Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Palo Alto Networks Add-on for Splunk
MD5 checksum (palo-alto-networks-add-on-for-splunk_371.tgz) 0fc6e53d3ef2b3d4d6bb46c7421c87ee MD5 checksum (palo-alto-networks-add-on-for-splunk_361.tgz) 3d864310fdea6254446f3d1adfd78515 MD5 checksum (palo-alto-networks-add-on-for-splunk_360.tgz) bbd74703cc6646d6aada265ec0230aea MD5 checksum (palo-alto-networks-add-on-for-splunk_352.tgz) e8592294d2b755d97b2b8ea7284d5eca MD5 checksum (palo-alto-networks-add-on-for-splunk_351.tgz) dceac61f5927e78f38e4542139fd5a50 MD5 checksum (palo-alto-networks-add-on-for-splunk_350.tgz) c5b166e4f05b7dfa99aa254c211a70d8
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Palo Alto Networks Add-on for Splunk

Splunk Certified
Overview
Details
The Palo Alto Networks Add-on for Splunk allows a Splunk® Enterprise administrator to collect data from Palo Alto Networks Next-Generation Firewall devices and Advanced Endpoint Protection. The add-on collects traffic, threat, system, configuration, and endpoint logs from Palo Alto Networks physical or virtual firewall devices over syslog. After Splunk Enterprise indexes the events, you can consume the data using the prebuilt dashboard panels included with the add-on. This add-on provides the inputs and CIM-compatible knowledge to use with other Splunk Enterprise apps, such as the Splunk App for Enterprise Security and the Splunk App for PCI Compliance.

Palo Alto Networks Add-on for Splunk

Authors: Brian Torres-Gil and Paul Nguyen - Palo Alto Networks

Documentation

Installation and Getting Started: http://pansplunk.readthedocs.io/en/latest/getting_started.html
Release Notes: http://pansplunk.readthedocs.io/en/latest/release_notes.html
Support: http://pansplunk.readthedocs.io/en/latest/support.html

This Add-on (TA) is designed to work with the Palo Alto Networks App for Splunk and Splunk Enterprise Security 4.

Release Notes

Version: 3.7.1

v3.7.1
- Changes made to meet new certification requirements

v3.7.0
- Integration with new Splunk Adaptive Response
- Tag to dynamic address group using modular actions and Adaptive Response
- Submit URL’s from any log in Splunk to WildFire
- Logs with malware hashes have a new event action that links directly to that hash in Autofocus
- Improved tagging for Splunk Enterprise Security, based on customer feedback
- New parser for GlobalProtect logs

Important Add-on Upgrade Notes
- Eventtype pan_threat no longer includes these log_subtypes: url, data, file, and wildfire. You might need to update custom searches or panels you created that leverage the pan_threat eventtype. There are new eventtypes for each of the removed log_subtypes: pan_url, pan_data, pan_file, and pan_wildfire.

Nov. 7, 2016, 8:07 p.m.

Platform Independent

6.6, 6.5, 6.4, 6.3, 6.2

Version: 3.6.1

* Add-on Certified by Splunk

July 7, 2016, 11:01 p.m.

Platform Independent

6.5, 6.4, 6.3, 6.2, 6.1

Version: 3.6.0

* Support new Traps 3.3.2 log format

WARNING: Traps versions before 3.3.2 are no longer supported beginning with this Add-on version

April 22, 2016, 6:20 a.m.

Platform Independent

6.4, 6.3, 6.2, 6.1

Version: 3.5.2

* Fix issue where endpoint logs would show up in CIM apps, but not Palo Alto Networks app

Feb. 3, 2016, 11:18 p.m.

Platform Independent

6.3, 6.2, 6.1

Version: 3.5.1

* Add support for PAN-OS 7.0 new fields
* Add hip-match log type from Firewall and Panorama
* Add sourcetype category
* Add Sanctioned SaaS lookup table
* Update app_list.csv and threat_list.csv lookup tables with new format and data
* Fix incorrect value in report_id field for Wildfire logs in PAN-OS 6.1 or higher
* Fix src_category field should be dest_category

Nov. 13, 2015, 4:36 p.m.

Platform Independent

6.3, 6.2, 6.1

Version: 3.5.0

Splunk Add-on for Palo Alto Networks 3.5.0. Copyright (C) 2014-2015 Splunk Inc. All rights reserved.

This new Add-on (TA) for Palo Alto Networks supports logs from Palo Alto Networks Next-generation Firewall, Panorama, and Traps Endpoint Security Manager. It is CIM 4.x compliant and designed to work with Splunk Enterprise Security 4 and the Palo Alto Networks App for Splunk v5.0.

May 28, 2015, 2 a.m.

Platform Independent

6.3, 6.2, 6.1

2,449
Installs
8,511
Downloads
Share Subscribe LOGIN TO DOWNLOAD
Version
3.7.1
Category
IT Operations
Security, Fraud & Compliance
Product Support
Splunk Enterprise
Splunk Cloud
Content Type
Add-on
Splunk Versions
6.5
6.4
6.3
6.2
CIM Versions
CIM 4.6, 4.5, 4.4, 4.3, 4.2
Licensing
ISC License
Platforms
Platform Independent
Built by
Palo Alto Networks
Contact Developer
Subscribe Share

Splunk Certification Program

Splunk's App Certification program uses a specific set of criteria to evaluate the level of quality, usability and security your app offers to its users. In addition, we evaluate the documentation and support you offer to your app's users.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2017 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.