All Apps and Add-ons

Paloalto Network add-on parsing concern

pavanbmishra
Path Finder

Hi Team,

We could see paloalto network add-on parsing informational messages to alert datamodel (having tag=alert) assigned. Sharing the snap-shot for ref. Can anyone assist me to identify & some business justification behind this please. Thanks in advance 

pavanbmishra_0-1640762646733.png

 

Labels (1)
Tags (3)
0 Karma

tscroggins
Influencer

@pavanbmishra 

Looking at the add-on, we can infer the developer recognized device generated notifications as external alerts and tagged them appropriately. I.e. The device generated an event of note separate from any traffic logging it may be performing.

For example, event type pan_system_alert uses the following search:

sourcetype=pan_system OR sourcetype=pan:system AND log_subtype="url-filtering"

pan_system and pan:system have both been used historically as source types. log_subtype comes from the extract_system transform.

In your screenshot, the event likely indicates the device's URL database was updated. If you're dependent on the device to perform URL filtering, alerting, etc. a configuration change of this type is probably important from a change or configuration management standpoint. An operations team may want to correlate the alert with a change request, for example, and consider the event suspicious if the correct process wasn't followed.

0 Karma
Get Updates on the Splunk Community!

Detecting Remote Code Executions With the Splunk Threat Research Team

WATCH NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If exploited, ...

Enter the Splunk Community Dashboard Challenge for Your Chance to Win!

The Splunk Community Dashboard Challenge is underway! This is your chance to showcase your skills in creating ...

.conf24 | Session Scheduler is Live!!

.conf24 is happening June 11 - 14 in Las Vegas, and we are thrilled to announce that the conference catalog ...