diff --git a/Splunk_TA_paloalto/default/eventtypes.conf b/Splunk_TA_paloalto/default/eventtypes.conf index 0a47612c..d408cfb2 100644 --- a/Splunk_TA_paloalto/default/eventtypes.conf +++ b/Splunk_TA_paloalto/default/eventtypes.conf @@ -38,6 +38,10 @@ search = sourcetype=pan_system OR sourcetype=pan:system AND log_subtype="url-fil search = sourcetype=pan_system OR sourcetype=pan:system description="*config cleared*" AND NOT (log_subtype IN ("routing", "ras", "vpn")) #tags = change +[pan_dhcp] +search = sourcetype=pan_system OR sourcetype=pan:system AND log_subtype="dhcp" +#tags = network session dhcp + [pan_threat] search = sourcetype=pan_threat OR sourcetype=pan:threat OR (sourcetype=pan:firewall_cloud AND LogType="THREAT") AND log_subtype != "url" log_subtype != "file" #tags = ids attack diff --git a/Splunk_TA_paloalto/default/props.conf b/Splunk_TA_paloalto/default/props.conf index 25deca6c..ae50b19b 100644 --- a/Splunk_TA_paloalto/default/props.conf +++ b/Splunk_TA_paloalto/default/props.conf @@ -308,7 +308,7 @@ KV_MODE = none TIME_PREFIX = ^(?:[^,]*,){6} MAX_TIMESTAMP_LOOKAHEAD = 32 -REPORT-search = extract_system, extract_globalprotect_user, extract_globalprotect_ip, extract_globalprotect_loginip, extract_globalprotect_clientversion, extract_globalprotect_message, extract_general_user, extract_system_alert_src, extract_system_auth +REPORT-search = extract_system, extract_globalprotect_user, extract_globalprotect_ip, extract_globalprotect_loginip, extract_globalprotect_clientversion, extract_globalprotect_message, extract_general_user, extract_system_alert_src, extract_system_auth, extract_pan_dhcp_ip, extract_pan_dhcp_dns, extract_pan_dhcp_mac FIELDALIAS-virtual_system = vsys as virtual_system # Field Aliases to map specific fields to the Splunk Common Information Model - Update @@ -318,6 +318,7 @@ FIELDALIAS-signature = event_id as signature FIELDALIAS-src_user = user as src_user FIELDALIAS-reason = description as reason FIELDALIAS-body = description as body +FIELDALIAS-dest_nt_host = dest_dns as dest_nt_host LOOKUP-vendor_info_for_pan_config = pan_vendor_info_lookup sourcetype OUTPUT vendor,product,vendor_product EVAL-action = case(match(description,"(?i)succeeded"),"success",match(description,"(?i)cleared"),"cleared",match(description,"(?i)GlobalProtect gateway agent message"),"success",match(description,"(?i)Failed"),"failure") EVAL-app = "Palo Alto Networks Firewall" diff --git a/Splunk_TA_paloalto/default/tags.conf b/Splunk_TA_paloalto/default/tags.conf index 8f3cb4e6..6cbb085b 100644 --- a/Splunk_TA_paloalto/default/tags.conf +++ b/Splunk_TA_paloalto/default/tags.conf @@ -107,3 +107,8 @@ alert = enabled [eventtype=pan_aperture_admin_audit] authentication = enabled + +[eventtype=pan_dhcp] +network = enabled +session = enabled +dhcp = enabled \ No newline at end of file diff --git a/Splunk_TA_paloalto/default/transforms.conf b/Splunk_TA_paloalto/default/transforms.conf index f6b702ca..a2b456e6 100644 --- a/Splunk_TA_paloalto/default/transforms.conf +++ b/Splunk_TA_paloalto/default/transforms.conf @@ -218,6 +218,16 @@ REGEX = Client version: (?[^,]+) SOURCE_KEY = description REGEX = Message: (?[^,]+) +#### DHCP info extractions +[extract_pan_dhcp_ip] +REGEX = ip (?\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}) + +[extract_pan_dhcp_dns] +REGEX = hostname (?.+), + +[extract_pan_dhcp_mac] +REGEX = mac (?[a-fA-F0-9]{2}(:[a-fA-F0-9]{2}){5}) + #### lookups [endpoint_actions_lookup]