index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
591
Monitoring Field Name Description App Flap Count (link_change_count) Number of link flaps that occurred during the session. Policy ID (policy_id) Name of the SD-WAN policy. Link Switches (link_switches) Contains up to four link flap entries, with each entry containing the link name, link tag, link type, physical interface, timestamp, bytes read, bytes written, link health, and link flap cause. SD-WAN Cluster (sdwan_cluster) Name of the SD-WAN cluster. SD-WAN Device Type (sdwan_device_type) Type of device (hub or branch). SD-WAN Cluster Type (sdwan_cluster_type) Type of cluster (mesh or hub-spoke). SD-WAN Site (sdwan_site) Name of the SD-WAN site. Dynamic User Group Name (dynusergroup_name) Name of the dynamic user group that contains the user who initiated the session. XFF Address (xff_ip) The IP address of the user who requested the web page or the IP address of the next to last device that the request traversed. If the request goes through one or more proxies, load balancers, or other upstream devices, the firewall displays the IP address of the most recent device. Based on different appliance implementations, the XFF field may contain non-IP address values. Source Device Category (src_category) The category for the device that Device-ID identifies as the source of the traffic. Source Device Profile (src_profile) The device profile for the device that Device-ID identifies as the source of the traffic. Source Device Model (src_model) The model of the device that Device-ID identifies as the source of the traffic. Source Device Vendor (src_vendor) The vendor of the device that Device-ID identifies as the source of the traffic. Source Device OS Family (src_osfamily) The operating system type for the device that Device-ID identifies as the source of the traffic. PAN-OS® Administrator’s Guide Version 10.2 592 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
592
Monitoring Field Name Description Source Device OS Version (src_osversion) The version of the operating system for the device that Device-ID identifies as the source of the traffic. Source Hostname (src_host) The hostname of the device that Device-ID identifies as the source of the traffic. Source MAC Address (src_mac) The MAC address for the device that Device-ID identifies as the source of the traffic. Destination Device Category (dst_category) The category for the device that Device-ID identifies as the destination for the traffic. Destination Device Profile (dst_profile) The device profile for the device that Device-ID identifies as the destination for the traffic. Destination Device Model (dst_model) The model of the device that Device-ID identifies as the destination for the traffic. Destination Device Vendor (dst_vendor) The vendor of the device that Device-ID identifies as the destination for the traffic. Destination Device OS Family (dst_osfamily) The operating system type for the device that Device-ID identifies as the destination for the traffic. Destination Device OS Version (dst_osversion) The version of the operating system for the device that Device-ID identifies as the destination for the traffic. Destination Hostname (dst_host) The hostname of the device that Device-ID identifies as the destination for the traffic. Destination MAC Address (dst_mac) The MAC address for the device that Device-ID identifies as the destination for the traffic. Container ID (container_id) The container ID of the PAN-NGFW pod on the Kubernetes node where the application POD is deployed. POD Namespace (pod_namespace) The namespace of the application POD being secured. POD Name (pod_name) The application POD being secured. Source External Dynamic List (src_edl) The name of the external dynamic list that contains the source IP address of the traffic. Destination External Dynamic List (dst_edl) The name of the external dynamic list that contains the destination IP address of the traffic. PAN-OS® Administrator’s Guide Version 10.2 593 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
593
Monitoring Field Name Description Host ID (hostid) Unique ID GlobalProtect assigns to identify the host. User Device Serial Number (serialnumber) Serial number of the user’s machine or device. Source Dynamic Address Group (src_dag) Original session source dynamic address group. Destination Dynamic Address Group (dst_dag) Original destination source dynamic address group. Session Owner (session_owner) The original high availability (HA) peer session owner in an HA cluster from which the session table data was synchronized upon HA failover. High Resolution Timestamp (high_res_timestamp) Time in milliseconds the log was received at the management plane. The format for this new field is YYYY-MM-DDThh:ss:sssTZD: • YYYY—Four digit year • MM—Two-digit month • DD—Two-digit day of the month (01 through 31) • T—Indicator for the beginning of the timestamp • hh—Two-digit hour using 24-hour time (00 through 23) • mm—Two-digit minute (00 through 59) • ss—Two-digit second (00 through 60) • sss—One or more digits for millisecond • TZD—Time zone designator (+hh:mm or -hh:mm) The High Resolution Timestamp is supported for logs received from managed firewalls running PAN-OS 10.0 and later releases. Logs received from managed firewalls running PAN-OS 9.1 and earlier releases display a 1969-12-31T16:00:00:000-8:00 timestamp regardless of when the log was received. A Slice Service Type (nssai_sst) The A Slice Service Type of the Network Slice ID. A Slice Differentiator (nssai_sd) The A Slice Differentiator of the Network Slice ID. PAN-OS® Administrator’s Guide Version 10.2 594 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
594
Monitoring Field Name Description Application Subcategory (subcategory_of_app) The application subcategory specified in the application configuration properties. Application Category (category_of_app) The application category specified in the application configuration properties. Values are: • business-systems • collaboration • general-internet • media • networking • saas Application Technology (technology_of_app) The application technology specified in the application configuration properties. Values are: • browser-based • client-server • network-protocol • peer-to-peer Application Risk (risk_of_app) Risk level associated with the application (1=lowest to 5=highest). Application Characteristic (characteristic_of_app) Comma-separated list of applicable characteristic of the application Application Container (container_of_app) The parent application for an application. Tunneled Application (tunneled_app) Name of the tunneled application. Application SaaS (is_saas_of_app) Displays 1 if a SaaS application or 0 if not a SaaS application. Application Sanctioned State (sanctioned_state_of_app) Displays 1 if application is sanctioned or 0 if application is not sanctioned. Offloaded (offloaded) Displays 1 if traffic flow has been offloaded or 0 if traffic flow was not offloaded. PAN-OS® Administrator’s Guide Version 10.2 595 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
595
Monitoring Threat Log Fields Format: FUTURE_USE, Receive Time, Serial Number, Type, Threat/Content Type, FUTURE_USE, Generated Time, Source Address, Destination Address, NAT Source IP, NAT Destination IP, Rule Name, Source User, Destination User, Application, Virtual System, Source Zone, Destination Zone, Inbound Interface, Outbound Interface, Log Action, FUTURE_USE, Session ID, Repeat Count, Source Port, Destination Port, NAT Source Port, NAT Destination Port, Flags, IP Protocol, Action, URL/Filename, Threat ID, Category, Severity, Direction, Sequence Number, Action Flags, Source Location, Destination Location, FUTURE_USE, Content Type, PCAP_ID, File Digest, Cloud, URL Index, User Agent, File Type, X-Forwarded-For, Referer, Sender, Subject, Recipient, Report ID, Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, FUTURE_USE, Source VM UUID, Destination VM UUID, HTTP Method, Tunnel ID/IMSI, Monitor Tag/IMEI, Parent Session ID, Parent Start Time, Tunnel Type, Threat Category, Content Version, FUTURE_USE, SCTP Association ID, Payload Protocol ID, HTTP Headers, URL Category List, Rule UUID, HTTP/2 Connection, Dynamic User Group Name, XFF Address, Source Device Category, Source Device Profile, Source Device Model, Source Device Vendor, Source Device OS Family, Source Device OS Version, Source Hostname, Source MAC Address, Destination Device Category, Destination Device Profile, Destination Device Model, Destination Device Vendor, Destination Device OS Family, Destination Device OS Version, Destination Hostname, Destination MAC Address, Container ID, POD Namespace, POD Name, Source External Dynamic List, Destination External Dynamic List, Host ID, Serial Number, Domain EDL, Source Dynamic Address Group, Destination Dynamic Address Group, Partial Hash, High Resolution Timestamp, Reason, Justification, A Slice Service Type, Application Subcategory, Application Category, Application Technology, Application Risk, Application Characteristic, Application Container, Tunneled Application, Application SaaS, Application Sanctioned State, Cloud Report ID Field Name Description Receive Time (receive_time or cef￾formatted-receive_time) Time the log was received at the management plane. Serial Number (serial #) Serial number of the firewall that generated the log. Type (type) Specifies the type of log; value is THREAT. Threat/Content Type (subtype) Subtype of threat log. Values include the following: • data—Data pattern matching a Data Filtering profile. • file—File type matching a File Blocking profile. • flood—Flood detected via a Zone Protection profile. • packet—Packet-based attack protection triggered by a Zone Protection profile. • scan—Scan detected via a Zone Protection profile. • spyware —Spyware detected via an Anti-Spyware profile. • url—URL filtering log. PAN-OS® Administrator’s Guide Version 10.2 596 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
596
Monitoring Field Name Description • ml-virus—Virus detected by WildFire Inline ML via an Antivirus profile. • virus—Virus detected via an Antivirus profile. • vulnerability —Vulnerability exploit detected via a Vulnerability Protection profile. • wildfire —A WildFire verdict generated when the firewall submits a file to WildFire per a WildFire Analysis profile and a verdict (malware, phishing, grayware, or benign, depending on what you are logging) is logged in the WildFire Submissions log. • wildfire-virus—Virus detected via an Antivirus profile. Generate Time (time_generated or cef-formatted￾time_generated) Time the log was generated on the dataplane. Source address (src) Original session source IP address. Destination address (dst) Original session destination IP address. NAT Source IP (natsrc) If source NAT performed, the post-NAT source IP address. NAT Destination IP (natdst) If destination NAT performed, the post-NAT destination IP address. Rule Name (rule) Name of the rule that the session matched. Source User (srcuser) Username of the user who initiated the session. Destination User (dstuser) Username of the user to which the session was destined. Application (app) Application associated with the session. Virtual System (vsys) Virtual System associated with the session. Source Zone (from) Zone the session was sourced from. Destination Zone (to) Zone the session was destined to. Inbound Interface (inbound_if) Interface that the session was sourced from. Outbound Interface (outbound_if) Interface that the session was destined to. PAN-OS® Administrator’s Guide Version 10.2 597 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
597
Monitoring Field Name Description Log Action (logset) Log Forwarding Profile that was applied to the session. Session ID (sessionid) An internal numerical identifier applied to each session. Repeat Count (repeatcnt) Number of sessions with same Source IP, Destination IP, Application, and Content/Threat Type seen within 5 seconds. Source Port (sport) Source port utilized by the session. Destination Port (dport) Destination port utilized by the session. NAT Source Port (natsport) Post-NAT source port. NAT Destination Port (natdport) Post-NAT destination port. Flags (flags) 32-bit field that provides details on session; this field can be decoded by AND-ing the values with the logged value: • 0x80000000—session has a packet capture (PCAP) • 0x40000000—option is enabled to allow a client to use multiple paths to connect to a destination host • 0x20000000—file is submitted to WildFire for a verdict • 0x10000000—enterprise credential submission by end user detected • 0x08000000— source for the flow is on an allow list and not subject to recon protection • 0x02000000—IPv6 session • 0x01000000—SSL session is decrypted (SSL Proxy) • 0x00800000—session is denied via URL filtering • 0x00400000—session has a NAT translation performed • 0x00200000—user information for the session was captured through Authentication Portal • 0x00100000—application traffic is on a non-standard destination port • 0x00080000 —X-Forwarded-For value from a proxy is in the source user field • 0x00040000 —log corresponds to a transaction within a http proxy session (Proxy Transaction) • 0x00020000—Client to Server flow is subject to policy based forwarding PAN-OS® Administrator’s Guide Version 10.2 598 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
598
Monitoring Field Name Description • 0x00010000—Server to Client flow is subject to policy based forwarding • 0x00008000 —session is a container page access (Container Page) • 0x00002000 —session has a temporary match on a rule for implicit application dependency handling. Available in PAN-OS 5.0.0 and above. • 0x00000800 —symmetric return is used to forward traffic for this session • 0x00000400—decrypted traffic is being sent out clear text through a mirror port • 0x00000010—payload of the outer tunnel is being inspected IP Protocol (proto) IP protocol associated with the session. Action (action) Action taken for the session; values are alert, allow, deny, drop, drop-all-packets, reset-client, reset-server, reset-both, block-url. • alert—threat or URL detected but not blocked • allow— flood detection alert • deny—flood detection mechanism activated and deny traffic based on configuration • drop— threat detected and session remains, but drops all packets • reset-client —threat detected and a TCP RST is sent to the client • reset-server —threat detected and a TCP RST is sent to the server • reset-both —threat detected and a TCP RST is sent to both the client and the server • block-url —URL request was blocked because it matched a URL category that was set to be blocked • block-ip—threat detected and client IP is blocked • random-drop—flood detected and packet was randomly dropped • sinkhole—DNS sinkhole activated • syncookie-sent—syncookie alert • block-continue (URL subtype only)—a HTTP request is blocked and redirected to a Continue page with a button for confirmation to proceed • continue (URL subtype only)—response to a block-continue URL continue page indicating a block-continue request was allowed to proceed PAN-OS® Administrator’s Guide Version 10.2 599 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
599
Monitoring Field Name Description • block-override (URL subtype only)—a HTTP request is blocked and redirected to an Admin override page that requires a pass code from the firewall administrator to continue • override-lockout (URL subtype only)—too many failed admin override pass code attempts from the source IP. IP is now blocked from the block-override redirect page • override (URL subtype only)—response to a block-override page where a correct pass code is provided and the request is allowed • block (Wildfire only)—file was blocked by the firewall and uploaded to Wildfire URL/Filename (misc) Field with variable length. A Filename has a maximum of 63 characters. A URL has a maximum of 1023 characters The actual URI when the subtype is url File name or file type when the subtype is file File name when the subtype is virus File name when the subtype is wildfire-virus File name when the subtype is wildfire URL or File name when the subtype is vulnerability if applicable URL when Threat Category is domain-edl Spoofed SNI domain when a host header mismatch is detected (identified by a unique threat ID of 86467). Threat/Content Name (threatid) Palo Alto Networks identifier for known and custom threats. It is a description string followed by a 64-bit numerical identifier in parentheses for some Subtypes: • 8000 – 8099— scan detection • 8500 – 8599— flood detection • 9999— URL filtering log • 10000 – 19999 —spyware phone home detection • 20000 – 29999 —spyware download detection • 30000 – 44999 —vulnerability exploit detection • 52000 – 52999— filetype detection • 60000 – 69999 —data filtering detection If the Domain EDL field is populated, then this field is populated with the same value. PAN-OS® Administrator’s Guide Version 10.2 600 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
600
Monitoring Field Name Description Threat ID ranges for virus detection, WildFire signature feed, and DNS C2 signatures used in previous releases have been replaced with permanent, globally unique IDs. Refer to the Threat/Content Type (subtype) and Threat Category (thr_category) field names to create updated reports, filter threat logs, and ACC activity. Category (category) For URL Subtype, it is the URL Category; For WildFire subtype, it is the verdict on the file and is either ‘malware’, ‘phishing’, ‘grayware’, or ‘benign’; For other subtypes, the value is ‘any’. Severity (severity) Severity associated with the threat; values are informational, low, medium, high, critical. Direction (direction) Indicates the direction of the attack, client-to-server or server-to￾client: • 0—direction of the threat is client to server • 1—direction of the threat is server to client Sequence Number (seqno) A 64-bit log entry identifier incremented sequentially. Each log type has a unique number space. Action Flags (actionflags) A bit field indicating if the log was forwarded to Panorama. Source Country (srcloc) Source country or Internal region for private addresses. Maximum length is 32 bytes. Destination Country (dstloc) Destination country or Internal region for private addresses. Maximum length is 32 bytes. Content Type (contenttype) Applicable only when Subtype is URL. Content type of the HTTP response data. Maximum length 32 bytes. PCAP ID (pcap_id) The packet capture (pcap) ID is a 64 bit unsigned integral denoting an ID to correlate threat pcap files with extended pcaps taken as a part of that flow. All threat logs will contain either a pcap_id of 0 (no associated pcap), or an ID referencing the extended pcap file. File Digest (filedigest) Only for WildFire subtype; all other types do not use this field The filedigest string shows the binary hash of the file sent to be analyzed by the WildFire service. PAN-OS® Administrator’s Guide Version 10.2 601 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
601
Monitoring Field Name Description Cloud (cloud) Only for WildFire subtype; all other types do not use this field. The cloud string displays the FQDN of either the WildFire appliance (private) or the WildFire cloud (public) from where the file was uploaded for analysis. URL Index (url_idx) Used in URL Filtering and WildFire subtypes. When an application uses TCP keepalives to keep a connection open for a length of time, all the log entries for that session have a single session ID. In such cases, when you have a single threat log (and session ID) that includes multiple URL entries, the url_idx is a counter that allows you to correlate the order of each log entry within the single session. For example, to learn the URL of a file that the firewall forwarded to WildFire for analysis, locate the session ID and the url_idx from the WildFire Submissions log and search for the same session ID and url_idx in your URL filtering logs. The log entry that matches the session ID and url_idx will contain the URL of the file that was forwarded to WildFire. User Agent (user_agent) Only for the URL Filtering subtype; all other types do not use this field. The User Agent field specifies the web browser that the user used to access the URL, for example Internet Explorer. This information is sent in the HTTP request to the server. File Type (filetype) Only for WildFire subtype; all other types do not use this field. Specifies the type of file that the firewall forwarded for WildFire analysis. X-Forwarded-For (xff) Only for the URL Filtering subtype; all other types do not use this field. The X-Forwarded-For field in the HTTP header contains the IP address of the user who requested the web page. It allows you to identify the IP address of the user, which is useful particularly if you have a proxy server on your network that replaces the user IP address with its own address in the source IP address field of the packet header. Based on different appliance implementations, the XFF field may contain non-IP address values. Referer (referer) Only for the URL Filtering subtype; all other types do not use this field. PAN-OS® Administrator’s Guide Version 10.2 602 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
602
Monitoring Field Name Description The Referer field in the HTTP header contains the URL of the web page that linked the user to another web page; it is the source that redirected (referred) the user to the web page that is being requested. Sender (sender) Specifies the name of the sender of an email. Subject (subject) Specifies the subject of an email. Recipient (recipient) Specifies the name of the receiver of an email. Report ID (reportid) Only for Data Filtering and WildFire subtype; all other types do not use this field. Identifies the analysis request on the firewall, WildFire cloud, or the WildFire appliance. Device Group Hierarchy (dg_hier_level_1 to dg_hier_level_4) A sequence of identification numbers that indicate the device group’s location within a device group hierarchy. The firewall (or virtual system) generating the log includes the identification number of each ancestor in its device group hierarchy. The shared device group (level 0) is not included in this structure. If the log values are 12, 34, 45, 0, it means that the log was generated by a firewall (or virtual system) that belongs to device group 45, and its ancestors are 34, and 12. To view the device group names that correspond to the value 12, 34 or 45, use one of the following methods: API query: /api/?type=op&cmd=<show><dg-hierarchy></dg￾hierarchy></show> Virtual System Name (vsys_name) The name of the virtual system associated with the session; only valid on firewalls enabled for multiple virtual systems. Device Name (device_name) The hostname of the firewall on which the session was logged. Source VM UUID (src_uuid) Identifies the source universal unique identifier for a guest virtual machine in the VMware NSX environment. Destination VM UUID (dst_uuid) Identifies the destination universal unique identifier for a guest virtual machine in the VMware NSX environment. PAN-OS® Administrator’s Guide Version 10.2 603 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
603
Monitoring Field Name Description HTTP Method (http_method) Only in URL filtering logs. Describes the HTTP Method used in the web request. Only the following methods are logged: Connect, Delete, Get, Head, Options, Post, Put. Tunnel ID/IMSI (tunnel_id/imsi) International Mobile Subscriber Identity (IMSI) is a unique number allocated to each mobile subscriber in the GSM/UMTS/EPS system. IMSI shall consist of decimal digits (0 through 9) only and maximum number of digits allowed are 15. Monitor Tag/IMEI (monitortag/imei) International Mobile Equipment Identity (IMEI) is a unique 15 or 16 digit number allocated to each mobile station equipment. Parent Session ID (parent_session_id) ID of the session in which this session is tunneled. Applies to inner tunnel (if two levels of tunneling) or inside content (if one level of tunneling) only. Parent Session Start Time (parent_start_time) Year/month/day hours:minutes:seconds that the parent tunnel session began. Tunnel Type (tunnel) Type of tunnel, such as GRE or IPSec. Threat Category (thr_category) Describes threat categories used to classify different types of threat signatures. If a domain external dynamic list generated the log, domain-edl populates this field. Content Version (contentver) Applications and Threats version on your firewall when the log was generated. SCTP Association ID (assoc_id) Number that identifies all connections for an association between two SCTP endpoints. Payload Protocol ID (ppid) ID of the protocol for the payload in the data portion of the data chunk. HTTP Headers (http_headers) Indicates the inserted HTTP header in the URL log entries on the firewall. URL Category List (url_category_list) Lists the URL filtering categories that the firewall used to enforce policy. Rule UUID (rule_uuid) The UUID that permanently identifies the rule. HTTP/2 Connection (http2_connection) Identifies if traffic used an HTTP/2 connection by displaying one of the following values: • TCP connection session ID—session is HTTP/2 PAN-OS® Administrator’s Guide Version 10.2 604 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
604
Monitoring Field Name Description • 0—session is not HTTP/2 Dynamic User Group Name (dynusergroup_name) The name of the dynamic user group that contains the user who initiated the session. XFF Address (xff_ip) The IP address of the user who requested the web page or the IP address of the next to last device that the request traversed. If the request goes through one or more proxies, load balancers, or other upstream devices, the firewall displays the IP address of the most recent device. Based on different appliance implementations, the XFF field may contain non-IP address values. Source Device Category (src_category) The category for the device that Device-ID identifies as the source of the traffic. Source Device Profile (src_profile) The device profile for the device that Device-ID identifies as the source of the traffic. Source Device Model (src_model) The model of the device that Device-ID identifies as the source of the traffic. Source Device Vendor (src_vendor) The vendor of the device that Device-ID identifies as the source of the traffic. Source Device OS Family (src_osfamily) The operating system type for the device that Device-ID identifies as the source of the traffic. Source Device OS Version (src_osversion) The version of the operating system for the device that Device-ID identifies as the source of the traffic. Source Hostname (src_host) The hostname of the device that Device-ID identifies as the source of the traffic. Source MAC Address (src_mac) The MAC address for the device that Device-ID identifies as the source of the traffic. Destination Device Category (dst_category) The category for the device that Device-ID identifies as the destination for the traffic. Destination Device Profile (dst_profile) The device profile for the device that Device-ID identifies as the destination for the traffic. PAN-OS® Administrator’s Guide Version 10.2 605 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
605
Monitoring Field Name Description Destination Device Model (dst_model) The model of the device that Device-ID identifies as the destination for the traffic. Destination Device Vendor (dst_vendor) The vendor of the device that Device-ID identifies as the destination for the traffic. Destination Device OS Family (dst_osfamily) The operating system type for the device that Device-ID identifies as the destination for the traffic. Destination Device OS Version (dst_osversion) The version of the operating system for the device that Device-ID identifies as the destination for the traffic. Destination Hostname (dst_host) The hostname of the device that Device-ID identifies as the destination for the traffic. Destination MAC Address (dst_mac) The MAC address for the device that Device-ID identifies as the destination for the traffic. Container ID (container_id) The container ID of the PAN-NGFW pod on the Kubernetes node where the application POD is deployed. POD Namespace (pod_namespace) The namespace of the application POD being secured. POD Name (pod_name) The application POD being secured. Source External Dynamic List (src_edl) The name of the external dynamic list that contains the source IP address of the traffic. Destination External Dynamic List (dst_edl) The name of the external dynamic list that contains the destination IP address of the traffic. Host ID (hostid) Unique ID GlobalProtect assigns to identify the host. User Device Serial Number (serialnumber) Serial number of the user’s machine or device. Domain EDL (domain_edl) The name of the external dynamic list that contains the domain name of the traffic. Source Dynamic Address Group (src_dag) Original session source dynamic address group. Destination Dynamic Address Group (dst_dag) Original destination source dynamic address group. PAN-OS® Administrator’s Guide Version 10.2 606 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
606
Monitoring Field Name Description Partial Hash (partial_hash) Machine Learning partial hash. High Resolution Timestamp (high_res timestamp) Time in milliseconds the log was received at the management plane. The format for this new field is YYYY-MM-DDThh:ss:sssTZD: • YYYY—Four digit year • MM—Two-digit month • DD—Two-digit day of the month (01 through 31) • T—Indicator for the beginning of the timestamp • hh—Two-digit hour using 24-hour time (00 through 23) • mm—Two-digit minute (00 through 59) • ss—Two-digit second (00 through 60) • sss—One or more digits for millisecond • TZD—Time zone designator (+hh:mm or -hh:mm) The High Resolution Timestamp is supported for logs received from managed firewalls running PAN-OS 10.2 and later releases. Logs received from managed firewalls running PAN-OS 9.1 and earlier releases display a 1969-12-31T16:00:00:000-8:00 timestamp regardless of when the log was received. Reason (reason) Reason for Data Filtering action. Justification (justification) Justification for Data Filtering action. A Slice Service Type (nssai_sst) The A Slice Service Type of the Network Slice ID. Application Subcategory (subcategory_of_app) The application subcategory specified in the application configuration properties. Application Category (category_of_app) The application category specified in the application configuration properties. Values are: • business-systems • collaboration • general-internet • media • networking PAN-OS® Administrator’s Guide Version 10.2 607 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
607
Monitoring Field Name Description • saas Application Technology (technology_of_app) The application technology specified in the application configuration properties. Values are: • browser-based • client-server • network-protocol • peer-to-peer Application Risk (risk_of_app) Risk level associated with the application (1=lowest to 5=highest). Application Characteristic (characteristic_of_app) Comma-separated list of applicable characteristic of the application Application Container (container_of_app) The parent application for an application. Tunneled Application (tunneled_app) Name of the tunneled application. Application SaaS (is_saas_of_app) Displays 1 if a SaaS application or 0 if not a SaaS application. Application Sanctioned State (sanctioned_state_of_app) Displays 1 if application is sanctioned or 0 if application is not sanctioned. Cloud Report ID (cloud_reportid) (PAN-OS 10.2.0) Unique 32 character ID for a file scanned by the DLP cloud service sent by a firewall. (PAN-OS 10.2.1 and later releases) Unique 67 character ID for a file scanned by the DLP cloud service sent by a firewall. The same Cloud Report ID is displayed for a file the DLP cloud service has already scanned and generated a Cloud Report ID for. URL Filtering Log Fields Format: FUTURE_USE, Receive Time, Serial Number, Type, Threat/Content Type, FUTURE_USE, Generated Time, Source Address, Destination Address, NAT Source IP, NAT Destination IP, Rule Name, Source User, Destination User, Application, Virtual System, Source Zone, Destination Zone, Inbound Interface, Outbound Interface, Log Action, FUTURE_USE, Session ID, Repeat Count, Source Port, Destination Port, NAT Source Port, NAT Destination Port, Flags, IP Protocol, Action, URL/Filename, Threat ID, Category, Severity, Direction, Sequence Number, Action Flags, Source Country, Destination Country, FUTURE_USE, Content Type, PCAP_ID, File Digest, Cloud, URL PAN-OS® Administrator’s Guide Version 10.2 608 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
608
Monitoring Index, User Agent, File Type, X-Forwarded-For, Referer, Sender, Subject, Recipient, Report ID, Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, FUTURE_USE, Source VM UUID, Destination VM UUID, HTTP Method, Tunnel ID/IMSI, Monitor Tag/IMEI, Parent Session ID, Parent Start Time, Tunnel Type, Threat Category, Content Version, FUTURE_USE, SCTP Association ID, Payload Protocol ID, HTTP Headers, URL Category List, Rule UUID, HTTP/2 Connection, Dynamic User Group Name, XFF Address, Source Device Category, Source Device Profile, Source Device Model, Source Device Vendor, Source Device OS Family, Source Device OS Version, Source Hostname, Source MAC Address, Destination Device Category, Destination Device Profile, Destination Device Model, Destination Device Vendor, Destination Device OS Family, Destination Device OS Version, Destination Hostname, Destination MAC Address, Container ID, POD Namespace, POD Name, Source External Dynamic List, Destination External Dynamic List, Host ID, Serial Number, Domain EDL, Source Dynamic Address Group, Destination Dynamic Address Group, Partial Hash, High Resolution Timestamp, Reason, Justification, A Slice Service Type, Application Subcategory, Application Category, Application Technology, Application Risk, Application Characteristic, Application Container, Tunneled Application, Application SaaS, Application Sanctioned State, Cloud Report ID Field Name Description Receive Time (receive_time or cef￾formatted-receive_time) Time the log was received at the management plane. Serial Number (serial #) Serial number of the firewall that generated the log. Type (type) Specifies the type of log; value is THREAT. Threat/Content Type (subtype) Subtype of threat log; value is url. Generate Time (time_generated or cef-formatted￾time_generated) Time the log was generated on the dataplane. Source address (src) Original session source IP address. Destination address (dst) Original session destination IP address. NAT Source IP (natsrc) If source NAT performed, the post-NAT source IP address. NAT Destination IP (natdst) If destination NAT performed, the post-NAT destination IP address. Rule Name (rule) Name of the rule that the session matched. Source User (srcuser) Username of the user who initiated the session. PAN-OS® Administrator’s Guide Version 10.2 609 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
609
Monitoring Field Name Description Destination User (dstuser) Username of the user to which the session was destined. Application (app) Application associated with the session. Virtual System (vsys) Virtual System associated with the session. Source Zone (from) Zone the session was sourced from. Destination Zone (to) Zone the session was destined to. Inbound Interface (inbound_if) Interface that the session was sourced from. Outbound Interface (outbound_if) Interface that the session was destined to. Log Action (logset) Log Forwarding Profile that was applied to the session. Session ID (sessionid) An internal numerical identifier applied to each session. Repeat Count (repeatcnt) Number of sessions with same Source IP, Destination IP, Application, and Content/Threat Type seen within 5 seconds. Source Port (sport) Source port utilized by the session. Destination Port (dport) Destination port utilized by the session. NAT Source Port (natsport) Post-NAT source port. NAT Destination Port (natdport) Post-NAT destination port. Flags (flags) 32-bit field that provides details on session; this field can be decoded by AND-ing the values with the logged value: • 0x80000000—session has a packet capture (PCAP) • 0x40000000—option is enabled to allow a client to use multiple paths to connect to a destination host • 0x20000000—file is submitted to WildFire for a verdict • 0x10000000—enterprise credential submission by end user detected • 0x08000000— source for the flow is on an allow list and not subject to recon protection PAN-OS® Administrator’s Guide Version 10.2 610 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
610
Monitoring Field Name Description • 0x02000000—IPv6 session • 0x01000000—SSL session is decrypted (SSL Proxy) • 0x00800000—session is denied via URL filtering • 0x00400000—session has a NAT translation performed • 0x00200000—user information for the session was captured through Authentication Portal • 0x00100000—application traffic is on a non-standard destination port • 0x00080000 —X-Forwarded-For value from a proxy is in the source user field • 0x00040000 —log corresponds to a transaction within a http proxy session (Proxy Transaction) • 0x00020000—Client to Server flow is subject to policy based forwarding • 0x00010000—Server to Client flow is subject to policy based forwarding • 0x00008000 —session is a container page access (Container Page) • 0x00002000 —session has a temporary match on a rule for implicit application dependency handling. Available in PAN-OS 5.0.0 and above. • 0x00000800 —symmetric return is used to forward traffic for this session • 0x00000400—decrypted traffic is being sent out clear text through a mirror port • 0x00000010—payload of the outer tunnel is being inspected IP Protocol (proto) IP protocol associated with the session. Action (action) Action taken for the session; values are alert, allow, block-url, block￾continue, continue, block-override, override-lockout, override. • alert—threat or URL detected but not blocked • block-url —URL request was blocked because it matched a URL category that was set to be blocked • block-continue—a HTTP request is blocked and redirected to a Continue page with a button for confirmation to proceed • continue —response to a block-continue URL continue page indicating a block-continue request was allowed to proceed PAN-OS® Administrator’s Guide Version 10.2 611 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
611
Monitoring Field Name Description • block-override —a HTTP request is blocked and redirected to an Admin override page that requires a pass code from the firewall administrator to continue • override-lockout—too many failed admin override pass code attempts from the source IP. IP is now blocked from the block￾override redirect page • override —response to a block-override page where a correct pass code is provided and the request is allowed URL/Filename (misc) Field with variable length. A URL has a maximum of 1023 characters. The actual URI when the subtype is url. URL when Threat Category is domain-edl. Threat/Content Name (threatid) Palo Alto Networks identifier for known and custom threats. It is a description string followed by a 64-bit numerical identifier in parentheses for some Subtypes: • 8000 – 8099— scan detection • 8500 – 8599— flood detection • 9999— URL filtering log • 10000 – 19999 —spyware phone home detection • 20000 – 29999 —spyware download detection • 30000 – 44999 —vulnerability exploit detection • 52000 – 52999— filetype detection • 60000 – 69999 —data filtering detection If the domain EDL field is populated, then this field is populated with the same value. Threat ID ranges for virus detection, WildFire signature feed, and DNS C2 signatures used in previous releases have been replaced with permanent, globally unique IDs. Refer to the Threat/Content Type (subtype) and Threat Category (thr_category) field names to create updated reports, filter threat logs, and ACC activity. Category (category) For URL Subtype, it is the URL Category; For WildFire subtype, it is the verdict on the file and is either ‘malware’, ‘phishing’, ‘grayware’, or ‘benign’; For other subtypes, the value is ‘any’. Severity (severity) Severity associated with the threat; values are informational, low, medium, high, critical. PAN-OS® Administrator’s Guide Version 10.2 612 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
612
Monitoring Field Name Description Direction (direction) Indicates the direction of the attack: • client-to-server • server-to-client Sequence Number (seqno) A 64-bit log entry identifier incremented sequentially. Each log type has a unique number space. Action Flags (actionflags) A bit field indicating if the log was forwarded to Panorama. Source Country (srcloc) Source country or Internal region for private addresses. Maximum length is 32 bytes. Destination Country (dstloc) Destination country or Internal region for private addresses. Maximum length is 32 bytes. Content Type (contenttype) Content type of the HTTP response data. Maximum length 32 bytes. PCAP ID (pcap_id) The packet capture (pcap) ID is a 64 bit unsigned integral denoting an ID to correlate threat pcap files with extended pcaps taken as a part of that flow. All threat logs will contain either a pcap_id of 0 (no associated pcap), or an ID referencing the extended pcap file. File Digest (filedigest) Only for WildFire subtype; all other types do not use this field The filedigest string shows the binary hash of the file sent to be analyzed by the WildFire service. Cloud (cloud) Only for WildFire subtype; all other types do not use this field. The cloud string displays the FQDN of either the WildFire appliance (private) or the WildFire cloud (public) from where the file was uploaded for analysis. URL Index (url_idx) When an application uses TCP keepalives to keep a connection open for a length of time, all the log entries for that session have a single session ID. In such cases, when you have a single threat log (and session ID) that includes multiple URL entries, the url_idx is a counter that allows you to correlate the order of each log entry within the single session. For example, to learn the URL of a file that the firewall forwarded to WildFire for analysis, locate the session ID and the url_idx from the WildFire Submissions log and search for the same session ID and url_idx in your URL filtering logs. The log entry that matches PAN-OS® Administrator’s Guide Version 10.2 613 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
613
Monitoring Field Name Description the session ID and url_idx will contain the URL of the file that was forwarded to WildFire. User Agent (user_agent) The User Agent field specifies the web browser that the user used to access the URL, for example Internet Explorer. This information is sent in the HTTP request to the server. File Type (filetype) Only for WildFire subtype; all other types do not use this field. Specifies the type of file that the firewall forwarded for WildFire analysis. X-Forwarded-For (xff) The X-Forwarded-For field in the HTTP header contains the IP address of the user who requested the web page. It allows you to identify the IP address of the user, which is useful particularly if you have a proxy server on your network that replaces the user IP address with its own address in the source IP address field of the packet header. Based on different appliance implementations, the XFF field may contain non-IP address values. Referer (referer) The Referer field in the HTTP header contains the URL of the web page that linked the user to another web page; it is the source that redirected (referred) the user to the web page that is being requested. Sender (sender) Specifies the name of the sender of an email. Subject (subject) Specifies the subject of an email. Recipient (recipient) Specifies the name of the receiver of an email. Report ID (reportid) Only for Data Filtering and WildFire subtype; all other types do not use this field. Identifies the analysis request on the firewall, WildFire cloud, or the WildFire appliance. Device Group Hierarchy (dg_hier_level_1 to dg_hier_level_4) A sequence of identification numbers that indicate the device group’s location within a device group hierarchy. The firewall (or virtual system) generating the log includes the identification number of each ancestor in its device group hierarchy. The shared device group (level 0) is not included in this structure. If the log values are 12, 34, 45, 0, it means that the log was generated by a firewall (or virtual system) that belongs to device group 45, and its ancestors are 34, and 12. To view the device PAN-OS® Administrator’s Guide Version 10.2 614 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
614
Monitoring Field Name Description group names that correspond to the value 12, 34 or 45, use one of the following methods: API query: /api/?type=op&cmd=<show><dg-hierarchy></dg￾hierarchy></show> Virtual System Name (vsys_name) The name of the virtual system associated with the session; only valid on firewalls enabled for multiple virtual systems. Device Name (device_name) The hostname of the firewall on which the session was logged. Source VM UUID (src_uuid) Identifies the source universal unique identifier for a guest virtual machine in the VMware NSX environment. Destination VM UUID (dst_uuid) Identifies the destination universal unique identifier for a guest virtual machine in the VMware NSX environment. HTTP Method (http_method) Describes the HTTP Method used in the web request. Only the following methods are logged: Connect, Delete, Get, Head, Options, Post, Put. Tunnel ID/IMSI (tunnel_id/imsi) International Mobile Subscriber Identity (IMSI) is a unique number allocated to each mobile subscriber in the GSM/UMTS/EPS system. IMSI shall consist of decimal digits (0 through 9) only and maximum number of digits allowed are 15. Monitor Tag/IMEI (monitortag/imei) International Mobile Equipment Identity (IMEI) is a unique 15 or 16 digit number allocated to each mobile station equipment. Parent Session ID (parent_session_id) ID of the session in which this session is tunneled. Applies to inner tunnel (if two levels of tunneling) or inside content (if one level of tunneling) only. Parent Session Start Time (parent_start_time) Year/month/day hours:minutes:seconds that the parent tunnel session began. Tunnel Type (tunnel) Type of tunnel, such as GRE or IPSec. Threat Category (thr_category) Describes threat categories used to classify different types of threat signatures. If a domain external dynamic list generated the log, domain-edl populates this field. PAN-OS® Administrator’s Guide Version 10.2 615 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
615
Monitoring Field Name Description Content Version (contentver) Applications and Threats version on your firewall when the log was generated. SCTP Association ID (assoc_id) Number that identifies all connections for an association between two SCTP endpoints. Payload Protocol ID (ppid) ID of the protocol for the payload in the data portion of the data chunk. HTTP Headers (http_headers) Indicates the inserted HTTP header in the URL log entries on the firewall. URL Category List (url_category_list) Lists the URL filtering categories that the firewall used to enforce policy. Rule UUID (rule_uuid) The UUID that permanently identifies the rule. HTTP/2 Connection (http2_connection) Identifies if traffic used an HTTP/2 connection by displaying one of the following values: • TCP connection session ID—session is HTTP/2 • 0—session is not HTTP/2 Dynamic User Group Name (dynusergroup_name) The name of the dynamic user group that contains the user who initiated the session. XFF Address (xff_ip) The IP address of the user who requested the web page or the IP address of the next to last device that the request traversed. If the request goes through one or more proxies, load balancers, or other upstream devices, the firewall displays the IP address of the most recent device. Based on different appliance implementations, the XFF field may contain non-IP address values. Source Device Category (src_category) The category for the device that Device-ID identifies as the source of the traffic. Source Device Profile (src_profile) The device profile for the device that Device-ID identifies as the source of the traffic. Source Device Model (src_model) The model of the device that Device-ID identifies as the source of the traffic. PAN-OS® Administrator’s Guide Version 10.2 616 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
616
Monitoring Field Name Description Source Device Vendor (src_vendor) The vendor of the device that Device-ID identifies as the source of the traffic. Source Device OS Family (src_osfamily) The operating system type for the device that Device-ID identifies as the source of the traffic. Source Device OS Version (src_osversion) The version of the operating system for the device that Device-ID identifies as the source of the traffic. Source Hostname (src_host) The hostname of the device that Device-ID identifies as the source of the traffic. Source MAC Address (src_mac) The MAC address for the device that Device-ID identifies as the source of the traffic. Destination Device Category (dst_category) The category for the device that Device-ID identifies as the destination for the traffic. Destination Device Profile (dst_profile) The device profile for the device that Device-ID identifies as the destination for the traffic. Destination Device Model (dst_model) The model of the device that Device-ID identifies as the destination for the traffic. Destination Device Vendor (dst_vendor) The vendor of the device that Device-ID identifies as the destination for the traffic. Destination Device OS Family (dst_osfamily) The operating system type for the device that Device-ID identifies as the destination for the traffic. Destination Device OS Version (dst_osversion) The version of the operating system for the device that Device-ID identifies as the destination for the traffic. Destination Hostname (dst_host) The hostname of the device that Device-ID identifies as the destination for the traffic. Destination MAC Address (dst_mac) The MAC address for the device that Device-ID identifies as the destination for the traffic. Container ID (container_id) The container ID of the PAN-NGFW pod on the Kubernetes node where the application POD is deployed. POD Namespace (pod_namespace) The namespace of the application POD being secured. POD Name (pod_name) The application POD being secured. PAN-OS® Administrator’s Guide Version 10.2 617 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
617
Monitoring Field Name Description Source External Dynamic List (src_edl) The name of the external dynamic list that contains the source IP address of the traffic. Destination External Dynamic List (dst_edl) The name of the external dynamic list that contains the destination IP address of the traffic. Host ID (hostid) Unique ID GlobalProtect assigns to identify the host. User Device Serial Number (serialnumber) Serial number of the user’s machine or device. Domain EDL (domain_edl) The name of the external dynamic list that contains the domain name of the traffic. Source Dynamic Address Group (src_dag) Original session source dynamic address group. Destination Dynamic Address Group (dst_dag) Original destination source dynamic address group. Partial Hash (partial_hash) Machine Learning partial hash. High Resolution Timestamp (high_res timestamp) Time in milliseconds the log was received at the management plane. The format for this new field is YYYY-MM-DDThh:ss:sssTZD: • YYYY—Four digit year • MM—Two-digit month • DD—Two-digit day of the month (01 through 31) • T—Indicator for the beginning of the timestamp • hh—Two-digit hour using 24-hour time (00 through 23) • mm—Two-digit minute (00 through 59) • ss—Two-digit second (00 through 60) • sss—One or more digits for millisecond • TZD—Time zone designator (+hh:mm or -hh:mm) The High Resolution Timestamp is supported for logs received from managed firewalls running PAN-OS 10.1 and later releases. Logs received from managed firewalls running PAN-OS 9.1 and earlier releases display a 1969-12-31T16:00:00:000-8:00 timestamp regardless of when the log was received. PAN-OS® Administrator’s Guide Version 10.2 618 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
618
Monitoring Field Name Description Reason (reason) Reason for URL Filtering action. Justification (justification) Justification for URL Filtering action. A Slice Service Type (nssai_sst) The A Slice Service Type of the Network Slice ID. Application Subcategory (subcategory_of_app) The application subcategory specified in the application configuration properties. Application Category (category_of_app) The application category specified in the application configuration properties. Values are: • business-systems • collaboration • general-internet • media • networking • saas Application Technology (technology_of_app) The application technology specified in the application configuration properties. Values are: • browser-based • client-server • network-protocol • peer-to-peer Application Risk (risk_of_app) Risk level associated with the application (1=lowest to 5=highest). Application Characteristic (characteristic_of_app) Comma-separated list of applicable characteristic of the application Application Container (container_of_app) The parent application for an application. Tunneled Application (tunneled_app) Name of the tunneled application. Application SaaS (is_saas_of_app) Displays yes if a SaaS application or no if not a SaaS application. PAN-OS® Administrator’s Guide Version 10.2 619 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
619
Monitoring Field Name Description Application Sanctioned State (sanctioned_state_of_app) Displays yes if application is sanctioned or no if application is not sanctioned. Cloud Report ID (cloud_reportid) (PAN-OS 10.2.0) Unique 32 character ID for a file scanned by the DLP cloud service sent by a firewall. (PAN-OS 10.2.1 and later releases) Unique 67 character ID for a file scanned by the DLP cloud service sent by a firewall. The same Cloud Report ID is displayed for a file the DLP cloud service has already scanned and generated a Cloud Report ID for. Data Filtering Log Fields Format: FUTURE_USE, Receive Time, Serial Number, Type, Threat/Content Type, FUTURE_USE, Generated Time, Source Address, Destination Address, NAT Source IP, NAT Destination IP, Rule Name, Source User, Destination User, Application, Virtual System, Source Zone, Destination Zone, Inbound Interface, Outbound Interface, Log Action, FUTURE_USE, Session ID, Repeat Count, Source Port, Destination Port, NAT Source Port, NAT Destination Port, Flags, IP Protocol, Action, URL/Filename, Threat ID, Category, Severity, Direction, Sequence Number, Action Flags, Source Country, Destination Country, FUTURE_USE, Content Type, PCAP_ID, File Digest, Cloud, URL Index, User Agent, File Type, X-Forwarded-For, Referer, Sender, Subject, Recipient, Report ID, Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, FUTURE_USE, Source VM UUID, Destination VM UUID, HTTP Method, Tunnel ID/IMSI, Monitor Tag/IMEI, Parent Session ID, Parent Start Time, Tunnel Type, Threat Category, Content Version, FUTURE_USE, SCTP Association ID, Payload Protocol ID, HTTP Headers, URL Category List, Rule UUID, HTTP/2 Connection, Dynamic User Group Name, XFF Address, Source Device Category, Source Device Profile, Source Device Model, Source Device Vendor, Source Device OS Family, Source Device OS Version, Source Hostname, Source MAC Address, Destination Device Category, Destination Device Profile, Destination Device Model, Destination Device Vendor, Destination Device OS Family, Destination Device OS Version, Destination Hostname, Destination MAC Address, Container ID, POD Namespace, POD Name, Source External Dynamic List, Destination External Dynamic List, Host ID, Serial Number, Domain EDL, Source Dynamic Address Group, Destination Dynamic Address Group, Partial Hash, High Resolution Timestamp, Reason, Justification, A Slice Service Type, Application Subcategory, Application Category, Application Technology, Application Risk, Application Characteristic, Application Container, Tunneled Application, Application SaaS, Application Sanctioned State, Cloud Report ID Field Name Description Receive Time (receive_time or cef￾formatted-receive_time) Time the log was received at the management plane. Serial Number (serial #) Serial number of the firewall that generated the log. PAN-OS® Administrator’s Guide Version 10.2 620 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
620
Monitoring Field Name Description Type (type) Specifies the type of log; value is THREAT. Threat/Content Type (subtype) Subtype of threat log; value is data, dlp, dlp-non-file, file. Generate Time (time_generated or cef-formatted￾time_generated) Time the log was generated on the dataplane. Source address (src) Original session source IP address. Destination address (dst) Original session destination IP address. NAT Source IP (natsrc) If source NAT performed, the post-NAT source IP address. NAT Destination IP (natdst) If destination NAT performed, the post-NAT destination IP address. Rule Name (rule) Name of the rule that the session matched. Source User (srcuser) Username of the user who initiated the session. Destination User (dstuser) Username of the user to which the session was destined. Application (app) Application associated with the session. Virtual System (vsys) Virtual System associated with the session. Source Zone (from) Zone the session was sourced from. Destination Zone (to) Zone the session was destined to. Inbound Interface (inbound_if) Interface that the session was sourced from. Outbound Interface (outbound_if) Interface that the session was destined to. Log Action (logset) Log Forwarding Profile that was applied to the session. Session ID (sessionid) An internal numerical identifier applied to each session. Repeat Count (repeatcnt) Number of sessions with same Source IP, Destination IP, Application, and Content/Threat Type seen within 5 seconds. PAN-OS® Administrator’s Guide Version 10.2 621 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
621
Monitoring Field Name Description Source Port (sport) Source port utilized by the session. Destination Port (dport) Destination port utilized by the session. NAT Source Port (natsport) Post-NAT source port. NAT Destination Port (natdport) Post-NAT destination port. Flags (flags) 32-bit field that provides details on session; this field can be decoded by AND-ing the values with the logged value: • 0x80000000—session has a packet capture (PCAP) • 0x40000000—option is enabled to allow a client to use multiple paths to connect to a destination host • 0x20000000—file is submitted to WildFire for a verdict • 0x10000000—enterprise credential submission by end user detected • 0x08000000— source for the flow is on an allow list and not subject to recon protection • 0x02000000—IPv6 session • 0x01000000—SSL session is decrypted (SSL Proxy) • 0x00800000—session is denied via URL filtering • 0x00400000—session has a NAT translation performed • 0x00200000—user information for the session was captured through Authentication Portal • 0x00100000—application traffic is on a non-standard destination port • 0x00080000 —X-Forwarded-For value from a proxy is in the source user field • 0x00040000 —log corresponds to a transaction within a http proxy session (Proxy Transaction) • 0x00020000—Client to Server flow is subject to policy based forwarding • 0x00010000—Server to Client flow is subject to policy based forwarding • 0x00008000 —session is a container page access (Container Page) • 0x00002000 —session has a temporary match on a rule for implicit application dependency handling. Available in PAN-OS 5.0.0 and above. PAN-OS® Administrator’s Guide Version 10.2 622 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
622
Monitoring Field Name Description • 0x00000800 —symmetric return is used to forward traffic for this session • 0x00000400—decrypted traffic is being sent out clear text through a mirror port • 0x00000010—payload of the outer tunnel is being inspected IP Protocol (proto) IP protocol associated with the session. Action (action) Action taken for the session; values are alert, allow, deny, drop, drop-all-packets, reset-client, reset-server, reset-both, block-url. • alert—traffic containing matching data detected but not blocked • allow (dlp subtype only)—flood detection alert • block (dlp and WildFire subtype only) —traffic containing matching data detected but blocked • block-continue (dlp subtype only)—traffic containing matching data is blocked and redirected to a Continue page with a button for confirmation to proceed • continue (dlp subtype only)—response to a block-continue page indicating a block-continue request was allowed to proceed • deny (dlp subtype only)—flood detection mechanism activated and deny traffic based on configuration URL/Filename (misc) Field with variable length. A Filename has a maximum of 63 characters. File name when the subtype is dlp URL when Threat Category is domain-edl. Threat/Content Name (threatid) Palo Alto Networks identifier for known and custom threats. It is a description string followed by a 64-bit numerical identifier in parentheses for some Subtypes: • 8000 – 8099— scan detection • 8500 – 8599— flood detection • 9999— URL filtering log • 10000 – 19999 —spyware phone home detection • 20000 – 29999 —spyware download detection • 30000 – 44999 —vulnerability exploit detection • 52000 – 52999— filetype detection • 60000 – 69999 —data filtering detection If the Domain EDL field is populated, then this field is populated with the same value. PAN-OS® Administrator’s Guide Version 10.2 623 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
623
Monitoring Field Name Description Threat ID ranges for virus detection, WildFire signature feed, and DNS C2 signatures used in previous releases have been replaced with permanent, globally unique IDs. Refer to the Threat/Content Type (subtype) and Threat Category (thr_category) field names to create updated reports, filter threat logs, and ACC activity. Category (category) For URL Subtype, it is the URL Category; For WildFire subtype, it is the verdict on the file and is either ‘malware’, ‘phishing’, ‘grayware’, or ‘benign’; For other subtypes, the value is ‘any’. Severity (severity) Severity associated with the threat; values are informational, low, medium, high, critical. Direction (direction) Indicates the direction of the attack: • client-to-server • server-to-client Sequence Number (seqno) A 64-bit log entry identifier incremented sequentially. Each log type has a unique number space. Action Flags (actionflags) A bit field indicating if the log was forwarded to Panorama. Source Country (srcloc) Source country or Internal region for private addresses. Maximum length is 32 bytes. Destination Country (dstloc) Destination country or Internal region for private addresses. Maximum length is 32 bytes. Content Type (contenttype) Applicable only when Subtype is URL. Content type of the HTTP response data. Maximum length 32 bytes. PCAP ID (pcap_id) The packet capture (pcap) ID is a 64 bit unsigned integral denoting an ID to correlate threat pcap files with extended pcaps taken as a part of that flow. All threat logs will contain either a pcap_id of 0 (no associated pcap), or an ID referencing the extended pcap file. File Digest (filedigest) Only for WildFire subtype; all other types do not use this field The filedigest string shows the binary hash of the file sent to be analyzed by the WildFire service. Cloud (cloud) Only for WildFire subtype; all other types do not use this field. PAN-OS® Administrator’s Guide Version 10.2 624 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
624
Monitoring Field Name Description The cloud string displays the FQDN of either the WildFire appliance (private) or the WildFire cloud (public) from where the file was uploaded for analysis. URL Index (url_idx) Used in URL Filtering and WildFire subtypes. When an application uses TCP keepalives to keep a connection open for a length of time, all the log entries for that session have a single session ID. In such cases, when you have a single threat log (and session ID) that includes multiple URL entries, the url_idx is a counter that allows you to correlate the order of each log entry within the single session. For example, to learn the URL of a file that the firewall forwarded to WildFire for analysis, locate the session ID and the url_idx from the WildFire Submissions log and search for the same session ID and url_idx in your URL filtering logs. The log entry that matches the session ID and url_idx will contain the URL of the file that was forwarded to WildFire. User Agent (user_agent) Only for the URL Filtering subtype; all other types do not use this field. The User Agent field specifies the web browser that the user used to access the URL, for example Internet Explorer. This information is sent in the HTTP request to the server. File Type (filetype) Specifies the type of file that the firewall forwarded for analysis. X-Forwarded-For (xff) Only for the URL Filtering subtype; all other types do not use this field. The X-Forwarded-For field in the HTTP header contains the IP address of the user who requested the web page. It allows you to identify the IP address of the user, which is useful particularly if you have a proxy server on your network that replaces the user IP address with its own address in the source IP address field of the packet header. Referer (referer) Only for the URL Filtering subtype; all other types do not use this field. The Referer field in the HTTP header contains the URL of the web page that linked the user to another web page; it is the source that redirected (referred) the user to the web page that is being requested. Sender (sender) Specifies the name of the sender of an email. PAN-OS® Administrator’s Guide Version 10.2 625 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
625
Monitoring Field Name Description Subject (subject) Specifies the subject of an email. Recipient (recipient) Specifies the name of the receiver of an email. Report ID (reportid) Identifies the analysis request on the firewall, WildFire cloud, or the WildFire appliance. Device Group Hierarchy (dg_hier_level_1 to dg_hier_level_4) A sequence of identification numbers that indicate the device group’s location within a device group hierarchy. The firewall (or virtual system) generating the log includes the identification number of each ancestor in its device group hierarchy. The shared device group (level 0) is not included in this structure. If the log values are 12, 34, 45, 0, it means that the log was generated by a firewall (or virtual system) that belongs to device group 45, and its ancestors are 34, and 12. To view the device group names that correspond to the value 12, 34 or 45, use one of the following methods: API query: /api/?type=op&cmd=<show><dg-hierarchy></dg￾hierarchy></show> Virtual System Name (vsys_name) The name of the virtual system associated with the session; only valid on firewalls enabled for multiple virtual systems. Device Name (device_name) The hostname of the firewall on which the session was logged. Source VM UUID (src_uuid) Identifies the source universal unique identifier for a guest virtual machine in the VMware NSX environment. Destination VM UUID (dst_uuid) Identifies the destination universal unique identifier for a guest virtual machine in the VMware NSX environment. HTTP Method (http_method) Only in URL filtering logs. Describes the HTTP Method used in the web request. Only the following methods are logged: Connect, Delete, Get, Head, Options, Post, Put. Tunnel ID/IMSI (tunnel_id/imsi) International Mobile Subscriber Identity (IMSI) is a unique number allocated to each mobile subscriber in the GSM/UMTS/EPS system. IMSI shall consist of decimal digits (0 through 9) only and maximum number of digits allowed are 15. Monitor Tag/IMEI (monitortag/imei) International Mobile Equipment Identity (IMEI) is a unique 15 or 16 digit number allocated to each mobile station equipment. PAN-OS® Administrator’s Guide Version 10.2 626 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
626
Monitoring Field Name Description Parent Session ID (parent_session_id) ID of the session in which this session is tunneled. Applies to inner tunnel (if two levels of tunneling) or inside content (if one level of tunneling) only. Parent Session Start Time (parent_start_time) Year/month/day hours:minutes:seconds that the parent tunnel session began. Tunnel Type (tunnel) Type of tunnel, such as GRE or IPSec. Threat Category (thr_category) Describes threat categories used to classify different types of threat signatures. If a domain external dynamic list generated the log, domain-edl populates this field. Content Version (contentver) Applications and Threats version on your firewall when the log was generated. SCTP Association ID (assoc_id) Number that identifies all connections for an association between two SCTP endpoints. Payload Protocol ID (ppid) ID of the protocol for the payload in the data portion of the data chunk. HTTP Headers (http_headers) Indicates the inserted HTTP header in the URL log entries on the firewall. URL Category List (url_category_list) Lists the URL Filtering categories that the firewall used to enforce policy. Rule UUID (rule_uuid) The UUID that permanently identifies the rule. HTTP/2 Connection (http2_connection) Identifies if traffic used an HTTP/2 connection by displaying one of the following values: • TCP connection session ID—session is HTTP/2 • 0—session is not HTTP/2 Dynamic User Group Name (dynusergroup_name) The name of the dynamic user group that contains the user who initiated the session. XFF Address (xff_ip) The IP address of the user who requested the web page or the IP address of the next to last device that the request traversed. If the request goes through one or more proxies, load balancers, or other PAN-OS® Administrator’s Guide Version 10.2 627 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
627
Monitoring Field Name Description upstream devices, the firewall displays the IP address of the most recent device. Source Device Category (src_category) The category for the device that Device-ID identifies as the source of the traffic. Source Device Profile (src_profile) The device profile for the device that Device-ID identifies as the source of the traffic. Source Device Model (src_model) The model of the device that Device-ID identifies as the source of the traffic. Source Device Vendor (src_vendor) The vendor of the device that Device-ID identifies as the source of the traffic. Source Device OS Family (src_osfamily) The operating system type for the device that Device-ID identifies as the source of the traffic. Source Device OS Version (src_osversion) The version of the operating system for the device that Device-ID identifies as the source of the traffic. Source Hostname (src_host) The hostname of the device that Device-ID identifies as the source of the traffic. Source MAC Address (src_mac) The MAC address for the device that Device-ID identifies as the source of the traffic. Destination Device Category (dst_category) The category for the device that Device-ID identifies as the destination for the traffic. Destination Device Profile (dst_profile) The device profile for the device that Device-ID identifies as the destination for the traffic. Destination Device Model (dst_model) The model of the device that Device-ID identifies as the destination for the traffic. Destination Device Vendor (dst_vendor) The vendor of the device that Device-ID identifies as the destination for the traffic. Destination Device OS Family (dst_osfamily) The operating system type for the device that Device-ID identifies as the destination for the traffic. Destination Device OS Version (dst_osversion) The version of the operating system for the device that Device-ID identifies as the destination for the traffic. Destination Hostname (dst_host) The hostname of the device that Device-ID identifies as the destination for the traffic. PAN-OS® Administrator’s Guide Version 10.2 628 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
628
Monitoring Field Name Description Destination MAC Address (dst_mac) The MAC address for the device that Device-ID identifies as the destination for the traffic. Container ID (container_id) The container ID of the PAN-NGFW pod on the Kubernetes node where the application POD is deployed. POD Namespace (pod_namespace) The namespace of the application POD being secured. POD Name (pod_name) The application POD being secured. Source External Dynamic List (src_edl) The name of the external dynamic list that contains the source IP address of the traffic. Destination External Dynamic List (dst_edl) The name of the external dynamic list that contains the destination IP address of the traffic. Host ID (hostid) Unique ID GlobalProtect assigns to identify the host. User Device Serial Number (serialnumber) Serial number of the user’s machine or device. Domain EDL (domain_edl) The name of the external dynamic list that contains the domain name of the traffic. Source Dynamic Address Group (src_dag) Original session source dynamic address group. Destination Dynamic Address Group (dst_dag) Original destination source dynamic address group. Partial Hash (partial_hash) Machine Learning partial hash. High Resolution Timestamp (high_res timestamp) Time in milliseconds the log was received at the management plane. The format for this new field is YYYY-MM-DDThh:ss:sssTZD: • YYYY—Four digit year • MM—Two-digit month • DD—Two-digit day of the month (01 through 31) • T—Indicator for the beginning of the timestamp • hh—Two-digit hour using 24-hour time (00 through 23) • mm—Two-digit minute (00 through 59) • ss—Two-digit second (00 through 60) PAN-OS® Administrator’s Guide Version 10.2 629 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
629
Monitoring Field Name Description • sss—One or more digits for millisecond • TZD—Time zone designator (+hh:mm or -hh:mm) The High Resolution Timestamp is supported for logs received from managed firewalls running PAN-OS 10.1 and later releases. Logs received from managed firewalls running PAN-OS 9.1 and earlier releases display a 1969-12-31T16:00:00:000-8:00 timestamp regardless of when the log was received. Reason (reason) Reason for Data Filtering action. Justification (justification) Justification for Data Filtering action. A Slice Service Type (nssai_sst) The A Slice Service Type of the Network Slice ID. Application Subcategory (subcategory_of_app) The application subcategory specified in the application configuration properties. Application Category (category_of_app) The application category specified in the application configuration properties. Values are: • business-systems • collaboration • general-internet • media • networking • saas Application Technology (technology_of_app) The application technology specified in the application configuration properties. Values are: • browser-based • client-server • network-protocol • peer-to-peer Application Risk (risk_of_app) Risk level associated with the application (1=lowest to 5=highest). PAN-OS® Administrator’s Guide Version 10.2 630 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
630
Monitoring Field Name Description Application Characteristic (characteristic_of_app) Comma-separated list of applicable characteristic of the application Application Container (container_of_app) The parent application for an application. Tunneled Application (tunneled_app) Name of the tunneled application. Application SaaS (is_saas_of_app) Displays yes if a SaaS application or no if not a SaaS application. Application Sanctioned State (sanctioned_state_of_app) Displays yes if application is sanctioned or no if application is not sanctioned. Cloud Report ID (cloud_reportid) (PAN-OS 10.2.0) Unique 32 character ID for a file scanned by the DLP cloud service sent by a firewall. (PAN-OS 10.2.1 and later releases) Unique 67 character ID for a file scanned by the DLP cloud service sent by a firewall. The same Cloud Report ID is displayed for a file the DLP cloud service has already scanned and generated a Cloud Report ID for. HIP Match Log Fields Format: FUTURE_USE, Receive Time, Serial Number, Type, Threat/Content Type, FUTURE_USE, Generated Time, Source User, Virtual System, Machine Name, Operating System, Source Address, HIP, Repeat Count, HIP Type, FUTURE_USE, FUTURE_USE, Sequence Number, Action Flags, Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, Virtual System ID, IPv6 Source Address, Host ID, User Device Serial Number, Device MAC Address, High Resolution Timestamp Field Name Description Receive Time (receive_time or cef-formatted￾receive_time) Time the log was received at the management plane. Serial Number (serial) Serial number of the firewall that generated the log. PAN-OS® Administrator’s Guide Version 10.2 631 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
631
Monitoring Field Name Description Type (type) Specifies the type of log; value is HIP-MATCH. Threat/Content Type (subtype) Subtype of HIP match log; unused. Generated Time (time_generated or cef-formatted￾time_generated) Time the log was generated on the dataplane. Source User (srcuser) Username of the user who initiated the session. Virtual System (vsys) Virtual System associated with the HIP match log. Machine Name (machinename) Name of the user’s machine. Operating System (os) The operating system installed on the user’s machine or device (or on the client system). Source Address (src) IP address of the source user. HIP (matchname) Name of the HIP object or profile. Repeat Count (repeatcnt) Number of times the HIP profile matched. HIP Type (matchtype) Whether the hip field represents a HIP object or a HIP profile. Sequence Number (seqno) A 64-bit log entry identifier incremented sequentially; each log type has a unique number space. Action Flags (actionflags) A bit field indicating if the log was forwarded to Panorama. Device Group Hierarchy (dg_hier_level_1 to dg_hier_level_4) A sequence of identification numbers that indicate the device group’s location within a device group hierarchy. The firewall (or virtual system) generating the log includes the identification number of each ancestor in its device group hierarchy. The shared device group (level 0) is not included in this structure. If the log values are 12, 34, 45, 0, it means that the log was generated by a firewall (or virtual system) that belongs to device group 45, and its ancestors are 34, and 12. To view the device group names that correspond to the value 12, 34 or 45, use one of the following methods: PAN-OS® Administrator’s Guide Version 10.2 632 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
632
Monitoring Field Name Description API query: /api/?type=op&cmd=<show><dg-hierarchy></dg￾hierarchy></show> Virtual System Name (vsys_name) The name of the virtual system associated with the session; only valid on firewalls enabled for multiple virtual systems. Device Name (device_name) The hostname of the firewall on which the session was logged. Virtual System ID (vsys_id) A unique identifier for a virtual system on a Palo Alto Networks firewall. IPv6 System Address (srcipv6) IPv6 address of the user’s machine or device. Host ID (hostid) Unique ID GlobalProtect assigns to identify the host. User Device Serial Number (serialnumber) Serial number of the user’s machine or device. Device MAC Address (mac) The MAC address of the user’s machine or device. High Resolution Timestamp (high_res_timestamp) Time in milliseconds the log was received at the management plane. The format for this new field is YYYY-MM-DDThh:ss:sssTZD: • YYYY—Four digit year • MM—Two-digit month • DD—Two-digit day of the month (01 through 31) • T—Indicator for the beginning of the timestamp • hh—Two-digit hour using 24-hour time (00 through 23) • mm—Two-digit minute (00 through 59) • ss—Two-digit second (00 through 60) • sss—One or more digits for millisecond • TZD—Time zone designator (+hh:mm or -hh:mm) PAN-OS® Administrator’s Guide Version 10.2 633 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
633
Monitoring Field Name Description The High Resolution Timestamp is supported for logs received from managed firewalls running PAN-OS 10.2 and later releases. Logs received from managed firewalls running PAN-OS 9.1 and earlier releases display a 1969-12-31T16:00:00:000-8:00 timestamp regardless of when the log was received. GlobalProtect Log Fields Format: FUTURE_USE, Receive Time, Serial Number, Type, Threat/Content Type, FUTURE_USE, Generated Time, Virtual System, Event ID, Stage, Authentication Method, Tunnel Type, Source User, Source Region, Machine Name, Public IP, Public IPv6, Private IP, Private IPv6, Host ID, Serial Number, Client Version, Client OS, Client OS Version, Repeat Count, Reason, Error, Description, Status, Location, Login Duration, Connect Method, Error Code, Portal, Sequence Number, Action Flags, High Res Timestamp, Selection Type, Response Time, Priority, Attempted Gateways, Gateway, Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, Virtual System ID Field Name Description Receive Time (receive_time) The time that the log was received at the management plane. Serial # (serial) The serial number of the firewall that generated the log. Type (type) Specifies the type of log; value is GLOBALPROTECT. Threat/Content Type (subtype) Subtype of threat log. Values include the following: • data—Data pattern matching a Data Filtering profile. • file—File type matching a File Blocking profile. • flood—Flood detected via a Zone Protection profile. • packet—Packet-based attack protection triggered by a Zone Protection profile. • scan—Scan detected via a Zone Protection profile. • spyware —Spyware detected via an Anti-Spyware profile. • url—URL filtering log. • virus—Virus detected via an Antivirus profile. • vulnerability —Vulnerability exploit detected via a Vulnerability Protection profile. • wildfire —A WildFire verdict generated when the firewall submits a file to WildFire per a WildFire Analysis profile and a verdict PAN-OS® Administrator’s Guide Version 10.2 634 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
634
Monitoring Field Name Description (malicious, phishing, grayware, or benign, depending on what you are logging) is logged in the WildFire Submissions log. • wildfire-virus—Virus detected via an Antivirus profile. Generate Time (time_generated) The time that the log was generated on the dataplane. Virtual System (vsys) The Virtual System associated with the session. Event ID (eventid) A string showing the name of the event. Stage (stage) A string showing the stage of the connection (for example, before￾login, login, or tunnel). Authentication Method (auth_method) A string showing the authentication type, such as LDAP, RADIUS, or SAML. Tunnel Type (tunnel_type) The type of tunnel (either SSLVPN or IPSec). Source User (srcuser) The username of the user who initiated the session. Source Region (srcregion) The region for the user who initiated the session. Machine Name (machinename) The name of the user’s machine. Public IP (public_ip) The public IP address for the user who initiated the session. Public IPv6 (public_ipv6) The public IPv6 address for the user who initiated the session. Private IP (private_ip) The private IP address for the user who initiated the session. Private IPv6 (private_ipv6) The private IPv6 address for the user who initiated the session. Host ID (hostid) The unique ID that GlobalProtect assigns to identify the host. Serial Number (serialnumber) The serial number of the user’s machine or device. Client Version (client_ver) The client’s GlobalProtect app version. PAN-OS® Administrator’s Guide Version 10.2 635 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
635
Monitoring Field Name Description Client OS (client_os) The client device’s OS type (for example, Windows or Linux). Client OS Version (client_os_ver) The client device’s OS version. Repeat Count (repeatcnt) The number of sessions with the same source IP address, destination IP address, application, and subtype that GlobalProtect has detected within the last five seconds. Reason (reason) A string that shows the reason for the quarantine. Error (error) A string showing that error that has occurred in any event. Description (opaque) Additional information for any event that has occurred. Status (status) The status (success or failure) of the event. Location (location) A string showing the administrator-defined location of the GlobalProtect portal or gateway. Login Duration (login_duration) The length of time, in seconds, the user is connected to the GlobalProtect gateway from logging in to logging out. Connect Method (connect_method) A string showing the how the GlobalProtect app connects to Gateway, (for example, on-demand or user-logon. Error Code (error_code) An integer associated with any errors that occurred. Portal (portal) The name of the GlobalProtect portal or gateway. Sequence Number (seqno) A 64-bit log entry identifier incremented sequentially; each log type has a unique number space. Action Flags (actionflags) A bit field indicating if the log was forwarded to Panorama. Gateway Selection Method (selection_type) The connection method that is selected to connect to the gateway. • manual—The gateway to which you want the GlobalProtect app to manually connect. • preferred—The preferred gateway to which you want the GlobalProtect app to connect. • auto—Automatically connect to the Best Available gateway based on the priority assigned to the gateway and the response time. PAN-OS® Administrator’s Guide Version 10.2 636 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
636
Monitoring Field Name Description SSL Response Time (response_time) The SSL response time of the selected gateway that is measured in milliseconds on the endpoint during tunnel setup. Gateway Priority (priority) The priority order of the gateway that is based on highest (1), high (2), medium (3), low (4), or lowest (5) to which the GlobalProtect app can connect. Attempted Gateways (attempted_gateways) The fields that are collected for each gateway connection attempt with the gateway name, SSL response time, and priority (see Gateway Priority in a Multiple Gateway Configuration. Each field entry is separated by commas such as g82-gateway,12,3. Each gateway entry is separated by semicolons such as g83-gateway,10,2;g84- gateway,-1,1. Gateway Name (gateway) The name of the gateway that is specified on the portal configuration. Device Group Hierarchy (dg_hier_level_1 to dg_hier_level_4) A sequence of identification numbers that indicate the device group’s location within a device group hierarchy. The firewall (or virtual system) generating the log includes the identification number of each ancestor in its device group hierarchy. The shared device group (level 0) is not included in this structure. If the log values are 12, 34, 45, 0, it means that the log was generated by a firewall (or virtual system) that belongs to device group 45, and its ancestors are 34, and 12. To view the device group names that correspond to the value 12, 34 or 45, use one of the following methods: API query: /api/?type=op&cmd=<show><dg-hierarchy></dg￾hierarchy></show> Virtual System Name (vsys_name) The name of the virtual system associated with the session; only valid on firewalls enabled for multiple virtual systems. Device Name (device_name) The hostname of the firewall on which the session was logged. Virtual System ID (vsys_id) A unique identifier for a virtual system on a Palo Alto Networks firewall. IP-Tag Log Fields Format: FUTURE_USE , Receive Time, Serial, Type, Threat/Content Type, FUTURE_USE, Generate Time, Virtual System, Source IP, Tag Name , Event ID, Repeat Count , Timeout, Data PAN-OS® Administrator’s Guide Version 10.2 637 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
637
Monitoring Source Name, Data Source Type, Data Source Subtype, Sequence Number, Action Flags, DG Hierarchy Level 1 , DG Hierarchy Level 2, DG Hierarchy Level 3, DG Hierarchy Level 4, Virtual System Name, Device Name, Virtual System ID, High Resolution Timestamp Field Name Description Receive Time (receive_time or cef-formatted￾receive_time) The time the log was received at the management plane. Serial Number (serial) The serial number of the firewall that generated the log. Type (type) Specifies the type of log; value is IPTAG. Threat/Content Type (subtype) The subtype of the HIP match log; unused. Generated Time (time_generated or cef-formatted￾time_generated) The time the log was generated on the dataplane. Virtual System (vsys) The virtual system associated with the HIP match log. Source IP (src) The IP address of the source user. Tag Name (tag_name) The tag mapped to the source IP address. Event ID (event_id) A string showing the name of the event. Repeat Count (repeatcnt) The number of sessions with the same Source IP, Destination IP, Application, and Subtype seen within 5 seconds. Timeout (timeout) The amount of time before the IP address-to-tag mapping expires for the source IP address. Data Source Name (datasourcename) The name of the source from which mapping information is collected. Data Source Type (datasource_type) The source from which mapping information is collected. Data Source Subtype (datasource_subtype) The mechanism used to identify the IP address-to-username mappings within a data source. Sequence Number (seqno) A 64-bit log entry identifier incremented sequentially. Each log type has a unique number space. PAN-OS® Administrator’s Guide Version 10.2 638 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
638
Monitoring Field Name Description Action Flags (actionflags) A bit field indicating whether the log was forwarded to Panorama. Device Group Hierarchy (dg_hier_level_1 to dg_hier_level_4) A sequence of identification numbers that indicates the location of the device group within a device group hierarchy. The firewall (or virtual system) generating the log includes the identification number of each ancestor in its device group hierarchy except the shared device group (level 0), which is not included in this structure. If the log values are 12, 34, 45, and 0, it means that the log was generated by a firewall (or virtual system) that belongs to device group 45 and its ancestors are 34 and 12. To view the device group names that correspond to the value 12, 34, or 45, use one of the following methods: API query: /api/?type=op&cmd=<show><dg-hierarchy></dg￾hierarchy></show> Virtual System Name (vsys_name) The name of the virtual system associated with the session; only valid on firewalls enabled for multiple virtual systems. Device Name (device_name) The hostname of the firewall on which the session was logged. Virtual System ID (vsys_id) A unique identifier for a virtual system on a Palo Alto Networks firewall. High Resolution Timestamp (high_res timestamp) Time in milliseconds the log was received at the management plane. The format for this new field is YYYY-MM-DDThh:ss:sssTZD: • YYYY—Four digit year • MM—Two-digit month • DD—Two-digit day of the month (01 through 31) • T—Indicator for the beginning of the timestamp • hh—Two-digit hour using 24-hour time (00 through 23) • mm—Two-digit minute (00 through 59) • ss—Two-digit second (00 through 60) • sss—One or more digits for millisecond • TZD—Time zone designator (+hh:mm or -hh:mm) PAN-OS® Administrator’s Guide Version 10.2 639 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
639
Monitoring Field Name Description The High Resolution Timestamp is supported for logs received from managed firewalls running PAN-OS 10.2 and later releases. Logs received from managed firewalls running PAN-OS 9.1 and earlier releases display a 1969-12-31T16:00:00:000-8:00 timestamp regardless of when the log was received. User-ID Log Fields Format: FUTURE_USER, Receive Time, Serial Number, Type, Threat/Content Type, FUTURE_USE, Generated Time, Virtual System, Source IP, User, Data Source Name, Event ID, Repeat Count, Time Out Threshold, Source Port, Destination Port, Data Source, Data Source Type, Sequence Number, Action Flags, Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, Virtual System ID, Factor Type, Factor Completion Time, Factor Number, User Group Flags, User by Source, Tag Name, High Resolution Timestamp Field Name Description Receive Time (receive_time or cef￾formatted-receive_time) Time the log was received at the management plane. Serial Number (serial) Serial number of the firewall that generated the log. Type (type) Specifies the type of log; value is USERID. Threat/Content Type (subtype) Subtype of User-ID log; values are login, logout, register-tag, and unregister-tag. • login—User logged in. • logout—User logged out. • register-tag—Indicates a tag or tags were registered for the user. • unregister-tag—Indicates a tag or tags were unregistered for the user. Generated Time (time_generated or cef-formatted￾time_generated) The time the log was generated on the dataplane. Virtual System (vsys) Virtual System associated with the configuration log. Source IP (ip) Original session source IP address. PAN-OS® Administrator’s Guide Version 10.2 640 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
640
Monitoring Field Name Description User (user) Identifies the end user. Data Source Name (datasourcename) User-ID source that sends the IP (Port)-User Mapping. Event ID (eventid) String showing the name of the event. Repeat Count (repeatcnt) Number of sessions with same Source IP, Destination IP, Application, and Subtype seen within 5 seconds. Time Out Threshold (timeout) Timeout after which the IP/User Mappings are cleared. Source Port (beginport) Source port utilized by the session. Destination Port (endport) Destination port utilized by the session. Data Source (datasource) Source from which mapping information is collected. Data Source Type (datasourcetype) Mechanism used to identify the IP/User mappings within a data source. Sequence Number (seqno) Serial number of the firewall that generated the log. Action Flags (actionflags) A bit field indicating if the log was forwarded to Panorama. Device Group Hierarchy (dg_hier_level_1 to dg_hier_level_4) A sequence of identification numbers that indicate the device group’s location within a device group hierarchy. The firewall (or virtual system) generating the log includes the identification number of each ancestor in its device group hierarchy. The shared device group (level 0) is not included in this structure. If the log values are 12, 34, 45, 0, it means that the log was generated by a firewall (or virtual system) that belongs to device group 45, and its ancestors are 34, and 12. To view the device group names that correspond to the value 12, 34 or 45, use one of the following methods: API query: /api/?type=op&cmd=<show><dg-hierarchy></ dg-hierarchy></show> Virtual System Name (vsys_name) The name of the virtual system associated with the session; only valid on firewalls enabled for multiple virtual systems. PAN-OS® Administrator’s Guide Version 10.2 641 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
641
Monitoring Field Name Description Device Name (device_name) The hostname of the firewall on which the session was logged. Virtual System ID (vsys_id) A unique identifier for a virtual system on a Palo Alto Networks firewall. Factor Type (factortype) Vendor used to authenticate a user when Multi Factor authentication is present. Factor Completion Time (factorcompletiontime) Time the authentication was completed. Factor Number (factorno) Indicates the use of primary authentication (1) or additional factors (2, 3). User Group Flags (ugflags) Displays whether the user group that was found during user group mapping. Supported values are: • User Group Found—Indicates whether the user could be mapped to a group. • Duplicate User—Indicates whether duplicate users were found in a user group. Displays N/A if no user group is found. User by Source (userbysource) Indicates the username received from the source through IP address-to-username mapping. Tag Name (tag_name) Name of the tag associated with the dynamic user group associated with the User Group the user is mapped to. High Resolution Timestamp (high_res timestamp) Time in milliseconds the log was received at the management plane. The format for this new field is YYYY-MM-DDThh:ss:sssTZD: • YYYY—Four digit year • MM—Two-digit month • DD—Two-digit day of the month (01 through 31) • T—Indicator for the beginning of the timestamp • hh—Two-digit hour using 24-hour time (00 through 23) • mm—Two-digit minute (00 through 59) • ss—Two-digit second (00 through 60) • sss—One or more digits for millisecond • TZD—Time zone designator (+hh:mm or -hh:mm) PAN-OS® Administrator’s Guide Version 10.2 642 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
642
Monitoring Field Name Description The High Resolution Timestamp is supported for logs received from managed firewalls running PAN-OS 10.2 and later releases. Logs received from managed firewalls running PAN-OS 9.1 and earlier releases display a 1969-12-31T16:00:00:000-8:00 timestamp regardless of when the log was received. Decryption Log Fields Format: FUTURE_USE, Receive Time, Serial Number, Type, Threat/Content Type, Config Version, Generate Time, Source Address, Destination Address, NAT Source IP, NAT Destination IP, Rule, Source User, Destination User, Application, Virtual System, Source Zone, Destination Zone, Inbound Interface, Outbound Interface, Log Action, Time Logged, Session ID, Repeat Count, Source Port, Destination Port, NAT Source Port, NAT Destination Port, Flags, IP Protocol, Action, Tunnel, FUTURE_USE, FUTURE_USE, Source VM UUID, Destination VM UUID, UUID for rule, Stage for Client to Firewall, Stage for Firewall to Server, TLS Version, Key Exchange Algorithm, Encryption Algorithm, Hash Algorithm, Policy Name, Elliptic Curve, Error Index, Root Status, Chain Status, Proxy Type, Certificate Serial Number, Fingerprint, Certificate Start Date, Certificate End Date, Certificate Version, Certificate Size, Common Name Length, Issuer Common Name Length, Root Common Name Length, SNI Length, Certificate Flags, Subject Common Name, Issuer Subject Common Name, Root Subject Common Name, Server Name Indication, Error, Container ID, POD Namespace, POD Name, Source External Dynamic List, Destination External Dynamic List, Source Dynamic Address Group, Destination Dynamic Address Group, High Res Timestamp, Source Device Category, Source Device Profile, Source Device Model, Source Device Vendor, Source Device OS Family, Source Device OS Version, Source Hostname, Source Mac Address, Destination Device Category, Destination Device Profile, Destination Device Model, Destination Device Vendor, Destination Device OS Family, Destination Device OS Version, Destination Hostname, Destination Mac Address, Sequence Number, Action Flags, Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, Virtual System ID, Application Subcategory, Application Category, Application Technology, Application Risk, Application Characteristic, Application Container, Application SaaS, Application Sanctioned State Field Name Description Receive Time (receive_time or cef-formatted￾receive_time) Time the log was received at the management plane. Serial Number (serial) Serial number of the firewall that generated the log. Type (type) Specifies the type of log; value is DECRYPTION. Threat/ContentType (subtype) Not used in the Decryption log. PAN-OS® Administrator’s Guide Version 10.2 643 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
643
Monitoring Field Name Description Config Version (config_ver) The software version. Generate Time (time_generated) Time the log was generated on the dataplane. Source Address (src) Original session source IP address. Destination Address (dst) Original session destination IP address. NAT Source IP (natsrc) If Source NAT performed, the post-NAT Source IP address. NAT Destination IP (natdst) If Destination NAT performed, the post-NAT Destination IP address. Rule (rule) Security policy rule that controls the session traffic. Source User (srcuser) Username of the user who initiated the session. Destination User (dstuser) Username of the user to which the session was destined. Application (app) Application associated with the session. Virtual System (vsys) Virtual System associated with the session. Source Zone (from) Zone the session was sourced from. Destination Zone (to) Zone the session was destined to. Inbound Interface (inbound_if) Interface that the session was sourced from. Outbound Interface (outbound_if) Interface that the session was destined to. Log Action (logset) Log Forwarding profile applied to the session. Time Logged (time_received) The time the log was received. Session ID (sessionid) An internal numerical identifier applied to each session. PAN-OS® Administrator’s Guide Version 10.2 644 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
644
Monitoring Field Name Description Repeat Count (repeatcnt) Number of sessions with the same Source IP, Destination IP, Application, and Content/Threat Type seen within 5 seconds. Source Port (sport) Source port utilized by the session. Destination Port (dport) Destination port utilized by the session. NAT Source Port (natsport) Post-NAT source port. NAT Destination Port (natdport) Post-NAT destination port. Flags (flags) 32-bit field that provides details on session; this field can be decoded by AND-ing the values with the logged value: • 0x80000000—session has a packet capture (PCAP) • 0x40000000—option is enabled to allow a client to use multiple paths to connect to a destination host • 0x20000000—file is submitted to WildFire for a verdict • 0x10000000—enterprise credential submission by end user detected • 0x08000000— source for the flow is on the allow list and not subject to recon protection • 0x02000000—IPv6 session • 0x01000000—SSL session is decrypted (SSL Proxy) • 0x00800000—session is denied via URL filtering • 0x00400000—session has a NAT translation performed • 0x00200000—user information for the session was captured through Authentication Portal • 0x00100000—application traffic is on a non-standard destination port • 0x00080000 —X-Forwarded-For value from a proxy is in the source user field • 0x00040000—log corresponds to a transaction within a http proxy session (Proxy Transaction) • 0x00020000—Client to Server flow is subject to policy based forwarding • 0x00010000—Server to Client flow is subject to policy based forwarding • 0x00008000—session is a container page access (Container Page) PAN-OS® Administrator’s Guide Version 10.2 645 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
645
Monitoring Field Name Description • 0x00002000—session has a temporary match on a rule for implicit application dependency handling. Available in PAN-OS 5.0.0 and above. • 0x00000800—symmetric return is used to forward traffic for this session • 0x00000400—decrypted traffic is being sent out clear text through a mirror port • 0x00000100—payload of the outer tunnel is being inspected IP Protocol (proto) IP protocol associated with the session. Action (action) Action taken for the session; possible values are: • allow—session was allowed by policy • deny—session was denied by policy • drop—session was dropped silently • drop ICMP—session was silently dropped with an ICMP unreachable message to the host or application • reset both—session was terminated and a TCP reset is sent to both the sides of the connection • reset client—session was terminated and a TCP reset is sent to the client • reset server—session was terminated and a TCP reset is sent to the server Tunnel (tunnel) Type of tunnel. Source VM UUID (src_uuid) The source universal unique identifier for a guest virtual machine in the VMware NSX environment. Destination VM UUID (dst_uuid) The destination universal unique identifier for a guest virtual machine in the VMware NSX environment. UUID for rule (rule_uuid) The UUID that permanently identifies the rule. Stage for Client to Firewall (hs_stage_c2f) The stage of the TLS handshake from the client to the firewall, for example, Client Hello, Server Hello, Certificate, Client/Server key exchange, etc. Stage for Firewall to Server (hs_stage_f2s) The stage of the TLS handshake from the firewall to the server. PAN-OS® Administrator’s Guide Version 10.2 646 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
646
Monitoring Field Name Description TLS Version (tls_version) The version of TLS protocol used for the session. Key Exchange Algorithm (tls_keyxchg) The key exchange algorithm used for the session. Encryption Algorithm (tls_enc) The algorithm used to encrypt the session data, such as AES-128-CBC, AES-256-GCM, etc. Hash Algorithm (tls_auth) The authentication algorithm used for the session, for example, SHA, SHA256, SHA384, etc. Policy Name (policy_name) The name of the Decryption policy associated with the session. Elliptic Curve (ec_curve) The elliptic cryptography curve that the client and server negotiate and use for connections that use ECDHE cipher suites. Error Index (err_index) The type of error that occurred: Cipher, Resource, Resume, Version, Protocol, Certificate, Feature, or HSM. Root Status (root_status) The status of the root certificate, for example, trusted, untrusted, or uninspected. Chain Status (chain_status) Whether the chain is trusted. Values are: • Uninspected • Untrusted • Trusted • Incomplete Proxy Type (proxy_type) The Decryption proxy type, such as Forward for Forward Proxy, Inbound for Inbound Inspection, No Decrypt for undecrypted traffic, GlobalProtect, etc. Certificate Serial Number (cert_serial) The unique identifier of the certificate (generated by the certificate issuer). Certificate Fingerprint (fingerprint) A hash of the certificate in x509 binary format. Certificate Start Date (notbefore) The time the certificate became valid (certificate in invalid before this time). PAN-OS® Administrator’s Guide Version 10.2 647 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
647
Monitoring Field Name Description Certificate End Date (notafter) The time the certificate expires (certificate becomes invalid after this time). Certificate Version (cert_ver) The certificate version (V1, V2, or V3). Certificate Size (cert_size) The certificate key size. Common Name Length (cn_len) The length of the subject common name. Issuer Common Name Length (issuer_len) The length of the issuer common name. Root Common Name Length (rootcn_len) The length of the root common name. SNI Length (sni_len) The length of the Server Name Indication (hostname). Certificate Flags (cert_flags) The certificate flags can return seven values: • Session is resumed (b_resume_session) • Certificate (subject) common name is truncated (b_cert_cn_truncated) • Issuer common name is truncated (b_issuer_cn_truncated) • Root common name is truncated (b_root_cn_truncated) • Server Name Indication (SNI) is truncated (b_sni_truncated) • Certificate type, RSA or ECDSA (b_cert_type) • Unused (padding3) Subject Common Name (cn) The domain name (the name of the server that the certificate protects). Issuer Common Name (issuer_cn) The name of the organization that verified the certificate’s contents. Root Common Name (root_cn) The name of the root certificate authority. Server Name Indication (sni) The hostname of the server that the client is trying to contact. Using SNIs enables a server to host multiple websites and present multiple certificates on the same IP address and TCP port because each website has a unique SNI. PAN-OS® Administrator’s Guide Version 10.2 648 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
648
Monitoring Field Name Description Error (error) A string showing the error that has occurred in the event. Container ID (container_id) A unique alphanumeric string that identifies the container if the firewall runs in a cloud container. POD Namespace (pod_namespace) The name of the Kubernetes pod namespace. POD Name (pod_name) The name of the kubernetes pod. Source External Dynamic List (src_edl) The name of the external dynamic list that contains the source IP address of the traffic. Destination External Dynamic List (dst_edl) The name of the external dynamic list that contains the destination IP address of the traffic. Source Dynamic Address Group (src_dag) The dynamic address group that Device-ID identifies as the source of the traffic. Destination Dynamic Address Group (dst_dag) The dynamic address group that Device-ID identifies as the destination for the traffic. High Resolution Timestamp (high_res_timestamp) Time in milliseconds the log was received at the management plane. The format for this field is YYYY-MM-DDThh:ss:sssTZD: • YYYY—Four digit year • MM—Two-digit month • DD—Two-digit day of the month (01 through 31) • T—Indicator for the beginning of the timestamp • hh—Two-digit hour using 24-hour time (00 through 23) • mm—Two-digit minute (00 through 59) • ss—Two-digit second (00 through 60) • sss—One or more digits for millisecond • TZD—Time zone designator (+hh:mm or -hh:mm) PAN-OS® Administrator’s Guide Version 10.2 649 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
649
Monitoring Field Name Description The High Resolution Timestamp is supported for logs received from managed firewalls running PAN-OS 10.0 and later releases. Logs received from managed firewalls running PAN-OS 9.1 and earlier releases display a 1969-12-31T16:00:00:000-8:00 timestamp regardless of when the log was received. Source Device Category (src_category) The category for the device that Device-ID identifies as the source of the traffic. Source Device Profile (src_profile) The device profile for the device that Device-ID identifies as the source of the traffic. Source Device Model (src_model) The model of the device that Device-ID identifies as the source of the traffic. Source Device Vendor (src_vendor) The vendor of the device that Device-ID identifies as the source of the traffic. Source Device OS Family (src_osfamily) The operating system type for the device that Device-ID identifies as the source of the traffic. Source Device OS Version (src_osversion) The version of the operating system for the device that Device-ID identifies as the source of the traffic. Source Hostname (src_host) The hostname of the device that Device-ID identifies as the source of the traffic. Source MAC Address (src_mac) The MAC address for the device that Device-ID identifies as the source of the traffic. Destination Device Category (dst_category) The category for the device that Device-ID identifies as the destination for the traffic. Destination Device Profile (dst_profile) The device profile for the device that Device-ID identifies as the destination for the traffic. Destination Device Model (dst_model) The model of the device that Device-ID identifies as the destination for the traffic. Destination Device Vendor (dst_vendor) The vendor of the device that Device-ID identifies as the destination for the traffic. PAN-OS® Administrator’s Guide Version 10.2 650 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
650
Monitoring Field Name Description Destination Device OS Family (dst_osfamily) The operating system type for the device that Device-ID identifies as the destination for the traffic. Destination Device OS Version (dst_osversion) The version of the operating system for the device that Device-ID identifies as the destination for the traffic. Destination Hostname (dst_host) The hostname of the device that Device-ID identifies as the destination for the traffic. Destination MAC Address (dst_mac) The MAC address for the device that Device-ID identifies as the destination for the traffic. Sequence Number (seqno) A 64-bit log entry identifier incremented sequentially; each log type has unique number space. Action Flags (actionflags) A bit field indicating if the log was forwarded to Panorama. Device Group Hierarchy (dg_hier_level_1 to dg_hier_level_4) A sequence of identification numbers that indicate the device group’s location within a device group hierarchy. The firewall (or virtual system) generating the log includes the identification number of each ancestor in its device group hierarchy. The shared device group (level 0) is not included in this structure. If the log values are 12, 34, 45, 0, it means that the log was generated by a firewall (or virtual system) that belongs to device group 45, and its ancestors are 34, and 12. To view the device group names that correspond to the value 12, 34 or 45, use one of the following methods: API query: /api/?type=op&cmd=<show><dg-hierarchy></dg￾hierarchy></show> Virtual System Name (vsys_name) The name of the virtual system associated with the session; only valid on firewalls enabled for multiple virtual systems. Device Name (device_name) The hostname of the firewall on which the session was logged. Virtual System ID (vsys_id) A unique identifier for a virtual system on a Palo Alto Networks firewall. PAN-OS® Administrator’s Guide Version 10.2 651 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
651
Monitoring Field Name Description Application Subcategory (subcategory_of_app) The application subcategory specified in the application configuration properties. Application Category (category_of_app) The application category specified in the application configuration properties. Values are: • business-systems • collaboration • general-internet • media • networking • saas Application Technology (technology_of_app) The application technology specified in the application configuration properties. Values are: • browser-based • client-server • network-protocol • peer-to-peer Application Risk (risk_of_app) Risk level associated with the application (1=lowest to 5=highest). Application Characteristic (characteristic_of_app) Comma-separated list of applicable characteristic of the application Application Container (container_of_app) The parent application for an application. Application SaaS (is_saas_of_app) Displays 1 if a SaaS application or 0 if not a SaaS application. Application Sanctioned State (sanctioned_state_of_app) Displays 1 if application is sanctioned or 0 if application is not sanctioned. Tunnel Inspection Log Fields Format: FUTURE_USE, Receive Time, Serial Number, Type, Subtype, FUTURE_USE, Generated Time, Source Address, Destination Address, NAT Source IP, NAT Destination IP, Rule Name, Source User, Destination User, Application, Virtual System, Source Zone, Destination Zone, Inbound Interface, Outbound Interface, Log Action, FUTURE_USE, Session ID, Repeat Count, PAN-OS® Administrator’s Guide Version 10.2 652 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
652
Monitoring Source Port, Destination Port, NAT Source Port, NAT Destination Port, Flags, Protocol, Action, Severity, Sequence Number, Action Flags, Source Location, Destination Location, Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, Tunnel ID/IMSI, Monitor Tag/ IMEI, Parent Session ID, Parent Start Time, Tunnel, Bytes, Bytes Sent, Bytes Received, Packets, Packets Sent, Packets Received, Maximum Encapsulation, Unknown Protocol, Strict Check, Tunnel Fragment, Sessions Created, Sessions Closed, Session End Reason, Action Source, Start Time, Elapsed Time, Tunnel Inspection Rule, Remote User IP, Remote User ID, Rule UUID, PCAP ID, Dynamic User Group, Source External Dynamic List, Destination External Dynamic List, High Resolution Timestamp, A Slice Differentiator, A Slice Service Type, PDU Session ID, Application Subcategory, Application Category, Application Technology, Application Risk, Application Characteristic, Application Container, Application SaaS, Application Sanctioned State Field Name Description Receive Time (receive_time or cef-formatted￾receive_time) Month, day, and time the log was received at the management plane. Serial Number (serial) Serial number of the firewall that generated the log. Type (type) Type of log as it pertains to the session: START or END. Threat/Content Type (subtype) Subtype of traffic log; values are start, end, drop, and deny • Start—session started • End—session ended • Drop—session dropped before the application is identified and there is no rule that allows the session. • Deny—session dropped after the application is identified and there is a rule to block or no rule that allows the session. Generated Time (time_generated or cef-formatted￾time_generated) Time the log was generated on the dataplane. Source Address (src) Source IP address of packets in the session. Destination Address (dst) Destination IP address of packets in the session. NAT Source IP (natsrc) If Source NAT performed, the post-NAT Source IP address. NAT Destination IP (natdst) If Destination NAT performed, the post-NAT Destination IP address. PAN-OS® Administrator’s Guide Version 10.2 653 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
653
Monitoring Field Name Description Rule Name (rule) Name of the Security policy rule in effect on the session. Source User (srcuser) Source User ID of packets in the session. Destination User (dstuser) Destination User ID of packets in the session. Application (app) Tunneling protocol used in the session. Virtual System (vsys) Virtual System associated with the session. Source Zone (from) Source zone of packets in the session. Destination Zone (to) Destination zone of packets in the session. Inbound Interface (inbound_if) Interface that the session was sourced from. Outbound Interface (outbound_if) Interface that the session was destined to. Log Action (logset) Log Forwarding Profile that was applied to the session. Session ID (sessionid) Session ID of the session being logged. Repeat Count (repeatcnt) Number of sessions with same Source IP, Destination IP, Application, and Subtype seen within 5 seconds. Source Port (sport) Source port utilized by the session. Destination Port (dport) Destination port utilized by the session. NAT Source Port (natsport) Post-NAT source port. NAT Destination Port (natdport) Post-NAT destination port. Flags (flags) 32-bit field that provides details on session; this field can be decoded by AND-ing the values with the logged value: • 0x80000000 —session has a packet capture (PCAP) • 0x02000000 —IPv6 session • 0x01000000 —SSL session was decrypted (SSL Proxy) • 0x00800000 —session was denied via URL filtering PAN-OS® Administrator’s Guide Version 10.2 654 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
654
Monitoring Field Name Description • 0x00400000 —session has a NAT translation performed (NAT) • 0x00200000 —user information for the session was captured through Authentication Portal • 0x00080000 —X-Forwarded-For value from a proxy is in the source user field • 0x00040000 —log corresponds to a transaction within a http proxy session (Proxy Transaction) • 0x00008000 —session is a container page access (Container Page) • 0x00002000 —session has a temporary match on a rule for implicit application dependency handling. Available in PAN-OS 5.0.0 and above. • 0x00000800 —symmetric return was used to forward traffic for this session IP Protocol (proto) IP protocol associated with the session. Action (action) Action taken for the session; possible values are: • Allow—session was allowed by policy • Deny—session was denied by policy • Drop—session was dropped silently • Drop ICMP—session was silently dropped with an ICMP unreachable message to the host or application • Reset both—session was terminated and a TCP reset is sent to both the sides of the connection • Reset client—session was terminated and a TCP reset is sent to the client • Reset server—session was terminated and a TCP reset is sent to the server Severity (severity) Severity associated with the event; values are informational, low, medium, high, critical. Sequence Number (seqno) A 64-bit log entry identifier incremented sequentially; each log type has a unique number space. This field is not supported on PA-7000 Series firewalls. Action Flags (actionflags) A bit field indicating if the log was forwarded to Panorama. Source Location (srcloc) Source country or Internal region for private addresses; maximum length is 32 bytes. PAN-OS® Administrator’s Guide Version 10.2 655 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
655
Monitoring Field Name Description Destination Location (dstloc) Destination country or Internal region for private addresses. Maximum length is 32 bytes. Device Group Hierarchy (dg_hier_level_1 to dg_hier_level_4) A sequence of identification numbers that indicate the device group’s location within a device group hierarchy. The firewall (or virtual system) generating the log includes the identification number of each ancestor in its device group hierarchy. The shared device group (level 0) is not included in this structure. If the log values are 12, 34, 45, 0, it means that the log was generated by a firewall (or virtual system) that belongs to device group 45, and its ancestors are 34, and 12. To view the device group names that correspond to the value 12, 34 or 45, use one of the following methods: API query: /api/?type=op&cmd=<show><dg-hierarchy></dg￾hierarchy></show> Virtual System Name (vsys_name) The name of the virtual system associated with the session; only valid on firewalls enabled for multiple virtual systems. Device Name (device_name) The hostname of the firewall on which the session was logged. Tunnel ID (tunnelid) ID of the tunnel being inspected or the International Mobile Subscriber Identity (IMSI) ID of the mobile user. Monitor Tag (monitortag) Monitor name you configured for the Tunnel Inspection policy rule or the International Mobile Equipment Identity (IMEI) ID of the mobile device. Parent Session ID (parent_session_id) ID of the session in which this session is tunneled. Applies to inner tunnel (if two levels of tunneling) or inside content (if one level of tunneling) only. Parent Start Time (parent_start_time) Year/month/day hours:minutes:seconds that the parent tunnel session began. Tunnel Type (tunnel) Type of tunnel, such as GRE or IPSec. Bytes (bytes) Number of bytes in the session. Bytes Sent (bytes_sent) Number of bytes in the client-to-server direction of the session. PAN-OS® Administrator’s Guide Version 10.2 656 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
656
Monitoring Field Name Description Bytes Received (bytes_received) Number of bytes in the server-to-client direction of the session. Packets (packets) Number of total packets (transmit and receive) for the session. Packets Sent (pkts_sent) Number of client-to-server packets for the session. Packets Received (pkts_received) Number of server-to-client packets for the session. Maximum Encapsulation (max_encap) Number of packets the firewall dropped because the packet exceeded the maximum number of encapsulation levels configured in the Tunnel Inspection policy rule (Drop packet if over maximum tunnel inspection level). Unknown Protocol (unknown_proto) Number of packets the firewall dropped because the packet contains an unknown protocol, as enabled in the Tunnel Inspection policy rule (Drop packet if unknown protocol inside tunnel). Strict Checking (strict_check) Number of packets the firewall dropped because the tunnel protocol header in the packet failed to comply with the RFC for the tunnel protocol, as enabled in the Tunnel Inspection policy rule (Drop packet if tunnel protocol fails strict header check). Tunnel Fragment (tunnel_fragment) Number of packets the firewall dropped because of fragmentation errors. Sessions Created (sessions_created) Number of inner sessions created. Sessions Closed (sessions_closed) Number of completed/closed sessions created. Session End Reason (session_end_reason) The reason a session terminated. If the termination had multiple causes, this field displays only the highest priority reason. The possible session end reason values are as follows, in order of priority (where the first is highest): • threat—The firewall detected a threat associated with a reset, drop, or block (IP address) action. • policy-deny—The session matched a security rule with a deny or drop action. • decrypt-cert-validation—The session terminated because you configured the firewall to block SSL forward proxy decryption or SSL inbound inspection when the session uses client authentication or when the session uses a server certificate with any of the PAN-OS® Administrator’s Guide Version 10.2 657 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
657
Monitoring Field Name Description following conditions: expired, untrusted issuer, unknown status, or status verification time-out. This session end reason also displays when the server certificate produces a fatal error alert of type bad_certificate, unsupported_certificate, certificate_revoked, access_denied, or no_certificate_RESERVED (SSLv3 only). • decrypt-unsupport-param—The session terminated because you configured the firewall to block SSL forward proxy decryption or SSL inbound inspection when the session uses an unsupported protocol version, cipher, or SSH algorithm. This session end reason is displays when the session produces a fatal error alert of type unsupported_extension, unexpected_message, or handshake_failure. • decrypt-error—The session terminated because you configured the firewall to block SSL forward proxy decryption or SSL inbound inspection when firewall resources or the hardware security module (HSM) were unavailable. This session end reason is also displayed when you configured the firewall to block SSL traffic that has SSH errors or that produced any fatal error alert other than those listed for the decrypt-cert-validation and decrypt-unsupport-param end reasons. • tcp-rst-from-client—The client sent a TCP reset to the server. • tcp-rst-from-server—The server sent a TCP reset to the client. • resources-unavailable—The session dropped because of a system resource limitation. For example, the session could have exceeded the number of out-of-order packets allowed per flow or the global out-of-order packet queue. • tcp-fin—One host or both hosts in the connection sent a TCP FIN message to close the session. • tcp-reuse—A session is reused and the firewall closes the previous session. • decoder—The decoder detects a new connection within the protocol (such as HTTP-Proxy) and ends the previous connection. • aged-out—The session aged out. • unknown—This value applies in the following situations: • Session terminations that the preceding reasons do not cover (for example, a clear session all command). • For logs generated in a PAN-OS release that does not support the session end reason field (releases older than PAN-OS 6.1), the value will be unknown after an upgrade to the current PAN￾OS release or after the logs are loaded onto the firewall. • In Panorama, logs received from firewalls for which the PAN-OS version does not support session end reasons will have a value of unknown. PAN-OS® Administrator’s Guide Version 10.2 658 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
658
Monitoring Field Name Description • n/a—This value applies when the traffic log type is not end. Action Source (action_source) Specifies whether the action taken to allow or block an application was defined in the application or in policy. The actions can be allow, deny, drop, reset- server, reset-client or reset-both for the session. Start Time (start) Year/month/day hours:minutes:seconds that the session began. Elapsed Time (elapsed) Elapsed time of the session. Tunnel Inspection Rule (tunnel_insp_rule) Name of the tunnel inspection rule matching the cleartext tunnel traffic. Remote User IP (remote_user_ip) IPv4 or IPv6 address of a remote user. Remote User ID (remote_user_id) IMSI identity of a remote user, and if available, one IMEI identity or one MSISDN identity. Security Rule UUID (rule_uuid) The UUID that permanently identifies the rule. PCAP ID (pcap_id) Unique packet capture ID that defines the location of the pcap file on the firewall. Dynamic User Group Name (dynusergroup_name) The name of the dynamic user group that contains the user who initiated the session. Source External Dynamic List (src_edl) The name of the external dynamic list that contains the source IP address of the traffic. Destination External Dynamic List (dst_edl) The name of the external dynamic list that contains the destination IP address of the traffic. High Resolution Timestamp (high_res timestamp) Time in milliseconds the log was received at the management plane. The format for this new field is YYYY-MM-DDThh:ss:sssTZD: • YYYY—Four digit year • MM—Two-digit month • DD—Two-digit day of the month (01 through 31) • T—Indicator for the beginning of the timestamp • hh—Two-digit hour using 24-hour time (00 through 23) PAN-OS® Administrator’s Guide Version 10.2 659 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
659
Monitoring Field Name Description • mm—Two-digit minute (00 through 59) • ss—Two-digit second (00 through 60) • sss—One or more digits for millisecond • TZD—Time zone designator (+hh:mm or -hh:mm) The High Resolution Timestamp is supported for logs received from managed firewalls running PAN-OS 10.2 and later releases. Logs received from managed firewalls running PAN-OS 9.1 and earlier releases display a 1969-12-31T16:00:00:000-8:00 timestamp regardless of when the log was received. A Slice Differentiator (nssai_sd) The A Slice Differentiator of the Network Slice ID. A Slice Service Type (nssai_sd) The A Slice Service Type of the Network Slice ID. PDU Session ID (pdu_session_id) Session ID for the collection of L4 segments inside a tunnel. Application Subcategory (subcategory_of_app) The application subcategory specified in the application configuration properties. Application Category (category_of_app) The application category specified in the application configuration properties. Values are: • business-systems • collaboration • general-internet • media • networking • saas Application Technology (technology_of_app) The application technology specified in the application configuration properties. Values are: • browser-based • client-server • network-protocol • peer-to-peer PAN-OS® Administrator’s Guide Version 10.2 660 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
660
Monitoring Field Name Description Application Risk (risk_of_app) Risk level associated with the application (1=lowest to 5=highest). Application Characteristic (characteristic_of_app) Comma-separated list of applicable characteristic of the application Application Container (container_of_app) The parent application for an application. Application SaaS (is_saas_of_app) Displays 1 if a SaaS application or 0 if not a SaaS application. Application Sanctioned State (sanctioned_state_of_app) Displays 1 if application is sanctioned or 0 if application is not sanctioned. SCTP Log Fields Format: FUTURE_USE, Receive Time, Serial Number, Type, FUTURE_USE, FUTURE_USE, Generated Time, Source Address, Destination Address, FUTURE_USE, FUTURE_USE, Rule Name, FUTURE_USE, FUTURE_USE, FUTURE_USE, Virtual System, Source Zone, Destination Zone, Inbound Interface, Outbound Interface, Log Action, FUTURE_USE, Session ID, Repeat Count, Source Port, Destination Port, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, IP Protocol, Action, Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, Sequence Number, FUTURE_USE, SCTP Association ID, Payload Protocol ID, Severity, SCTP Chunk Type, FUTURE_USE, SCTP Verification Tag 1, SCTP Verification Tag 2, SCTP Cause Code, Diameter App ID, Diameter Command Code, Diameter AVP Code, SCTP Stream ID, SCTP Association End Reason, Op Code, SCCP Calling Party SSN, SCCP Calling Party Global Title, SCTP Filter, SCTP Chunks, SCTP Chunks Sent, SCTP Chunks Received, Packets, Packets Sent, Packets Received, UUID for rule, High Resolution Timestamp Field Name Description Receive Time (receive_time or cef-formatted￾receive_time) Time the log was received at the management plane. Serial Number (serial) Serial number of the firewall that generated the log. Type (type) Specifies the type of log; value is SCTP. PAN-OS® Administrator’s Guide Version 10.2 661 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
661
Monitoring Field Name Description Generated Time (time_generated or cef￾formatted-time_generated) Time the log was generated on the dataplane. Source Address (src) Original session source IP address. Destination Address (dst) Original session destination IP address. Rule Name (rule) Name of the Security policy rule in effect on the session. Virtual System (vsys) Virtual System associated with the session. Source Zone (from) Zone the session was sourced from. Destination Zone (to) Zone the session was destined to. Inbound Interface (inbound_if) Interface that the session was sourced from. Outbound Interface (outbound_if) Interface that the session was destined to. Log Action (logset) Log Forwarding Profile that was applied to the session. Session ID (sessionid) An internal numerical identifier applied to each session. Repeat Count (repeatcnt) Number of sessions with same Source IP, Destination IP, Application, and Subtype seen within 5 seconds. Source Port (sport) Source port utilized by the session. Destination Port (dport) Destination port utilized by the session. IP Protocol (proto) IP protocol associated with the session. Action (action) Action taken for the session; possible values are: • allow—session was allowed by the policy • deny—session was denied by the policy Device Group Hierarchy (dg_hier_level_1 to dg_hier_level_4) A sequence of identification numbers that indicate the device group’s location within a device group hierarchy. The firewall (or virtual system) generating the log includes the identification number of each ancestor in its device group hierarchy. The shared device group (level 0) is not included in this structure. PAN-OS® Administrator’s Guide Version 10.2 662 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
662
Monitoring Field Name Description If the log values are 12, 34, 45, 0, it means that the log was generated by a firewall (or virtual system) that belongs to device group 45, and its ancestors are 34, and 12. To view the device group names that correspond to the value 12, 34 or 45, use one of the following methods: API query: /api/?type=op&cmd=<show><dg-hierarchy></dg￾hierarchy></show> Virtual System Name (vsys_name) The name of the virtual system associated with the session; only valid on firewalls enabled for multiple virtual systems. Device Name (device_name) The hostname of the firewall on which the session was logged. Sequence Number (seqno) A 64-bit log entry identifier incremented sequentially; each log type has a unique number space. SCTP Association ID (assoc_id) An internal 56-bit numerical logical identifier applied to each SCTP association. Payload Protocol ID (ppid) Identifies the Payload Protocol ID (PPID) in the data chunk which triggered this event. PPID is assigned by Internet Assigned Numbers Authority (IANA). Severity (severity) Severity associated with the event; values are informational, low, medium, high, critical. SCTP Chunk Type (sctp_chunk_type) Describes the type of information contained in a chunk, such as control or data. SCTP Event Type (sctp_event_type) Defines the event triggered per SCTP chunk or packet when SCTP protection profile is applied to the SCTP traffic. It is also triggered by start or end of a SCTP association. SCTP Verification Tag 1 (verif_tag_1) Used by endpoint1 which initiates the association to verify if the SCTP packet received belongs to current SCTP association and validate the endpoint2. SCTP Verification Tag 2 (verif_tag_2) Used by endpoint2 to verify if the SCTP packet received belongs to current SCTP association and validate the endpoint1. SCTP Cause Code (sctp_cause_code) Sent by an endpoint to specify reason for an error condition to other endpoint of same SCTP association. PAN-OS® Administrator’s Guide Version 10.2 663 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
663
Monitoring Field Name Description Diameter App ID (diam_app_id) The diameter application in the data chunk which triggered the event. Diameter Application ID is assigned by Internet Assigned Numbers Authority (IANA). Diameter Command Code (diam_cmd_code) The diameter command code in the data chunk which triggered the event. Diameter Command Code is assigned by Internet Assigned Numbers Authority (IANA) Diameter AVP Code (diam_avp_code) The diameter AVP code in the data chunk which triggered the event. SCTP Stream ID (stream_id) ID of the stream which carries the data chunk which triggered the event. SCTP Association End Reason (assoc_end_reason) Reason an association was terminated. If the termination had multiple causes, the highest priority reason is displayed. The possible session end reasons in descending priority are: • shutdown-from-endpoint (highest)—endpoint sends out SHUTDOWN • abort-from-endpoint—endpoint sends out ABORT • unknown (lowest)—the association aged out, or association termination reason is not covered by one of the previous reasons (for example, a clear session all command). Op Code (op_code) Identifies the operation code of application layer SS7 protocols, like MAP or CAP, in the data chunk which triggered the event. SCCP Calling Party SSN (sccp_calling_ssn) The Signaling Connection Control Part (SCCP) calling party subsystem number (SSN) in the data chunk which triggered the event. SCCP Calling Party Global Title (sccp_calling_gt) The Signaling Connection Control Part (SCCP) calling party global title (GT) in the data chunk which triggered the event. SCTP Filter (sctp_filter) Name of the filter that the SCTP chunk matched. SCTP Chunks (chunks) Number of total chunks (transmit and receive) for the association. SCTP Chunks Sent (chunks_sent) Number of endpoint1(which initiates association)-to￾endpoint2 chunks for the association. SCTP Chunks Received (chunks_received) Number of endpoint2-to-endpoint1(which initiates association) chunks for the association. PAN-OS® Administrator’s Guide Version 10.2 664 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
664
Monitoring Field Name Description Packets (packets) Number of total packets (transmit and receive) for the session. Packets Sent (pkts_sent) Number of client-to-server packets for the session. Packets Received (pkts_received) Number of server-to-client packets for the session. UUID for rule (rule_uuid) The UUID that permanently identifies the rule. High Resolution Timestamp (high_res_timestamp) Time in milliseconds the log was received at the management plane. The format for this new field is YYYY-MM-DDThh:ss:sssTZD: • YYYY—Four digit year • MM—Two-digit month • DD—Two-digit day of the month (01 through 31) • T—Indicator for the beginning of the timestamp • hh—Two-digit hour using 24-hour time (00 through 23) • mm—Two-digit minute (00 through 59) • ss—Two-digit second (00 through 60) • sss—One or more digits for millisecond • TZD—Time zone designator (+hh:mm or -hh:mm) The High Resolution Timestamp is supported for logs received from managed firewalls running PAN-OS 10.2 and later releases. Logs received from managed firewalls running PAN-OS 9.1 and earlier releases display a 1969-12-31T16:00:00:000-8:00 timestamp regardless of when the log was received. Authentication Log Fields Format: FUTURE_USE, Receive Time, Serial Number, Type, Threat/Content Type, FUTURE_USE, Generated Time, Virtual System, Source IP, User, Normalize User, Object, Authentication Policy, Repeat Count, Authentication ID, Vendor, Log Action, Server Profile, Description, Client Type, Event Type, Factor Number, Sequence Number, Action Flags, Device Group Hierarchy 1, Device Group Hierarchy 2, Device Group Hierarchy 3, Device Group Hierarchy 4, Virtual System Name, Device Name, Virtual System ID, Authentication Protocol, UUID for rule, High Resolution Timestamp, Source Device Category, Source Device Profile, Source Device Model, Source Device Vendor, Source Device OS Family, Source Device OS Version, Source Hostname, Source Mac Address, Region, FUTURE_USE, User Agent, Session ID PAN-OS® Administrator’s Guide Version 10.2 665 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
665
Monitoring Field Name Description Receive Time (receive_time or cef-formatted￾receive_time) Time the log was received at the management plane. Serial Number (serial) Serial number of the device that generated the log. Type (type) Specifies the type of log; value is AUTHENTICATION. Threat/Content Type (subtype) Subtype of the system log; refers to the system daemon generating the log; values are crypto, dhcp, dnsproxy, dos, general, global-protect, ha, hw, nat, ntpd, pbf, port, pppoe, ras, routing, satd, sslmgr, sslvpn, userid, url-filtering, vpn. Generated Time (time_generated or cef-formatted￾time_generated) Time the log was generated on the dataplane. Virtual System (vsys) Virtual System associated with the session. Source IP (ip) Original session source IP address. User (user) End user being authenticated. Normalize User (normalize_user) Normalized version of username being authenticated (such as appending a domain name to the username). Object (object) Name of the object associated with the system event. Authentication Policy (authpolicy) Policy invoked for authentication before allowing access to a protected resource. Repeat Count (repeatcnt) Number of sessions with same Source IP, Destination IP, Application, and Subtype seen within 5 seconds. Authentication ID (authid) Unique ID given across primary authentication and additional (multi factor) authentication. Vendor (vendor) Vendor providing additional factor authentication. Log Action (logset) Log Forwarding Profile that was applied to the session. Server Profile (serverprofile) Authentication server used for authentication. PAN-OS® Administrator’s Guide Version 10.2 666 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
666
Monitoring Field Name Description Description (desc) Additional authentication information. Client Type (clienttype) Type of client used to complete authentication (such as authentication portal). Event Type (event) Result of the authentication attempt. Factor Number (factorno) Indicates the use of primary authentication (1) or additional factors (2, 3). Sequence Number (seqno) A 64-bit log entry identifier incremented sequentially. Each log type has a unique number space. Action Flags (actionflags) A bit field indicating if the log was forwarded to Panorama. Device Group Hierarchy (dg_hier_level_1 to dg_hier_level_4) A sequence of identification numbers that indicate the device group’s location within a device group hierarchy. The firewall (or virtual system) generating the log includes the identification number of each ancestor in its device group hierarchy. The shared device group (level 0) is not included in this structure. If the log values are 12, 34, 45, 0, it means that the log was generated by a firewall (or virtual system) that belongs to device group 45, and its ancestors are 34, and 12. To view the device group names that correspond to the value 12, 34 or 45, use one of the following methods: API query: /api/?type=op&cmd=<show><dg-hierarchy></dg￾hierarchy></show> Virtual System Name (vsys_name) The name of the virtual system associated with the session; only valid on firewalls enabled for multiple virtual systems. Device Name (device_name) The hostname of the firewall on which the session was logged. Virtual System ID (vsys_id) A unique identifier for a virtual system on a Palo Alto Networks firewall. Authentication Protocol (authproto) Indicates the authentication protocol used by the server. For example, PEAP with GTC. UUID for rule (rule_uuid) The UUID that permanently identifies the rule. PAN-OS® Administrator’s Guide Version 10.2 667 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
667
Monitoring Field Name Description High Resolution Timestamp (high_res _timestamp) Time in milliseconds the log was received at the management plane. The format for this new field is YYYY-MM-DDThh:ss:sssTZD: • YYYY—Four digit year • MM—Two-digit month • DD—Two-digit day of the month (01 through 31) • T—Indicator for the beginning of the timestamp • hh—Two-digit hour using 24-hour time (00 through 23) • mm—Two-digit minute (00 through 59) • ss—Two-digit second (00 through 60) • sss—One or more digits for millisecond • TZD—Time zone designator (+hh:mm or -hh:mm) The High Resolution Timestamp is supported for logs received from managed firewalls running PAN-OS 10.2 and later releases. Logs received from managed firewalls running PAN-OS 9.1 and earlier releases display a 1969-12-31T16:00:00:000-8:00 timestamp regardless of when the log was received. Source Device Category (src_category) The category for the device that Device-ID identifies as the source of the traffic. Source Device Profile (src_profile) The device profile for the device that Device-ID identifies as the source of the traffic. Source Device Model (src_model) The model of the device that Device-ID identifies as the source of the traffic. Source Device Vendor (src_vendor) The vendor of the device that Device-ID identifies as the source of the traffic. Source Device OS Family (src_osfamily) The operating system type for the device that Device-ID identifies as the source of the traffic. Source Device OS Version (src_osversion) The version of the operating system for the device that Device-ID identifies as the source of the traffic. Source Hostname (src_host) The hostname of the device that Device-ID identifies as the source of the traffic. PAN-OS® Administrator’s Guide Version 10.2 668 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
668
Monitoring Field Name Description Source MAC Address (src_mac) The MAC address for the device that Device-ID identifies as the source of the traffic. Region (region) The geographical region where the traffic originates. User Agent (user_agent) The string from the HTTP request header User-Agent. Session ID A string that uniquely identifies the traffic session. Config Log Fields Format: FUTURE_USE, Receive Time, Serial Number, Type, Subtype, FUTURE_USE, Generated Time, Host, Virtual System, Command, Admin, Client, Result, Configuration Path, Before Change Detail, After Change Detail, Sequence Number, Action Flags, Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, Device Group, Audit Comment, FUTURE_USE, High Resolution Timestamp Field Name Description Receive Time (receive_time or cef-formatted￾receive_time) Time the log was received at the management plane. Serial Number (serial) Serial number of the device that generated the log. Type (type) Specifies the type of log; value is CONFIG. Threat/Content Type (subtype) Subtype of the configuration log; unused. Generated Time (time_generated or cef-formatted￾time_generated) Time the log was generated on the dataplane. Host (host) Hostname or IP address of the client machine Virtual System (vsys) Virtual System associated with the configuration log Command (cmd) Command performed by the Admin; values are add, clone, commit, delete, edit, move, rename, set. PAN-OS® Administrator’s Guide Version 10.2 669 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
669
Monitoring Field Name Description Admin (admin) Username of the Administrator performing the configuration Client (client) Client used by the Administrator; values are Web and CLI Result (result) Result of the configuration action; values are Submitted, Succeeded, Failed, and Unauthorized Configuration Path (path) The path of the configuration command issued; up to 512 bytes in length Before Change Detail (before￾change-detail) This field is in custom logs only; it is not in the default format. It contains the full xpath before the configuration change. After Change Detail (after-change-detail) This field is in custom logs only; it is not in the default format. It contains the full xpath after the configuration change. Sequence Number (seqno) A 64bit log entry identifier incremented sequentially; each log type has a unique number space. Action Flags (actionflags) A bit field indicating if the log was forwarded to Panorama. Device Group Hierarchy (dg_hier_level_1 to dg_hier_level_4) A sequence of identification numbers that indicate the device group’s location within a device group hierarchy. The firewall (or virtual system) generating the log includes the identification number of each ancestor in its device group hierarchy. The shared device group (level 0) is not included in this structure. If the log values are 12, 34, 45, 0, it means that the log was generated by a firewall (or virtual system) that belongs to device group 45, and its ancestors are 34, and 12. To view the device group names that correspond to the value 12, 34 or 45, use one of the following methods: API query: /api/?type=op&cmd=<show><dg-hierarchy></dg￾hierarchy></show> Virtual System Name (vsys_name) The name of the virtual system associated with the session; only valid on firewalls enabled for multiple virtual systems. Device Name (device_name) The hostname of the firewall on which the session was logged. Device Group (dg_id) The device group the firewall belongs to if managed by a Panorama™ management server. PAN-OS® Administrator’s Guide Version 10.2 670 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
670
Monitoring Field Name Description Audit Comment (comment) The audit comment entered in a policy rule configuration change. High Resolution Timestamp (high_res_timestamp) Time in milliseconds the log was received at the management plane. The format for this new field is YYYY-MM-DDThh:ss:sssTZD: • YYYY—Four digit year • MM—Two-digit month • DD—Two-digit day of the month (01 through 31) • T—Indicator for the beginning of the timestamp • hh—Two-digit hour using 24-hour time (00 through 23) • mm—Two-digit minute (00 through 59) • ss—Two-digit second (00 through 60) • sss—One or more digits for millisecond • TZD—Time zone designator (+hh:mm or -hh:mm) The High Resolution Timestamp is supported for logs received from managed firewalls running PAN-OS 10.0 and later releases. Logs received from managed firewalls running PAN-OS 9.1 and earlier releases display a 1969-12-31T16:00:00:000-8:00 timestamp regardless of when the log was received. System Log Fields Format: FUTURE_USE, Receive Time, Serial Number, Type, Content/Threat Type, FUTURE_USE, Generated Time, Virtual System, Event ID, Object, FUTURE_USE, FUTURE_USE, Module, Severity, Description, Sequence Number, Action Flags, Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, FUTURE_USE, FUTURE_USE, High Resolution Timestamp Field Name Description Receive Time (receive_time or cef-formatted￾receive_time) Time the log was received at the management plane. Serial Number (serial) Serial number of the firewall that generated the log. Type (type) Specifies the type of log; value is SYSTEM. PAN-OS® Administrator’s Guide Version 10.2 671 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
671
Monitoring Field Name Description Content/Threat Type (subtype) Subtype of the system log; refers to the system daemon generating the log; values are crypto, dhcp, dnsproxy, dos, general, global-protect, ha, hw, nat, ntpd, pbf, port, pppoe, ras, routing, satd, sslmgr, sslvpn, userid, url-filtering, vpn. Generated Time (time_generated or cef-formatted￾time_generated) Time the log was generated on the dataplane. Virtual System (vsys) Virtual System associated with the configuration log. Event ID (eventid) String showing the name of the event. Object (object) Name of the object associated with the system event. Module (module) This field is valid only when the value of the Subtype field is general. It provides additional information about the sub-system generating the log; values are general, management, auth, ha, upgrade, chassis. Severity (severity) Severity associated with the event; values are informational, low, medium, high, critical. Description (opaque) Detailed description of the event, up to a maximum of 512 bytes. Sequence Number (seqno) A 64-bit log entry identifier incremented sequentially; each log type has a unique number space. Action Flags (actionflags) A bit field indicating if the log was forwarded to Panorama. Device Group Hierarchy (dg_hier_level_1 to dg_hier_level_4) A sequence of identification numbers that indicate the device group’s location within a device group hierarchy. The firewall (or virtual system) generating the log includes the identification number of each ancestor in its device group hierarchy. The shared device group (level 0) is not included in this structure. If the log values are 12, 34, 45, 0, it means that the log was generated by a firewall (or virtual system) that belongs to device group 45, and its ancestors are 34, and 12. To view the device group names that correspond to the value 12, 34 or 45, use one of the following methods: API query: /api/?type=op&cmd=<show><dg-hierarchy></dg￾hierarchy></show> PAN-OS® Administrator’s Guide Version 10.2 672 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
672
Monitoring Field Name Description Virtual System Name (vsys_name) The name of the virtual system associated with the session; only valid on firewalls enabled for multiple virtual systems. Device Name (device_name) The hostname of the firewall on which the session was logged. High Resolution Timestamp (high_res_timestamp) Time in milliseconds the log was received at the management plane. The format for this new field is YYYY-MM-DDThh:ss:sssTZD: • YYYY—Four digit year • MM—Two-digit month • DD—Two-digit day of the month (01 through 31) • T—Indicator for the beginning of the timestamp • hh—Two-digit hour using 24-hour time (00 through 23) • mm—Two-digit minute (00 through 59) • ss—Two-digit second (00 through 60) • sss—One or more digits for millisecond • TZD—Time zone designator (+hh:mm or -hh:mm) The High Resolution Timestamp is supported for logs received from managed firewalls running PAN-OS 10.2 and later releases. Logs received from managed firewalls running PAN-OS 9.1 and earlier releases display a 1969-12-31T16:00:00:000-8:00 timestamp regardless of when the log was received. Correlated Events Log Fields Format: FUTURE_USE, Receive Time, Serial Number, Type, Content/Threat Type, FUTURE_USE, Generated Time, Source Address. Source User, Virtual System, Category, Severity, Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, Virtual System ID, Object Name, Object ID, Evidence Field Name Description Receive Time (receive_time or cef-formatted￾receive_time) Time the log was received at the management plane. Serial Number (serial) Serial number of the device that generated the log. PAN-OS® Administrator’s Guide Version 10.2 673 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
673
Monitoring Field Name Description Type (type) Specifies the type of log; value is CORRELATION. Content/Threat Type (subtype) Subtype of the system log; refers to the system daemon generating the log; values are crypto, dhcp, dnsproxy, dos, general, global-protect, ha, hw, nat, ntpd, pbf, port, pppoe, ras, routing, satd, sslmgr, sslvpn, userid, url-filtering, vpn. Generated Time (time_generated or cef-formatted￾time_generated) Time the log was generated on the dataplane. Source Address (src) IP address of the user who initiated the event. Source User (srcuser) Username of the user who initiated the event. Virtual System (vsys) Virtual System associated with the configuration log. Category (category) A summary of the kind of threat or harm posed to the network, user, or host. Severity (severity) Severity associated with the event; values are informational, low, medium, high, critical. Device Group Hierarchy (dg_hier_level_1 to dg_hier_level_4) A sequence of identification numbers that indicate the device group’s location within a device group hierarchy. The firewall (or virtual system) generating the log includes the identification number of each ancestor in its device group hierarchy. The shared device group (level 0) is not included in this structure. If the log values are 12, 34, 45, 0, it means that the log was generated by a firewall (or virtual system) that belongs to device group 45, and its ancestors are 34, and 12. To view the device group names that correspond to the value 12, 34 or 45, use one of the following methods: API query: /api/?type=op&cmd=<show><dg-hierarchy></dg￾hierarchy></show> Virtual System Name (vsys_name) The name of the virtual system associated with the session; only valid on firewalls enabled for multiple virtual systems. Device Name (device_name) The hostname of the firewall on which the session was logged. PAN-OS® Administrator’s Guide Version 10.2 674 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
674
Monitoring Field Name Description Virtual System ID (vsys_id) A unique identifier for a virtual system on a Palo Alto Networks firewall. Object Name (objectname) Name of the correlation object that was matched on. Object ID (object_id) Name of the object associated with the system event. Evidence (evidence) A summary statement that indicates how many times the host has matched against the conditions defined in the correlation object. For example, Host visited known malware URl (19 times). GTP Log Fields Format: FUTURE_USE, Receive Time, Serial Number, Type, Threat/Content Type, FUTURE_USE, Generated Time, Source Address, Destination Address, FUTURE_USE, FUTURE_USE, Rule Name, FUTURE_USE, FUTURE_USE, Application, Virtual System, Source Zone, Destination Zone, Inbound Interface, Outbound Interface, Log Action, FUTURE_USE, Session ID, FUTURE_USE, Source Port, Destination Port, FUTURE_USE, FUTURE_USE, FUTURE_USE, Protocol, Action, GTP Event Type, MSISDN, Access Point Name, Radio Access Technology, GTP Message Type, End User IP Address, Tunnel Endpoint Identifier1, Tunnel Endpoint Identifier2, GTP Interface, GTP Cause, Severity, Serving Country MCC, Serving Network MNC, Area Code, Cell ID, GTP Event Code, FUTURE_USE, FUTURE_USE, Source Location, Destination Location, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, Tunnel ID/IMSI, Monitor Tag/IMEI, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, Start Time, Elapsed Time, Tunnel Inspection Rule, Remote User IP, Remote User ID, UUID for rule, PCAP ID, High Resolution Timestamp, A Slice Service Type, A Slice Differentiator, Application Subcategory, Application Category, Application Technology, Application Risk, Application Characteristic, Application Container, Application SaaS, Application Sanctioned State Field Name Description Receive Time (receive_time or cef-formatted￾receive_time) Month, Day and time the log was received at the management plane. Serial Number (serial) Serial number of the firewall that generated the log. Type (type) Specifies the type of log; value is GTP. Threat/Content Type (subtype) Subtype of traffic log; values are start, end, drop, and deny • Start—session started • End—session ended PAN-OS® Administrator’s Guide Version 10.2 675 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
675
Monitoring Field Name Description • Drop—session dropped before the application is identified and there is no rule that allows the session. • Deny—session dropped after the application is identified and there is a rule to block or no rule that allows the session. Generated Time (time_generated or cef￾formatted-time_generated) Time the log was generated on the dataplane. Source Address (src) Source IP address of packets in the session. Destination Address (dst) Destination IP address of packets in the session. Rule Name (rule) Name of the Security policy rule in effect on the session. Application (app) Tunneling protocol used in the session. Virtual System (vsys) Virtual System associated with the session. Source Zone (from) Source zone of packets in the session. Destination Zone (to) Destination zone of packets in the session. Inbound Interface (inbound_if) Interface that the session was sourced from. Outbound Interface (outbound_if) Interface that the session was destined to. Log Action (logset) Log Forwarding Profile that was applied to the session. Session ID (sessionid) Session ID of the session being logged. Source Port (sport) Source port utilized by the session. Destination Port (dport) Destination port utilized by the session. IP Protocol (proto) IP protocol associated with the session. Action (action) Action taken for the session; possible values are: • allow—session was allowed by policy • deny—session was denied by policy PAN-OS® Administrator’s Guide Version 10.2 676 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
676
Monitoring Field Name Description GTP Event Type (event_type) Defines event triggered by a GTP message when checks in GTP protection profile are applied to the GTP traffic. Also triggered by the start or end of a GTP session. MSISDN (msisdn) Service identity associated with the mobile subscriber composed of a Country Code, National Destination Code and a Subscriber. Consists of decimal digits (0-9) only with a maximum of 15 digits. Access Point Name (apn) Reference to a Packet Data Network Data Gateway (PGW)/ Gateway GPRS Support Node in a mobile network. Composed of a mandatory APN Network Identifier and an optional APN Operator Identifier. Radio Access Technology (rat) Type of technology used for radio access. For example, EUTRAN, WLAN, Virtual, HSPA Evolution, GAN and GERAN. GTP Message Type (msg_type) Indicates the GTP message type. End IP Address (end_ip_adr) IP address of a mobile subscriber allocated by a PGW/GGSN. Tunnel Endpoint Identifier1 (teid1) Identifies the GTP tunnel in the network node. TEID1 is the first TEID in the GTP message. Tunnel Endpoint Identifier2 (teid2) Identifies the GTP tunnel in the network node. TEID2 is the second TEID in the GTP message. GTP Interface (gtp_interface) 3GPP interface from which a GTP message is received. GTP Cause (cause_code) GTP cause value in logs responses which contain an Information Element that provides information about acceptance or rejection of GTP requests by a network node. Severity (severity) Severity associated with the event; values are informational, low, medium, high, critical. Serving Network MCC (mcc) Mobile country code of serving core network operator. Serving Network MNC (mnc) Mobile network code of serving core network operator. Area Code (area_code) Area within a Public Land Mobile Network (PLMN). Cell ID (cell_id) Base station within an area code. PAN-OS® Administrator’s Guide Version 10.2 677 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
677
Monitoring Field Name Description GTP Event Code (event_code) Event code describing the GTP event. Source Location (srcloc) Source country or Internal region for private addresses; maximum length is 32 bytes. Destination Location (dstloc) Destination country or Internal region for private addresses; maximum length is 32 bytes. Tunnel ID/IMSI (imsi) International Mobile Subscriber Identity (IMSI) is a unique number allocated to each mobile subscriber in the GSM/ UMTS/EPS system. IMSI shall consist of decimal digits (0 through 9) only and maximum number of digits allowed are 15. Monitor Tag/IMEI (imei) International Mobile Equipment Identity (IMEI) is a unique 15 or 16 digit number allocated to each mobile station equipment. Start Time (start) Time of session start. Elapsed Time (elapsed) Elapsed time of the session. Tunnel Inspection Rule (tunnel_insp_rule) Name of the tunnel inspection rule matching the cleartext tunnel traffic Remote User IP (remote_user_ip) IPv4 or IPv6 address used by a remote user. Remote User ID (remote_user_id) IMSI identity of a remote user, and if available, one IMEI identity and/or one MSISDN identity. UUID for rule (rule_uuid) Universally Unique ID for rule. PCAP ID (pcap_id) Unique packet capture ID that is used to locate the pcap file saved on the firewall. High Resolution Timestamp (high_res_timestamp) Time in milliseconds the log was received at the management plane. The format for this new field is YYYY-MM-DDThh:ss:sssTZD: • YYYY—Four digit year • MM—Two-digit month • DD—Two-digit day of the month (01 through 31) • T—Indicator for the beginning of the timestamp • hh—Two-digit hour using 24-hour time (00 through 23) • mm—Two-digit minute (00 through 59) PAN-OS® Administrator’s Guide Version 10.2 678 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
678
Monitoring Field Name Description • ss—Two-digit second (00 through 60) • sss—One or more digits for millisecond • TZD—Time zone designator (+hh:mm or -hh:mm) The High Resolution Timestamp is supported for logs received from managed firewalls running PAN-OS 10.2 and later releases. Logs received from managed firewalls running PAN-OS 9.1 and earlier releases display a 1969-12-31T16:00:00:000-8:00 timestamp regardless of when the log was received. A Slice Service Type (nsdsai_sst) The A Slice Service Type of the Network Slice ID. A Slice Differentiator (nsdsai_sd) The A Slice Differentiator of the Network Slice ID. Application Subcategory (subcategory_of_app) The application subcategory specified in the application configuration properties. Application Category (category_of_app) The application category specified in the application configuration properties. Values are: • business-systems • collaboration • general-internet • media • networking • saas Application Technology (technology_of_app) The application technology specified in the application configuration properties. Values are: • browser-based • client-server • network-protocol • peer-to-peer Application Risk (risk_of_app) Risk level associated with the application (1=lowest to 5=highest). Application Characteristic (characteristic_of_app) Comma-separated list of applicable characteristic of the application PAN-OS® Administrator’s Guide Version 10.2 679 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
679
Monitoring Field Name Description Application Container (container_of_app) The parent application for an application. Application SaaS (is_saas_of_app) Displays 1 if a SaaS application or 0 if not a SaaS application. Application Sanctioned State (sanctioned_state_of_app) Displays 1 if application is sanctioned or 0 if application is not sanctioned. Application Subcategory (subcategory_of_app) The application subcategory specified in the application configuration properties. Audit Log Fields Where Can I Use This? What Do I Need? • Next-Gen Firewall • Panorama™ management server Support license (Panorama) Device management license Format: Serial Number, Generate Time, Threat/Content Type, FUTURE_USE, Event ID, Object, CLI Command, Severity Field Name Description Serial Number Serial number of the firewall or Panorama that generated the log. Generate Time Time the log was generated on the dataplane. Threat/Content Type (subtype) Specifies the type of log; value is AUDIT. Audit logs are a subytpe of System logs. Event ID Source of the command that generated the audit log. Values include the following as a source of the command: • cli—Firewall or Panorama command line. • gui—Navigation in the firewall or Panorama web interface. • gui-op—Operational command from the firewall or Panorama web interface. • gnmi—OpenConfig plugin. • rest—PAN-OS REST API. PAN-OS® Administrator’s Guide Version 10.2 680 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
680
Monitoring Field Name Description Object Name of the administrator which executed the command that generated the log. CLI Command Command executed that generated the log. Severity Completion status for the command that generated the log; value can be none, success, or failure. Syslog Severity The syslog severity is set based on the log type and contents. Log Type/Severity Syslog Severity Traffic Info Config Info Threat/System— Informational Info Threat/System—Low Notice Threat/System—Medium Warning Threat/System—High Warning Threat/System—Critical Critical Custom Log/Event Format To facilitate the integration with external log parsing systems, the firewall allows you to customize the log format; it also allows you to add custom Key: Value attribute pairs. Custom message formats can be configured under Device > Server Profiles > Syslog > Syslog Server Profile > Custom Log Format. To achieve ArcSight Common Event Format (CEF) compliant log formatting, refer to the CEF Configuration Guide. Escape Sequences Any field that contains a comma or a double-quote is enclosed in double quotes. Furthermore, if a double-quote appears inside a field it is escaped by preceding it with another double-quote. To maintain backward compatibility, the Misc field in threat log is always enclosed in double-quotes. PAN-OS® Administrator’s Guide Version 10.2 681 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
681
Monitoring SNMP Monitoring and Traps The following topics describe how Palo Alto Networks firewalls, Panorama, and WF-500 appliances implement SNMP, and the procedures to configure SNMP monitoring and trap delivery. • SNMP Support • Use an SNMP Manager to Explore MIBs and Objects • Enable SNMP Services for Firewall-Secured Network Elements • Monitor Statistics Using SNMP • Forward Traps to an SNMP Manager • Supported MIBs SNMP Support You can use an SNMP manager to monitor event-driven alerts and operational statistics for the firewall, Panorama, or WF-500 appliance and for the traffic they process. The statistics and traps can help you identify resource limitations, system changes or failures, and malware attacks. You configure alerts by forwarding log data as traps, and enable the delivery of statistics in response to GET messages (requests) from your SNMP manager. Each trap and statistic has an object identifier (OID). Related OIDs are organized hierarchically within the Management Information Bases (MIBs) that you load into the SNMP manager to enable monitoring. When an event triggers SNMP trap generation (for example, an interface goes down), the firewall, Panorama virtual appliance, M-Series appliance, and WF-500 appliance respond by updating the corresponding SNMP object (for example, the interfaces MIB) instead of waiting for the periodic update of all objects that occurs every ten seconds. This ensures that your SNMP manager displays the latest information when polling an object to confirm an event. The firewall, Panorama, and WF-500 appliance support SNMP Version 2c and Version 3. Decide which to use based on the version that other devices in your network support and on your network security requirements. SNMPv3 is more secure and enables more granular access control for system statistics than SNMPv2c. The following table summarizes the security features of each version. You select the version and configure the security features when you Monitor Statistics Using SNMP and Forward Traps to an SNMP Manager. SNMPVersion Authentication Message Privacy MessageIntegrity MIB Access Granularity SNMPv2cCommunity string No (cleartext) No SNMP community access for all MIBs on a device SNMPv3 EngineID, username, and authentication password (SHA Privacy password for AES (128, 192, or 256) encryption Yes User access based on views that include or exclude specific OIDs PAN-OS® Administrator’s Guide Version 10.2 682 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
682
Monitoring SNMPVersion Authentication Message Privacy MessageIntegrity MIB Access Granularity hashing for the password) of SNMP messages SNMP Implementation illustrates a deployment in which firewalls forward traps to an SNMP manager while also forwarding logs to Log Collectors. Alternatively, you could configure the Log Collectors to forward the firewall traps to the SNMP manager. For details on these deployments, refer to Log Forwarding Options in Centralized Logging and Reporting. In all deployments, the SNMP manager gets statistics directly from the firewall, Panorama, or WF-500 appliance. In this example, a single SNMP manager collects both traps and statistics, though you can use separate managers for these functions if that better suits your network. Figure 2: SNMP Implementation Use an SNMP Manager to Explore MIBs and Objects To use SNMP for monitoring Palo Alto Networks firewalls, Panorama, or WF-500 appliances, you must first load the Supported MIBs into your SNMP manager and determine which object identifiers (OIDs) correspond to the system statistics and traps you want to monitor. The following topics provide an overview of how to find OIDs and MIBs in an SNMP manager. For the specific steps to perform these tasks, refer to your SNMP management software. • Identify a MIB Containing a Known OID PAN-OS® Administrator’s Guide Version 10.2 683 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
683
Monitoring • Walk a MIB • Identify the OID for a System Statistic or Trap Identify a MIB Containing a Known OID If you already know the OID for a particular SNMP object (statistic or trap) and want to know the OIDs of similar objects so you can monitor them, you can explore the MIB that contains the known OID. STEP 1 | Load all the Supported MIBs into your SNMP manager. STEP 2 | Search the entire MIB tree for the known OID. The search result displays the MIB path for the OID, as well as information about the OID (for example, name, status, and description). You can then select other OIDs in the same MIB to see information about them. STEP 3 | (Optional) Walk a MIB to display all its objects. Walk a MIB If you want to see which SNMP objects (system statistics and traps) are available for monitoring, displaying all the objects of a particular MIB can be useful. To do this, load the Supported MIBs into your SNMP manager and perform a walk on the desired MIB. To list the traps that Palo Alto Networks firewalls, Panorama, and WF-500 appliance support, walk the panCommonEventEventsV2 MIB. In the following example, walking the PAN-COMMON-MIB.my displays the following list of OIDs and their values for certain statistics: PAN-OS® Administrator’s Guide Version 10.2 684 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
684
Monitoring Identify the OID for a System Statistic or Trap To use an SNMP manager for monitoring Palo Alto Networks firewalls, Panorama, or WF-500 appliances, you must know the OIDs of the system statistics and traps you want to monitor. STEP 1 | Review the Supported MIBs to determine which one contains the type of statistic you want. For example, the PAN-COMMON-MIB.my contains hardware version information. The panCommonEventEventsV2 MIB contains all the traps that Palo Alto Networks firewalls, Panorama, and WF-500 appliances support. STEP 2 | Open the MIB in a text editor and perform a keyword search. For example, using Hardware version as a search string in PAN-COMMON-MIB identifies the panSysHwVersion object: panSysHwVersion OBJECT-TYPE SYNTAX DisplayString (SIZE(0..128)) MAX-ACCESS read-only STATUS current DESCRIPTION "Hardware version of the unit." ::= {panSys 2} PAN-OS® Administrator’s Guide Version 10.2 685 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
685
Monitoring STEP 3 | In a MIB browser, search the MIB tree for the identified object name to display its OID. For example, the panSysHwVersion object has an OID of 1.3.6.1.4.1.25461.2.1.2.1.2. Enable SNMP Services for Firewall-Secured Network Elements If you will use Simple Network Management Protocol (SNMP) to monitor or manage network elements (for example, switches and routers) that are within the security zones of Palo Alto Networks firewalls, you must create a security rule that allows SNMP services for those elements. You don’t need a security rule to enable SNMP monitoring of Palo Alto Networks firewalls, Panorama, or WF-500 appliances. For details, see Monitor Statistics Using SNMP. STEP 1 | Create an application group. 1. Select Objects > Application Group and click Add. 2. Enter a Name to identify the application group. 3. Click Add, type snmp, and select snmp and snmp-trap from the drop-down. 4. Click OK to save the application group. STEP 2 | Create a security rule to allow SNMP services. 1. Select Policies > Security and click Add. 2. In the General tab, enter a Name for the rule. 3. In the Source and Destination tabs, click Add and enter a Source Zone and a Destination Zone for the traffic. 4. In the Applications tab, click Add, type the name of the applications group you just created, and select it from the drop-down. 5. In the Actions tab, verify that the Action is set to Allow, and then click OK and Commit. Monitor Statistics Using SNMP The statistics that a Simple Network Management Protocol (SNMP) manager collects from Palo Alto Networks firewalls can help you gauge the health of your network (systems and PAN-OS® Administrator’s Guide Version 10.2 686 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
686
Monitoring connections), identify resource limitations, and monitor traffic or processing loads. The statistics include information such as interface states (up or down), active user sessions, concurrent sessions, session utilization, temperature, and system uptime. You can’t configure an SNMP manager to control Palo Alto Networks firewalls (using SET messages), only to collect statistics from them (using GET messages). For details on how SNMP is implemented for Palo Alto Networks firewalls, see SNMP Support. STEP 1 | Configure the SNMP Manager to get statistics from firewalls. The following steps provide an overview of the tasks you perform on the SNMP manager. For the specific steps, refer to the documentation of your SNMP manager. 1. To enable the SNMP manager to interpret firewall statistics, load the Supported MIBs for Palo Alto Networks firewalls and, if necessary, compile them. 2. For each firewall that the SNMP manager will monitor, define the connection settings (IP address and port) and authentication settings (SNMPv2c community string or SNMPv3 EngineID/username/password) for the firewall. All Palo Alto Networks firewalls use port 161. The SNMP manager can use the same or different connection and authentication settings for multiple firewalls. The settings must match those you define when you configure SNMP on the firewall (see Step 3). For example, if you use SNMPv2c, the community string you define when configuring the firewall must match the community string you define in the SNMP manager for that firewall. 3. Determine the object identifiers (OIDs) of the statistics you want to monitor. For example, to monitor the session utilization percentage of a firewall, a MIB browser shows that this statistic corresponds to OID 1.3.6.1.4.1.25461.2.1.2.3.1.0 in PAN￾COMMON-MIB.my. For details, see Use an SNMP Manager to Explore MIBs and Objects. 4. Configure the SNMP manager to monitor the desired OIDs. STEP 2 | Enable SNMP traffic on a firewall interface. This is the interface that will receive statistics requests from the SNMP manager. PAN-OS doesn’t synchronize management (MGT) interface settings for firewalls in a high availability (HA) configuration. You must configure the interface for each HA peer. Perform this step in the firewall web interface. • To enable SNMP traffic on the MGT interface, select Device > Setup > Interfaces, edit the Management interface, select SNMP, and then click OK and Commit. • To enable SNMP traffic on any other interface, create an interface management profile for SNMP services and assign the profile to the interface that will receive the SNMP requests. The interface type must be Layer 3 Ethernet. PAN-OS® Administrator’s Guide Version 10.2 687 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
687
Monitoring STEP 3 | Configure the firewall to respond to statistics requests from an SNMP manager. PAN-OS doesn’t synchronize SNMP response settings for firewalls in a high availability (HA) configuration. You must configure these settings for each HA peer. 1. Select Device > Setup > Operations and, in the Miscellaneous section, click SNMP Setup. 2. Select the SNMP Version and configure the authentication values as follows. For version details, see SNMP Support. • V2c—Enter the SNMP Community String, which identifies a community of SNMP managers and monitored devices, and serves as a password to authenticate the community members to each other. As a best practice, don’t use the default community string public; it’s well known and therefore not secure. • V3—Create at least one SNMP view group and one user. User accounts and views provide authentication, privacy, and access control when firewalls forward traps and SNMP managers get firewall statistics. • Views—Each view is a paired OID and bitwise mask: the OID specifies a MIB and the mask (in hexadecimal format) specifies which objects are accessible within (include matching) or outside (exclude matching) that MIB. Click Add in the first list and enter a Name for the group of views. For each view in the group, click Add and configure the view Name, OID, matching Option (include or exclude), and Mask. • Users—Click Add in the second list, enter a username under Users, select the View group from the drop-down, enter the authentication password (Auth Password) used to authenticate to the SNMP manager, and enter the privacy password (Priv Password) used to encrypt SNMP messages to the SNMP manager. 3. Click OK and Commit. STEP 4 | Monitor the firewall statistics in an SNMP manager. Refer to the documentation of your SNMP manager for details. When monitoring statistics related to firewall interfaces, you must match the interface indexes in the SNMP manager with interface names in the firewall web interface. For details, see Firewall Interface Identifiers in SNMP Managers and NetFlow Collectors. Forward Traps to an SNMP Manager Simple Network Management Protocol (SNMP) traps can alert you to system events (failures or changes in hardware or software of Palo Alto Networks firewalls) or to threats (traffic that matches a firewall security rule) that require immediate attention. PAN-OS® Administrator’s Guide Version 10.2 688 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
688
Monitoring To see the list of traps that Palo Alto Networks firewalls support, use your SNMP Manager to access the panCommonEventEventsV2 MIB. For details, see Use an SNMP Manager to Explore MIBs and Objects. For details on how for Palo Alto Networks firewalls implement SNMP, see SNMP Support. STEP 1 | Enable the SNMP manager to interpret the traps it receives. Load the Supported MIBs for Palo Alto Networks firewalls and, if necessary, compile them. For the specific steps, refer to the documentation of your SNMP manager. STEP 2 | Configure an SNMP Trap server profile. The profile defines how the firewall accesses the SNMP managers (trap servers). You can define up to four SNMP managers for each profile. Optionally, configure separate SNMP Trap server profiles for different log types, severity levels, and WildFire verdicts. 1. Log in to the firewall web interface. 2. Select Device > Server Profiles > SNMP Trap. 3. Click Add and enter a Name for the profile. 4. If the firewall has more than one virtual system (vsys), select the Location (vsys or Shared) where this profile is available. 5. Select the SNMP Version and configure the authentication values as follows. For version details, see SNMP Support. • V2c—For each server, click Add and enter the server Name, IP address (SNMP Manager), and Community String. The community string identifies a community of SNMP managers and monitored devices, and serves as a password to authenticate the community members to each other. As a best practice, don’t use the default community string public; it’s well known and therefore not secure. • V3—For each server, click Add and enter the server Name, IP address (SNMP Manager), SNMP User account (this must match a username defined in the SNMP manager), EngineID used to uniquely identify the firewall (you can leave the field blank to use the firewall serial number), authentication password (Auth Password) used to authenticate to the server, and privacy password (Priv Password) used to encrypt SNMP messages to the server. 6. Click OK to save the server profile. PAN-OS® Administrator’s Guide Version 10.2 689 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
689
Monitoring STEP 3 | Configure log forwarding. 1. Configure the destinations of Traffic, Threat, and WildFire traps: 1. Create a Log Forwarding profile. For each log type and each severity level or WildFire verdict, select the SNMP Trap server profile. 2. Assign the Log Forwarding profile to policy rules and network zones. The rules and zones will trigger trap generation and forwarding. 2. Configure the destinations for System, Configuration, User-ID, HIP Match, and Correlation logs. For each log (trap) type and severity level, select the SNMP Trap server profile. 3. Click Commit. STEP 4 | Monitor the traps in an SNMP manager. Refer to the documentation of your SNMP manager. When monitoring traps related to firewall interfaces, you must match the interface indexes in the SNMP manager with interface names in the firewall web interface. For details, see Firewall Interface Identifiers in SNMP Managers and NetFlow Collectors. Supported MIBs The following table lists the Simple Network Management Protocol (SNMP) management information bases (MIBs) that Palo Alto Networks firewalls, Panorama, and WF-500 appliances support. You must load these MIBs into your SNMP manager to monitor the objects (system statistics and traps) that are defined in the MIBs. For details, see Use an SNMP Manager to Explore MIBs and Objects. MIB Type Supported MIBs Standard—The Internet Engineering Task Force (IETF) maintains most standard MIBs. You can download the MIBs from the IETF website. MIB-II IF-MIB HOST-RESOURCES-MIB ENTITY-MIB ENTITY-SENSOR-MIB ENTITY-STATE-MIB PAN-OS® Administrator’s Guide Version 10.2 690 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
690
Monitoring MIB Type Supported MIBs Palo Alto Networks firewalls, Panorama, and WF-500 appliances don’t support every object (OID) in every one of these MIBs. See the Supported MIBs links for an overview of the supported OIDs. IEEE 802.3 LAG MIB LLDP-V2-MIB.my BFD-STD-MIB Enterprise—You can download the enterprise MIBs from the Palo Alto Networks Technical Documentation portal. PAN-COMMON-MIB.my PAN-GLOBAL-REG-MIB.my PAN-GLOBAL-TC-MIB.my PAN-LC-MIB.my PAN-PRODUCT-MIB.my PAN-ENTITY-EXT-MIB.my PAN-TRAPS.my MIB-II MIB-II provides object identifiers (OIDs) for network management protocols in TCP/IP-based networks. Use this MIB to monitor general information about systems and interfaces. For example, you can analyze trends in bandwidth usage by interface type (ifType object) to determine if the firewall needs more interfaces of that type to accommodate spikes in traffic volume. Palo Alto Networks firewalls, Panorama, and WF-500 appliances support only the following object groups: Object Group Description system Provides system information such as the hardware model, system uptime, FQDN, and physical location. interfaces Provides statistics for physical and logical interfaces such as type, current bandwidth (speed), operational status (for example, up or down), and discarded packets. Logical interface support includes VPN PAN-OS® Administrator’s Guide Version 10.2 691 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf