Palo Alto Networks Panorama Plugin for Threat Exchange

Palo Alto Networks Panorama Plugin for Threat Exchange

This document explains how to configure the Palo Alto Networks Panorama integration with the Threat Exchange module of the Netskope Cloud Exchange platform. The Palo Alto Networks Panorama plugin retrieves information about domains, IP addresses, filehases (SHA256) from Wildfire logs, and URLs from URL-Filtering logs.

Prerequisites

To complete this configuration, you need:

  • A Netskope tenant (or multiple, for example, production and development/test instances) that is already configured in Cloud Exchange..
  • A Netskope Cloud Exchange tenant with the Threat Exchange module already configured.
  • A Panorama Base URL and API Key.
  • Permissions needed for plugin. The API Key needs to have XML API permissions available to pull the indicators. Follow this document for the Panorama platform to give permission to your user.
Panorama Plugin Support
PullYes
PushNo

Workflow

  1. Get your Panorama Base URL and API Key.
  2. Configure the Panorama plugin
  3. Validate the Panorama plugin.

Click play to watch a video.

 

Get your Panorama Base URL and API Key

  1. Base URL
    • The URL of their Palo Alto Networks instance should be the Base URL for the configuration parameters.
    • For example: https://<your-panorama-domain>
  2. API Key
    • Get API Key by following the steps mentioned in this document.

Configure the Palo Alto Networks Panorama Plugin

  1. In Cloud Exchange, go to Settings > Plugins.
  2. Search for and select the Palo Alto Networks Panorama box to open the plugin creation page.
    image2.png
  3. Enter these parameters:
    • Configuration Name: Unique name for the configuration.Sync Interval: Leave Default.Aging Criteria: Leave Default.Override Reputation: Leave Default.Enable SSL verification: Enable if SSL verification is required for communication.Use System Proxy: Enable if the proxy is required for communication.
    image3.png
  4. Click Next.
  5. Enter your Panorama Base URL and API Key.
    image5.png
  6. Select the Type of Threat Data. (Select Malware if you want to pull only file hashes or URL; if you want to pull only URLs, and select Both if you want to pull both.
  7. Enter an Initial Range (how many days of indicators you want to pull initially.
  8. Click Save.
    image6.png
  9. Now plugin is configured and you’ll see plugin configuration in Threat Exchange > Plugins.

Validate the Palo Alto Networks Panorama Plugin

Validate in Cloud Exchange
  1. Go to Threat Exchange > Threat IoCs.
  2. Here you’ll see all the IoCs that are fetched from Palo Alto Networks Panorama.
    image7.png
Validate in Panorama
  1. Go to Monitor > Wildfire Submissions. File hashes are fetched from this page. So, if this logs appear here, then indicators will be pulled in Netskope CE.
    image8.png
  2. Go to Monitor > URL Filtering. File hashes are fetched from this page. So, if logs are available in this page, then it will be fetched as an indicator in Netskope CE.
    image9.png

Troubleshooting Panorama

First seen time and Last seen time will be converted automatically according to local time zone of the device.

Limitation with Panorama

We only support pulling 100k indicators as of now, which takes around 2 and a half hours to pull and then a few more hours to store in CE. If the indicators to be pulled is greater than 100k you might start to see some performance issues in CE, like indicators taking too long to be fetched, CE taking time to respond, etc. This issue will be fixed in the next release of CE.

Share this Doc

Palo Alto Networks Panorama Plugin for Threat Exchange

Or copy link

In this topic ...