt;/P&gt;
&lt;P&gt;When Minemeld receive syslog (include Source Address), It will output to &lt;A href="https://suntory.scb.co.th/#/prototypes/stdlib/feedHCGreen" target="_blank"&gt;stdlib.feedHCGreen&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Then PaloAlto Firewall polling via EDL. Attacker will be blocked.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2017 08:11:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/syslog-miner-indicator/m-p/180501#M99345</guid>
      <dc:creator>iThreatHunt</dc:creator>
      <dc:date>2017-10-06T08:11:57Z</dc:date>
    </item>
  </channel>
</rss>

