Secure Internet and SaaS Access (ZIA)
Adding Cloud NSS Feeds for DNS Logs
To configure a Cloud NSS feed for DNS logs:
- Go to Administration > Nanolog Streaming Service.
- In the Cloud NSS Feeds tab, click Add Cloud NSS Feed.
The Add Cloud NSS Feed window appears.
- In the Add Cloud NSS Feed window:
- Feed Name: Enter or edit the name of the feed. Each feed is a connection between NSS and your SIEM.
- NSS Type: Select NSS for Firewall.
If you have a subscription to Cloud & Branch Connector, the NSS for Firewall (NSS type) is displayed as NSS for Firewall, Cloud & Branch Connector.
- Status: It is Enabled by default. Click Disabled if you want to activate it at a later time.
- SIEM Rate: Leave as Unlimited, unless you need to throttle the output stream due to licensing or other constraints.
- SIEM Rate Limit (Events per Second): This is only applicable if you selected Limited under SIEM Rate. Enter an appropriate rate limit for the events per second that you want streamed to your SIEM. This number must be between 100 and 1,000,000. A limit that is too low for the traffic volume causes log loss.
- SIEM Type: Choose a SIEM type from the list.
- OAuth 2.0 Authentication: This setting is enabled by default if it is applicable to the SIEM type.
- Max Batch Size: Enter a size limit for an individual HTTP request payload to the SIEM's best practice.
- API URL: Enter the HTTPS URL of the SIEM log collection API endpoint.
- Key 1: Enter the key for the HTTP header.
- Value 1: Enter the token value for the HTTP header.
- Add HTTP Header: Click to add more HTTP headers (keys and values).
- Log Domain:
- If you want to configure Cloud NSS for ZIA DNS logs, choose Firewall and follow the successive steps.
- If you want to configure Cloud NSS for Cloud & Branch Connector logs, choose Cloud & Branch Connector and see Adding Cloud NSS Feeds for applicable log types.
- Log Type: Choose DNS Logs.
- Feed Output Type: The output is JSON by default. You can choose Name-Value Pairs or Tab-separated if your SIEM accepts any of these formats.
If you select JSON as the Feed Output Type, special characters such as \
present in string fields may cause a parsing issue for your SIEM. To prevent the issue, enter ,\"
as the Feed Escape Character and use hex encoded fields (e.g., %s{elogin}
instead of %s{login}
) in the Feed Output Format.
- JSON Array Notation: When JSON is selected, the JSON Array Notation setting is enabled by default. This setting allows the NSS to stream a batch of logs in a JSON Array format: Individual logs are ordered in a list, separated by commas, and surrounded by square brackets (e.g., [\{JSON1},\{JSON2}]). You can disable this setting.
- Feed Escape Character: Optionally, type a character that you want to hex encode when it appears in a URL, hostname or referrer URL. For example, type a comma (,) to encode it as
%2C
. This is useful if you are using this character as your delimiter and want to ensure it does not cause erroneous delimitation. If custom encoding was done for a record, the%s{eedone}
field isYES
for that record. - Feed Output Format: These are the fields that are displayed in the output. See NSS Feed Output Format: DNS Logs for information about the available fields and their syntax.
- Time Zone: By default, this is set to the organization's time zone. The time zone you set applies to the time field in the output file. The time zone automatically adjusts to changes in daylight savings in the specific time zone. The configured time zone can be output to the logs as a separate field. The list of time zones is derived from the IANA Time Zone database. Direct GMT offsets can also be specified.
- Define the filters:
- Action
- Policy Actions
- Allow: Use this filter to limit the logs to allowed DNS requests and responses.
- Block: Use this filter to limit the logs to DNS requests and responses that the service dropped.
- Redirect: Use this filter to limit the logs to transactions wherein the service redirected the DNS request or response.
- Request Allow: Use this filter to limit the logs to allowed DNS requests only.
- Request Block: Use this filter to limit the logs to DNS requests that the service dropped.
- Request Redirect: Use this filter to limit the logs to DNS requests that the service redirected.
- Response Allow: Use this filter to limit the logs to allowed DNS responses only.
- Response Block: Use this filter to limit the logs to DNS responses that the service dropped.
- Response Redirect: Use this filter to limit the logs to DNS responses that the service redirected.
- Rule Name: Use this filter to limit the logs based on specific rules in the DNS Control policy. Choose the rules from the list.
- Policy Actions
- Who
- Users: Use this filter to limit the logs to specific users who generated transactions. To use the Search function, enter either the username or email address in the Search box and click Search. There is no limit on the number of users that you can select. Users that are deleted after they are selected appear with a strikethrough line.
- Departments: Use this filter to limit the logs to specific departments that generated transactions. To use the Search function, enter the department name in the Search box and click Search. There is no limit on the number of departments that you can select. Departments that are deleted after they are selected appear with a strikethrough line.
- Source
- Locations: Use this filter to limit the logs to specific locations and sublocations. To use the Search function, enter the location name in the Search box and click Search. There is no limit on the number of locations that you can select. Locations that are deleted after they are selected appear with a strikethrough line.
- Client IP Addresses: Use this filter to limit the logs based on a client’s IP address. You can enter:
- An IP address (e.g., 198.51.100.100)
- A range of IP addresses (e.g., 192.0.2.1-192.0.2.10)
- An IP address with a netmask (e.g., 203.0.113.0/24)
You can enter multiple entries. Press
CloseEnter
after each entry, then click Add Items. For item lists, you can view up to 500 items on a page; filter the list by searching for a word, phrase, or number contained in an item; and remove all items from the list (Remove All) or only items from a specific page (Remove Page). If you select Remove All or Remove Page, a confirmation window appears. - Destination
- Server IP Addresses: Use this filter to limit the logs to specific server IP addresses. You can enter:
- An IP address (e.g., 198.51.100.100)
- A range of IP addresses (e.g., 192.0.2.1-192.0.2.10)
- An IP address with a netmask (e.g., 203.0.113.0/24)
You can enter multiple entries. Press
Enter
after each entry, then click Add Items. For item lists, you can view up to 500 items on a page; filter the list by searching for a word, phrase, or number contained in an item; and remove all items from the list (Remove All) or only items from a specific page (Remove Page). If you select Remove All or Remove Page, a confirmation window appears.- Server Ports: Use this filter to limit the logs to specific server ports. You can specify individual ports and a range of ports. For item lists, you can view up to 500 items on a page; filter the list by searching for a word, phrase, or number contained in an item; and remove all items from the list (Remove All) or only items from a specific page (Remove Page). If you select Remove All or Remove Page, a confirmation window appears.
- IP Domain Classes: Use this filter to limit the logs to specific URL classes with the domain in the request.
- IP Domain Super Categories: Use this filter to limit the logs to specific URL super categories with the domain in the request.
- IP Domain Categories: Use this filter to limit the logs to specific URL categories associated with the domain in the request.
- Server IP Addresses: Use this filter to limit the logs to specific server IP addresses. You can enter:
- Session
- Domains: Use this filter to limit the logs to sessions associated with specific domains. For item lists, you can view up to 500 items on a page; filter the list by searching for a word, phrase, or number contained in an item; and remove all items from the list (Remove All) or only items from a specific page (Remove Page). If you select Remove All or Remove Page, a confirmation window appears.
- DNS Request Types: Use this filter to limit the logs to sessions associated with specific DNS request types.
- DNS Response Codes: Use this filter to limit the logs to sessions associated with specific DNS response codes.
- DNS Responses: Use this filter to limit the logs to sessions that contain specific data in the DNS responses. You can specify domain names, IPv4 and IPv6 addresses. For IPv4 addresses, you can enter:
- An IP address (e.g., 198.51.100.100)
- A range of IP addresses (e.g., 192.0.2.1-192.0.2.10)
- An IP address with a netmask (e.g., 203.0.113.0/24)
You can enter multiple entries separated by commas. For item lists, you can view up to 500 items on a page; filter the list by searching for a word, phrase, or number contained in an item; and remove all items from the list (Remove All) or only items from a specific page (Remove Page). If you select Remove All or Remove Page, a confirmation window appears.
- Durations: Use this filter to limit the logs based on the duration of the sessions, in seconds. For item lists, you can view up to 500 items on a page; filter the list by searching for a word, phrase, or number contained in an item; and remove all items from the list (Remove All) or only items from a specific page (Remove Page). If you select Remove All or Remove Page, a confirmation window appears.
- Action
- Click Save and activate the change.