Clarification on System Log Subtypes Categorized as Security Events

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

Clarification on System Log Subtypes Categorized as Security Events

L1 Bithead

I’m currently reviewing the subtypes available under System Logs in Palo Alto Networks, and I’d like to confirm which of the following subtypes are categorized or considered as Security related events.

here is the list I've:

  •  Auth
  • crypto
  • dhcp
  • dnsproxy
  • dos
  • general
  • global-protect
  • ha
  • hw
  • nat
  • ntpd
  • pbf
  • port
  • pppoe
  • ras
  • routing
  • satd
  • sslmgr
  • sslvpn
  • userid
  • url-filtering
  • vpn
  • wildfire

Could someone please confirm which of these are considered Security-focused subtypes? If there's any documentation link or reference that details this categorization, that would be greatly appreciated as well.

1 accepted solution

Accepted Solutions

Cyber Elite
Cyber Elite

Hello @suresh.nalamolu

 

thanks for post!

 

Based on documentation: System Log Fields the list of System log sub types you mentioned in your post is complete. In general, System logs are related to Firewall's health / Firewall's operation events / Outcome of Firewall's configuration.

 

As Security Analyst / SOC Analyst / Security Engineer, I would be looking more into Threat, WildFire, URL and Traffic logs. System logs are more important for Firewall Administrator. Personally, I found some of the system logs useful. For example Auth system log sub type is handy to detect excessive logging failures, credential brute forcing into Firewall. Other than this, I found all other log types more handy for Firewall admin.

 

Kind Regards

Pavel  

Help the community: Like helpful comments and mark solutions.

View solution in original post

1 REPLY 1

Cyber Elite
Cyber Elite

Hello @suresh.nalamolu

 

thanks for post!

 

Based on documentation: System Log Fields the list of System log sub types you mentioned in your post is complete. In general, System logs are related to Firewall's health / Firewall's operation events / Outcome of Firewall's configuration.

 

As Security Analyst / SOC Analyst / Security Engineer, I would be looking more into Threat, WildFire, URL and Traffic logs. System logs are more important for Firewall Administrator. Personally, I found some of the system logs useful. For example Auth system log sub type is handy to detect excessive logging failures, credential brute forcing into Firewall. Other than this, I found all other log types more handy for Firewall admin.

 

Kind Regards

Pavel  

Help the community: Like helpful comments and mark solutions.
  • 1 accepted solution
  • 422 Views
  • 1 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!