firewall.paloalto
Purpose
An analyst wanted to detect malicious traffic in a corporate network. Using the SecOpsFWTrafficForeignDestination alert with Palo Alto firewall data, the analyst found out that actors in sanctioned countries attempted remote access. As a result, the analyst blocked the network traffic using firewall rules, preventing exploitation of vulnerabilities in the corporate network.
How is the data sent to Devo?
Sending with the Devo relay
In PAN-OS, enable syslog.
Set the server to be your Devo relay.
Use the TCP protocol.
Choose a port on your relay which is currently unused.
Select BSD format.
Define these relay rules.
Source message:
Source data: ([^,]+,){3}([^,]+)
Source tag:
Target tag: firewall.paloalto.\\D2
Sent without syslog tag: true
Stop processing: true
Source message:
Source data: LEEF:(?:[^\|]+\|){4}([^\|]+)\|.*$
Source tag:
Target tag: firewall.paloalto.\\D1.leef
Sent without syslog tag: true
Stop processing: true
For some versions of PAN-OS, the digit 4
must be replaced with 6
.
Sending with AWS SQS
Logs can be forwarded to an S3 bucket and then sent to Devo with an SQS collector using the aws_sqs_palo_alto
service.
Tags and tables
The default tags are for CSV formatted logs. For other log formats, select leef
or json
tags. No JSON relay rule is necessary.
Tag | Data table |
---|---|
|
This is a union table. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Configuration log versions
Different configuration log tags can be used for different log formats.
firewall.paloalto.config.v1
- This is the default format. In this case, the parser uses the default field order (fields affected: seqno, actionflags, beforechangedetail and afterchangedetail).firewall.paloalto.config.v2
- Used to indicate that the fields beforechangedetail and afterchangedetail are not part of the event and must be ignored and initialized with null.firewall.paloalto.config.v3
- Used to indicate that the fields beforechangedetail and afterchangedetail come before the seqno and actionflags fields.firewall.paloalto.config.leef
- LEEF format.firewall.paloalto.config.json
- JSON format.
Secure it
Devo Exchange resources that work with Palo Alto and other data sources:
Palo Alto-specific resources:
Compromised identity provider
An identity provider has been compromised. To determine the impact of the attack on the firewall, check how the firewall used identity providers.
from firewall.paloalto.system where isnotnull(idp_entity_id)
group by machine, eventId, idp_entity_id, auth_username
Credential tampering
A malicious “man in the middle” has modified certificates to cause an interruption in service. Identify certificates which are not valid.
from firewall.paloalto.system where eq(eventId,"tls-X509-validation-failed")