Cortex Data Lake

  1. Use the credentials associated with your Palo Alto Networks support account and log in to the Cortex Data Lake application on the hub.
  2. Allocate Storage Based on Log Type. If storage space has not been allocated for DNS Security logs on CDL, logging entries will not be viewable through Cortex Data Lake.
  3. Search for DNS queries that have been processed using DNS Security in CDL Explore.
    1. Select
      to open the CDL log viewer.
    2. Constrain your search using the threat filter and submit a log query based on the DNS category, for example,
      threat_category.value = 'dns-c2'
      to view logs that have been determined to be a C2 domain. To search for other DNS types, replace c2 with another supported DNS category (ddns, parked, malware, etc). Adjust the search criteria as necessary for your search, including additional query parameters (such as the severity level and subtype) along with a date range.
    3. Select a log entry to view the details of a detected DNS threat.
    4. The threat
      is displayed in the
      pane of the detailed log view. Other relevant details about the threat are displayed in their corresponding windows.

Recommended For You