Monitor > Automated Correlation Engine > Correlation Objects
Last Updated:
Mon Jul 06 15:05:10 PDT 2020
Table of Contents
Search the Table of Contents
- Dashboard
- ACC
-
- Monitor > Logs
- Monitor > Automated Correlation Engine
- Monitor > Automated Correlation Engine > Correlation Objects
- Monitor > Automated Correlation Engine > Correlated Events
- Monitor > Packet Capture
- Monitor > App Scope
- Monitor > Session Browser
- Monitor > Botnet
- Monitor > PDF Reports
- Monitor > PDF Reports > Manage PDF Summary
- Monitor > PDF Reports > User Activity Report
- Monitor > PDF Reports > SaaS Application Usage
- Monitor > PDF Reports > Report Groups
- Monitor > PDF Reports > Email Scheduler
- Monitor > Manage Custom Reports
- Monitor > Reports
-
- Move, Clone, Override, or Revert Objects
- Actions in Security Profiles and Custom Objects
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Applications
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > Tags
- Objects > External Dynamic Lists
- Objects > Custom Objects
- Objects > Custom Objects > Data Patterns
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > URL Filtering
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Decryption Profile
- Objects > Schedules
-
- Network > Virtual Wires
- Network > Interfaces
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Virtual Routers
- Network > Zones
- Network > VLANs
- Network > IPSec Tunnels
- Network > DHCP
- Network > DNS Proxy
- Network > QoS
- Network > LLDP
- Network > Network Profiles
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IKE Gateways
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > Monitor
- Network > Network Profiles > Zone Protection
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > BFD Profile
- Network > Network Profiles > QoS
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Operations
- Device > Setup > HSM
- Device > Setup > Services
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device > Setup > Session
- Device > High Availability
- Device > Config Audit
- Device > Password Profiles
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Profile
- Device > Authentication Sequence
- Device > VM Information Sources
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificates
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Response Pages
- Device > Log Settings
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > DNS
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
- Device > Master Key and Diagnostics
-
- Use the Panorama Web Interface
- Commit Your Changes in Panorama
- Defining Policies on Panorama
- Logs and Reports on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance
- Panorama > High Availability
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Managed Devices
- Panorama > Templates
- Panorama > Device Groups
- Panorama > Managed Collectors
- Panorama > Collector Groups
- Panorama > VMware Service Manager
- Panorama > Log Settings
- Panorama > Scheduled Config Export
- Panorama > Software
- Panorama > Device Deployment
To counter the advances in exploits and malware distribution methods, correlation objects extend the signature-based malware detection capabilities on the firewall. They provide the intelligence for identifying suspicious behavior patterns across different sets of logs and they gather the evidence required to investigate and promptly respond to an event.
A correlation object is a definition file that specifies patterns for matching, the data sources to use for performing the lookups, and the time period within which to look for these patterns. A pattern is a boolean structure of conditions that query the data sources, and each pattern is assigned a severity and a threshold, which is number of time the pattern match occurs within a defined time limit. When a pattern match occurs, a correlation event is logged.
The data sources used for performing lookups can include the following logs: application statistics, traffic, traffic summary, threat summary, threat, data filtering, and URL filtering. For example, the definition for a correlation object can include a set of patterns that query the logs for evidence of infected hosts, evidence of malware patterns, or for lateral movement of malware in the traffic, url filtering, and threat logs.