Palo Alto Networks® next-generation firewalls inspect all traffic (including applications, threats, and content), and tie that traffic to the user, regardless of location or device type. The user, application, and content—the elements that run your business—become integral components of your enterprise security policy. This allows you to align security with your business policies, as well as write rules that are easy to understand and maintain.
This integration relies on Syslog. Logs received via Syslog are parsed and correlated by UTMStack automatically.