View Traffic and Threat Logs in Strata Logging Service
Table of Contents
Expand all | Collapse all
-
- Cloud NGFW for Azure
- Cloud NGFW Components
- Cloud NGFW for Azure Supported Regions
- Cloud NGFW for Azure Limits and Quotas
- Cloud NGFW for Azure Pricing
- Cloud NGFW for Azure Free Trial
- Cloud NGFW Credit Distribution and Management
- Start with Cloud NGFW for Azure
- Manage Cloud NGFW Roles for Azure Users
- Integrate Single Sign-on
- Monitor Cloud NGFW Health
- Create a Support Case
- Register Your Cloud NGFW Tenant with a Palo Alto Networks Support Account
- Cloud NGFW for Azure Certifications
- Cloud NGFW For Azure Privacy and Data Protection
-
- About Rulestacks and Rules on Cloud NGFW for Azure
- Create a Rulestack on Cloud NGFW for Azure
- Cloud NGFW for Azure Security Rule Objects
- Create a Prefix List on Cloud NGFW for Azure
- Create an FQDN List for Cloud NGFW on Azure
- Add a Certificate to Cloud NGFW for Azure
- Create Security Rules on Cloud NGFW for Azure
- Cloud NGFW for Azure Security Services
- Enable DNS Security on Cloud NGFW for Azure
- Set Up Outbound Decryption on Cloud NGFW for Azure
- Set Up Inbound Decryption on Cloud NGFW for Azure
-
- Panorama Integration
- Panorama Integration Prerequisites
- Link the Cloud NGFW to Palo Alto Networks Management
- Use Panorama for Cloud NGFW Policy Management
- Enable User-ID on the Cloud NGFW for Azure
- Configure Service Routes for On-Prem Services
- Use XFF IP Address Values in Policy
- View Cloud NGFW Logs and Activity in Panorama
- View Traffic and Threat Logs in Strata Logging Service
- Strata Cloud Manager Policy Management
-
- Configure Logging for Cloud NGFW on Azure
- Cloud NGFW for Azure Traffic Log Fields
- Cloud NGFW for Azure Threat Log Fields
- Cloud NGFW for Azure Decryption Log Fields
- Enable Log Settings
- Disable Log Settings
- Enable Activity Logging on Cloud NGFW for Azure
- Multiple Logging Destinations on Cloud NGFW for Azure
- View the Logs
- View Audit Logs on a Firewall Resource
- View Audit Logs on Resource Groups
- What's New
- Cloud NGFW for Azure Known Issues
- Cloud NGFW for Azure Addressed Issues
View Traffic and Threat Logs in Strata Logging Service
View traffic and threat logs in Strata Logging Service using Cloud NGFW for
Azure.
When you integrate Cloud NGFW with Panorama and Strata Logging Service (formerly Cortex
Data Lake), you forward logs created by your Cloud NGFW resources and view them in
Strata Logging Service. In the Strata Logging Service web interface, you can view
the Traffic, threat, and decryption logs generated by your Cloud
NGFW Resources.
If you want to view logs in Panorama you
must create a log collector.
If you're using Panorama and are not using Strata Logging
Service for log collection, you can forward logs to another entity, however, you
must enable Strata Logging Service in your logging profile.
For information about the log fields, see the Strata Logging Service Schema
Reference: Traffic, Threat, and Decryption.
Important Considerations
For existing customers who have already deployed the Cloud NGFW in Azure and would
like to use Strata Logging Service:
- Upgrade your current Panorama Plugin for Azure to version 5.2.2.
- Follow the instructions noted in this page.
- Generate the registration string from the Panorama Plugin for Azure; contact Palo Alto Networks support to update the registration string to enable the Strata Logging Service.
For new users who are deploying the Cloud NGFW resource and would like to use
the Strata Logging Service, consider the following:
- You must use Panorama to enable log forwarding to the Strata Logging Service.
The Panorama web interface continues to show Cortex Data Lake, rather than the updated product name, Strata Logging Service.
- You must the Panorama for Azure plugin version 5.2.2-c3 (or later).
- If your Panorama is setup in a HA pair, both Panorama serial numbers should be registered to the same CSP account, and should also be associated with the same Strata Logging Service.
To use Strata Logging Service with Cloud NGFW for Azure:
- Log in to your Strata Logging Service instance.Select Explore.From the query drop-down, you can select the type of logs. Each page displays 100 logs. However, you can use the Strata Logging Service Queries to refine the information displayed.Select Inventory to display information about onboarded firewalls.In the Inventory page, select Cloud NGFW.
Forward Logs to Strata Logging Service
To forward logs to Strata Logging Service:- In the Panorama console, select Objects under Device Groups.Select Log Forwarding.Click Add to create a new log forwarding match list profile.In the Log Forwarding Profile Match List screen, specify a name for the log.Select a Log Type from the drop-down.Select Panorama/Strata Logging Service as the Forward Method.Click OK.Commit and push your change.
Forward Logs without Strata Logging Service
If you're using Panorama and are not using Strata Logging Service for log collection, you can forward logs to another entity.- In the Panorama console, select Objects under Device Groups.Select Log Forwarding.Click Add to create a new log forwarding match list profile.In the Log Forwarding Profile Match List screen, specify a name for the log.Select a Log Type from the drop-down.Enable Strata Logging Service in your logging profile even if you don't intend to send logs directly to it.Click OK.Commit and push your change.