Session Logging Considerations
Focus
Focus
Network Security

Session Logging Considerations

Table of Contents

Session Logging Considerations

Understanding when sessions appear in traffic logs and when to enable session start logging helps you configure effective logging policies and troubleshoot issues.
Where Can I Use This?What Do I Need?
  • NGFW (Managed by Strata Cloud Manager)
  • NGFW (Managed by PAN-OS or Panorama)
  • Prisma Access (Managed by Panorama or Strata Cloud Manager)
  • No prerequisites needed

When Sessions May Not Appear in Traffic Logs

Even with Log At Session End enabled, sessions may not appear in traffic logs in the following situations:
  • Very short-lived sessions - Sessions that complete too quickly may not generate logs due to buffer flushing or logging thresholds. Enable Log At Session Start to capture these sessions.
  • Log forwarding issues - If you misconfigure the Log Forwarding Profile, reach logging rate limits, or lose connectivity to the destination (Panorama, syslog server), logs are silently dropped.
  • Incomplete TCP sessions - TCP SYN packets that do not complete the three-way handshake, or sessions that never transmit application data may not reach the logging stage.
  • Silent threat prevention drops - Threat prevention profiles that drop traffic mid-session without logging enabled will not generate traffic logs (check threat logs instead).
  • Log storage issues - When the log disk fills or logging processes fail, session logging may not occur even though sessions are established.

Differences Between Session Start and Session End Logging

Log At Session Start generates logs when the first application data packet is transmitted (not when the TCP handshake completes). As App-ID identifies applications during the session, multiple logs may be created for a single connection as the application classification evolves (for example: ssl → facebook-base → facebook-messaging). This creates additional log entries and increases management plane CPU load.
Log At Session End generates a single log entry when the session completes, showing the final application App-ID identified and the ultimate policy rule that applied after App-ID completed. This consumes fewer resources and provides more accurate application identification.

When to Enable Log At Session Start

Enable Log At Session Start in the following situations:
  • Troubleshooting policy behavior - To see both the initial policy match (before App-ID) and the final policy match
  • Capturing very short-lived sessions - Sessions that may not generate end logs due to their brief duration
  • Monitoring long-lived sessions - GRE tunnels and OT/ICS connections that you want to see immediately in the ACC rather than waiting for the session to end
  • Debugging application identification - To see how the application classification evolves over time
For production environments, Log At Session End remains the recommended setting due to lower resource consumption and more accurate application identification.