Skip to main content
Version: 2.0.0

Palo Alto Cortex XDR Integrations

 Palo Alto Cortex XDR Integrations

Methodology: Syslog

Process: Barracuda email protection Syslog logs will be exported to a Syslog server. From that Syslog server, logs will be transferred to Zeron via Zensor. 


To send Cortex XDR notifications to your Syslog server, you need to define the settings for the Syslog receiver from which you want to send notifications.

  1. Before you define the Syslog settings, enable access to the following Cortex XDR IP addresses for your deployment region in your firewall configurations:

    United States - Americas (US)-
    Germany (DE)-
    Netherlands - Europe (EU)-
    Canada (CA)-
    United Kingdom (UK)-
    Singapore (SG)-
    Japan (JP)-
    Australia (AU)-
    United States - Government-
    India (IN)-
    Switzerland (CH)-
  1. Select Settings → Configurations → Integrations → External Applications.

  2. In Syslog Servers, add a + New Server.

  3. Define the Syslog server parameters:

    • Name—Unique name for the server profile.

    • Destination—IP address or fully qualified domain name (FQDN) of the Syslog server.

    • Port—The port number on which to send Syslog messages.

    • Facility—Choose one of the Syslog standard values. The value maps to how your Syslog server uses the facility field to manage messages. For details on the facility field, see RFC 5424.

    • Protocol—Select a method of communication with the Syslog server:

      1. TCP—No validation is made on the connection with the Syslog server. However, if an error occurred with the domain used to make the connection, the Test connection will fail.

      2. UDP—Cortex XDR runs a validation to ensure connection was made with the syslog server.

      3. TCP + SSL—Cortex XDR validates the syslog server certificate and uses the certificate signature and public key to encrypt the data sent over the connection.

    • Certificate—The communication between Cortex XDR and the Syslog destination can use TLS. In this case, upon connection, Cortex XDR validates that the Syslog receiver has a certificate signed by either a trusted root CA or a self-signed certificate. You may need to merge the Root and Intermediate certificate if you receive a certificate error when using a public certificate. Up to TLS 1.2 is supported.
      If your Syslog receiver uses a self-signed CA, Browse and upload your self-signed Syslog receiver CA.
      Make sure the self-signed CA includes your public key. If you only use a trusted root CA leave the Certificate field empty.

    • Ignore Certificate Error—Cortex XDR does not recommend, but you can choose to select this option to ignore certificate errors if they occur. This will forward alerts and logs even if the certificate contains errors.

  4. Test the parameters to ensure a valid connection and create when ready. You can define up to five Syslog servers. Upon success, the table displays the Syslog servers and their status.

  5. (Optional) Manage your Syslog server connection. In the Syslog Servers table

  • Locate your Syslog server and right-click to Send text message to test the connection. Cortex XDR sends a message to the defined Syslog server which you can check to see if the test message indeed arrived.
    If the message doesn’t arrive, Cortex XDR displays an error. View the error details and suggested solutions in Syslog Server Test Message Errors.
  • Locate the Status field.
    The Status field displays a Valid or Invalid TCP connection. Cortex XDR tests connection with the Syslog server every 10min.