You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Dec 14, 2024. It is now read-only.
feat(addon): Significantly improve and modernize CIM compliance
BREAKING CHANGE(addon): pan_traffic_start logs no longer included in CIM
BREAKING CHANGE(addon): pan_traffic_end logs moved from Network Session to Network Traffic datamodel
BREAKING CHANGE(addon): pan_threat event type now includes wildfire and data logs
BREAKING CHANGE(addon): pan_file logs moved from Web to IDS datamodel
BREAKING CHANGE(addon): pan_virus logs moved from Malware to IDS datamodel
BREAKING CHANGE(addon): pan_wildfire logs moved from Malware to IDS datamodel
BREAKING CHANGE(addon): pan_email removed from Email datamodel
Copy file name to clipboardExpand all lines: Splunk_TA_paloalto/default/eventtypes.conf
+23-9Lines changed: 23 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -15,27 +15,36 @@ search = sourcetype=pan_config OR sourcetype=pan:config
15
15
16
16
[pan_traffic]
17
17
search = sourcetype=pan_traffic OR sourcetype=pan:traffic OR (sourcetype=pan:firewall_cloud AND LogType="TRAFFIC")
18
-
#tags = network communicate
19
18
20
19
[pan_traffic_start]
21
20
search = sourcetype=pan_traffic OR sourcetype=pan:traffic OR (sourcetype=pan:firewall_cloud AND LogType="TRAFFIC") AND log_subtype="start"
22
-
#tags = network session start
23
21
24
22
[pan_traffic_end]
25
23
search = sourcetype=pan_traffic OR sourcetype=pan:traffic OR (sourcetype=pan:firewall_cloud AND LogType="TRAFFIC") AND log_subtype="end"
26
-
#tags = network session end
24
+
#tags = network communicate
27
25
28
26
[pan_system]
29
27
search = sourcetype=pan_system OR sourcetype=pan:system OR (sourcetype=pan:firewall_cloud AND LogType="SYSTEM")
30
-
#tags = update status
28
+
29
+
[pan_system_auth]
30
+
search = sourcetype=pan_system OR sourcetype=pan:system AND log_subtype="globalprotect" OR description="*Failed password*" NOT description="*client configuration released*" NOT description="*client configuration generated*"
31
+
#tags = authentication default
32
+
33
+
[pan_system_alert]
34
+
search = sourcetype=pan_system OR sourcetype=pan:system AND log_subtype="url-filtering"
35
+
#tags = alert
36
+
37
+
[pan_system_change]
38
+
search = sourcetype=pan_system OR sourcetype=pan:system description="*config cleared*" AND NOT (log_subtype IN ("routing", "ras", "vpn"))
39
+
#tags = change
31
40
32
41
[pan_threat]
33
-
search = sourcetype=pan_threat OR sourcetype=pan:threat OR (sourcetype=pan:firewall_cloud AND LogType="THREAT") AND log_subtype != "url" log_subtype != "file" log_subtype != "wildfire" log_subtype != "data"
42
+
search = sourcetype=pan_threat OR sourcetype=pan:threat OR (sourcetype=pan:firewall_cloud AND LogType="THREAT") AND log_subtype != "url" log_subtype != "file"
34
43
#tags = ids attack
35
44
36
45
[pan_file]
37
46
search = sourcetype=pan_threat OR sourcetype=pan:threat OR (sourcetype=pan:firewall_cloud AND LogType="THREAT") AND log_subtype = "file"
38
-
#tags = web
47
+
#tags = ids attack
39
48
40
49
[pan_url]
41
50
search = sourcetype=pan_threat OR sourcetype=pan:threat OR (sourcetype=pan:firewall_cloud AND LogType="THREAT") AND log_subtype = "url"
@@ -47,7 +56,7 @@ search = sourcetype=pan_threat OR sourcetype=pan:threat OR (sourcetype=pan:firew
47
56
48
57
[pan_virus]
49
58
search = (sourcetype=pan_threat OR sourcetype=pan:threat OR (sourcetype=pan:firewall_cloud AND LogType="THREAT")) AND (log_subtype = "virus" OR log_subtype = "wildfire-virus")
50
-
#tags = malware attack
59
+
#tags = ids attack
51
60
52
61
[pan_spyware]
53
62
search = sourcetype=pan_threat OR sourcetype=pan:threat OR (sourcetype=pan:firewall_cloud AND LogType="THREAT") AND log_subtype = "spyware"
@@ -62,11 +71,11 @@ search = sourcetype=pan_decryption OR sourcetype=pan:decryption OR (sourcetype=p
62
71
63
72
[pan_wildfire_malicious]
64
73
search = sourcetype=pan_threat OR sourcetype=pan:threat OR (sourcetype=pan:firewall_cloud AND LogType="THREAT") AND log_subtype="wildfire" AND verdict=malicious
65
-
#tags = malware attack
74
+
#tags = ids attack
66
75
67
76
[pan_wildfire]
68
77
search = sourcetype=pan_threat OR sourcetype=pan:threat OR (sourcetype=pan:firewall_cloud AND LogType="THREAT") AND log_subtype = "wildfire"
69
-
#tags = malware operations
78
+
#tags = ids attack
70
79
71
80
[pan_malware_attacks]
72
81
search = sourcetype=pan:threat_traps
@@ -86,6 +95,7 @@ search = sourcetype=pan:analytics_traps OR sourcetype=pan:threat_traps OR source
86
95
87
96
[pan_correlation]
88
97
search = sourcetype=pan_correlation OR sourcetype=pan:correlation OR (sourcetype=pan:firewall_cloud AND LogType="CORRELATION")
98
+
#tags = alert
89
99
90
100
[pan_email]
91
101
search = sourcetype=pan_threat OR sourcetype=pan:threat OR (sourcetype=pan:firewall_cloud AND LogType="THREAT") AND recipient="*" AND sender="*"
@@ -95,18 +105,22 @@ search = sourcetype=pan_aperture OR sourcetype=pan:aperture
95
105
96
106
[pan_aperture_incident]
97
107
search = sourcetype=pan_aperture OR sourcetype=pan:aperture AND log_type="incident"
108
+
#tags = alert
98
109
99
110
[pan_aperture_remediation]
100
111
search = sourcetype=pan_aperture OR sourcetype=pan:aperture AND log_type="remediation"
112
+
#tags = alert
101
113
102
114
[pan_aperture_policy_violation]
103
115
search = sourcetype=pan_aperture OR sourcetype=pan:aperture AND log_type="policy_violation"
116
+
#tags = alert
104
117
105
118
[pan_aperture_activity_monitoring]
106
119
search = sourcetype=pan_aperture OR sourcetype=pan:aperture AND log_type="activity_monitoring"
107
120
108
121
[pan_aperture_admin_audit]
109
122
search = sourcetype=pan_aperture OR sourcetype=pan:aperture AND log_type="admin_audit"
0 commit comments