Log Types
Table of Contents
Expand all | Collapse all
-
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > GTP Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Decryption > Forwarding Profile
- Objects > Schedules
-
-
- Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > VLANs
- Network > Virtual Wires
-
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
-
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
-
- Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
-
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Device Block List
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
-
- Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Scheduled Config Export
End-of-Life (EoL)
Log Types
- MonitorLogs
The firewall displays all logs so that role-based administration
permissions are respected. Only the information that you are permitted
to see is visible, which varies depending on the types of logs you
are viewing. For information on administrator permissions, see Device
> Admin Roles.
Log Type | Description |
---|---|
Traffic | Displays an entry for the start and end
of each session. Each entry includes the date and time, source and
destination zones, addresses and ports, application name, security
rule name applied to the flow, rule action (allow, deny,
or drop), ingress and egress interface, number
of bytes, and session end reason. The Type column indicates
whether the entry is for the start or end of the session, or whether
the session was denied or dropped. A “drop” indicates that the security
rule that blocked the traffic specified “any” application, while
a “deny” indicates the rule identified a specific application. If
traffic is dropped before the application is identified, such as
when a rule drops all traffic for a specific service, the application
is shown as “not-applicable”. Drill down in traffic logs for
more details on individual entries and artifacts:
|
Threat | Displays an entry for each security alarm
generated by the firewall. Each entry includes the date and time,
a threat name or URL, the source and destination zones, addresses, and
ports, the application name, security rule name applied to the flow,
and the alarm action (allow or block)
and severity. The Type column indicates the type of threat,
such as “virus” or “spyware;” the Name column is the threat description
or URL; and the Category column is the threat category (such as
“keylogger”) or URL category. Drill down in threat logs for
more details on individual entries and artifacts:
|
URL Filtering | Displays logs for URL filters, which control
access to websites and whether users can submit credentials to websites. Select Objects
> Security Profiles > URL Filtering to define URL filtering
settings, including which URL categories to block or allow and to
which you want to grant or disable credential submissions. You can
also enable logging of the HTTP header options for the URL. On
a firewall with an active AutoFocus license, hover next to an IP
address, filename, URL, user agent, threat name, or hash contained
in a log entry and click the drop-down ( |
WildFire Submissions | Displays logs for files and email links
that the firewall forwarded for WildFire™ analysis. The WildFire
cloud analyzes the sample and returns analysis results, which include
the WildFire verdict assigned to the sample (benign, malware, grayware,
or phishing). You can confirm if the firewall allowed or blocked
a file based on Security policy rules by viewing the Action column. On
a firewall with an active AutoFocus license, hover next to an IP
address, filename, URL, user agent, threat name, or hash (in the
File Digest column) contained in a log entry and click the drop-down
( |
Data Filtering | Displays logs for the security policies
with attached Data Filtering profiles, to help prevent sensitive
information such as credit card or social security numbers from
leaving the area protected by the firewall, and File Blocking profiles,
that prevent certain file types from being uploaded or downloaded. To
configure password protection for access the details for a log entry,
click The system prompts you
to enter the password only once per session. |
HIP Match | Displays all HIP matches that the GlobalProtect™ gateway
identifies when comparing the raw HIP data reported by the agent
to the defined HIP objects and HIP profiles. Unlike other logs,
a HIP match is logged even when it does not match a security policy.
For more information, refer to Network
> GlobalProtect > Portals. |
GlobalProtect | Displays GlobalProtect connection logs.
Use this information to identify your GlobalProtect users and their
client OS version, troubleshoot connection and performance issues, and
identify the portal and gateways to which users connect. |
IP-Tag | Displays information about how and when a tag was applied to a particular IP address. Use this information to determine when and why a particular IP address was placed in an address group and what policy rules impact that address. The log includes Receive Time (the date and time when the first and last packet of the session arrived), Virtual System, Source IP-Address, Tag, Event, Timeout, Source Name, and Source Type. |
User-ID™ | Displays information about IP address-to-username mappings,
such as the source of the mapping information, when the User-ID
agent performed the mapping, and the remaining time before mappings
expire. You can use this information to help troubleshoot User-ID
issues. For example, if the firewall is applying the wrong policy
rule for a user, you can view the logs to verify whether that user
is mapped to the correct IP address and whether the group associations
are correct. |
GTP | Displays event-based logs that include information
on the wide range of GTP attributes. These include GTP event type,
GTP event message type, APN, IMSI, IMEI, End User IP address, in
addition to the TCP/IP information that the next-generation firewall
identifies such as application, source and destination address and
timestamp. |
Tunnel Inspection | Displays an entry for the start and end
of each inspected tunnel session. The log includes the Receive Time
(date and time the first and last packet in the session arrived),
Tunnel ID, Monitor Tag, Session ID, Security rule applied to the
tunnel traffic, and more. See Policies
> Tunnel Inspection for more information. |
SCTP | Displays SCTP events and associations based on
logs generated by the firewall while it performs stateful inspection,
protocol validation, and filtering of SCTP traffic. SCTP logs include
information on the wide range of SCTP and its payload protocol attributes,
such as SCTP event type, chunk type, SCTP cause code, Diameter Application
ID, Diameter Command Code, and chunks. This SCTP information is
provided in addition to the general information that the firewall
identifies, such as source and destination address, source and destination
port, rule, and timestamp. See Objects
> Security Profiles > SCTP Protection for more information. |
Configuration | Displays an entry for each configuration
change. Each entry includes the date and time, the administrator
username, the IP address from where the change was made, the type
of client (web interface or CLI), the type of command executed, whether
the command succeeded or failed, the configuration path, and the
values before and after the change. |
System | Displays an entry for each system event.
Each entry includes the date and time, the event severity, and an
event description. |
Alarms | The alarms log records detailed information
on alarms that are generated by the system. The information in this
log is also reported in Alarms. Refer to Define
Alarm Settings. |
Authentication | Displays information about authentication
events that occur when end users try to access network resources
for which access is controlled by Authentication policy rules. You can
use this information to help troubleshoot access issues and to adjust
your Authentication policy as needed. In conjunction with correlation
objects, you can also use Authentication logs to identify suspicious
activity on your network, such as brute force attacks. Optionally,
you can configure Authentication rules to Log
Authentication Timeouts. These timeouts relate to the period
of time when a user need authenticate for a resource only once but
can access it repeatedly. Seeing information about the timeouts
helps you decide if and how to adjust them. System logs
record authentication events relating to GlobalProtect and to administrator
access to the web interface. |
Unified | Displays the latest Traffic, Threat, URL
Filtering, WildFire Submissions, and Data Filtering log entries
in a single view. The collective log view enables you to investigate
and filter these different types of logs together (instead of searching each
log set separately). Or, you can choose which log types to display:
click the arrow to the left of the filter field and select traffic, threat, url, data,
and/or wildfire to display only the selected log
types. On a firewall with an active AutoFocus license, hover next
to an IP address, filename, URL, user agent, threat name, or hash
contained in a log entry and click the drop-down ( The firewall
displays all logs so that role-based administration permissions
are respected. When viewing Unified logs, only the logs that you
have permission to see are displayed. For example, an administrator
who does not have permission to view WildFire Submissions logs will
not see WildFire Submissions log entries when viewing Unified logs. For
information on administrator permissions, refer to Device
> Admin Roles. You can use the Unified
log set with the AutoFocus threat intelligence portal. Set up an AutoFocus search to
add AutoFocus search filters directly to the Unified log filter
field. |