Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Palo Alto Networks Add-on for Splunk
SHA256 checksum (palo-alto-networks-add-on-for-splunk_610.tgz) 6c4a74479a56204d0468b028e2ac7ccd16b0e066013e99f12f1a4555bfd0ef6e SHA256 checksum (palo-alto-networks-add-on-for-splunk_602.tgz) d98d21e9e45ff81828ccf691f0e1e0c6ea23b0a6bdef17d1e5cef8638dfe28fa SHA256 checksum (palo-alto-networks-add-on-for-splunk_601.tgz) 84027e56656e6747eaca556ab825744b584c63b968c00161b008ef6e68cc3889 SHA256 checksum (palo-alto-networks-add-on-for-splunk_600.tgz) 37c1b3e0b5f79d4885b9c936ce09c35ed07047da122dcd3aea30cbac3d9cfb43 SHA256 checksum (palo-alto-networks-add-on-for-splunk_382.tgz) 2fc2124e7030cf5b79fb1b09fc733a657e9c921a62a98442e27feda0b38d3c9d SHA256 checksum (palo-alto-networks-add-on-for-splunk_381.tgz) f54d19a98f14139fef164738ac1f6d2cf8019ea5b17f2fa4800d3f600bbd1a90 SHA256 checksum (palo-alto-networks-add-on-for-splunk_380.tgz) 01ff8b63c024bcd17bfbd3678d5b45267ec818f88768ac78665075e27e358833 SHA256 checksum (palo-alto-networks-add-on-for-splunk_371.tgz) 5544e6144691d68335a2599efd9088816d530103d84c14064949715a8013d342 SHA256 checksum (palo-alto-networks-add-on-for-splunk_361.tgz) 110930e344bd23d84d62a39d962505105e3e687d90c4b71968d1cb286a9cba2d SHA256 checksum (palo-alto-networks-add-on-for-splunk_360.tgz) c2cf059e0f4063b39b7d5c3c7cfda1bce2edbf1f801cf71270cfbb0422ccdb49 SHA256 checksum (palo-alto-networks-add-on-for-splunk_352.tgz) fb965974190a01ace61383f4470c65a08badabef09e0437ff2c2754413c76414 SHA256 checksum (palo-alto-networks-add-on-for-splunk_351.tgz) d3a1e05e85242aa4908afc6af08c1e591e42ba915f2d8d6c018b6d1a7f9775ad SHA256 checksum (palo-alto-networks-add-on-for-splunk_350.tgz) ec7229b853eee3d619d40f38096e8269c8c724844f99a9dd7a7f598d1a285246
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Palo Alto Networks Add-on for Splunk

Overview
Details
The Palo Alto Networks Add-on for Splunk allows a Splunk® Enterprise administrator to collect data from every product in the Palo Alto Networks Next-generation Security Platform. The add-on collects and correlates data from Firewalls, Panorama, Traps Endpoints, Aperture SaaS Security, AutoFocus, MineMeld, and WildFire. You can consume the data using the Palo Alto Network App for Splunk, Splunk Enterprise Security, and any App you create for your SOC or IT requirements. This add-on provides the inputs and CIM-compatible knowledge to use with other Splunk Enterprise apps, such as the Splunk Enterprise Security and the Splunk App for PCI Compliance.

This Add-on (TA) is designed to work with the Palo Alto Networks App for Splunk and Splunk Enterprise Security.

Installation

Support

Products Supported

Authors

Palo Alto Networks

  • Brian Torres-Gil
  • Paul Nguyen
  • Garfield Freeman

Release Notes

Version 6.1.0
Oct. 26, 2018

- New: Support for Traps 5.0 (Traps Management Service)
- New: Support for Firewall User-ID logs
- New: Credential Detected flag for PAN-OS 8.1
- New: MineMeld indicator retention timer
- New: Batch collection of Aperture logs
- New: Support all Aperture regions
- New: Easier to disable certificate validation for self-hosted MineMeld
- New: Malicious WildFire events tagged for Malware CIM datamodel
- Fix: category field for URL logs is now more consistent
- Fix: url_length field fixed
- Fix: Corrected the double parse of Aperture logs

Potentially breaking changes:
- Traps datamodel has been renamed from pan_endpoint to pan_traps

Version 6.0.2
Dec. 27, 2017

v.6.0.2
* threat_list.csv and app_list.csv updated.

v.6.0.1
* Fixed threat list warning message

v6.0.0
* MineMeld Support
* AutoFocus Tags Support
* Aperture Support
* PAN-OS 8.0 new fields
* Threat Intelligence from MineMeld can be shared with Splunk Enterprise Security
* Improved CIM adoption
* Datamodel optimizations for size on disk and performance

Version 6.0.1
Nov. 21, 2017

v.6.0.1
* Fixed threat list warning message

v6.0.0
* MineMeld Support
* AutoFocus Tags Support
* Aperture Support
* PAN-OS 8.0 new fields
* Threat Intelligence from MineMeld can be shared with Splunk Enterprise Security
* Improved CIM adoption
* Datamodel optimizations for size on disk and performance

Version 6.0.0
Nov. 10, 2017

v6.0.0
* MineMeld Support
* AutoFocus Tags Support
* Aperture Support
* PAN-OS 8.0 new fields
* Threat Intelligence from MineMeld can be shared with Splunk Enterprise Security
* Improved CIM adoption
* Datamodel optimizations for size on disk and performance

Version 3.8.2
Aug. 4, 2017

v3.8.2
* Improved CIM support for correlation log.

v3.8.1
* Configuration screen bug fix

v3.8.1
* Configuration screen bug fix

v3.8.0
* AutoFocus Export List modular input
* Improved configuration screen allows credentials to be changed

Version 3.8.1
June 29, 2017

v3.8.1
* Configuration screen bug fix

v3.8.0
* AutoFocus Export List modular input
* Improved configuration screen allows credentials to be changed

Version 3.8.0
April 28, 2017

v3.8.0
* AutoFocus Export List modular input
* Improved configuration screen allows credentials to be changed

Version 3.7.1
Nov. 7, 2016

v3.7.1
- Changes made to meet new certification requirements

v3.7.0
- Integration with new Splunk Adaptive Response
- Tag to dynamic address group using modular actions and Adaptive Response
- Submit URL’s from any log in Splunk to WildFire
- Logs with malware hashes have a new event action that links directly to that hash in Autofocus
- Improved tagging for Splunk Enterprise Security, based on customer feedback
- New parser for GlobalProtect logs

Important Add-on Upgrade Notes
- Eventtype pan_threat no longer includes these log_subtypes: url, data, file, and wildfire. You might need to update custom searches or panels you created that leverage the pan_threat eventtype. There are new eventtypes for each of the removed log_subtypes: pan_url, pan_data, pan_file, and pan_wildfire.

Version 3.6.1
July 7, 2016

* Add-on Certified by Splunk

Version 3.6.0
April 22, 2016

* Support new Traps 3.3.2 log format

WARNING: Traps versions before 3.3.2 are no longer supported beginning with this Add-on version

Version 3.5.2
Feb. 3, 2016

* Fix issue where endpoint logs would show up in CIM apps, but not Palo Alto Networks app

Version 3.5.1
Nov. 13, 2015

* Add support for PAN-OS 7.0 new fields
* Add hip-match log type from Firewall and Panorama
* Add sourcetype category
* Add Sanctioned SaaS lookup table
* Update app_list.csv and threat_list.csv lookup tables with new format and data
* Fix incorrect value in report_id field for Wildfire logs in PAN-OS 6.1 or higher
* Fix src_category field should be dest_category

Version 3.5.0
May 28, 2015

Splunk Add-on for Palo Alto Networks 3.5.0. Copyright (C) 2014-2015 Splunk Inc. All rights reserved.

This new Add-on (TA) for Palo Alto Networks supports logs from Palo Alto Networks Next-generation Firewall, Panorama, and Traps Endpoint Security Manager. It is CIM 4.x compliant and designed to work with Splunk Enterprise Security 4 and the Palo Alto Networks App for Splunk v5.0.

5,036
Installs
27,254
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2018 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.