Configure a Palo Alto Networks firewall to send logs to Arctic Wolf
You can configure a Palo Alto Networks® device to send the necessary logs to Arctic Wolf® for security monitoring using firewall.
These resources are required:
- An activated Arctic Wolf Sensor or Virtual Log Collector (vLC)
- Access to Palo Alto Networks console with administrator permissions
Create a syslog server profile
Configure syslog forwarding for System, Config, HIP Match, and Global Protect
Create a log forwarding profile for Arctic Wolf
Note: You can only have one log forwarding profile. If necessary, edit your existing log forwarding profile to include the required log forwarding profile match list information.
Add your log forwarding profile to your outgoing north-south security policies
Enable benign and grayware sample logging for WildFire
This step is optional. It is only required if you have WildFire.
- Sign in to the Palo Alto Networks console with administrator permissions.
- Click the Device tab.
- In the navigation menu, click Setup.
- Click the WildFire tab.
- In the General Settings section, click
Edit.
- Make sure that the Report Benign Files and Report Grayware Files checkboxes are selected.
- Click OK.
Include email header information in WildFire logs and reports
This step is optional. It is only required if you have WildFire.