External Logs and Other Data
Focus
Focus
Prisma Access

External Logs and Other Data

Table of Contents

External Logs and Other Data

Prisma Access also supports the ingestion of logs and other data from a variety of external, third-party sources.
Where Can I Use This?What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
You may already be accustomed to viewing and interacting with the Prisma Access logs that are stored in theStrata Logging Service from ActivityLogs. But, did you know Prisma Access also supports the ingestion of logs and other data from a variety of external, third-party sources when you have a Cortex XDR Pro per TB license Data Lake? Once you’re set up, you can use theStrata Logging Service app on the hub to view logs and to set up log forwarding. Supported vendors include:
  • Activate the Windows Event Collector
  • Corelight Zeek
  • PAN IoT Security
  • Amazon S3
  • ElasticSearch Filebeat
  • PingFederate
  • Apache Kafka
  • Forcepoint DLP
  • PingOne for Enterprise
  • AWS
  • Fortinet Fortigate
  • Prisma Cloud
  • AWS CloudTrail and Amazon CloudWatch
  • Google Cloud Platform
  • Prisma Cloud Compute
  • Azure Event Hub
  • Google Kubernetes Engine
  • Proofpoint Targeted Attack Protection
  • Azure Network Watcher
  • Google Workspace
  • ServiceNow CMDB
  • BeyondTrust Privilege Management Cloud
  • Microsoft Azure
  • Windows DHCP using Elasticsearch Filebeat
  • Check Point FW1/VPN1
  • Microsoft Office 365
  • Workday
  • Cisco ASA
  • Okta
  • Zscaler Cloud Firewall
You can use the logs ingested from third-party sources as the sole data source or, you can use those logs in conjunction with Palo Alto Networks Prisma Access logs and additional data sources.
With Palo Alto Networks, reduce your operational burden and radically simplify your SOC operations by collecting, integrating, and normalizing data from across all data sources–Network, Endpoint, and Cloud. Get a unified view and actionable insights for application usage, traffic patterns, threats, and incidents across your enterprise.