# Palo Alto Firewall Syslog Filter Documentation ##### **1. Introduction** This guide outlines how to configure **Syslog filters** on Palo Alto Networks firewalls to control which logs are sent to external Syslog servers. Proper filtering reduces noise, focuses on relevant events, and improves SIEM performance. ##### **2. Syslog Overview** Syslog is a protocol used to send logs from network devices to centralized logging systems. Palo Alto firewalls support syslog forwarding for various log types: **traffic**, **threat**, **system**, and **configuration**. ##### **3. Components Involved**
##### Component ##### Description
##### Syslog Server Profile ##### Defines the destination server and syslog transport type
##### Log Forwarding Profile ##### Specifies what logs to forward and to whom
##### Security Policy ##### Determines when logs are generated and which are forwarded
##### **4. Configuration Steps** **4.1 Create Syslog Server Profile** ##### Navigate to: **Device** > **Server Profiles** > **Syslog** ##### **Steps:** 1. Click **Add** to create a new profile. [![2025-06-19_11-20.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/UVKt7zpsTvW9bCUI-2025-06-19-11-20.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/UVKt7zpsTvW9bCUI-2025-06-19-11-20.png) 2. Enter a **Name (e.g., SIEM-Syslog). [![syslog name.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/KZGuGzwbBSly05zw-syslog-name.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/KZGuGzwbBSly05zw-syslog-name.png)** 3. Under **Syslog Server**, click **Add** and enter: - **Name**: e.g., SIEM-Server - **Server**: IP or hostname of your syslog server - **Transport**: UDP, TCP, or SSL - **Port**: Default is 514 (UDP) - **Facility**: e.g., local4 - **Format**: BSD or IETF [![2025-06-19_11-33.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/jm5IZn8oPyzwM6iS-2025-06-19-11-33.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/jm5IZn8oPyzwM6iS-2025-06-19-11-33.png) 4. (Optional) Add a **Filter** to specify: - **Log Type**: Threat, Traffic, System, Config - **Severity**: Info, Low, Medium, High, Critical [![levels.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/NFrEro1pXoJSroAi-levels.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/NFrEro1pXoJSroAi-levels.png) 5. Click **OK** ##### **4.2 Create Log Forwarding Profile** ##### Navigate to: **Objects** > **Log Forwarding** **[![objects.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/LUCzkkk4DwCi2xW7-objects.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/LUCzkkk4DwCi2xW7-objects.png)** ##### **Steps:** 1. Click **Add** to create a new log forwarding profile. [![add.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/RBWMVx9jxKAdvLnd-add.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/RBWMVx9jxKAdvLnd-add.png) 2. Name it (example: syslog) 3. Under **Log Type**, click **Add** and configure: [![syslog .png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/TsTqOna0GsjIzAsU-syslog.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/TsTqOna0GsjIzAsU-syslog.png) - **Log Type**: Select Threat or Traffic [![traffic.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/cyWcOslLjexb9bjy-traffic.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/cyWcOslLjexb9bjy-traffic.png) - **Filter** (optional): For example, (severity eq high) - **Forward Method**: Select the Syslog Server Profile you created, click **Add** then select the one you **created** 4. Click **OK [![methof.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/NITyrphhyaMsouws-methof.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/NITyrphhyaMsouws-methof.png) [![okay.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/o8r1tkpKiqn7aHWT-okay.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/o8r1tkpKiqn7aHWT-okay.png)** ##### **4.3 Apply Log Forwarding to Security Policy** ##### **Navigate to: Policies > Security** **[![sections.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/w7oQKZI0gBzIvdui-sections.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/w7oQKZI0gBzIvdui-sections.png)** ##### **Steps:** 1. Locate and **edit** the security policy you want to apply logging to. 2. Click the **Actions** tab. 3. In the **Log Forwarding** field, select the log forwarding profile you created. 4. (Optional) Enable logging at session start/end. 5. Click **OK** and then **Commit** your changes. [![fd.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/QCZiWwBgPTTVKz7a-fd.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/QCZiWwBgPTTVKz7a-fd.png) Reference Links: [https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/monitoring/use-syslog-for-monitoring/configure-syslog-monitoring](https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/monitoring/use-syslog-for-monitoring/configure-syslog-monitoring "Palo alto") Reference Video: [https://www.youtube.com/watch?v=ftR3DU2MtjY&t=137s](https://www.youtube.com/watch?v=ftR3DU2MtjY&t=137s "syslog system configure")