Audit Management Logs
Focus
Focus
Prisma Access Agent

Audit Management Logs

Table of Contents
Lean how to audit management logs for the Prisma Access Agent using the log viewer.
Where Can I Use This?What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
  • Minimum Required Prisma Access Version: 5.1 Preferred or Innovation
  • Prisma Access license with the Mobile User subscription
  • Prisma Access Agent version: 25.1.0.14
  • macOS 14 and later or Windows 10 version 2024 and later desktop devices
  • Contact your Palo Alto Networks account representative to activate the Prisma Access Agent feature
The Prisma Access Agent logs any action or activity that an administrator performed on the specifically in the Inventory page that relates to another device, user, or configuration and sends the data to Strata Logging Service. You can access the logs in the log viewer or Strata Logging Service to view the management logs.
To learn how to use the log viewer, you can explore logs in detail.
You can audit the management logs or common configuration logs.
  1. To audit the management logs, open the log viewer or Strata Logging Service.
    • From Strata Cloud Manager, select Incidents & AlertsLog ViewerEndpointManagement:
    • From Strata Logging Service, select ExploreEndpointManagement.
  2. If no data is displayed, increase the time range to show more entries.
  3. To narrow the scope of the logs in the table, you can create queries based on the column headings in the log viewer, and save the queries as filters for use later.
    1. Enter a log query in the search field. Click to display a list of management log fields and select an item from the list or start entering the name of a field and select from the list of matching items.
      You can create a query for Prisma Access management logs using the information in Endpoint Logs.
    2. Select an operator, such as =, !=, < >, or LIKE and a value for the field. You can build on the query by adding AND or OR operators. For example, to audit the remote shell activities that were initiated on Windows endpoints from ManagePrisma Access Agent, you can create a query such as:
      Endpoint OS Type = 'Windows' AND Event ID Value = 'Agent Remote Shell'
      You can use the LIKE operator to filter on values that match a pattern you provide. For example, to show all event ID values that start with gateway, you can specify:
      Event ID Value LIKE 'gateway%'
    3. Select a different time range if needed.
    4. Click the right arrow to begin the query.
    5. To save the query for future use, click the filter save icon. Then, enter a descriptive Name for the query and Save the filter for future use.
    6. (Optional) Export the log query results to a .csv file and download the file to your computer for further analysis with a spreadsheet app.
    7. To view the details in a log, click the
      icon next to a log in the table to open the LOG DETAILS window.
      To show all the details in the log, select Log Details.