Professional Documents
Culture Documents
Logs
- Traffic Logs
- Threat Logs
g
- URL Logs
- Data Filtering Logs
- Config and System Logs
Reports
- Custom Reports
- Scheduled Email Reports
Panorama Reports
Anything logged from a Policy is viewed in the Traffic Logs Anything logged from a AV, Sypware or Vulnerability
Profiles are viewed in the Threat Logs
By default, logs are generated at the end of a session
2009 Palo Alto Networks. Proprietary and Confidential 3.0-a 2009 Palo Alto Networks. Proprietary and Confidential 3.0-a
Any actions triggered by a URL filtering Profile are Any events triggered by File Blocking or Data Filtering
recorded in the URL Filtering Log Profiles are recorded in the Data Filtering Log
Page 5 | 2009 Palo Alto Networks. Proprietary and Confidential 3.0-a Page 6 | 2009 Palo Alto Networks. Proprietary and Confidential 3.0-a
Details provide more information Can be dynamically built from log data
about the traffic in the log Can be built using the filter editor
Useful data in this view includes:
Can be saved for later use
- Did the traffic undergo NAT?
- Was the traffic SSL decrypted?
- Ingress and egress interfaces
- Was this a captive portal session?
All Logs have details
2009 Palo Alto Networks. Proprietary and Confidential 3.0-a 2009 Palo Alto Networks. Proprietary and Confidential 3.0-a
2009 Palo Alto Networks. Proprietary and Confidential 3.0-a 2009 Palo Alto Networks. Proprietary and Confidential 3.0-a
5 Databases to pull from Gives most commonly blocked URLs for a user
- Application Summary By changing the user name filter at run time the report is
- Traffic log and summary more flexible
- Threat log and summary
Can pick columns to include and set their order
Can build filter conditions of the data displayed
2009 Palo Alto Networks. Proprietary and Confidential 3.0-a Page 12 | 2009 Palo Alto Networks. Proprietary and Confidential 3.0-a
2009 Palo Alto Networks. Proprietary and Confidential 3.0-a Page 14 | 2009 Palo Alto Networks. Proprietary and Confidential 3.0-a
Specific report groups can be automatically generated and Same range of reporting as individual devices
emailed as needed
Reports show an aggregate of data
Panorama
Device A Device B
2009 Palo Alto Networks. Proprietary and Confidential 3.0-a Page 16 | 2009 Palo Alto Networks. Proprietary and Confidential 3.0-a