Want to learn more about the best ways to use syslogs
to associate users with authentication events that originate from
many different types of sources?
Palo Alto Networks firewalls can parse Syslog
messages to obtain IP address-to-username mappings. You can use
authentication events from existing network services and devices
such as third-party VPN solutions, Network Access Control (NAC)
solutions, or Security Information and Event Management (SIEM) systems
using Syslog messages. To keep user mappings current, you can also
configure the firewall to parse syslog messages for logout events
to automatically delete obsolete mappings.