Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Palo Alto Networks Add-on for Splunk
MD5 checksum (palo-alto-networks-add-on-for-splunk_382.tgz) 79e0742f1550588288f1ce3e86ac7b6d MD5 checksum (palo-alto-networks-add-on-for-splunk_381.tgz) 62c381bec482ed5edac442b07effbcd8 MD5 checksum (palo-alto-networks-add-on-for-splunk_380.tgz) b0ea66d967631eb240754ed866dfa40b MD5 checksum (palo-alto-networks-add-on-for-splunk_371.tgz) 0fc6e53d3ef2b3d4d6bb46c7421c87ee MD5 checksum (palo-alto-networks-add-on-for-splunk_361.tgz) 3d864310fdea6254446f3d1adfd78515
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Palo Alto Networks Add-on for Splunk

Splunk Certified
Overview
Details
The Palo Alto Networks Add-on for Splunk allows a Splunk® Enterprise administrator to collect data from Palo Alto Networks Next-Generation Firewall devices and Advanced Endpoint Protection. The add-on collects traffic, threat, system, configuration, and endpoint logs from Palo Alto Networks physical or virtual firewall devices over syslog. After Splunk Enterprise indexes the events, you can consume the data using the prebuilt dashboard panels included with the add-on. This add-on provides the inputs and CIM-compatible knowledge to use with other Splunk Enterprise apps, such as the Splunk App for Enterprise Security and the Splunk App for PCI Compliance.

Palo Alto Networks Add-on for Splunk

Authors: Brian Torres-Gil and Paul Nguyen - Palo Alto Networks

Documentation

Installation and Getting Started: http://pansplunk.readthedocs.io/en/latest/getting_started.html
Release Notes: http://pansplunk.readthedocs.io/en/latest/release_notes.html
Support: http://pansplunk.readthedocs.io/en/latest/support.html

This Add-on (TA) is designed to work with the Palo Alto Networks App for Splunk and Splunk Enterprise Security 4.

Release Notes

Version 3.8.2
Aug. 4, 2017

v3.8.2
* Improved CIM support for correlation log.

v3.8.1
* Configuration screen bug fix

v3.8.1
* Configuration screen bug fix

v3.8.0
* AutoFocus Export List modular input
* Improved configuration screen allows credentials to be changed

Version 3.8.1
June 29, 2017

v3.8.1
* Configuration screen bug fix

v3.8.0
* AutoFocus Export List modular input
* Improved configuration screen allows credentials to be changed

Version 3.8.0
April 28, 2017

v3.8.0
* AutoFocus Export List modular input
* Improved configuration screen allows credentials to be changed

Version 3.7.1
Nov. 7, 2016

v3.7.1
- Changes made to meet new certification requirements

v3.7.0
- Integration with new Splunk Adaptive Response
- Tag to dynamic address group using modular actions and Adaptive Response
- Submit URL’s from any log in Splunk to WildFire
- Logs with malware hashes have a new event action that links directly to that hash in Autofocus
- Improved tagging for Splunk Enterprise Security, based on customer feedback
- New parser for GlobalProtect logs

Important Add-on Upgrade Notes
- Eventtype pan_threat no longer includes these log_subtypes: url, data, file, and wildfire. You might need to update custom searches or panels you created that leverage the pan_threat eventtype. There are new eventtypes for each of the removed log_subtypes: pan_url, pan_data, pan_file, and pan_wildfire.

Version 3.6.1
July 7, 2016

* Add-on Certified by Splunk

3,355
Installs
14,854
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

Splunk Certification Program

Splunk's App Certification program uses a specific set of criteria to evaluate the level of quality, usability and security your app offers to its users. In addition, we evaluate the documentation and support you offer to your app's users.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2017 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.