How can I effectively ingest Palo Alto and Fortigate logs into Microsoft Sentinel?

0
21
Asked By Skywalker101 On

I've recently onboarded a new customer to our SOC services and need to integrate their Palo Alto and FortiGate firewalls into our Microsoft-based stack, specifically for log ingestion into Microsoft Sentinel. I'm looking for insights from anyone who's successfully done this in a production environment. What are the best and most reliable methods to send these logs to Sentinel? Additionally, how can we manage the signal-to-noise ratio to avoid overwhelming ourselves with low-value alerts once the ingestion is live? Any useful filtering, parsing, or tuning tips you've found helpful would be greatly appreciated. Thanks for your help!

4 Answers

Answered By TechWhiz87 On

A straightforward approach is to set up a virtual machine that runs a syslog server. You can use the Azure Monitor agent on that VM and then create a data collection rule to direct the logs to your Sentinel workspace. It's a solid setup for getting those logs flowing!

DailyAdmin91 -

Absolutely! We're also in the early stages of configuring this for our Cisco ASA devices, utilizing an on-premise log forwarder along with Azure Arc and the Azure Monitor Agent. It’s coming together nicely!

LinuxGuru44 -

Right, and don’t forget to get a competent Linux admin involved to optimize the server settings. The default configurations often aren't designed for handling high log volumes efficiently.

Answered By CloudNinja17 On

Also, keep an eye out for the Azure Syslog Gateway. It can be very useful in simplifying the log ingestion process!

Answered By AlertKing23 On

Make sure to inform the customer about potential costs associated with this ingestion process. It’s crucial they have a budget in mind before diving in.

Answered By DataSage12 On

Definitely follow the syslog server route. For managing alerts, you can implement filters directly on the syslog server using the syntax specific to your setup. We used rsyslog and filtered out a lot of unnecessary logs before they hit Sentinel, which saves on costs. You could also set up some filtering on the Palo's Panorama beforehand, but I'd recommend doing most of it on the syslog server to keep the process streamlined.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.