Configure Palo Alto Panorama custom log formats for syslog log forwarding to Radiant Security.
Overview
In this guide, you will set up Panorama to forward Palo Alto Firewall events to Radiant Security through TLS Syslog.
To do this, you’ll need to complete the following configuration steps:
- Add the data connector in Radiant Security
- Upload the certificate to Panorama
- Configure the syslog server
- Configure panorama log settings
- Configure log collector log settings
- Commit changes
Prerequisites
- Palo Alto Firewalls must be forwarding events to Panorama
- Panorama:
Administrator
- Custom log formats provided from Radiant Security
Add the data connector in Radiant Security
Upload the certificate to Panorama
Register the syslog server
Configure Panorama log settings
- Navigate to Panorama > Log Settings.
- In each box for System, Configuration, User-ID, HIP Match, GlobalProtect, and IP-Tag complete the following:
- Click Add
- Under Log Settings, fill in the following details:
- Name: Radiant Security
- Filter: All Logs
- Under Syslog, Click Add and select the Syslog Server Profile (RadiantSecurity) that you created from the previous steps
- Click OK to save and repeat for each Log Type.
- Navigate to Objects > Log Forwarding.
- Click Add.
- Under Log Settings, fill in the following details:
- Name: Radiant Security
- Add a Match List
- Under Match List, select the following Log Types: auth, data, threat, traffic, tunnel, URL, and WildFire
- Under Syslog, Click Add and select the Syslog Server Profile (RadiantSecurity) that you created in the previous section
Configure log collectors log settings
In case your environment uses log collectors, follow the steps to configure them to forward syslog to Radiant Security.
- Navigate to Panorama > Collector Groups.
- Click Collector Log Forwarding.
- In each box for System, Configuration, User-ID, HIP Match, GlobalProtect, and IP-Tag complete the following:
- Click Add.
- Under Log Settings, fill in the following details:
- Name: Radiant Security
- Filter: All Logs
- Under Syslog, Click Add and select the Syslog Server Profile (RadiantSecurity) that you created from the previous steps
- Click OK to save and repeat for each Log Type. Click OK to save and repeat step 3 for each log type: System, Configuration, User-ID, HIP Match, GlobalProtect, and IP-Tag.
Commit changes
- Lastly, remember to commit the changes by clicking the Commit button in the upper right hand corner.
- Once the Commit Status progress is completed, the configured syslog formats will be used to send logs to Radiant Security.
We value your opinion. Did you find this article helpful? Share your thoughts by clicking here or reach to our Product and Customer Success teams at support@radiantsecurity.ai
Last updated: 2024-08-28