This article leads you through the process of integrating Palo Alto Networks Threat Prevention with Red Canary. Follow the procedure from beginning to end.
Step 1: Red Canary–Create your Red Canary generated URL
Create a Red Canary generated-URL to send Palo Alto alerts for ingestion.
- From the Red Canary homepage, click Integrations, and then click Alert Sources.
- In the search bar, type and select Palo Alto Networks Threat Prevention.
- To configure your new alert source, scroll down and click Palo Alto Networks Threat Prevention.
- Click Edit Configuration.
- Enter a Name for your external alert source.
- Select a Display Category.
- Under the Ingest Format/Method dropdown, select Palo Alto Networks Threat via Syslog.
- Click Save Configuration.
- Click Edit Configuration.
- Click Activate.
- Red Canary will generate a URL and Port number that you will use to input into your Palo Alto account. Copy and save this number as you will use it in subsequent steps.
- With your Red Canary URL generated, log in to your PAN-OS device of choice.
Step 2: Your PAN-OS Device–Generate a PAN-OS certificate
Generate a PanOS custom certificate to send syslogs from your PAN-OS device to Red Canary.
Step 2.1–Create a Syslog Profile
- From your PAN-OS dashboard, click Device.
- From the Server Profiles dropdown in the navigation pane, click Syslog.
- Click +Add.
- Name your Syslog Profile.
- Click +Add.
- Name your Syslog Server.
- Copy and paste the syslog server URL address from Step 1.11.
- From the Transport dropdown, select SSL.
- In the Port section, enter the Port number from Step 1.11.
- From the Format dropdown, select BSD.
- From the Facility dropdown, select LOG_User.
- Click OK.
Step 2.2–Create a Log Forwarding Profile
- From your PAN-OS dashboard, click Objects.
- In the navigation pane, click Log Forwarding.
- Click +Add.
- Name your log forwarding profile, and then write a description for the profile.
Note: We recommend that you name your profile something generic so it can be reused with other PAN-OS security products (for example, RC Syslog Output). - Click +Add.
- Name your log forwarding profile match list, and then write a description for the profile match list.
- From the Log Type dropdown, select threat.
- From the Filter dropdown, select All Logs.
- From the Syslog section, click +Add, and then select the syslog created from Step 2.1.
- Click OK.
- With your Log Forwarding Profile created, click OK.
Step 2.3–Create a Security Policy Rule
- From your PAN-OS dashboard, click Policies.
- In the navigation pane, click Security.
- Click +Add.
- To create a Security Policy Rule, fill in the required information in all of the tabs.
Note: We recommend that you name your Security Policy Rule something generic so it can be reused with other PAN-OS security products (for example, RC Security Policy). - In the Actions tab’s Action dropdown, select Allow.
- From the Profile Type dropdown, select Profiles.
- Customize the type of information you want to send to Red Canary by selecting your profile settings.
- From the Log Forwarding dropdown, select RC Syslog Output.
- With all of the required information filled in, click OK.
Step 2.4–Export your PAN-OS Certificate
- From your PAN-OS dashboard, click Device.
- From the Certificate Management dropdown in the navigation pane, click Certificates.
- Click Generate.
- Name your certificate.
- For Common Name, enter the address you acquired from Red Canary in Step 1.11.
- From the Signed By dropdown, select the trusted CA or the self-signed CA that the syslog server and the firewall both trust.
- Click Generate.
- Click your newly created certificate.
- Select Certificate for Secure Syslog.
- Click OK.
- From the Device Certificates landing page, select the new certificate, and then click Export Certificate.
- Select Export Private Key.
- Enter a Passphrase.
- Confirm your Passphrase.
- Click OK.
- Save the downloaded certificate as you will use it in subsequent steps.
- With your PAN-OS generated certificate downloaded, log in to Red Canary.
- Continue on to Step 4.
Step 3: Your PAN-OS Device–Create a Certificate Authority (CA) (Optional)
Generate a PanOS CA certificate to send syslogs from your PAN-OS device to Red Canary. If you choose to perform this step, you do so before you perform Step 4.
- Review this article and complete steps 1-4 to configure the PAN-OS syslog monitoring process.
Note: If a CA certificate is not already present, PAN-OS allows for their firewall to act as a certificate authority. Learn more about creating a certificate authority on a PAN device. - From your PAN-OS dashboard, click Device.
- From the Certificate Management dropdown in the navigation pane, click Certificates.
- Click Generate.
- Name your certificate.
- For Common Name, enter the URL address you acquired from Red Canary in Step 1.11.
- From the Signed By dropdown, select the trusted CA or the self-signed CA that the syslog server and the firewall both trust.
Note: The certificate can’t be a Certificate Authority nor an External Authority (certificate signing request [CSR]). - Select Certificate Authority.
- From the Certificate Attributes section, click +Add.
- From the Type dropdown, select Email.
- From the Value dropdown, enter your email address.
- Click Generate.
- Click your newly created certificate, and then select Certificate for Secure Syslog.
- Click OK.
- From the Device Certificates landing page, select your new certificate, and then click Export Certificate.
- Select Export Private Key.
- Enter a Passphrase.
- Copy and save this Passphrase for future reference.
- Confirm your Passphrase.
- Click OK.
- Save the downloaded certificate as you will use it in subsequent steps.
- With your PAN-OS generated CA certificate downloaded, log in to Red Canary.
Step 4: Red Canary–Upload your PanOS certificates to Red Canary
Connect your custom certificates to Red Canary in order to start receiving PAN-OS alerts.
- From the Red Canary homepage, click Integrations, and then click Alert Sources.
- To configure your new alert source, scroll down and click Palo Alto Networks Threat Prevention.
- Click Edit Configuration.
- Select Use Custom TLS server certificate for ingest over TLS.
- Upload the certificates you generated in previous steps:
- Upload a certificate file (PEM or DER)–Upload the server.crt from Step 2.4.
- Enter the Private key passphrase used to generate the server key from Step 3.17.
- Upload the CA certificate corresponding to your certificate (this step is optional)–Upload the ca.crt from Step 3.
- Click Save Configuration.
Comments
0 comments
Please sign in to leave a comment.