View DNS Security Logs
Focus
Focus
DNS Security

View DNS Security Logs

Table of Contents

View DNS Security Logs

Where Can I Use This?
What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
  • NGFW (Managed by Strata Cloud Manager)
  • NGFW (PAN-OS or Panorama Managed)
  • VM-Series
  • CN-Series
  • DNS Security License
  • Advanced Threat Prevention or Threat Prevention License
You can browse, search, and view DNS Security logs that are automatically generated when DNS Security encounters a qualifying event. Typically, this includes any domain category that DNS Security analyzes unless it is specifically configured with a log severity level of none. Log entries provide numerous details about the event, including the threat level and, if applicable, the nature of threat.
DNS Security logs are accessible directly on the firewall or through
Strata Logging Service
-based log viewers (
AIOps for NGFW Free
,
Cloud Management
,
Strata Logging Service
, etc). While the firewall allows you to access malicious threat log entries that are generated when users make DNS queries, benign DNS requests are not recorded. DNS Security data is also forwarded to
Strata Logging Service
through log forwarding (as threat logs) and DNS Security telemetry (as DNS Security logs), which are then referenced by various activity log viewer applications. DNS Security telemetry operates with minimal overhead, which limits the amount of data sent to
Strata Logging Service
; as a result, only a subset of DNS queries are forwarded to
Strata Logging Service
as DNS Security log entries, regardless of the severity level, threat type, or category. The threat logs for malicious DNS requests that are forwarded to
Strata Logging Service
using log forwarding are available in their entirety. As a result, Palo Alto Networks recommends viewing logs for malicious DNS requests as threat logs instead of DNS Security logs.

Cloud Management

Benign DNS queries that have been analyzed by DNS Security are not displayed in the log viewer. Log in to your
Strata Logging Service
app to access benign DNS log entries.
  1. Use the credentials associated with your Palo Alto Networks support account and log in to the
    Strata Cloud Manager
    on the hub.
  2. Search for DNS queries that have been processed using DNS Security.
    1. Select
      Incidents and Alerts
      Log Viewer
      .
    2. Constrain your search using the threat filter and submit a log query based on the DNS category, for example,
      threat_category.value = 'dns-c2'
      to view logs that have been determined to be a C2 domain. To search for other DNS types, replace c2 with another supported DNS category (ddns, parked, malware, etc). Adjust the search criteria as necessary for your search, including additional query parameters (such as the severity level and subtype) along with a date range.
    3. Select a log entry to view the details of a detected DNS threat.
    4. The threat
      Category
      is displayed in the
      General
      pane of the detailed log view. Other relevant details about the threat are displayed in their corresponding windows.

PAN-OS & Panorama

  1. Search for activity on the firewall for queries that have been processed using DNS Security.
    1. Select
      Monitor
      Logs
      Threat
      and filter based on the DNS category, for example,
      ( category-of-threatid eq dns-c2 )
      to view logs that have been determined to be a C2 domain. To search for other DNS types, replace c2 with another supported DNS category (ddns, parked, malware, etc).
    2. Select a log entry to view the details of a detected DNS threat.
    3. The threat
      Category
      is displayed in the
      Details
      pane of the detailed log view. Other relevant details about the threat are displayed in their corresponding windows.

AIOps for NGFW Free

Benign DNS queries that have been analyzed by DNS Security are not displayed in the
AIOps for NGFW Free
log viewer. Log in to your
Strata Logging Service
app to access benign DNS log entries.
  1. Use the credentials associated with your Palo Alto Networks support account and log in to the
    AIOps for NGFW Free
    application on the hub.
  2. Search for DNS queries that have been processed using DNS Security in
    AIOps for NGFW Free
    .
    1. Select
      Incidents and Alerts
      Log Viewer
      .
    2. Constrain your search using the threat filter and submit a log query based on the DNS category, for example,
      threat_category.value = 'dns-c2'
      to view logs that have been determined to be a C2 domain. To search for other DNS types, replace c2 with another supported DNS category (ddns, parked, malware, etc). Adjust the search criteria as necessary for your search, including additional query parameters (such as the severity level and subtype) along with a date range.
    3. Select a log entry to view the details of a detected DNS threat.
    4. The threat
      Category
      is displayed in the
      Details
      pane of the detailed log view. Other relevant details about the threat are displayed in their corresponding windows.

Strata Logging Service

  1. Use the credentials associated with your Palo Alto Networks support account and log in to the
    Strata Logging Service
    application on the hub.
  2. Allocate Storage Based on Log Type. If storage space has not been allocated for DNS Security logs on
    Strata Logging Service
    , logging entries will not be viewable through
    Strata Logging Service
    .
  3. Search for DNS queries that have been processed using DNS Security in
    Strata Logging Service
    .
    1. Select
      Explore
      to open the
      Strata Logging Service
      log viewer.
    2. Constrain your search using the threat filter and submit a log query based on the DNS category, for example,
      threat_category.value = 'dns-c2'
      to view logs that have been determined to be a C2 domain. To search for other DNS types, replace c2 with another supported DNS category (ddns, parked, malware, etc). Adjust the search criteria as necessary for your search, including additional query parameters (such as the severity level and subtype) along with a date range.
    3. Select a log entry to view the details of a detected DNS threat.
    4. The threat
      Category
      is displayed in the
      Details
      pane of the detailed log view. Other relevant details about the threat are displayed in their corresponding windows.

Recommended For You