Support
 
Support Get Quote
 
 
 
 

Syslog Management

Palo Alto Networks firewall security auditing

Firewalls are an important line of defense against malicious attack attempts on an organization's network. By blocking various attack types, firewalls allow network communications to continue seamlessly. But it is also important to take stock and understand what attacks are attempted on a network and who is trying to disrupt the network. This can be done by auditing security logs, which provide information on all attack attempts and aid in security-related decision making. EventLog Analyzer helps organizations efficiently audit security logs and take steps to improve network security.

Since Palo Alto Networks firewalls are equipped to deal with specific attack types, auditing their security logs provides detailed information about these attacks. Some scenarios in which auditing Palo Alto Networks security logs are useful include:

  • When users need to identify highly targeted devices that are attacked repeatedly. This may necessitate tightening security measures for the host, such as encrypting the host data, or backing up device data more frequently.
  • When users need to extract information about specific attack attempts. For instance, admins can identify a denial of service attack, where the attacker tries to flood a server with requests, and block the source from future attack attempts.
  • When users need to review threats detected by the Palo Alto Networks Wildfire environment to discover and keep pace with the latest threats.
  • When users need to monitor which blocked sites employees are attempting to access using URL filtering logs.
  • When users need to identify trends to develop a deeper understanding of the pattern of attacks that an organization faces.

Palo Alto Networks firewall security auditing reports

check-point-firewall-traffic-reports

Two groups of security auditing reports are available: system event reports and threat reports. System event reports detail the various software packages that are installed or upgraded on the firewall.

Threat reports provide information regarding various security-related dangers to the network. Specifically, threat reports include:

  • An overview report that presents a summary of the various threats averted.
  • A trend report that describes threat trends over time.
  • Top N reports, which identify the source or destination devices which are the most frequent cause (or target) of attacks.
  • Various threat-specific security reports, namely: flood attack detection, spyware download detection, Wildfire signature feed, and vulnerability exploit detection.

Available Reports

Package Installed | Package Upgraded | Possible Attacks | Critical Attacks | Top Attacks based on Source | Top Attacks based on Destination | Attacks Trend Scan Detection | Flood Detection | URL Filtering Log | Spyware Phone Home Detection | Spyware Download Detection | Vulnerability Exploit Detection | Filetype Detection | Data Filtering Detection | Virus Detection | Wildfire Signature Feed | DNS Botnet Signatures

EventLog Analyzer efficiently analyzes, reports, and alerts on Palo Alto Networks security logs, ensuring that no attack attempts are missed and the network is constantly protected.

Track activity happening in your Palo Alto devices.

Get Your Free Trial

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Infosys
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
A Single Pane of Glass for Comprehensive Log Management