Log successful and unsuccessful TLS handshakes and forward logs to appropriate
storage and administrators for analysis.
Where Can I Use
This? | What Do I Need? |
|
No separate license required for decryption when using NGFWs or
Prisma Access.
Note: The features and capabilities available to you in
Strata Cloud Manager depend on your active license(s).
|
By default, decryption logs record details of unsuccessful TLS
handshakes. You can log successful TLS handshakes in decryption policy rules.
If you log successful TLS handshakes, ensure that you have
sufficient system resources (log space).
Configure decryption logging in the decryption policy rules that control
the traffic you want to log. To log traffic that you don’t decrypt, create a
policy-based decryption exclusion and, for rules that
govern TLSv1.2 and earlier traffic, apply a
No-decryption profile to the decryption policy rule.
If you forward decryption logs for storage, ensure that you properly secure log
transport and storage because these logs contain sensitive information.
Next-Generation Firewalls (
NGFWs) don't generate decryption log
entries for web traffic blocked during
SSL/TLS handshakes. These sessions
don’t appear in decryption logs because the
NGFW prevents
decryption when it resets the SSL/TLS connection, ending the handshake. You can
view details of the blocked sessions in the URL filtering logs.
SSH Proxy traffic isn't captured in decryption logs. In addition, certificate
information isn’t available for session resumption logs.