External Logs and Other Data
Focus
Focus
Prisma Access

External Logs and Other Data

Table of Contents

External Logs and Other Data

Prisma Access
also supports the ingestion of logs and other data from a variety of external, third-party sources.
Where Can I Use This?
What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
You may already be accustomed to viewing and interacting with the
Prisma Access
logs that are stored in the
Strata Logging Service
from
Activity
Logs
. But, did you know
Prisma Access
also supports the ingestion of logs and other data from a variety of external, third-party sources when you have a Cortex XDR Pro per TB license Data Lake? Once you’re set up, you can use the
Strata Logging Service
app on the hub to view logs and to set up log forwarding. Supported vendors include:
  • Activate the Windows Event Collector
  • Corelight Zeek
  • PAN IoT Security
  • Amazon S3
  • ElasticSearch Filebeat
  • PingFederate
  • Apache Kafka
  • Forcepoint DLP
  • PingOne for Enterprise
  • AWS
  • Fortinet Fortigate
  • Prisma Cloud
  • AWS CloudTrail and Amazon CloudWatch
  • Google Cloud Platform
  • Prisma Cloud Compute
  • Azure Event Hub
  • Google Kubernetes Engine
  • Proofpoint Targeted Attack Protection
  • Azure Network Watcher
  • Google Workspace
  • ServiceNow CMDB
  • BeyondTrust Privilege Management Cloud
  • Microsoft Azure
  • Windows DHCP using Elasticsearch Filebeat
  • Check Point FW1/VPN1
  • Microsoft Office 365
  • Workday
  • Cisco ASA
  • Okta
  • Zscaler Cloud Firewall
You can use the logs ingested from third-party sources as the sole data source or, you can use those logs in conjunction with Palo Alto Networks
Prisma Access
logs and additional data sources.
With Palo Alto Networks, reduce your operational burden and radically simplify your SOC operations by collecting, integrating, and normalizing data from across all data sources–Network, Endpoint, and Cloud. Get a unified view and actionable insights for application usage, traffic patterns, threats, and incidents across your enterprise.

Recommended For You