Connect this data source on your own, using the Hunters platform.
TL;DR
Supported data types | 3rd party detection | Hunters detection | IOC search | Search | Table name | Log format | Collection method |
---|---|---|---|---|---|---|---|
PAN Firewall Threat Strata Logs | ✅ | ✅ | ✅ | pan_firewall_threat | NDJSON | S3-LIST | |
PAN Firewall Global Protect Strata Logs | ✅ | ✅ | ✅ | pan_firewall_globalprotect | NDJSON | S3-LIST | |
PAN Firewall Traffic Strata Logs | ✅ | ✅ | ✅ | pan_firewall_traffic | NDJSON | S3-LIST |
Overview
This article explains how to connect your Palo Alto Strata Logs.
Strata Logging Service compresses logs using Snappy, and these logs are forwarded to AWS S3 in JSON format. The logs are compressed using Snappy for efficient storage and transfer. It’s an important key here - the decompression and processing of the JSON data are handled by the user, and not by Hunters.
Strata data is sent compressed using the “Snappy” algorithm. Today, this algorithm is not supported by Hunters. What our customers can do is stream the information to a bucket, and use a lambda function to decompress it and send it to the actual S3 bucket Hunters reads from.
We will update all of our customers on this page, once Snappy compression would be natively supported in the Hunters portal in the near future (Beginning of 2026).
Palo Alto Networks Strata Logging Service provides cloud-based, centralized log storage and aggregation for your on premise, virtual (private cloud and public cloud) firewalls, for Prisma Access, and for cloud-delivered services such as Cortex XDR.
Strata Logging Service is secure, resilient, and fault-tolerant, and it ensures your logging data is up-to-date and available when you need it. It provides a scalable logging infrastructure that alleviates the need for you to plan and deploy Log Collectors to meet your log retention needs. If you already have on premise Log Collectors, the new Strata Logging Service can easily complement your existing setup. You can augment your existing log collection infrastructure with the cloud-based Strata Logging Service to expand operational capacity.
Strata Logging Service interacts with several different products. Some products send logs to Strata Logging Service, while others use it to view and analyze the log data.
Integrating PAN Strata into Hunters allows the collection and ingestion of key data types into the data lake. Furthermore, alerts will be created over the logs, auto-investigated, and correlated to other related signals.
Supported data types
PAN Firewall Threat Strata Logs
Overview
Table name: pan_firewall_threat
PAN Firewall Threat Strata Logs are security event records generated by Palo Alto Networks' Next-Generation Firewall (NGFW) platform, part of the Strata product line. These logs capture detailed information about malicious activity detected in network traffic, including exploits, malware, spyware, and command-and-control communications. By inspecting and analyzing data at the application and content level, Threat Strata Logs enable precise threat identification and policy enforcement across the network. The logs integrate seamlessly with Hunters’ SIEM and threat intelligence platform, supporting real-time visibility, forensic investigations, and incident response. With granular insights and customizable logging policies, PAN Firewall Threat Strata Logs empower organizations to detect, block, and remediate advanced threats while maintaining robust network security.
Send data to Hunters
PAN Firewall Threat Strata Logs
To connect PAN Firewall Threat Strata Logs :
Please follow these:
📘Note
When performing the last part of the process (Provide information to Hunters), follow these steps:
Navigate to Data > Data Sources, and then click + Connect Data Sources.
Search for Palo Alto Networks and click Connect.
From the side-menu, click + More Integrations and then select PAN VIA S3 LIST → PAN Firewall Threat Decoded Strata By Snappy
📘Note
When setting up the connection on the Hunters platform, in the Bucket name field insert the Storage path provided in the Cortex console, without the
gs://
prefix.For example, if the storage path value on your PAN Firewall GlobalProtect console is:
gs://pan-strata-de-abcdefghijk-event-forwarding
then you should enter
pan-strata-de-abcdefghijk-event-forwarding
into the Bucket name field on the Hunters portal.
Expected format
Logs are expected in JSON format.
{"TimeReceived":"2025-05-29T05:27:26.000000Z","DeviceSN":"no-serial","LogType":"THREAT","Subtype":"spyware","ConfigVersion":"10.2","TimeGenerated":"2025-05-29T05:27:14.000000Z","SourceAddress":"10.10.161.97","DestinationAddress":"10.10.161.1","NATSource":"","NATDestination":"","Rule":"Mobile users - internal dns ping - no log","SourceUser":"matone\\aalderweireldt","DestinationUser":null,"Application":"dns-base","VirtualLocation":"vsys1","FromZone":"trust","ToZone":"trust","InboundInterface":"tunnel.1","OutboundInterface":"tunnel.1","LogSetting":"Log_only_threats_to_panorama","SessionID":1606508,"RepeatCount":1,"SourcePort":52982,"DestinationPort":53,"NATSourcePort":0,"NATDestinationPort":0,"Protocol":"udp","Action":"alert","FileName":"www.tr.news","ThreatID":"Parked:tr.news(109010003)","VendorSeverity":"Informational","DirectionOfAttack":"client to server","SequenceNo":7487050375535530027,"SourceLocation":"Materialise-Leuven","DestinationLocation":"Materialise-Leuven","PacketID":0,"FileHash":null,"ApplianceOrCloud":null,"URLCounter":0,"FileType":null,"SenderEmail":null,"EmailSubject":null,"RecipientEmail":null,"ReportID":0,"DGHierarchyLevel1":302,"DGHierarchyLevel2":0,"DGHierarchyLevel3":0,"DGHierarchyLevel4":0,"VirtualSystemName":"","DeviceName":"GP cloud service","SourceUUID":null,"DestinationUUID":null,"IMSI":0,"IMEI":null,"ParentSessionID":0,"ParentStarttime":"1970-01-01T00:00:00.000000Z","Tunnel":"N/A","ThreatCategory":"dns-parked","ContentVersion":"0","SigFlags":"0x0","RuleUUID":"8cb7fe52-dc38-41f8-86d9-4ec972fdaa58","HTTP2Connection":0,"DynamicUserGroupName":null,"X-Forwarded-ForIP":null,"SourceDeviceCategory":null,"SourceDeviceProfile":null,"SourceDeviceModel":null,"SourceDeviceVendor":null,"SourceDeviceOSFamily":null,"SourceDeviceOSVersion":null,"SourceDeviceHost":null,"SourceDeviceMac":null,"DestinationDeviceCategory":null,"DestinationDeviceProfile":null,"DestinationDeviceModel":null,"DestinationDeviceVendor":null,"DestinationDeviceOSFamily":null,"DestinationDeviceOSVersion":null,"DestinationDeviceHost":null,"DestinationDeviceMac":null,"ContainerID":null,"ContainerNameSpace":null,"ContainerName":null,"SourceEDL":"edl-matone-users-vpn","DestinationEDL":null,"HostID":null,"EndpointSerialNumber":null,"DomainEDL":null,"SourceDynamicAddressGroup":null,"DestinationDynamicAddressGroup":null,"PartialHash":0,"TimeGeneratedHighResolution":"2025-05-29T05:27:14.983000Z","NSSAINetworkSliceType":null}
PAN Firewall Global Protect Strata Logs
Overview
Table name: pan_firewall_globalprotect
PAN Firewall GlobalProtect Strata Logs are security and connectivity logs generated by Palo Alto Networks' GlobalProtect VPN, integrated within the Strata firewall platform. These logs provide detailed visibility into remote user activity, authentication events, tunnel establishment, and endpoint posture assessments. By recording events such as successful and failed VPN connections, gateway selection, user login attempts, and compliance status, GlobalProtect logs help organizations monitor secure access to internal resources. They also support correlation with threat and traffic logs for enhanced context during incident investigations. With native integration into centralized - Hunters’ SIEM Platform, GlobalProtect Strata Logs enable security teams to enforce access policies, detect anomalies in remote access behavior, and ensure a secure hybrid work environment.
Send data to Hunters
Hunters supports the collection of PAN Firewall Global Protect Strata Logs using S3 LIST.
To connect PAN Firewall Global Protect Strata Alerts:
Navigate to Data > Data Sources, and then click + Connect Data Sources.
Search for Palo Alto Networks and click Connect.
From the side-menu, click + More Integrations and then select PAN VIA S3 LIST → PAN Firewall Threat Decoded Strata By Snappy.
Provide the information you’ve acquired from PAN GlobalProtect bucket and complete the connection process.
📘Note
When setting up the connection on the Hunters platform, in the Bucket name field insert the Storage path provided in the Cortex console, without the gs://
prefix.
For example, if the storage path value on your PAN Firewall GlobalProtect console is:
gs://pan-strata-de-abcdefghijk-event-forwarding
then you should enter
pan-strata-de-abcdefghijk-event-forwarding
into the Bucket name field on the Hunters portal.
Expected format
Logs are expected in JSON format.
{"TimeReceived":"2025-05-29T01:35:58.000000Z","DeviceSN":"no-serial","LogType":"GLOBALPROTECT","Subtype":"globalprotect","LogSubtype":"globalprotect","ConfigVersion":"10.2","TimeGenerated":"2025-05-29T01:35:45.000000Z","VirtualSystem":"vsys1","EventIDValue":"gateway-tunnel-latency","Stage":"tunnel","AuthMethod":null,"TunnelType":null,"SourceUserName":"nikafifsholihi.rohaidi@materialise.com.my","SourceRegion":"MY","EndpointDeviceName":"KLUL-7JW0BG3","PublicIPv4":"202.186.93.7","PublicIPv6":"","PrivateIPv4":"202.186.93.7","PrivateIPv6":"","HostID":"a95e03bf-7e43-4acc-ae6b-e7907b2bbcf4","EndpointSN":"7JW0BG3","GlobalProtectClientVersion":"5.1.7","EndpointOSType":"any","EndpointOSVersion":null,"RepeatCount":1,"CountOfRepeats":1,"QuarantineReason":null,"ConnectionError":null,"Description":"Pre-tunnel latency: 36ms, Post-tunnel latency: 1ms","EventStatus":"success","GlobalProtectGatewayLocation":null,"LoginDuration":0,"ConnectionMethod":null,"ConnectionErrorID":0,"Portal":"GlobalProtect_External_Gateway","SequenceNo":7486897122491977975,"TimeGeneratedHighResolution":"2025-05-29T01:35:45.193000Z","GatewaySelectionType":"","SSLResponseTime":-1,"GatewayPriority":null,"AttemptedGateways":null,"Gateway":null,"DGHierarchyLevel1":302,"DGHierarchyLevel2":0,"DGHierarchyLevel3":0,"DGHierarchyLevel4":0,"VirtualSystemName":"","DeviceName":"GPGW_1563464_ap-southeast-1_mat","VirtualSystemID":1}
PAN Firewall Traffic Strata Logs
Overview
Table name: pan_firewall_traffic
PAN Firewall Traffic Strata Logs are foundational records generated by Palo Alto Networks' Strata firewalls that document the flow of network sessions across the enterprise. Unlike threat or system logs, Traffic Logs focus on permitted and denied connections, capturing essential metadata such as source and destination IPs, ports, applications, zones, user identities, session durations, and bytes transferred. These logs provide a comprehensive baseline for understanding normal versus anomalous traffic behavior, supporting both performance monitoring and security auditing.
By offering rich visibility into application-layer traffic—regardless of port or protocol—Traffic Strata Logs help organizations enforce granular policy controls, validate segmentation strategies, and identify shadow IT or misconfigurations. When combined with threat and URL logs, they enable full-spectrum context for incident investigation. Seamless export to Hunter's’ SIEM ensures scalable monitoring, making Traffic Strata Logs a cornerstone for both proactive security and operational oversight.
Send data to Hunters
Hunters supports the collection of PAN Firewall Traffic Strata Logs using S3-LIST.
To connect PAN Firewall Traffic logs:
Navigate to Data > Data Sources, and then click + Connect Data Sources.
Search for Palo Alto Networks and click Connect.
From the side-menu, click + More Integrations and then select PAN VIA S3 LIST → PAN Firewall Traffic Decoded Strata By Snappy.
📘Note
When setting up the connection on the Hunters platform, in the Bucket name field insert the Storage path provided in the Cortex console, without the gs://
prefix.
For example, if the storage path value on your PAN Firewall GlobalProtect console is:
gs://pan-strata-de-abcdefghijk-event-forwarding
then you should enter
pan-strata-de-abcdefghijk-event-forwarding
into the Bucket name field on the Hunters portal.
Expected format
Logs are expected in JSON format.
{"TimeReceived":"2025-05-29T04:04:36.000000Z","DeviceSN":"no-serial","LogType":"TRAFFIC","Subtype":"end","ConfigVersion":"10.2","TimeGenerated":"2025-05-29T04:04:29.000000Z","SourceAddress":"10.10.161.97","DestinationAddress":"48.209.164.47","NATSource":"208.127.123.5","NATDestination":"48.209.164.47","Rule":"Mobile users - internet access apps full check","SourceUser":"matone\\aalderweireldt","DestinationUser":null,"Application":"ssl","VirtualLocation":"vsys1","FromZone":"trust","ToZone":"untrust","InboundInterface":"tunnel.1","OutboundInterface":"ethernet1/1","LogSetting":"Log_To_Cortex","SessionID":288188,"RepeatCount":1,"SourcePort":57949,"DestinationPort":443,"NATSourcePort":29843,"NATDestinationPort":443,"Protocol":"tcp","Action":"allow","Bytes":14629,"BytesSent":4629,"BytesReceived":10000,"PacketsTotal":34,"SessionStartTime":"2025-05-29T04:04:09.000000Z","SessionDuration":0,"URLCategory":"computer-and-internet-info","SequenceNo":7487050375595088135,"SourceLocation":"Materialise-Leuven","DestinationLocation":"EU","PacketsSent":17,"PacketsReceived":17,"SessionEndReason":"tcp-fin","DGHierarchyLevel1":302,"DGHierarchyLevel2":0,"DGHierarchyLevel3":0,"DGHierarchyLevel4":0,"VirtualSystemName":"","DeviceName":"GP cloud service","ActionSource":"from-policy","SourceUUID":null,"DestinationUUID":null,"IMSI":0,"IMEI":null,"ParentSessionID":0,"ParentStarttime":"1970-01-01T00:00:00.000000Z","Tunnel":"N/A","EndpointAssociationID":72057594037927936,"ChunksTotal":0,"ChunksSent":0,"ChunksReceived":0,"RuleUUID":"8df4b318-272b-4b52-8ce5-2e93632f2021","HTTP2Connection":0,"LinkChangeCount":0,"SDWANPolicyName":null,"LinkSwitches":null,"SDWANCluster":null,"SDWANDeviceType":null,"SDWANClusterType":null,"SDWANSite":null,"DynamicUserGroupName":null,"X-Forwarded-ForIP":null,"SourceDeviceCategory":null,"SourceDeviceProfile":null,"SourceDeviceModel":null,"SourceDeviceVendor":null,"SourceDeviceOSFamily":null,"SourceDeviceOSVersion":null,"SourceDeviceHost":null,"SourceDeviceMac":null,"DestinationDeviceCategory":null,"DestinationDeviceProfile":null,"DestinationDeviceModel":null,"DestinationDeviceVendor":null,"DestinationDeviceOSFamily":null,"DestinationDeviceOSVersion":null,"DestinationDeviceHost":null,"DestinationDeviceMac":null,"ContainerID":null,"ContainerNameSpace":null,"ContainerName":null,"SourceEDL":null,"DestinationEDL":null,"GPHostID":null,"EndpointSerialNumber":null,"SourceDynamicAddressGroup":null,"DestinationDynamicAddressGroup":null,"HASessionOwner":null,"TimeGeneratedHighResolution":"2025-05-29T04:04:29.590000Z","NSSAINetworkSliceType":null,"NSSAINetworkSliceDifferentiator":null}