Hello @CraigAddison for Traffic, Threat, URL, Data Filtering, WildFire,...logs you have to enable Log Forwarding profile under each security policy. This type of log gets generated depending on log type when for example security policy is getting hit, threat signature is getting hit, there is a URL category match. As long as you have: "Log at Session End" enabled and a Log Forwarding profile in place with Panorama set as destination, logs will be sent to Panorama's log collector. Here is corresponding KB: https://knowledgebase.paloaltonetworks.com/kcSArticleDetail?id=kA10g000000ClGL For System, Configuration, User-ID... logs, you can configure it from Device > Log Settings. This log will get forwarded to Panorama's log collector as it gets generated on Firewall. Since this log type is not traffic dependent even passive Firewall will generated some system logs. If you do not see logs in Panorama, I would recommend to go through this KB: https://knowledgebase.paloaltonetworks.com/kCSArticleDetail?id=kA10g000000ClXA I would check below points: - Make sure that Firewall is assigned to log collector and this change has been committed and pushed to log collector. - Make sure that on Firewall side from CLI: "show log-collector preference-list" you will see log collectors IP addresses. I had a case before that this was not applied until I restarted management process. - Make sure you will see the log received in Panorama from CLI: show logging-status device <serial number>. - Make sure that Firewall and Panorama are using the same time/time zone. - Make sure there are no restrictions/blocked ports between Firewall and log collector. Kind Regards Pavel
... View more