Hello,
I am using Palo Alto App for Splunk and its adaptive response feature.
We have done some troubleshooting and testing and based on what we have accomplished so far, I have few questions:
Commit required
According to documents,
"The IP is tagged on the firewall immediately, however, it can take up to 60 seconds for the tagged IP addresses to show up in the corresponding Dynamic Address Group in the security policy. This delay is intentional to prevent accidental DoS scenarios."
We've waited couple minutes or more but we found that admin has to initiate "commit" for the IP to be included in the Group.
This is the command we tried:
index=pan_logs sourcetype=pan:threat host=$PA_FIREWALL$ category=malware vendor_action=allowed dest_zone=internal
| stats count by src_ip
| pantag device="$PA_FIREWALL$" action=add tag="SplunkBlock" ip_field="src_ip"
Change is not visible
We are getting Palo Alto logs from the device and for config type logs, following custom format is used:
$receive_time $admin $host $client $cmd $result $path $before-change-detail $after-change-detail
Strangely, we do not see any log related to the IP being added to the tag or to the group.
Is this expected behaviour? or are we missing some field in syslog setting?
Thanks!
... View more