Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Palo Alto Networks Add-on for Splunk
SHA256 checksum (palo-alto-networks-add-on-for-splunk_602.tgz) d98d21e9e45ff81828ccf691f0e1e0c6ea23b0a6bdef17d1e5cef8638dfe28fa SHA256 checksum (palo-alto-networks-add-on-for-splunk_601.tgz) 84027e56656e6747eaca556ab825744b584c63b968c00161b008ef6e68cc3889 SHA256 checksum (palo-alto-networks-add-on-for-splunk_600.tgz) 37c1b3e0b5f79d4885b9c936ce09c35ed07047da122dcd3aea30cbac3d9cfb43 SHA256 checksum (palo-alto-networks-add-on-for-splunk_382.tgz) 2fc2124e7030cf5b79fb1b09fc733a657e9c921a62a98442e27feda0b38d3c9d SHA256 checksum (palo-alto-networks-add-on-for-splunk_381.tgz) f54d19a98f14139fef164738ac1f6d2cf8019ea5b17f2fa4800d3f600bbd1a90 SHA256 checksum (palo-alto-networks-add-on-for-splunk_380.tgz) 01ff8b63c024bcd17bfbd3678d5b45267ec818f88768ac78665075e27e358833 SHA256 checksum (palo-alto-networks-add-on-for-splunk_371.tgz) 5544e6144691d68335a2599efd9088816d530103d84c14064949715a8013d342 SHA256 checksum (palo-alto-networks-add-on-for-splunk_361.tgz) 110930e344bd23d84d62a39d962505105e3e687d90c4b71968d1cb286a9cba2d
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Palo Alto Networks Add-on for Splunk

Splunk Certified
Overview
Details
The Palo Alto Networks Add-on for Splunk allows a Splunk® Enterprise administrator to collect data from every product in the Palo Alto Networks Next-generation Security Platform. The add-on collects and correlates data from Firewalls, Panorama, Traps Endpoints, Aperture SaaS Security, AutoFocus, MineMeld, and WildFire. You can consume the data using the Palo Alto Network App for Splunk, Splunk Enterprise Security, and any App you create for your SOC or IT requirements. This add-on provides the inputs and CIM-compatible knowledge to use with other Splunk Enterprise apps, such as the Splunk Enterprise Security and the Splunk App for PCI Compliance.

This Add-on (TA) is designed to work with the Palo Alto Networks App for Splunk and Splunk Enterprise Security.

Installation

Support

Products Supported

Authors

Palo Alto Networks

  • Brian Torres-Gil
  • Paul Nguyen
  • Garfield Freeman

Release Notes

Version 6.0.2
Dec. 27, 2017

v.6.0.2
* threat_list.csv and app_list.csv updated.

v.6.0.1
* Fixed threat list warning message

v6.0.0
* MineMeld Support
* AutoFocus Tags Support
* Aperture Support
* PAN-OS 8.0 new fields
* Threat Intelligence from MineMeld can be shared with Splunk Enterprise Security
* Improved CIM adoption
* Datamodel optimizations for size on disk and performance

Version 6.0.1
Nov. 21, 2017

v.6.0.1
* Fixed threat list warning message

v6.0.0
* MineMeld Support
* AutoFocus Tags Support
* Aperture Support
* PAN-OS 8.0 new fields
* Threat Intelligence from MineMeld can be shared with Splunk Enterprise Security
* Improved CIM adoption
* Datamodel optimizations for size on disk and performance

Version 6.0.0
Nov. 10, 2017

v6.0.0
* MineMeld Support
* AutoFocus Tags Support
* Aperture Support
* PAN-OS 8.0 new fields
* Threat Intelligence from MineMeld can be shared with Splunk Enterprise Security
* Improved CIM adoption
* Datamodel optimizations for size on disk and performance

Version 3.8.2
Aug. 4, 2017

v3.8.2
* Improved CIM support for correlation log.

v3.8.1
* Configuration screen bug fix

v3.8.1
* Configuration screen bug fix

v3.8.0
* AutoFocus Export List modular input
* Improved configuration screen allows credentials to be changed

Version 3.8.1
June 29, 2017

v3.8.1
* Configuration screen bug fix

v3.8.0
* AutoFocus Export List modular input
* Improved configuration screen allows credentials to be changed

Version 3.8.0
April 28, 2017

v3.8.0
* AutoFocus Export List modular input
* Improved configuration screen allows credentials to be changed

Version 3.7.1
Nov. 7, 2016

v3.7.1
- Changes made to meet new certification requirements

v3.7.0
- Integration with new Splunk Adaptive Response
- Tag to dynamic address group using modular actions and Adaptive Response
- Submit URL’s from any log in Splunk to WildFire
- Logs with malware hashes have a new event action that links directly to that hash in Autofocus
- Improved tagging for Splunk Enterprise Security, based on customer feedback
- New parser for GlobalProtect logs

Important Add-on Upgrade Notes
- Eventtype pan_threat no longer includes these log_subtypes: url, data, file, and wildfire. You might need to update custom searches or panels you created that leverage the pan_threat eventtype. There are new eventtypes for each of the removed log_subtypes: pan_url, pan_data, pan_file, and pan_wildfire.

Version 3.6.1
July 7, 2016

* Add-on Certified by Splunk

4,573
Installs
23,453
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2018 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.