Palo Alto GlobalProtect Integration
Overview
Palo Alto GlobalProtect provides secure remote access VPN with HIP checking. KYRA MDR collects GlobalProtect logs through PAN-OS syslog. Supports GlobalProtect 5.x and 6.x.
Prerequisites
- A KYRA MDR Collector installed and running
- Palo Alto NGFW configured as GlobalProtect gateway/portal
- Syslog configured on the NGFW
- GlobalProtect gateway and portal configured
Configuration
GlobalProtect events are forwarded through PAN-OS syslog:
- Ensure syslog is configured (see Palo Alto NGFW integration)
- Configure log forwarding under Objects > Log Forwarding:
| Log Type | Forwarding |
|---|---|
| System | KYRA-MDR syslog profile |
| Authentication | KYRA-MDR syslog profile |
| GlobalProtect | KYRA-MDR syslog profile |
| HIP Match | KYRA-MDR syslog profile |
- Apply the log forwarding profile to security policies
- Commit the configuration
PAN-OS CLI Configuration
You can configure syslog forwarding and log profiles directly from the PAN-OS CLI:
# Configure a syslog server profileset shared log-settings syslog kyra-mdr-syslog server kyra-collector \ server <COLLECTOR_IP> \ transport TCP \ port 514 \ format BSD \ facility LOG_USER
# Create a log forwarding profileset shared log-settings profiles kyra-gp-profile \ match-list gp-auth-logs \ log-type auth \ send-syslog kyra-mdr-syslog \ filter "All Logs"
set shared log-settings profiles kyra-gp-profile \ match-list gp-system-logs \ log-type system \ send-syslog kyra-mdr-syslog \ filter "All Logs"
set shared log-settings profiles kyra-gp-profile \ match-list gp-globalprotect-logs \ log-type globalprotect \ send-syslog kyra-mdr-syslog \ filter "All Logs"
set shared log-settings profiles kyra-gp-profile \ match-list gp-hipmatch-logs \ log-type hipmatch \ send-syslog kyra-mdr-syslog \ filter "All Logs"
# Apply the profile to a security policy ruleset rulebase security rules allow-vpn-traffic \ log-setting kyra-gp-profile
# Commit the configurationcommitVerify Log Forwarding
# Show syslog server profileshow log-settings syslog
# Show log forwarding profileshow log-settings profiles
# On the KYRA Collector, verify incoming GlobalProtect logssudo tcpdump -i any port 514 -A | grep -i "globalprotect"Collected Log Types
| Log Type | Description | Security Use |
|---|---|---|
| GlobalProtect Login | VPN authentication events | Access monitoring |
| GlobalProtect Logout | VPN disconnection events | Session tracking |
| HIP Check | Host information profile results | Endpoint compliance |
| Gateway Selection | Gateway assignment events | Load balancing monitoring |
| Config Sync | Portal-gateway config sync | Configuration integrity |
| Satellite | GlobalProtect satellite events | Site-to-site VPN monitoring |
Troubleshooting
No GlobalProtect logs: Verify the log forwarding profile includes the GlobalProtect log type.
Missing HIP data: HIP Match logs require HIP profiles configured and assigned to policies.
Multi-gateway: Each gateway generates independent logs. Configure syslog on all gateways.
Contact kyra@seekerslab.com for support.