Network Security
Configure a Log Forwarding Profile (Strata Cloud Manager)
Table of Contents
Expand All
|
Collapse All
Network Security Docs
Configure a Log Forwarding Profile (Strata Cloud Manager)
Use a Log Forwarding profile to centrally monitor log information
Follow these steps to configure a Log Forwarding profile.
- Go to ManageConfigurationNGFW and Prisma AccessObjectsLog Forwarding.Select Add Log Forwarding Profile.Configure the settings in this table:Log Forwarding Profile SettingsDescriptionNameEnter a name (up to 64 characters) to identify the profile. This name appears in the list of Log Forwarding profiles when defining Security rules. The name is case-sensitive, must be unique, and can contain only letters, numbers, spaces, hyphens, and underscores.DescriptionEnter a description to explain the purpose of this Log Forwarding profile.Match List (unlabeled)Add one or more match list profiles (up to 64) that specify forwarding destinations, log attribute-based filters to control which logs are forwarded, and actions to perform on the logs (such as automatic tagging). Complete the following two fields (Name and Description) for each match list profile.Name (match list profile)Enter a name (up to 31 characters) to identify the match list profile.Description (match list profile)Enter a description (up to 1,023 characters) to explain the purpose of this match list profile.Log TypeSelect the type of logs to which this match list profile applies: authentication (auth), data, gtp, sctp, threat, traffic, tunnel, URL, or WildFire.FilterBy default, All Logs of the selected Log Type are forwarded. To forward a subset of the logs, select an existing filter from the drop-down or select Filter Builder to add a new filter. For each query in a new filter, specify the following fields and Add the query:
- Connector—Select the connector logic (and/or) for the query. Select Negate if you want to apply negation to the logic. For example, to avoid forwarding logs from an untrusted zone, select Negate, select Zone as the Attribute, select equal as the Operator, and enter the name of the untrusted zone in the Value column.
- Attribute—Select a log attribute. The available attributes depend on the Log Type.
- Operator—Select the criterion to determine whether the attribute applies (such as equal). The available criteria depend on the Log Type.
- Value—Specify the attribute value to match.
To display or export the logs that the filter matches, View Filtered Logs, which provides the same options as the Monitoring tab pages (such as MonitoringLogsTraffic).SNMPAdd one or more SNMP Trap server profiles to forward logs as SNMP traps.EmailAdd one or more Email server profiles to forward logs as email notifications.SyslogAdd one or more Syslog server profiles to forward logs as syslog messages.HTTPAdd one or more HTTP server profiles to forward logs as HTTP requests.Built-in ActionsYou can select from two types of built-in actions when you Add an action to perform—Tagging and Integration.- Tagging—Add or remove a tag to the source or destination IP address in a log entry automatically and register the IP address and tag mapping to a User-ID agent on Panorama, or to a remote User-ID agent so that you can respond to an event and dynamically enforce Security policy. The ability to tag an IP address and dynamically enforce policy using Dynamic Address Groups gives you better visibility, context, and control for consistently enforcing Security policy irrespective of where the IP address moves across your network.Configure the following settings:
- Add an action and enter a name to describe it.
- Select the target IP address you want to tag—Source Address or Destination Address.
You can take an action for all log types that include a source or destination IP address in the log entry. You can tag the source IP address only in Correlation logs and HIP Match logs; you can't configure an action for system logs and configuration logs because the log type does not include an IP address in the log entry.- Select the action—Add Tag or Remove Tag.
- Select whether to register the IP address and tag mapping to the Local User-ID agent, or to a Remote User-ID agent.
- To register the IP address and tag mapping to a Remote User-ID agent, select the HTTP server profile that will enable forwarding.
- Configure the IP-Tag Timeout to set, in minutes, the amount of time that IP address-to-tag mapping is maintained. Setting the timeout to 0 means that the IP-Tag mapping does not timeout (range is 0 to 43200 (30 days); default is 0).You can only configure a timeout with the Add Tag action.
- Enter or select the Tags you want to apply or remove from the target source or destination IP address.
- Integration—Only available on the VM-Series on Azure. This option allows you to forward the selected logs to the Azure Security Center using the Azure-Security-Center-Integration action.
To add a device to the quarantine list based on the Log Forwarding profile filter, select Quarantine.Save your configuration.Select Push Config to save your configuration and deploy it to your network.