Get System Info - Palo Alto PAN-OS XML API
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Content Index
This playbook allows us to get System Info of a Palo Alto device for a Microsoft Sentinel alert.
Additional Documentation
📄 Source: PaloAltoPlaybooks/PaloAlto-PAN-OS-GetSystemInfo/readme.md
PaloAlto-PAN-OS-GetSYstemInfo
## Summary
This playbook allows us to get System Info of a Palo Alto device for a Microsoft Sentinel alert.
When a new Sentinel incident is created, this playbook gets triggered and performs below actions:
-
Gets the various parameters from the alert
-
Gets the System Info for the device in the alert.
-
Creates a Sentinel Incident and updates it with the system info.
Prerequisites
- PaloAlto connector needs to be deployed prior to the deployment of this playbook under the same subscription. Relevant instructions can be found in the connector doc page.
- Generate an API key.Refer this link on how to generate the API Key
- This playbook only works for Palo Alto incidents.
Deployment instructions
- Deploy the playbook by clicking on "Deploy to Azure" button. This will take you to deploying an ARM Template wizard.

- Fill in the required parameters:
- Playbook Name: The playbook name here (e.g. PaloAlto-PAN-OS-GetSystemInfo)
- CustomConnectorName : Name of the custom connector, if you want to change the default name, make sure to use the same in all PaloAlto automation playbooks as well
Post-Deployment instructions
a. Authorize connections
Once deployment is complete, you will need to authorize each connection.
1. Click the Microsoft Sentinel connection resource
2. Click edit API connection
3. Click Authorize
4. Sign in
5. Click Save
6. Repeat steps for other connections such as Blob Store connection and PAN-OS API connection (For authorizing the PAN-OS API connection, API Key needs to be provided)
b. Configurations in Sentinel
- In Microsoft sentinel analytical rules should be configured to trigger an incident with risky IP
- Configure the automation rules to trigger this playbook
c. Assign Playbook Microsoft Sentinel Responder Role
- Select the Playbook (Logic App) resource
- Click on Identity Blade
- Choose Systen assigned tab
- Click on Azure role assignments
- Click on Add role assignments
- Select Scope - Resource group
- Select Subscription - where Playbook has been created
- Select Resource group - where Playbook has been created
- Select Role - Microsoft Sentinel Responder
- Click Save (It takes 3-5 minutes to show the added role.)
Playbook steps explained
When Microsoft Sentinel incident creation rule is triggered
Microsoft Sentinel incident is created. The playbook receives the incident as the input.
Run Query and List Results
Get the logs from the incident.
For Each
Iterates on each result and performs the following:
If alert is Palo Alto alert
Checks if the alert is a Palo Alto alert. Required when logs from various devices are present
Query XML API
Sets the device name, and queries the device's XML API to retrieve the system info for the device
Alert - Get Incident
Creates Incident for the alert
Adds a comment containing the system info to the incident
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Playbooks · Back to PaloAlto-PAN-OS