Palo Alto Networks
Requirements
Steps
Step 1. Configure a Syslog Server Profile
Step 2. Add a Syslog Server to the Profile
Step 3. Configure Syslog Forwarding (Traffic, Threat, Wildfire, URL, Data, Tunnel, Authentication Logs)
Step 4. Assign Syslog Forwarding Profile to Security Policy
Step 5. Configure Syslog Forwarding for System, Config, Correlation, GlobalProtect, HIP Match, and User-ID Logs
Step 6. Commit Changes
Step 7. Provide Details to ThreatDefence
Last updated

