About the App
Palo Alto Networks and Splunk have partnered to deliver an advanced security reporting and analysis tool. The collaboration delivers operational reporting as well as simplified and configurable dashboard views across Palo Alto Networks family of next-generation firewalls.
Splunk for Palo Alto Networks leverages the data visibility provided by Palo Alto Networks's Cortex XDR with Splunk's extensive investigation and visualization capabilities to deliver an advanced security reporting and analysis tool. This app enables security analysts, administrators, and architects to correlate application and user activities across all network and security infrastructures from a real-time and historical perspective.
Complicated incident analysis that previously consumed days of manual and error-prone data mining can now be completed in a fraction of the time, saving not only manpower but also enabling key enterprise security resources to focus on critical, time-sensitive investigations.
The Palo Alto Networks App and Add-on have different features that are designed to work together, and with Splunk Enterprise Security when available.
Palo Alto Networks App
- Dashboards to track incidents, SaaS application usage, IoT Security, user activity, system health, configuration changes for audits, malware, GlobalProtect VPN, and other Palo Alto Networks specific features.
- Datamodels with pivots for easy access to data and visualizations
- Splunk Adaptive Response integration for automated action and remediation
- Sync user login events with User-ID
- Use Adaptive Response to share context with Dynamic Address/User Groups
- Update metadata from content packs
- Special searchbar commands
- Macros for easy access to logs
Palo Alto Networks Add-on
- Fully Common Information Model (CIM) compliant and designed for use with Splunk Enterprise Security
- Field extraction for Palo Alto Networks logs from Firewalls, Panorama, Cortex XDR, and Aperture SaaS Application Security - IP Classification tailored to your network environment
- Designate SaaS applications as sanctioned or unsanctioned for your organization
- App and Threat metadata from the Palo Alto Networks content and signature packs
The Palo Alto Networks App and Add-on for Splunk has varying system requirements depending on the number of logs sent to Splunk. The firewall administrator has granular control over the quantity of logs sent. The more logs sent to Splunk, the more visibility is available into the traffic on the network.
If the compute resources of the servers are oversubscribed, the firewall administrator can reduce the volume of logs sent from the firewall by turning off unnecessary logs. Common high-volume low-value candidates are traffic start logs, non-container URL logs, benign WildFire logs, and logs from policy rules that pass a lot of traffic that is not highly relevant (eg. local SAN traffic).
App: The Palo Alto Networks App for Splunk contains a datamodel and dashboards. The dashboards use the datamodel to pull logs quickly for visualization. The dashboards don't require a lot of compute resources or memory, and neither does the datamodel once it is built. However, the process of building the datamodel is very CPU intensive, and is an ongoing process as new logs are indexed and need to be added to the datamodel summary index. By building the datamodel and spending the compute resources to summarize the data when logs are indexed, it allows the dashboards and visualizations to pull the data quickly without intensive compute.
Care should be taken to ensure the datamodel summary indexing has enough compute resources available to keep up with the flow of logs to the index. If there aren't enough compute resources available, the dashboards may lag behind the data in the index.
Add-on: The Palo Alto Networks Add-on for Splunk handles the parsing of the logs into the index. It is highly optimized, but can require significant compute resources for high volumes of logs.