All Apps and Add-ons

Paloalto Network add-on parsing concern

pavanbmishra
Path Finder

Hi Team,

We could see paloalto network add-on parsing informational messages to alert datamodel (having tag=alert) assigned. Sharing the snap-shot for ref. Can anyone assist me to identify & some business justification behind this please. Thanks in advance 

pavanbmishra_0-1640762646733.png

 

Labels (1)
Tags (3)
0 Karma

tscroggins
Motivator

@pavanbmishra 

Looking at the add-on, we can infer the developer recognized device generated notifications as external alerts and tagged them appropriately. I.e. The device generated an event of note separate from any traffic logging it may be performing.

For example, event type pan_system_alert uses the following search:

sourcetype=pan_system OR sourcetype=pan:system AND log_subtype="url-filtering"

pan_system and pan:system have both been used historically as source types. log_subtype comes from the extract_system transform.

In your screenshot, the event likely indicates the device's URL database was updated. If you're dependent on the device to perform URL filtering, alerting, etc. a configuration change of this type is probably important from a change or configuration management standpoint. An operations team may want to correlate the alert with a change request, for example, and consider the event suspicious if the correct process wasn't followed.

0 Karma
Get Updates on the Splunk Community!

Understanding Generative AI Techniques and Their Application in Cybersecurity

Watch On-Demand Artificial intelligence is the talk of the town nowadays, with industries of all kinds ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

Using the Splunk Threat Research Team’s Latest Security Content

REGISTER HERE Tech Talk | Security Edition Did you know the Splunk Threat Research Team regularly releases ...