Use Panorama to Forward Logs to Azure Security Center
Use Panorama templates and device groups to forward VM-Series firewall logs to Azure Security Center
If you are using Panorama to manage your firewalls, you can use templates and device groups to forward firewall logs to Azure Security Center. With the default Azure Security Center Log Forwarding profile, Threat and WildFire Submissions logs of low, medium, high, or critical severity generated on the firewall are displayed as security alerts on the Azure Security Center dashboard. So that you can focus and triage alerts more efficiently, you can set up granular log filters to only forward logs of interest to you, or forward high and critical severity logs only. You can also selectively attach the log forwarding profile to a few Security policy rules based on your applications and security needs.
To enable the Azure Security Center integration from Panorama, use the following workflow.
- Specify the log types to forward to the Logging Service.The way you enable forwarding depends on the log type. For logs that are generated based on a policy match, you use a log forwarding profile within a device group, and for other logs types you use the Log Settings configuration within a template.
- Configure forwarding of System, Configuration, User-ID, and HIP Match logs.
- Select.DeviceLog Settings
- Select theTemplatethat contains the firewalls you want to forward logs to the Logging Service.
- For each log type that you to forward to the Logging Service,Adda match list filter. Give it aName, optionally define aFilter.
- AddBuilt-in Actions and enter aName. The Azure-Security-Center-Integration action will be auto selected. ClickOK.
- Configure forwarding of all other log types that are generated when a policy match occurs such as Traffic, Threat, WildFire Submission, URL Filtering, Data Filtering, and Authentication logs. To forward these logs, you must create and attach a log forwarding profile to each policy rule for which you want to forward logs.
- Select theDevice Group, and then selecttoObjectsLog ForwardingAdda profile. In the log forwarding profile match list, add each log type that you want to forward.
- SelectAddin Built-in Actions to enable the firewalls in the device group to forward the logs to Azure Security Center.
- Create basic security policy rules in the device group you just created and selectActionsto attach the Log Forwarding profile you created for forwarding logs to Azure Security Center. Until the firewall has interfaces and zones and a basic security policy, it will not let any traffic through, and only traffic that matches a security policy rule will be logged (by default).
- For each rule you create, selectActionsand select the Log Forwarding profile that allows the firewall to forward logs to Azure Security Center.
- Commit your changes to Panorama and push them to the template and device group you created.
- Verify that the firewall logs are being forwarded to Azure Security Center.
- Log in the Azure portal, selectAzure Security Center.
- Verify that you can see firewall logs as Security alerts on the Azure Security Center dashboard.