The following content pack is available for use with a Graylog Illuminate license and Graylog Enterprise or Graylog Security. Contact sales to learn more about obtaining Illuminate.

Palo Alto is a next-generation firewall that provides real-time (line-rate, low-latency) content scanning to protect users against malicious attacks that include viruses, spyware, data leakage, and application vulnerabilities based on a stream-based threat prevention engine. This technology pack will process Palo Alto logs, providing normalization and enrichment of common events of interest.

Supported Version(s)

  • PAN-OS 11.1+

Requirements

  • Graylog Server 6.1.0+ with a valid Enterprise license
  • Palo Alto Device(s) sending Logs to the Palo Alto 11.x input on the Graylog system

Stream Configuration

This technology pack includes 1 stream:

  • "Illuminate:Palo Alto Messages"

If you were previously using the Palo Alto 9.x pack with Illuminate, this pack will use the same stream.

Hint: If this stream does not exist prior to the activation of this pack then it will be created and configured to route messages to this stream and the associated index set. There should not be any stream rules configured for this stream.

Index Set Configuration

This technology pack includes 1 index set definition:

  • "Palo Alto Logs"

Hint: If this index set is already defined, then nothing will be changed. If this index set does not exist, then it will be created based on the default Graylog index configuration. These settings can be adjusted as required after installation.

Log Collection

Palo Alto Device Logging Configuration

Configure your device(s) following the instructions in the Palo Alto logging guide using TCP as the transport and the format "BSD."

Log Processing

The Illuminate pack for Palo Alto 11.x will rename some common fields to all Palo Alto logs but primarily processes the following log types:

  • Config
  • Decryption
  • GlobalProtect
  • HIP Match
  • System
  • Threat
  • Traffic
  • User-ID

Palo Alto Logs and CSV Processing

Illuminate processes Palo Alto logs in CSV format. A common issue arises when newer versions of PAN-OS introduce additional fields. To handle these gracefully, this pack captures the extra fields in placeholder fields prefixed with additional_field_, followed by a letter corresponding to the field’s position. Letters a through x are used to represent these additional columns. These placeholders are temporary and will be replaced with properly labeled fields in a future release of the pack.

IP Field Processing

Palo Alto devices have distinct fields for device IPv4 and IPv6 addresses. When one of these values is not present, it will log that field with the value 0.0.0.0. Illuminate will reassign the IPv6 address to the appropriate IP field: source_ip, host_ip, or destination_ip.

If both IPv4 and IPv6 values are defined (e.g. not assigned the value 0.0.0.0), then no changes will be made to the field assignments.

Field Normalization

The Illuminate pack for Palo Alto will normalize fields common fields from all logs. The normalized common fields are in the following table:

Config Logs

Log Format Example

1,2024/10/04 03:46:00,,CONFIG,0,2816,2024/10/04 03:46:00,172.16.14.19,,commit,admin,Web,Submitted,,7421534605078953992,0x0,0,0,0,0,,PA-VM,0,,0,2024-10-04T03:46:00.050-07:00

Normalized Fields

Decryption Logs

Log Format Example

1,2024/11/28 04:39:15,007954000533467,DECRYPTION,0,2817,2024/11/28 04:39:15,172.16.16.11,198.51.100.20,172.16.14.28,198.51.100.20,LAN_WAN,,,web-browsing,vsys1,LAN_Zone,WAN_Zone,ethernet1/1,ethernet1/3,Licen_PA,2024/11/28 04:39:15,593,1,49984,443,12874,443,0x1400000,tcp,allow,N/A,,,,,b8b30cde-a128-468c-a1ca-69fc9cd04b22,Finished,Finished,TLS1.2,ECDHE,AES_256_GCM,SHA384,Test SSL Decryption,secp384r1,None,trusted,Trusted,Forward,01e3ae440d35ca7bc34,d8d8858803dacbb6b9002a070297eeaf0269380972364ba09e518ebe3676fa88,2024/11/12 16:00:00,2025/05/13 16:59:59,V3,2048,14,30,23,14,:::::RSA,login.live.com,DigiCert SHA2 Secure Server CA,DigiCert Global Root CA,login.live.com,,,,,,,,,2024-11-28T04:39:15.985-08:00,,,,,,,,,,,,,,,,,7442296184930041891,0x0,0,0,0,0,,PA-VM,1,internet-utility,general-internet,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,web-browsing,no,no,

Normalized Fields

GlobalProtect Logs

Log Format Example

1,2024/11/27 11:45:44,007954000533467,GLOBALPROTECT,0,2817,2024/11/27 11:45:44,vsys1,gateway-config-release,configuration,,,test,172.16.0.0-172.31.255.255,DESKTOP-FNV6TE0,172.16.14.19,0.0.0.0,192.168.40.1,0.0.0.0,23fd01a8-11d4-44cd-8be9-774d7e1b68a5,6ZVJD02,6.3.1,Windows,\"Microsoft Windows 10 Pro , 64-bit\",1,,,,success,,0,,0,Test GP GW,7441913159746584601,0x0,2024-11-27T11:45:46.019-08:00,,,,,,0,0,0,0,,PA-VM,1,

Normalized Fields

HIP Match Logs

Log Format Example

1,2024/11/27 11:45:02,007954000533467,HIPMATCH,0,2817,2024/11/27 11:45:02,test,vsys1,DESKTOP-FNV6TE0,Windows,192.168.40.1,Test_HIP,1,object,,,7441913164041551873,0x0,0,0,0,0,,PA-VM,1,0.0.0.0,23fd01a8-11d4-44cd-8be9-774d7e1b68a5,6ZVJD02,,2024-11-27T11:45:03.231-08:00,

Normalized Fields

System Logs

Log Format Example

1,2024/10/08 12:04:25,,SYSTEM,general,2816,2024/10/08 12:04:25,,general,,0,0,general,informational,\"Connection to Update server: updates.paloaltonetworks.com completed successfully, initiated by 172.16.14.40\",7421534605078955497,0x0,0,0,0,0,,PA-VM,0,0,2024-10-08T12:04:25.668-07:00

Normalized Fields

Threat Logs

Log Format Example

1,2024/12/18 03:45:54,007954000533467,THREAT,virus,2817,2024/12/18 03:45:54,172.16.16.11,89.238.73.97,172.16.14.28,89.238.73.97,LAN_WAN,,,web-browsing,vsys1,LAN_Zone,WAN_Zone,ethernet1/1,ethernet1/3,Licen_PA,2024/12/18 03:45:54,307,1,49878,443,39152,443,0x1402000,tcp,reset-server,\"eicar.com\",Eicar Test File(100000),any,medium,server-to-client,7449709697914896384,0x0,172.16.0.0-172.31.255.255,Germany,,,0,,,1,,,,,,,,0,0,0,0,0,,PA-VM,,,,,0,,0,,N/A,js,Antivirus-5010-5528,0x0,0,4294967295,,,b8b30cde-a128-468c-a1ca-69fc9cd04b22,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,0,2024-12-18T03:45:54.944-08:00,,,,internet-utility,general-internet,browser-based,4,\"used-by-malware,able-to-transfer-file,has-known-vulnerability,tunnel-other-application,pervasive-use\",,web-browsing,no,no,,,NonProxyTraffic

Normalized Fields

Traffic Logs

Log Format Example

1,2024/10/03 00:38:31,,TRAFFIC,end,2816,2024/10/03 00:38:31,172.16.16.11,172.16.14.40,172.16.14.28,172.16.14.40,LAN-WAN,,,ping,vsys1,LAN_Zone,WAN_Zone,ethernet1/1,ethernet1/3,Traffic_log1,2024/10/03 00:38:31,16,4,0,0,0,0,0x500019,icmp,allow,592,296,296,8,2024/10/03 00:38:15,0,any,,7421447455897550886,0x0,172.16.0.0-172.31.255.255,172.16.0.0-172.31.255.255,,4,4,aged-out,0,0,0,0,,PA-VM,from-policy,,,0,,0,,N/A,0,0,0,0,1c467ae3-1dd7-4dd3-976e-c2e6d98e7cc2,0,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,2024-10-03T00:38:31.407-07:00,,,internet-utility,general-internet,network-protocol,2,\"has-known-vulnerability,tunnel-other-application,pervasive-use\",,untunneled,no,no,0,NonProxyTraffic,

Normalized Fields

User-ID Logs

Log Format Example

1,2024/11/27 11:45:44,007954000533467,USERID,logout,2817,2024/11/27 11:45:44,vsys1,192.168.40.1,test,,0,1,0,0,0,vpn-client,globalprotect,7441913164041551877,0x0,0,0,0,0,,PA-VM,1,,2024/11/27 11:45:46,1,0x0,test,,2024-11-27T11:45:46.015-08:00,,client-to-server,

Normalized Fields

Hint: Prior to Illuminate 6.3.2, User was extracted as source_user, and User by Source was extracted as vendor_source_user.

Illuminate will overwrite the message field for User ID logs (normally the CSV-formatted event data) into a more brief summary of the event in question. The replacement message uses the template User-ID:{user_name} discovery:{vendor_log_subtype}, data source:{vendor_datasource} (name:{vendor_datasource_name}, type:{vendor_datasource_type}). For example, User-ID:corpuser discovery:login, data source:agent (name:CORPSYS1, type:).

Enrichments

Illuminate will enrich events with data to make working with events easier.

application_risk

Some Palo Alto logs will include a numeric risk-scoring value, assigned to the field application_risk_level for logged applications, on a scale of 1 (lowest) to 5 (highest). Illuminate also adds the field application_risk_score, which will provide a text value that reflects the rating of the numeric risk score.

Palo Alto 11 Spotlight Content Pack

The Palo Alto 11 Spotlight Pack offers an overview dashboard with the following tabs:

Overview

Traffic

Threat

Global Protect

URL Filtering

Decryption