Palo Alto Firewall Syslog Filter Documentation
1. Introduction
This guide outlines how to configure Syslog filters on Palo Alto Networks firewalls to control which logs are sent to external Syslog servers. Proper filtering reduces noise, focuses on relevant events, and improves SIEM performance.
2. Syslog Overview
Syslog is a protocol used to send logs from network devices to centralized logging systems. Palo Alto firewalls support syslog forwarding for various log types: traffic, threat, system, and configuration.
3. Components Involved
Component |
Description |
---|---|
Syslog Server Profile |
Defines the destination server and syslog transport type |
Log Forwarding Profile |
Specifies what logs to forward and to whom |
Security Policy |
Determines when logs are generated and which are forwarded |
4. Configuration Steps
4.1 Create Syslog Server Profile
Navigate to: Device > Server Profiles > Syslog
Steps:
-
Under Syslog Server, click Add and enter:
-
(Optional) Add a Filter to specify:
-
Click OK
4.2 Create Log Forwarding Profile
Navigate to: Objects > Log Forwarding
Steps:
-
Name it (example: syslog)
4.3 Apply Log Forwarding to Security Policy
Navigate to: Policies > Security
Steps:
-
Locate and edit the security policy you want to apply logging to.
-
Click the Actions tab.
-
In the Log Forwarding field, select the log forwarding profile you created.
-
(Optional) Enable logging at session start/end.
Reference Links: https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/monitoring/use-syslog-for-monitoring/configure-syslog-monitoring
Reference Video: https://www.youtube.com/watch?v=ftR3DU2MtjY&t=137s
No Comments