: Use Panorama to Forward Logs to Azure Security Center
Focus
Focus

Use Panorama to Forward Logs to Azure Security Center

Table of Contents

Use Panorama to Forward Logs to Azure Security Center

Use Panorama templates and device groups to forward VM-Series firewall logs to Azure Security Center
If you are using Panorama to manage your firewalls, you can use templates and device groups to forward firewall logs to Azure Security Center. With the default Azure Security Center Log Forwarding profile, Threat and WildFire Submissions logs of low, medium, high, or critical severity generated on the firewall are displayed as security alerts on the Azure Security Center dashboard. So that you can focus and triage alerts more efficiently, you can set up granular log filters to only forward logs of interest to you, or forward high and critical severity logs only. You can also selectively attach the log forwarding profile to a few Security policy rules based on your applications and security needs.
To enable the Azure Security Center integration from Panorama, use the following workflow.
  1. From Panorama, create a template and a device group to push log forwarding settings to the firewalls that will be forwarding logs to Azure Security Center.
  2. Specify the log types to forward to the Logging Service.
    The way you enable forwarding depends on the log type. For logs that are generated based on a policy match, you use a log forwarding profile within a device group, and for other logs types you use the Log Settings configuration within a template.
    1. Configure forwarding of System, Configuration, User-ID, and HIP Match logs.
      1. Select DeviceLog Settings.
      2. Select the Template that contains the firewalls you want to forward logs to the Logging Service.
      3. For each log type that you to forward to the Logging Service, Add a match list filter. Give it a Name, optionally define a Filter.
      4. Add Built-in Actions and enter a Name. The Azure-Security-Center-Integration action will be auto selected. Click OK.
      5. Click OK.
    2. Configure forwarding of all other log types that are generated when a policy match occurs such as Traffic, Threat, WildFire Submission, URL Filtering, Data Filtering, and Authentication logs. To forward these logs, you must create and attach a log forwarding profile to each policy rule for which you want to forward logs.
      1. Select the Device Group, and then select ObjectsLog Forwarding to Add a profile. In the log forwarding profile match list, add each log type that you want to forward.
      2. Select Add in Built-in Actions to enable the firewalls in the device group to forward the logs to Azure Security Center.
      3. Create basic security policy rules in the device group you just created and select Actions to attach the Log Forwarding profile you created for forwarding logs to Azure Security Center. Until the firewall has interfaces and zones and a basic security policy, it will not let any traffic through, and only traffic that matches a security policy rule will be logged (by default).
      4. For each rule you create, select Actions and select the Log Forwarding profile that allows the firewall to forward logs to Azure Security Center.
  3. Commit your changes to Panorama and push them to the template and device group you created.
  4. Verify that the firewall logs are being forwarded to Azure Security Center.
    1. Log in the Azure portal, select Azure Security Center.
    2. Verify that you can see firewall logs as Security alerts on the Azure Security Center dashboard.