# Palo Alto Networks Firewall via Radiant Agent

In this guide, you will configure Palo Alto Networks Firewall to forward logs to your Radiant Agent via syslog using Radiant's custom log template.

### Prerequisites

* [ ] Palo Alto: `Administrator`

### Add the data connector in Radiant Security

First, you’ll add the Palo Alto Networks Firewall data connector in Radiant Security to create a certificate that you’ll use to create the syslog server in Palo Alto.

1. Log in to [Radiant Security](https://app.radiantsecurity.ai/)
2. From the navigation menu, click **Settings** > **Data Connectors** and click **+ Add Connector**.
3. Search for and select the **Radiant Agent** option and then click **Data Feeds.**
4. Under S**elect your data feeds**, select the **Palo Alto Firewall 9.1** data feed and then click **Credentials.**
5. Under **Credential Name,** give the credential an identifiable name (e.g. `Radiant Agent Integration`). If you already have a Radiant Agent in place, select it from the drop-down menu.
6. Click **Add Connector.**

### Configure the syslog server

1. On the left navigation list, expand **Server Profiles** and click **Syslog.**

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FR6Rzbori1qbjrL7LkEJr%2FPalo_Alto_Networks_Syslog_09.webp?alt=media&#x26;token=2c1ae41a-2ef1-41d5-a157-4ccf6ffb5d9e" alt="" width="187"><figcaption></figcaption></figure></div>

2. At the bottom of the right pane, click **Add.**

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FFKoq07XUiNtc14QC2wla%2FPalo_Alto_Networks_Syslog_10.webp?alt=media&#x26;token=f95bb8d0-964d-450a-9c3a-6b88001654e0" alt=""><figcaption></figcaption></figure></div>

3. Under **Syslog** **Server** **Profile**, fill in the following details:

   * Name: `RadiantSecurity`

   Click **Add** to add a server, choose the configuration according to your setup:

   * **Name**: `RadiantSecurity Agent`
   * **Syslog Server**: `<Radiant Security Agent local IP address>`&#x20;
   * **Transport**: `TCP`
   * **Port**: `<Port Configured to Receive PAN Firewall Data>` (ask your Customer Success rep. if unsure)  &#x20;

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2Fwx8iobB6h0snAcqcFRd7%2FPalo_Alto_Networks_Syslog_11.webp?alt=media&#x26;token=ff80ecf4-da56-44e3-af37-15eb7bd4ae36" alt="" width="328"><figcaption></figcaption></figure></div>

4. Then, click the **Custom Log Format** tab.

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2Fq2mJPp6x4LLMLAL2hZsH%2FPalo_Alto_Networks_Syslog_12.webp?alt=media&#x26;token=c5faf117-56a8-4d75-a05e-9d51b510a2fc" alt="" width="375"><figcaption></figcaption></figure></div>

5. In the **Log** **Type** column, for each **Log** **Type** click on the name and paste the corresponding log format for that log type on the **Config** **Log** Format text box. The log formats can be found in [this file for download](https://files.gitbook.com/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FfNLNrMXXx8yUsLd0qCOi%2FRadiant%20Security%20PAN%20Custom%20Templates.zip?alt=media\&token=9d76878a-32ab-43ed-b084-15206ffb810a).

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2F1RnwYQ8RoT5ZvUyxvt4f%2FPalo_Alto_Networks_Syslog_13.webp?alt=media&#x26;token=913423c9-287f-43e1-b3d1-9f615c8c0b0d" alt="" width="375"><figcaption></figcaption></figure></div>

5. Click **OK** to save the configuration.
6. Repeat **steps 2-6** for all 14 **Log Types**.
7. Once all 14 Log Types have been updated, click **OK** on the syslog configuration screen.

### Configure log settings

1. On the left navigation list, under **Certificate** **Management**, click **Log Settings.**

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FSxsljsSvJ9nyJrrdvre7%2FPalo_Alto_Networks_Syslog_14.webp?alt=media&#x26;token=e9c3b1a4-5d0a-4120-af1b-ba1e9e27690a" alt=""><figcaption></figcaption></figure></div>

2. In each box for **System**, **Configuration**, **User-ID**, **HIP Match**, **GlobalProtect**, and **IP-Tag** complete the following:
   * Click **Add**.
   * Under **Log** **Settings - System**, fill in the following details:
     * **Name**: Radiant Security
     * **Filter**: All Logs
     * Under **Syslog**, Click **Add** and select the **Syslog Server Profile** (**RadiantSecurity**) that you created in the previous section
   * Click **OK** to save and repeat **step 2** for each firewall log: **System**, **Configuration**, **User-ID**, **HIP** **Match**, **GlobalProtect**, and **IP-Tag**.

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2Fmx6msL8WM9WjKr8Zo1Qf%2FPalo_Alto_Networks_Syslog_15.webp?alt=media&#x26;token=238bc4f1-959c-4833-bd9d-6fac4ecc2df2" alt=""><figcaption></figcaption></figure></div>

### Configure syslog log forwarding

{% hint style="info" %}
**Note**: If log forwarding is already configured on your firewall, add the newly created Radiant Security syslog server to the existing log forwarding profile *without removing any current settings*. This ensures that syslog messages are sent to both destinations simultaneously.
{% endhint %}

1. On the top navigation bar, click **Objects**.

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2F6RD6uuRspd1bWpmfqBNW%2FPalo_Alto_Networks_Syslog_16.webp?alt=media&#x26;token=5ae76a9e-b948-4275-9a0d-cb88ae34dc03" alt=""><figcaption></figcaption></figure></div>

2. On the left navigation list, under **Security Profiles**, click **Log Forwarding.**

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FxYZygg6l32aNEI9AfZ2x%2FPalo_Alto_Networks_Syslog_17.webp?alt=media&#x26;token=00aaf879-c69c-42d4-b39d-2bd56c4bdc92" alt=""><figcaption></figcaption></figure></div>

3. At the bottom of the right pane, click **Add.** If log forwarding is already configured on your firewall, instead of adding a new profile, **Edit** the current one.

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FM9k0AtOEvyZm4whBC1Ab%2FPalo_Alto_Networks_Syslog_18.webp?alt=media&#x26;token=1a99f09f-4b58-4866-92be-7574044e3790" alt=""><figcaption></figcaption></figure></div>

4. Under **Log** **Forwarding** **Profile**, fill in the following details:
   * **Name**: Radiant Security Log Profile

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FWplqgvn25BqQJC6UsxY4%2FPalo_Alto_Networks_Syslog_19.webp?alt=media&#x26;token=165c3ff3-dad4-472a-9821-8dc26d3efd3a" alt="" width="375"><figcaption></figcaption></figure></div>

5. Then click **Add** to add a log forwarding profile match. In the **Log Forwarding Profile Match List** pane, for each **Log Type** fill in the following details.&#x20;

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2F93uc4X9ErAoUr0Wn1EiK%2FPalo_Alto_Networks_Syslog_20.webp?alt=media&#x26;token=b30d0a8f-1ee7-46ea-9b2f-9c87214718cf" alt="" width="375"><figcaption></figcaption></figure></div>

* Note that if the existing log forwarding profile doesn't have all the **Log** **Types** selected then follow the steps below to add them to the profile.
  * **Name**: Use the same name as the **Log Type**
  * **Panorama**: Enable this option if you use Panorama for log forwarding
  * Under **Syslog**, click **Add** and select the syslog profile (**RadiantSecurity**) that you created in the previous section
  * Click **OK** to save the configuration

6. Once all Log Types are added, click **OK** to save on the **Log Forwarding Profile** pane.
7. Now to assign the **Log** **Forwarding** **profile** to policy rules, navigate to **Policies** > **Security**. Complete the following steps for each rule that you want to trigger log forwarding to Radiant Security:
   * Edit the rule.
   * Select **Actions** and select the **Radiant Security Log Forwarding** profile.
   * For **Traffic Logs**, select **Log at Session End**.
   * For **Threat Logs**, select the security profile required to trigger log generation.
8. Remember to commit the changes by clicking the **Commit** button in the upper right hand corner.

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2F6jDmytFOU5K7zduNgppN%2FPalo_Alto_Networks_Syslog_21.webp?alt=media&#x26;token=be239ebd-eb13-4e00-b32e-e3fd89474530" alt=""><figcaption></figcaption></figure></div>

9. Once the **Commit Status** progress is completed, the configured syslog formats will be used to send logs to Radiant Security.

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FzKWmteFRxUKSS0f57lJo%2FPalo_Alto_Networks_Syslog_22.webp?alt=media&#x26;token=e3eefec7-430c-4d35-a0fb-fa9b9a9312a4" alt="" width="375"><figcaption></figcaption></figure></div>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://help.radiantsecurity.ai/radiant-connectors/data-connectors/palo-alto-networks-firewall-via-radiant-agent.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
