Device > Server Profiles > Email
Table of Contents
                    
					11.0 (EoL)
						
				
		
  Expand all | Collapse all
  - 
          
                
- Firewall Overview
 - Features and Benefits
 - Last Login Time and Failed Login Attempts
 - Message of the Day
 - Task Manager
 - Language
 - Alarms
 - Commit Changes
 - Save Candidate Configurations
 - Revert Changes
 - Lock Configurations
 - Global Find
 - Threat Details
 - AutoFocus Intelligence Summary
 - Configuration Table Export
 - Change Boot Mode
 
 - 
          
                
- Objects > Addresses
 - Objects > Address Groups
 - Objects > Regions
 - Objects > Dynamic User Groups
 - Objects > Application Groups
 - Objects > Application Filters
 - Objects > Services
 - Objects > Service Groups
 - Objects > Devices
 - Objects > External Dynamic Lists
 - Objects > Custom Objects > Spyware/Vulnerability
 - Objects > Custom Objects > URL Category
 - Objects > Security Profiles > Antivirus
 - Objects > Security Profiles > Anti-Spyware Profile
 - Objects > Security Profiles > Vulnerability Protection
 - Objects > Security Profiles > File Blocking
 - Objects > Security Profiles > WildFire Analysis
 - Objects > Security Profiles > Data Filtering
 - Objects > Security Profiles > DoS Protection
 - Objects > Security Profiles > Mobile Network Protection
 - Objects > Security Profiles > SCTP Protection
 - Objects > Security Profile Groups
 - Objects > Log Forwarding
 - Objects > Authentication
 - Objects > Packet Broker Profile
 - Objects > Schedules
 
 - 
          
                
- 
      
            
- Firewall Interfaces Overview
 - Common Building Blocks for Firewall Interfaces
 - Common Building Blocks for PA-7000 Series Firewall Interfaces
 - Tap Interface
 - HA Interface
 - Virtual Wire Interface
 - Virtual Wire Subinterface
 - PA-7000 Series Layer 2 Interface
 - PA-7000 Series Layer 2 Subinterface
 - PA-7000 Series Layer 3 Interface
 - Layer 3 Interface
 - Layer 3 Subinterface
 - Log Card Interface
 - Log Card Subinterface
 - Decrypt Mirror Interface
 - Aggregate Ethernet (AE) Interface Group
 - Aggregate Ethernet (AE) Interface
 
 - Network > Interfaces > VLAN
 - Network > Interfaces > Loopback
 - Network > Interfaces > Tunnel
 - Network > Interfaces > SD-WAN
 - Network > Interfaces > PoE
 - Network > VLANs
 - Network > Virtual Wires
 - 
      
            
- Network > Routing > Logical Routers > General
 - Network > Routing > Logical Routers > Static
 - Network > Routing > Logical Routers > OSPF
 - Network > Routing > Logical Routers > OSPFv3
 - Network > Routing > Logical Routers > RIPv2
 - Network > Routing > Logical Routers > BGP
 - Network > Routing > Logical Routers > Multicast
 
 - 
      
            
- Network > Routing > Routing Profiles > BGP
 - Network > Routing > Routing Profiles > BFD
 - Network > Routing > Routing Profiles > OSPF
 - Network > Routing > Routing Profiles > OSPFv3
 - Network > Routing > Routing Profiles > RIPv2
 - Network > Routing > Routing Profiles > Filters
 - Network > Routing > Routing Profiles > Multicast
 
 - Network > Proxy
 - 
      
            
- Network > Network Profiles > GlobalProtect IPSec Crypto
 - Network > Network Profiles > IPSec Crypto
 - Network > Network Profiles > IKE Crypto
 - Network > Network Profiles > Monitor
 - Network > Network Profiles > Interface Mgmt
 - Network > Network Profiles > QoS
 - Network > Network Profiles > LLDP Profile
 - Network > Network Profiles > SD-WAN Interface Profile
 
 
 - 
      
            
 - 
          
                
- Device > Setup
 - Device > Setup > Management
 - Device > Setup > Interfaces
 - Device > Setup > Telemetry
 - Device > Setup > Content-ID
 - Device > Setup > WildFire
 - Device > Setup > ACE
 - Device > Setup > DLP
 - Device > Log Forwarding Card
 - Device > Config Audit
 - Device > Administrators
 - Device > Admin Roles
 - Device > Access Domain
 - Device > Authentication Sequence
 - Device > IoT > DHCP Server
 - Device > Device Quarantine
 - 
      
            
- Security Policy Match
 - QoS Policy Match
 - Authentication Policy Match
 - Decryption/SSL Policy Match
 - NAT Policy Match
 - Policy Based Forwarding Policy Match
 - DoS Policy Match
 - Routing
 - Test Wildfire
 - Threat Vault
 - Ping
 - Trace Route
 - Log Collector Connectivity
 - External Dynamic List
 - Update Server
 - Test Cloud Logging Service Status
 - Test Cloud GP Service Status
 
 - Device > Virtual Systems
 - Device > Shared Gateways
 - Device > Certificate Management
 - Device > Certificate Management > Certificate Profile
 - Device > Certificate Management > OCSP Responder
 - Device > Certificate Management > SSL/TLS Service Profile
 - Device > Certificate Management > SCEP
 - Device > Certificate Management > SSL Decryption Exclusion
 - Device > Certificate Management > SSH Service Profile
 - Device > Response Pages
 - Device > Server Profiles
 - Device > Server Profiles > SNMP Trap
 - Device > Server Profiles > Syslog
 - Device > Server Profiles > Email
 - Device > Server Profiles > HTTP
 - Device > Server Profiles > NetFlow
 - Device > Server Profiles > RADIUS
 - Device > Server Profiles > SCP
 - Device > Server Profiles > TACACS+
 - Device > Server Profiles > LDAP
 - Device > Server Profiles > Kerberos
 - Device > Server Profiles > SAML Identity Provider
 - Device > Server Profiles > DNS
 - Device > Server Profiles > Multi Factor Authentication
 - Device > Local User Database > Users
 - Device > Local User Database > User Groups
 - Device > Scheduled Log Export
 - Device > Software
 - Device > Dynamic Updates
 - Device > Licenses
 - Device > Support
 - Device > Policy Recommendation > IoT
 - Device > Policy > Recommendation SaaS
 
 - 
          
                
- Device > User Identification > Connection Security
 - Device > User Identification > Terminal Server Agents
 - Device > User Identification > Group Mapping Settings
 - Device > User Identification> Trusted Source Address
 - Device > User Identification > Authentication Portal Settings
 - Device > User Identification > Cloud Identity Engine
 
 - 
          
                
- Network > GlobalProtect > MDM
 - Network > GlobalProtect > Clientless Apps
 - Network > GlobalProtect > Clientless App Groups
 - Objects > GlobalProtect > HIP Profiles
 
 - 
          
                
- Use the Panorama Web Interface
 - Context Switch
 - Panorama Commit Operations
 - Defining Policies on Panorama
 - Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
 - Panorama > Setup > Interfaces
 - Panorama > High Availability
 - Panorama > Firewall Clusters
 - Panorama > Administrators
 - Panorama > Admin Roles
 - Panorama > Access Domains
 - Panorama > Device Groups
 - Panorama > Plugins
 - Panorama > Log Ingestion Profile
 - Panorama > Log Settings
 - Panorama > Server Profiles > SCP
 - Panorama > Scheduled Config Export
 - Panorama > Device Registration Auth Key
 
 
                            End-of-Life (EoL)
                        
                    Device > Server Profiles > Email
Select DeviceServer ProfilesEmail or PanoramaServer ProfilesEmail to configure a server profile
      
  
   for forwarding logs
as email notifications. To define an Email server profile, Add a
profile and specify Email Notification Settings.
  - To select the Email Server profile for System, Config, User-ID, HIP Match, and Correlation logs, see Device > Log Settings.
 - To select the Email Server Profile For Traffic, Threat, Wildfire, URL Filtering, Data Filtering, Tunnel Inspection, Authentication, and GTP logs, see Objects > Log Forwarding.
 - You can also schedule email reports (Monitor > PDF Reports > Email Scheduler).
 - You cannot delete a server profile that the firewall uses in any System or Config log settings or Log Forwarding profile.
 
Email Notification Settings  | Description  | 
|---|---|
Name  | Enter a name for the server profile (up
to 31 characters). The name is case-sensitive and must be unique.
Use only letters, numbers, spaces, hyphens, and underscores.  | 
Location (Virtual systems only) | Select the scope in which the profile is
available. In the context of a firewall that has more than one virtual
system (vsys), select a vsys or select Shared (all
virtual systems). In any other context, you can’t select the Location;
its value is predefined as Shared (firewalls) or as Panorama.
After you save the profile, you can’t change its Location.  | 
| Servers Tab | |
Name  | Enter a name to identify the server (up
to 31 characters). This field is just a label and does not have
to be the host name of an existing email server.  | 
Email Display Name  | Enter the name shown in the From field
of the email.  | 
From  | Enter the sender’s email address, such as security_alert@company.com.  | 
To  | Enter the email address of the recipient.  | 
Additional Recipient  | Optionally, enter the email address of another
recipient. You can only add one additional recipient. To add multiple
recipients, add the email address of a distribution list.  | 
Email Gateway  | Enter the IP address or host name of the
server that sends the email.  | 
Protocol  | Select the protocol you want to use to send
the email (Unauthenticated SMTP or SMTP
over TLS).  | 
Port  | Enter the port number you want to use to send the email if it differs from the default (25 for SMTP or 587 for TLS). | 
TLS Version (SMTP over TLS only) | Select the TLS version you want to use (1.2 or 1.1).  As a best practice, we strongly recommend using
the latest TLS version.  | 
Authentication Method (SMTP over
TLS only) | Select the authentication method you want
to use: 
  | 
Certificate Profile (SMTP over TLS only) | Select the certificate profile for
the firewall to use to authenticate the email server.  | 
Username (SMTP over TLS only) | Enter the username of the account that sends
the email.   | 
Password (SMTP over TLS only) | Enter the password of the account that sends
the email.   | 
Confirm Password (SMTP over TLS only) | Confirm the password of the account that
sends the email.  | 
Test Connection (SMTP over TLS only) | Confirm the connection between the email
server and the firewall.   | 
| Custom Log Format Tab | |
Log Type  | Click the log type to open a dialog box
that allows you to specify a custom log format. In the dialog box,
click a field to add it to the Log Format area. Click OK to
save your changes.  | 
Escaping  | Specify the Escaped Characters (all characters
to not interpret literally) without spaces and specify the Escape
Character for the escape sequence.  |