Global Find
Table of Contents
Expand all | Collapse all
-
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > GTP Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Decryption > Forwarding Profile
- Objects > Schedules
-
-
- Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > VLANs
- Network > Virtual Wires
-
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
-
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
-
- Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
-
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Device Block List
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
-
- Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Scheduled Config Export
End-of-Life (EoL)
Global Find
Global Find enables you to search the candidate configuration on a firewall or on Panorama for a
particular string, such as an IP address, object name, policy name, threat ID, rule
UUID, or application name. You can use Global Find to search for IP addresses within
external dynamic lists. The search results are grouped by category and provide links to
the configuration location in the web interface so that you can easily find all of the
places where the string exists or is referenced.
To launch global find, click the Search icon
on the
upper right side of the web interface. Global Find is available
from all web interface pages and locations. The following is a list
of Global Find features to help you perform successful searches:
- If you initiate a search on a firewall that has multiple virtual systems enabled or if administrative roles are defined, Global Find will return results only for areas of the firewall for which you have permission to access. The same applies to Panorama device groups; you will see search results only for device groups to which you have administrative access.
- Spaces in search text are handled as AND operations. For example, if you search on corp policy, both corp and policy must exist in the configuration item for it to be included in the search results.
- To find an exact phrase, surround the phrase in quotes.
- To re-run a previous search, click Global Find and a list of the last 20 searches are displayed. Click any item in the list to re-run that search. The search history list is unique to each administrative account.
Global Find is available for each field that is searchable. For
example, in the case of a Security policy, you can search on the
following fields: Name, Tags, Zone, Address, User, HIP Profile,
Application, UUID, and Service. To perform a search, click the drop-down
next to any of these fields and click Global Find.
For example, if you click Global Find on
a zone named l3-vlan-trust, Global Find will search the entire configuration
for that zone name and return results for each location where the
zone is referenced. The search results are grouped by category and
you can hover over any item to view details or you can click an
item to navigate to the configuration page for that item.
Global Find does not search dynamic content that the firewall
allocates to users (such as logs, address ranges, or individual
DHCP addresses). In the case of DHCP, you can search on a DHCP server
attribute, such as the DNS entry, but you cannot search for individual
addresses issued to users. Another example is usernames that the
firewall collects when you enable the User-ID™ feature. In this
case, a username or user group that exists in the User-ID database
is only searchable if the name or group exists in the configuration,
such as when a user group name is defined in a policy. In general,
you can only search for content that the firewall writes to the configuration.
Looking for more?
Learn more about using Global Find to search
the firewall or Panorama configuration.