12-21-2010 09:44 AM
Ths is not possible in the curent release or the effort to do this is just too much to be practical. What are you trying to accomplish? Why is one threat or a small list of threats more worthy of an email notification than all of the Critical or High threats? I could revise my response depending on your answer
12-21-2010 10:19 AM
I don't have a specific example yet, It was a question that came about from curiousity. Instead of checking the logs every now and then, I thought it would be a good idea to be able to be notified of a particular threat(s) as it happens. Not just all the ones that fall under the same Severity level.
edit: Here's an example. It would be nice to be notified when Palo Alto detects a user using any kind of "remote-access" application as it happens.
12-21-2010 10:57 AM
Log forwarding profiles can be enabled per policy, so you can create a Security Policy rule that allows "remote-access" applications with an application filter. Then attach a log forwarding profile that emails for every session. Since the emails will only apply to applications that match that rule, you effectively get an email every time a user completes a remote-access session.
You can also turn on session logging at start for that rule so you get the email as soon as the session is identified as a remote-access application.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!