02 Traps Management Service Admin
02 Traps Management Service Admin
Administrator’s Guide
paloaltonetworks.com/documentation
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2017-2018 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
June 29, 2018
iv TABLE OF CONTENTS
Traps Management Service Overview
> Traps Management Service
5
6 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Traps Management Service Overview
© 2018 Palo Alto Networks, Inc.
Traps Management Service
As new malware variants pop up around the globe and new software bugs and vulnerabilities are
discovered, it can be challenging to ensure that your endpoints remain secure. With the Traps management
service, a cloud-based endpoint security service, you save the time and cost of having to build out your
own global endpoint security infrastructure. The simplified deployment, which requires no server licenses,
databases, or other infrastructure to get started, enables you to start protecting your endpoints quickly.
In addition, you forward logs generated by the Traps components to the Logging Service, and view the logs
directly from the Traps management service.
With the Traps management service, Palo Alto Networks will deploy and manage the security infrastructure
globally to manage the endpoint security policy for both local and remote endpoints, and ensure that the
service is secure, resilient, up to date, and available to you when you need it. This allows you to focus less
on deploying the infrastructure and more on defining the polices to meet your corporate usage guidelines.
The Traps management service is comprised of the following components:
• Traps Management Service Web Interface—A cloud-based security infrastructure service that is
designed to minimize the operational challenges associated with protecting your endpoints. From the
Traps management service, you can manage the endpoint security policy, review security events as they
occur, and perform additional analysis of associated logs.
You can host your Traps management service tenant in either the US Region or EU
Region.
You can host your Logging Service instance in either the US Region or EU Region.
• Directory Sync Service—The Directory Sync Service enables Palo Alto Networks cloud-based
applications to leverage computer, user, and group attributes from your on-premise Active Directory
for use in policy and endpoint management. The Directory Sync Service uses an on-premise agent to
collect computer, user, and group attributes from your on-premise Active Directory. The Directory
Sync Service agent runs in the background to collect the Active Directory information and syncs it
with the cloud-based Directory Sync Service that you configure using the Cloud Services Portal.
You can host your Directory Sync Service instance in either the US Region or EU
Region.
• WildFire cloud service—The WildFire cloud service identifies previously unknown malware and
generates signatures that Palo Alto Networks firewalls and the Traps management service can use
to then detect and block the malware. When a Traps agent detects an unknown sample (attempts
to run a macro, DLL, or executable file), the Traps management service can automatically forward
the sample for WildFire analysis. Based on the properties, behaviors, and activities the sample
displays when analyzed and executed in the WildFire sandbox, WildFire determines the sample to be
benign, grayware, phishing, or malicious. WildFire then generates signatures to recognize the newly-
discovered malware, and makes the latest signatures globally available every five minutes.
9
10 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management
Service
© 2018 Palo Alto Networks, Inc.
Plan Your Traps Management Service
Deployment
Before you get started with the Traps management service, plan your deployment:
Determine your log storage requirements. By default, the Traps management service includes 100GB of
log storage when you activate the Traps management service. If you require additional log storage you
must purchase an additional Logging Service license.
Determine whether you will forward both firewall logs and Traps management service logs to the same
Logging Service instance. If you plan to forward both, you must first activate the Logging Service from
the Customer Support Portal instead of activating the Logging Service from the Cloud Services Portal
and then associate it with the Traps management service during activation. This sequence allows you to
associate the Auth code with Panorama and later associate the same Logging Service instance with the
Traps management service.
Determine the region in which you want to host the Traps management service and any associated
services (Logging Service and Directory Sync Service).
Calculate the bandwidth required to support the number of agents you plan to deploy. For every
100,000 agents, you will need to allocate 120Mbps of bandwidth. The bandwidth requirement scales
linearly. For example, to support 300,000 agents, plan to allocate 360Mbps of bandwidth (three times
the amount required for 100,000 agents).
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management Service 11
© 2018 Palo Alto Networks, Inc.
Migrate from the Traps Endpoint Security
Manager to the Traps Management Service
You can easily migrate the Traps agent from management by the Endpoint Security Manager (ESM) to the
Traps management service. The minimum version of the ESM and Traps agent that supports migration
depends on the endpoint operating system:
• Windows and Mac—Endpoint Security Manager (ESM) 4.1.3 and Traps agent 4.1.0 on Windows and Mac
endpoints.
• Linux—Endpoint Security Manager (ESM) 4.2 and from Traps agent 4.2 on Linux endpoints.
Before you migrate to the Traps management service:
Review Differences Between Endpoint Security Manager and Traps Management Service to determine
whether upgrading to the Traps management service is right for you.
Sanitize your security policy—Because the policy structure for Traps management service is different
than Traps Endpoint Security Manager (ESM), you cannot migrate rules from an existing deployment.
Before migrating to Traps management service, we recommend that you review existing user rules for
each policy type and remove any that are no longer required. For example, remove any rules that are
resolved in content updates or that apply to older Traps agent versions.
Review restore candidates—Before migrating to Traps management service, review any files that
were quarantined and determine whether the file needs to be restored or any additional action to
remeditate the endpoint is required. After you upgrade the agent version to Traps 5.0, the agent will not
communicate with the Traps ESM, and therefore will not respond to requests from the ESM to restore
files.
Review security events—Review and address any events that require remediation before migrating to
the Traps management service. Note that security events that were not sent to the ESM before installing
the new agents will not be sent to the Traps management service.
Locate your ESM Auth code—You can locate the Auth code in the Customer Support Portal (Assets >
Advanced Endpoint Protection).
STEP 2 | Import hash overrides as hash exceptions in the Traps management service.
1. From the ESM Console, select Settings.
2. Generate a Tech Support File and download it when it finishes.
3. Extract the TechSupport ZIP file which contains two zipped files (one for Core and one for
Console).
4. Extract the Console ZIP file.
5. Open the DBQueries folder and locate the Verdict_Override_Exports.csv file.
This file contains all the hash overrides defined in the ESM Console.
6. Log in to the Traps management service and select Exceptions > Hash Exceptions.
12 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management
Service
© 2018 Palo Alto Networks, Inc.
7. Select Actions > Import CVS.
8. Select and then Upload the Verdict_Override_Exports.csv file.
If necessary, resolve any conflicts encountered during the upload and retry.
9. Select Import to confirm and then OK when the Traps management service finishes importing the
hash exceptions.
There may be more than one WildFire rule with whitelists. While the ESM merges
WildFire rules, this capability is not available in the Traps management service.
Ensure that you migrate paths to the relevant Malware Security Profile for each platform:
• Copy paths in macOS WildFire rules to the Mach-O Files whitelist in a MacOS profile.
• Copy paths in Windows WildFire rules for Executables or DLL files to the Portable Executables
and DLLs whitelist in a Windows profile.
• Copy paths in Windows WildFire rules for Office files to the Office Files whitelist in a Windows
profile.
4. Configure a Policy Rule for each group of target objects to which the profile (and any associated hash
exceptions) applies.
You can return to the Profiles > Malware Profile page to specify the target objects after you upgrade
the Traps agent.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management Service 13
© 2018 Palo Alto Networks, Inc.
• 1. From the Traps management service, Create an Installation Package with an installation type as
Upgrade from ESM.
2. Download the package to a location reachable to the ESM.
3. From the ESM Console, disable services protection and then create an agent action rule to
upgrade the Traps agent using the package created from the Traps management service.
Because this procedure is valid only for a specific version of Traps agents, we
recommend using a condition for the action rule to upgrade the agents which
specifies the Traps agent version.
4. Save and Apply the rule.
• Older Traps versions
There are three options for upgrading older Traps versions:
• Upgrade the older version to a version which supports migration using action rules, and then use
the previous workflow to upgrade the Traps agent.
• Upgrade the Traps agent using a third-party software deployment tool such as JAMF or SCCM.
With this method you must uninstall the agent and install a fresh installation package of Traps 5.0
instead of an upgrade package.
• Manually uninstall the older Traps agent and install a fresh installation package of Traps 5.0.
After the upgraded Traps agent begins communicating with the Traps management service. Endpoints
that successfully check in with the Traps management service are displayed on the Endpoints page and
are eligible for assignment in Endpoint Groups and policy rules.
STEP 6 | Return to the Policy Rules and Exceptions pages to restrict by specific endpoints.
Visibility
Import never seen hashes and Hash Control Exceptions > Hash Exceptions
set verdicts for them.
14 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management
Service
© 2018 Palo Alto Networks, Inc.
Feature Endpoint Security Manager Traps management service
Display quarantined files that are Hash Control Logs > Restore Candidates
eligible to be restored to their
original location on the endpoint.
Security events search criteria Security Events—Endpoint, user Security Events—Limited options
name, and process. to filter security events.
Policy Management
Exception creation and policy You can create almost any policy Palo Alto Networks can also
configuration rule that Palo Alto Networks create granular policy changes,
Research teams (often at the using either support exceptions
instruction of Support) can or content updates. You can
create. also an edit profiles, create
exceptions from security events,
You can also whitelist very
and disable specific capabilities,
specific flows including
such as for a specific module or
whitelisting specific DLLs for
process.
EPMs, and allowing specific child
processes.
Exceptions for Active Directory Assign rules to any AD object. Exceptions cannot be assigned
(AD) objects to AD objects (or virtual groups).
Change mode per process Report or block an event based Report or block an event based
on the process. on the category and not the
process.
View protected processes Visibility from the ESM Console Visibility from product
(Policies > Exploit > Process documentation (Processes
Management). Protected by the Default Policy).
Agent and ESM settings Granular control over settings Fixed settings but reduced
such as the Heartbeat Interval heartbeat interval (5 minutes)
(the frequency at which the and reporting interval (1 hour).
Traps agent attempts to check
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management Service 15
© 2018 Palo Alto Networks, Inc.
Feature Endpoint Security Manager Traps management service
in), the Reporting Interval
(the frequency at which the
Traps agent sends report
notifications, including changes
in service, crash events, and new
processes), and the Heartbeat
Grace Period (the allowable time
period for a Traps agent that has
not responded, after which the
status changes to disconnected).
Role-based access control Granular access control for One role for access to all Traps
different areas and flows in the management service features.
ESM Console.
16 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management
Service
© 2018 Palo Alto Networks, Inc.
Assign Roles to Manage Cloud Services
To assign roles to or create other users in the Customer Support Portal, you must be assigned a Super User
role.
To activate cloud services such as the Traps management service from the Cloud Services Portal, you must
have an account in the Customer Support Portal and a valid Auth code. However, to access the service,
either directly using the Traps management service URL, or from the Cloud Services Portal, you must be
assigned the corresponding service role from the Customer Support Portal. When you log in to the Cloud
Services Portal, you see tiles for all services associated with your user account. Note that after activating
a service, the tile can briefly appear on your Cloud Services Portal but is subsequently removed unless you
have the associated service role.
The list of roles are:
Role Description
Super User Required to assign roles and create users in the Customer Support Portal.
Traps Provides access to the Traps management service where you can manage and
protect your endpoints from malware and software exploits.
Directory Sync Directory Sync is an optional service that reads Active Directory information on a
Service customer's network, and sends it to the Palo Alto Networks cloud so that apps can
access it for reporting and analytics purposes. You must have this role to set up the
Directory Sync Service.
Logging Service Logging Service enables the storage and query of logging data. Logging data can
be either network logs as written by firewalls, or logs written by apps and services
such as the Traps management service. Assign this role if the administrator must
configure the Logging Service, manage logging quotas for the Traps management
service, or configure log forwarding using the Log Forwarding app.
STEP 2 | Locate or search for the user(s) for which you want to enable access to the Traps management
service and other services. Or, if the user does not already exist, Add Member.
STEP 3 | Click the edit icon in the Actions column for the user.
STEP 4 | Click in to the Roles cell and select the desired roles, one at a time depending on the role of the
user.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management Service 17
© 2018 Palo Alto Networks, Inc.
STEP 5 | Click the check mark in the Actions column when finished.
18 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management
Service
© 2018 Palo Alto Networks, Inc.
Set Up Directory Sync Service
The Directory Sync Service is an optional service that enables you to leverage your user directory when you
configure policies in the Traps management service. To set up Directory Sync Service, you must perform
the following tasks and then specify your Directory Sync Service instance when you Activate the Traps
Management Service.
The Directory Sync Service supports the US Region and EU Region.
If you disassociate a Directory Sync Service instance with a Traps management service
tenant, Palo Alto Networks recommends that you remove all Active Directory (AD) objects
from any active rules. Traps cannot continue to apply policy rules to Active Directory objects
without the relationship with the Directory Sync Service. If you later re-associate the Traps
management service tenant with the same Directory Sync Service and did not remove the
original AD objects from your policy rules, only the rules for AD Computers and Users will
reapply. For a policy rule to apply to other types of AD objects, you must re-add them to any
policy rules.
The following high-level workflow provides a brief overview on the steps you need to follow to set up the
Directory Sync Service. For detailed workflows on how to set up, manage, and troubleshoot Directory Sync
Service, refer to the Directory Sync Service Getting Started Guide.
STEP 1 | Review the Directory Sync Service System Requirements and Prerequisites.
STEP 3 | Generate Certificates to Authenticate the Directory Sync Service and the Agent.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management Service 19
© 2018 Palo Alto Networks, Inc.
Activate the Traps Management Service
After you purchase Traps licenses, you will receive an email with an Auth code that you can use to activate
your Traps management service tenant. The Directory Sync Service and Logging Service are also available
to you.
While Directory Sync Service does not require you to register the service separately, you must perform
additional configuration to begin using the service.
By default, the Traps management service includes 100GB of log storage when you activate the Traps
management service. With the Traps Included Storage option, you do not need to activate the Logging
Service separately. However, if you plan to use the same Logging Service instance for both firewall logs and
Traps management service logs, you must first activate the Logging Service from the Customer Support
Portal instead of activating the Logging Service from the Cloud Services Portal and then associate it with
the Traps management service during activation. This sequence allows you to associate the Auth code with
Panorama and later associate the same Logging Service instance with the Traps management service.
Use the following workflow to activate and set up a Traps management service tenant:
20 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management
Service
© 2018 Palo Alto Networks, Inc.
STEP 3 | (Optional) Set Up Directory Sync Service.
The Directory Sync Service reads Active Directory (AD) information on your network and sends it to the
Palo Alto Networks cloud. This enables you to configure rules in your Traps management service tenant
that apply to AD objects such as users and groups. Before you can begin assigning policy to AD objects,
you must set up the service.
STEP 4 | Set up Logging Service if you intend to use the same Logging Service instance to store logs
from Palo Alto Networks firewalls. If you plan to use only the Traps Included Storage, skip to
the next step to activate the Traps management service.
You must activate the Logging Service from the Customer Support Portal and retrieve the license on
Panorama (see License and Install the Cloud Service Plugin), if you want to store Traps logs and firewall
logs to the same Logging Service instance.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management Service 21
© 2018 Palo Alto Networks, Inc.
3. Enter an Instance Name to identify your tenant in the Cloud Services Portal and provide an optional
Description.
4. Select the Region in which you want to host the Traps management service tenant: US East (N.
Virginia) or EU (Frankfurt).
The region you choose determines the location of the Logging Service and optionally the Directory
Sync Service as well as the privacy regulations applied to your Traps management service tenant.
The Traps agents can communicate with a Traps management service deployed in any region.
5. Enter the Subdomain that you want to use for your tenant of the Traps management service.
For example, if you enter mycompany as the subdomain, Palo Alto Networks will create your tenant
of the Traps management serviceas mycompany.traps.paloaltonetworks.com.
6. Choose a Logging Service instance to use to store logs.
The Cloud Services Portal displays the list of Logging Service instances available in your Region. If
you did not already purchase and activate Logging Service, the Traps management service includes
100GB of logging storage.
7. If you #unique_18, select your Directory Sync Service instance.
8. Review the terms of the End User License Agreement and Agree and Activate.
9. Click Done.
22 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management
Service
© 2018 Palo Alto Networks, Inc.
STEP 6 | Manage Logging Storage for Traps.
Before you can begin storing logs, you must set quota allocation preferences for the Traps management
service.
When the Traps management service tenant is available, the status changes to the green check mark.
STEP 9 | Access your Traps management service tenant for the first time.
There are two ways to access your Traps management service tenant: Return to the
Cloud Services Portal (https://apps.paloaltonetworks.com/) and select your tenant from
the Traps management service tile. Or, go directly to the web address for your tenant
(https://<subdomain>.traps.paloaltonetworks.com).
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management Service 23
© 2018 Palo Alto Networks, Inc.
Manage Logging Storage for Traps
The Logging Service provides granular control over quota allocation for each type of log it receives. After
you activate the Traps management service, you must define how the service allocates log storage for
Traps. If your Logging Service instance receives logs from other apps or services, you will need to consider
how to allocate storage across all services and apps.
STEP 4 | Adjust the quota allocated for each type of Traps logs.
24 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management
Service
© 2018 Palo Alto Networks, Inc.
If your total allocated quota is already at 100% for non-Traps apps and services, reduce the quota for
available log types to free up storage for the Traps management service.
Use the arrows to increment or decrement existing allocations or enter a new quota percentage.
2. Expand the Traps allocation and adjust the storage allocated for each type of Traps log.
The following table describes the different record types for Traps with the recommended storage
allocation for each record type.
Config Audit logs recorded by the Traps management service. This includes 1%
policy events—such as changes to the Traps security policy,
exception management, and profile management. Audit logs also
include other configuration changes such as device management,
distribution management, and system management.
Analytic Logs from the hourly hash execution report from every Traps agent. 83%
Provides visibility on tracking attempted malware executions in
your protected environment, hash exception policy changes, and
forensics. File analytics reports consume a considerable share of
Traps storage space.
To see the record type for a specific Traps log, see Log Types and Severity Levels.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management Service 25
© 2018 Palo Alto Networks, Inc.
STEP 5 | Apply your changes.
26 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management
Service
© 2018 Palo Alto Networks, Inc.
Enable Access to the Traps Management
Service
After you receive your account details, enable and verify access to the Traps management service.
STEP 1 | If you enabled SSL Decryption on your Palo Alto Networks firewall, install the certificate used
for decryption as a trusted root CA certificate for the system.
Otherwise, you must add *.traps.paloaltonetworks.com to your SSL Decryption Exclusion list.
In PAN-OS 8.0 and later releases, you can configure the list in Device > Certificate Management > SSL
Decryption Exclusion.
STEP 2 | In your firewall configuration, enable access to Traps management service communication
servers.
With Palo Alto Networks firewalls, it is recommended to use the App-ID traps-
management-service to allow communication between Traps agents and the Traps
management service. To use the App-ID traps-management-service, you must
install the Application and Threat content update version 793 or later.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management Service 27
© 2018 Palo Alto Networks, Inc.
• https://s3.amazonaws.com/distributions-proda-n.virginia—Used for
provisioning Traps agents for the first time to obtain the agent provisioning URL for the tenant.
• https://s3.amazonaws.com/scanning-results-proda-n.virginia—Used by
Traps agents to upload files that require analysis as indicated in a scan of the endpoint.
• https://s3.amazonaws.com/installers-origin-proda-n.virginia—Used by the
Traps management service to host the installers used to upgrade the Traps agents.
STEP 3 | Verify that you can access your tenant of the Traps management service.
After you download and install the Traps software on your endpoints (see Create an Installation
Package) and Manage Endpoint Policy, verify that the Traps agents can receive changes to the policy.
28 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management
Service
© 2018 Palo Alto Networks, Inc.
Use the Traps Management Service Dashboard
The Dashboard widgets display general information about the Traps management service. Each chart is
described in the following table.
PLATFORMS Displays the total number of registered agents and the distribution of agents
by platform.
LICENSE Displays information about your Traps management service license including
the license expiration date and the number of license seats that are currently
allocated. If you are close to running out of license seats or your license is
about to expire, consider renewing or purchasing additional licenses.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management Service 29
© 2018 Palo Alto Networks, Inc.
30 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Get Started with the Traps Management
Service
Administer the Traps Management Service
> Manage Traps Installation Packages
> Define Endpoint Groups
> Manage Registered Endpoints
> About Traps Licenses
31
32 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Administer the Traps Management Service
© 2018 Palo Alto Networks, Inc.
Manage Traps Installation Packages
To ensure that your endpoints remain secure, you must download the Traps software and install it on your
endpoints. From the Traps management service, you can manage multiple installation packages for different
Traps versions and operating systems.
On new tenants created in June 2018 or later, you must change the default uninstall
password to a new password which meets the Traps management service security
standards before you can create installation packages. To later change the uninstall
password, create an Agent Settings Profile to assign to a policy rule.
After you create an installation package, you can then install it directly on an endpoint or you can use a
software deployment tool of your choice to distribute the software to multiple endpoints. To install Traps,
you must use a valid installation package that exists on the Traps management service. If you delete an
installation package and later attempt to use it to install Traps, the agent will not be able to register to the
Traps management service.
• Create an Installation Package
• View Details About an Installation Package
• Remove an Installation Package
STEP 3 | Enter a unique Name and a Description to identify the installation package.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Administer the Traps Management Service 33
© 2018 Palo Alto Networks, Inc.
The package Name can contain letters, numbers, or spaces and must be fewer than 64 characters.
STEP 5 | Select the Platform for which you want to create the installation package.
STEP 6 | (Windows, macOS, and Linux only) Select the Agent Version for the package.
You cannot upgrade from the Traps for Android Beta to this version. If you participated
in the Traps for Android Beta, you must uninstall the Beta version and install the new
version.
34 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Administer the Traps Management Service
© 2018 Palo Alto Networks, Inc.
STEP 2 | Locate and view details about the installation package.
STEP 2 | Hover over the installation package and select the delete icon.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Administer the Traps Management Service 35
© 2018 Palo Alto Networks, Inc.
The Traps management service removes the installation package so that you cannot download or use it
to install Traps on additional endpoints.
36 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Administer the Traps Management Service
© 2018 Palo Alto Networks, Inc.
Define Endpoint Groups
To easily apply policy rules to specific endpoints, you can define an endpoint group. There are two methods
you can use to define an endpoint group: You can create a static group by defining a list of endpoints using
the endpoint’s hostname or alias, or you can allow the Traps management service to populate your endpoint
group dynamically using specific endpoint characteristics such as a partial hostname or alias; full or partial
domain or workgroup name; or IP address, range or subnet. After you define an endpoint group you can
then use it in your policy rules to narrow the scope of the rule to apply it to only the endpoints in the group.
The Endpoint Groups page displays all endpoint groups along with the number endpoints and policy rules
linked to the endpoint group.
STEP 2 | Create a new endpoint group or hover over an existing group and click
to edit it.
STEP 3 | Enter a Name and Description to identify the endpoint group. The name you assign to the
group will be visible when you create new policy rules.
STEP 4 | To determine the endpoint properties you want to use to create a group, select the
Membership Type:
• Static—Add endpoints by the endpoint hostname or alias. After a Traps agent checks in with the
Traps management service, you can add the endpoint to an endpoint group. To narrow the list of
endpoints you can begin typing its name or alias in the search field. The Traps management service
provides autocompletion as you type. In a multi-domain environment, you can also filter the list of
endpoints by Domain.
• Dynamic—Dynamically populate a list of endpoints that match one or more endpoint characteristics.
If you specify more than one characteristic, the endpoint must match all characteristics to be included
in the group.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Administer the Traps Management Service 37
© 2018 Palo Alto Networks, Inc.
• Enable Endpoint Name / Alias to match endpoints using a full or partial hostname. Use a ? to
match a single character or an * to match any string of characters. For example to match any
endpoint whose hostname begins with enghost, enter enghost*.
• Enable Domain / Workgroup to match endpoints which belong to a specific domain or
workgroup. Use a ? to match a single character or an * to match any string of characters.
• Enable IP to match endpoints with a specific IP Address, Range, or Subnet. The Traps
management service supports only IPv4 addresses.
• Enable VDI and specify whether to add or exclude all virtual desktop infrastructure (VDI)
endpoints from the endpoint group.
STEP 6 | After you save your endpoint group, assign it in a policy rule.
A new endpoint which matches the characteristics of an endpoint group can take up to an hour to
receive applicable rules. The Traps management service can also take up to an hour to reflect changes in
dynamic group membership when the characteristics of an endpoint change.
38 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Administer the Traps Management Service
© 2018 Palo Alto Networks, Inc.
Manage Registered Endpoints
After the Traps agent registers with the Traps management service, you can view information about the
endpoint and perform basic management functions.
• Filter the Endpoints
• View Details About an Endpoint
• View the Endpoint Security Policy
• Retrieve Logs from an Endpoint
• Upgrade Traps
• Uninstall Traps
• Delete an Endpoint
• By Status—Select the Status to filter the list of endpoints by their registration status. For status
definitions, see View Details About an Endpoint on page 39.
• By OS—Select the OS to filter by operating system versions.
• By Name—Enter a full or partial hostname for the endpoint. This field also supports wildcards: Use
a ? to match a single character or an * to match any string of characters. For example to match any
endpoint whose hostname begins with enghost, enter enghost*.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Administer the Traps Management Service 39
© 2018 Palo Alto Networks, Inc.
STEP 1 | From the Traps management service, click Endpoints.
STEP 2 | Select the row for the endpoint to view additional information.
The Traps management service displays the following information for the endpoint:
• Endpoint:
• ENDPOINT NAME—Hostname of the endpoint. To assign an alias to represent the endpoint in
the Traps management service and in search, click the edit icon next to the hostname, enter the
alias, and then click the save icon.
To refresh the Endpoint details, click the refresh icon to the right of the Endpoint area.
40 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Administer the Traps Management Service
© 2018 Palo Alto Networks, Inc.
• Endpoint group membership
• Active directory membership
• Last heartbeat communication
To view the active policy for an endpoint:
STEP 2 | Select the row for the endpoint to view additional information.
STEP 2 | Select the row for the endpoint to view additional information.
STEP 3 | Select Retrieve Tech Support File to prompt the Traps agent to package all available logs and
send them to the Traps management service.
STEP 4 | When the Tech Support File is ready, you can download it from the Tech Support File area in
the endpoint details view. This view displays only the last file retrieved from the endpoint. To
see the status and history of all files received from the endpoint, select Logs > Data Retrieval.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Administer the Traps Management Service 41
© 2018 Palo Alto Networks, Inc.
Upgrade Traps
After you install Traps and the agent registers with the Traps management service, you can upgrade the
Traps software using a method supported by the endpoint platform:
• Android—Upgrade the app directly from the Google Play Store.
• Windows, Mac, or Linux—Create new installation packages and push the Traps package to your
endpoints from the Traps management service.
The following workflow describes how to upgrade Traps for Windows, Mac, and Linux endpoints:
STEP 1 | Select Agent Installations and identify the name of the installation package (or packages if you
plan to upgrade the agent on different operating systems) that you want to use to upgrade
your Traps agents.
If needed, Create an Installation Package for a version that is newer than the version installed on
your endpoints. If you select an installation package which is the same version or earlier, the Traps
management service ignores the upgrade request.
To reduce the number of results, use the endpoint name search and filters at the top of
the table. Filter the list of endpoints by Status, Operating System (OS), endpoint name, or
endpoint Group name.
STEP 6 | For each platform, select the name of the installation package you want to push to the selected
endpoints.
42 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Administer the Traps Management Service
© 2018 Palo Alto Networks, Inc.
STEP 7 | Click Upgrade.
The Traps management service distributes the installation package to the selected endpoints at the next
heartbeat communication with the agent.
Uninstall Traps
At any time you can uninstall Traps from one or more Windows, Mac, or Linux endpoints from the Traps
management service. To uninstall the Traps app for Android, you must do so from the Android endpoint.
The following workflow describes how to uninstall Traps from one or more Windows, Mac, or Linux
endpoints.
STEP 2 | Select the endpoints on which you want to uninstall the Traps agent.
To reduce the number of results, use the endpoint name search and filters at the top of
the table. Filter the list of endpoints by Status, Operating System (OS), endpoint name, or
endpoint Group name.
Delete an Endpoint
When an agent has been removed from the network without being properly uninstalled, the license remains
associated with the agent until the 90 day clean-up policy is enforced. After that period of time, the Traps
management service returns the license to the available license pools (see License Allocation).
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Administer the Traps Management Service 43
© 2018 Palo Alto Networks, Inc.
If you need to decommission the Traps agent from one or more endpoints before the 90 clean-up policy
takes effect, you can do so from the Traps management service. When you decommission the Traps agent,
the Traps management service deletes the endpoint from the list of registered endpoints and returns the
license to the available license pool.
Because VDI endpoints have a VDI-specific license cleanup policy, this action is not supported for VDI
endpoints.
STEP 2 | Select the endpoints you whose Traps license you want to revoke.
To reduce the number of results, use the endpoint name search and filters at the top of
the table. Filter the Endpoints on page 39 by Status, Operating System (OS), endpoint
name, or endpoint Group name.
STEP 5 | Confirm the action to Delete one or more endpoints and return the associated licenses to the
pool, or Cancel.
44 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Administer the Traps Management Service
© 2018 Palo Alto Networks, Inc.
About Traps Licenses
Before you can start using the Traps management service to protect your endpoints, you must activate the
Traps management service and any additional services you purchased. Each Traps management service
license enables protection for a maximum number of endpoints and defines the length of time for which
protection is enabled.
• License Allocation
• License Expiration
• License Monitoring
License Allocation
The Traps management service manages licensing for all endpoints in your organization. Each time you
install a new Traps agent on an endpoint, the Traps agent registers with the Traps management service to
obtain a license. In the case of non-persistent VDI, the Traps agent registers with the Traps management
service as soon as the user logs in to the endpoint.
The Traps management service issues licenses until you exhaust the number of license seats available. The
Traps management service also enforces a license cleanup policy to automatically return unused licenses to
the pool of available licenses. A license returns to the license pool when any of the following events occur:
• The Traps agent is uninstalled.
• The Traps agent is disconnected from the Traps management service for more than 90 days.
• (Non-persistent VDI) The user logs off of or ends the VDI session.
• You manually Delete an Endpoint.
If after a license is revoked (either manually or automatically) the agent connects to the Traps management
service, the agent is treated as a new agent and receives a new license from the pool, if available.
It can take up to an hour for the Traps management service to display revived endpoints.
If you exceed the number of available licenses available, the Traps agents that cannot obtain a license will
remain unlicensed and unprotected until you either free up license seats or purchase additional licenses.
If you later free up additional seats, the Traps agent can take up to an hour to obtain a valid
license.
License Expiration
After your Traps management service license expires, the Traps management service allows access to your
tenant for an additional grace period of 14 days. After the 14 day grace period, the Traps management
service disables access until you renew the license.
During the expiration period, the Traps management service will retain data in the Logging Service
according to your Logging Service data retention policy and licensing.
On Windows endpoints, the Traps console displays a disabled status when the agent is unlicensed.
License Monitoring
As new Traps agents register with the Traps management service, the dashboard updates the LICENSE area
to reflect the current license usage. The Traps management service also logs events when the number of
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Administer the Traps Management Service 45
© 2018 Palo Alto Networks, Inc.
licenses near the maximum capacity available and when the license nears the expiration date. Monitoring
license events can help you decide when to purchase additional licenses to ensure uninterrupted protection
of your endpoints.
46 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Administer the Traps Management Service
Manage Endpoint Policy
> Endpoint Policy Concepts
> Traps Security Profiles
> Configure a Policy Rule
47
48 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Manage Endpoint Policy
© 2018 Palo Alto Networks, Inc.
Endpoint Policy Concepts
• Protection Capabilities
• Protection Modules
• Processes Protected by the Default Policy
• Customizable Traps Settings
Protection Capabilities
Each security profile provides a tailored list of protection capabilities that you can configure for the platform
you select. The following table describes the protection capabilities you can customize in a security profile.
The table also indicates which platforms support the protection capability (a — indicates the capability is not
supported).
Ransomware Protection — — —
Targets encryption based
activity associated with
ransomware to analyze and halt
ransomware before any data
loss occurs.
Execution Paths — — —
Many attack scenarios are
based on writing malicious
executable files to certain
folders such as the local
temp or download folder
and then running them. Use
this capability to restrict the
locations from which executable
files can run.
Network Locations — — —
To prevent attack scenarios that
are based on writing malicious
files to remote folders, you can
restrict access to all network
locations except for those that
you explicitly trust.
Removable Media — — —
To prevent malicious code from
gaining access to endpoints
using external media such as
a removable drive, you can
restrict the executable files,
that users can launch from
external drives attached to the
endpoints in your network.
Optical Drive — — —
Protection Modules
Each security profile applies multiple security modules to protect your endpoints from a wide range of
attack techniques. While the settings for each module are not configurable, Traps activates a specific
protection module depending on the type of attack, the configuration of your security policy, and the
operating system of the endpoint. When a security event occurs, Traps logs details about the event
including the security module employed by Traps to detect and prevent the attack based on the technique.
To help you understand the nature of the attack, the Traps management service identifies the protection
module Traps employed in the Security Event Details.
The following table lists the modules and the platforms on which they are supported.
Anti-Ransomware — — —
Targets encryption-based activity associated with
ransomware with the ability to analyze and halt ransomware
activity before any data loss occurs.
APC Protection — — —
Prevents attacks which change the execution order of a
process by redirecting an asynchronous procedure call (APC)
to point to the attacker’s malicious shellcode.
CPL Protection — — —
Protects against vulnerabilities related to the display routine
for Windows Control Panel shortcut images, which can be
used as a malware infection vector.
DEP — — —
Data execution prevention (DEP). Prevents areas of memory
designated as containing data from running as executable
code.
DLL Hijacking — — —
Prevents DLL-hijacking attacks where the attacker attempts
to load DLLs from non-secure locations that are not secure to
gain control of a process.
DLL Security — — —
Prevents access to crucial DLL metadata from untrusted code
locations.
Dylib Hijacking — — —
Prevents Dylib-hijacking attacks where the attacker attempts
to load dynamic libraries from non-secure locations to gain
control of a process.
Font Protection — — —
Prevents improper font handling, a common target of
exploits.
Gatekeeper Enhancement — — —
Enhancement of the macOS gatekeeper functionality
which allows apps to run based on their digital signature.
This module provides an additional layer of protection by
extending gatekeeper functionality to child processes to
enforce the signature level of your choice.
Hash Exception — —
Halts execution of files which an administrator has
determined to be malware regardless of the WildFire verdict.
JIT — —
Local Analysis — —
Examines hundreds of characteristics of an unknown
executable file, DLL, or macro to determine if it is likely to be
malware. The local analysis module uses a statistical model
that was developed using machine learning on WildFire
threat intelligence.
Null Dereference — — —
Prevents malicious code from mapping to address zero in
the memory space, making null dereference vulnerabilities
unexploitable.
ROP —
Protects against the use of return oriented programming
(ROP) by protecting APIs used in ROP chains.
SEH — — —
Prevents hijacking of the Structured Exception Handler (SEH),
a commonly exploited control structure called Linked List,
which contains a sequence of function records.
Shellcode Protection — — —
Reserves and protects certain areas of memory commonly
used to house payloads using heap spray techniques.
ShellLink — — —
Prevents shell-link logical vulnerabilities.
SysExit — — —
Protects against the use of return oriented programming
(ROP) by protecting APIs used in ROP chains.
UASLR — — —
Improves or altogether implements ASLR (module location
randomization) with greater entropy, robustness, and strict
enforcement.
WildFire —
Leverages WildFire for threat intelligence to determine
whether a file is malware. In the case of unknown files, the
Traps management service can forward samples to WildFire
for in-depth analysis.
Linux
macOS
Windows
7z.exe dism.exe
7zfm.exe dllhost.exe
7zg.exe eqnedt32.exe
acrobat.exe excel.exe
acrord32.exe firefox.exe
acrord32info.exe flashfxp.exe
flashplayerplugin_10_3_183_15.exe flashplayerplugin_11_0_1_152.exe
flashplayerplugin_10_3_183_16.exe flashplayerplugin_11_1_102_55.exe
flashplayerplugin_10_3_183_18.exe flashplayerplugin_11_1_102_62.exe
flashplayerplugin_10_3_183_20.exe flashplayerplugin_11_1_102_63.exe
flashplayerplugin_10_3_183_25.exe flashplayerplugin_11_2_202_228.exe
flashplayerplugin_10_3_183_29.exe flashplayerplugin_11_2_202_233.exe
flashplayerplugin_10_3_183_43.exe flashplayerplugin_11_2_202_235.exe
flashplayerplugin_10_3_183_48.exe flashplayerplugin_11_3_300_257.exe
flashplayerplugin_10_3_183_5.exe flashplayerplugin_11_3_300_262.exe
flashplayerplugin_10_3_183_50.exe flashplayerplugin_11_3_300_273.exe
flashplayerplugin_10_3_183_51.exe flashplayerplugin_11_4_402_278.exe
flashplayerplugin_10_3_183_63.exe flashplayerplugin_11_4_402_287.exe
flashplayerplugin_10_3_183_67.exe flashplayerplugin_11_5_502_110.exe
flashplayerplugin_10_3_183_68.exe flashplayerplugin_11_5_502_136.exe
flashplayerplugin_10_3_183_7.exe flashplayerplugin_11_5_502_146.exe
flashplayerplugin_10_3_183_75.exe flashplayerplugin_11_5_502_149.exe
flashplayerplugin_10_3_183_86.exe flashplayerplugin_11_6_602_168.exe
flashplayerplugin_11_6_602_171.exe flashplayerplugin_11_9_900_117.exe
flashplayerplugin_11_6_602_180.exe flashplayerplugin_11_9_900_152.exe
flashplayerplugin_11_7_700_169.exe flashplayerplugin_11_9_900_170.exe
flashplayerplugin_11_7_700_202.exe flashplayerplugin_12_0_0_38.exe
flashplayerplugin_11_7_700_232.exe flashplayerplugin_12_0_0_44.exe
flashplayerplugin_11_7_700_242.exe flashplayerplugin_12_0_0_70.exe
flashplayerplugin_11_7_700_252.exe flashplayerplugin_12_0_0_77.exe
flashplayerplugin_13_0_0_258.exe flashplayerplugin_14_0_0_179.exe
flashplayerplugin_13_0_0_259.exe flashplayerplugin_15_0_0_152.exe
flashplayerplugin_13_0_0_260.exe flashplayerplugin_15_0_0_189.exe
flashplayerplugin_13_0_0_262.exe flashplayerplugin_15_0_0_223.exe
flashplayerplugin_13_0_0_264.exe flashplayerplugin_15_0_0_239.exe
flashplayerplugin_13_0_0_269.exe flashplayerplugin_15_0_0_246.exe
flashplayerplugin_13_0_0_277.exe flashplayerplugin_16_0_0_235.exe
flashplayerplugin_13_0_0_281.exe flashplayerplugin_16_0_0_257.exe
flashplayerplugin_13_0_0_289.exe flashplayerplugin_16_0_0_287.exe
flashplayerplugin_13_0_0_292.exe flashplayerplugin_16_0_0_296.exe
flashplayerplugin_13_0_0_296.exe flashplayerplugin_16_0_0_305.exe
flashplayerplugin_13_0_0_302.exe flashplayerplugin_17_0_0_134.exe
flashplayerplugin_13_0_0_309.exe flashplayerplugin_17_0_0_169.exe
flashplayerplugin_14_0_0_125.exe flashplayerplugin_17_0_0_188.exe
flashplayerplugin_14_0_0_145.exe flashplayerplugin_17_0_0_190.exe
flashplayerplugin_14_0_0_176.exe flashplayerplugin_17_0_0_191.exe
flashplayerplugin_18_0_0_160.exe flashplayerplugin_18_0_0_366.exe
flashplayerplugin_18_0_0_194.exe flashplayerplugin_19_0_0_185.exe
flashplayerplugin_18_0_0_203.exe flashplayerplugin_19_0_0_207.exe
flashplayerplugin_18_0_0_209.exe flashplayerplugin_19_0_0_226.exe
flashplayerplugin_18_0_0_232.exe flashplayerplugin_19_0_0_245.exe
flashplayerplugin_18_0_0_241.exe flashplayerplugin_20_0_0_228.exe
flashplayerplugin_18_0_0_252.exe flashplayerplugin_20_0_0_235.exe
flashplayerplugin_18_0_0_255.exe flashplayerplugin_20_0_0_286.exe
flashplayerplugin_18_0_0_261.exe flashplayerplugin_20_0_0_306.exe
flashplayerplugin_18_0_0_268.exe flashplayerplugin_21_0_0_182.exe
flashplayerplugin_23_0_0_162.exe flashplayerplugin_27_0_0_183.exe
flashplayerplugin_23_0_0_185.exe flashplayerplugin_27_0_0_187.exe
flashplayerplugin_23_0_0_205.exe flashplayerplugin_28_0_0_126.exe
flashplayerplugin_23_0_0_207.exe flashutil_activex.exe
flashplayerplugin_24_0_0_186.exe fltldr.exe
flashplayerplugin_24_0_0_194.exe fontdrvhost.exe
flashplayerplugin_24_0_0_221.exe foxit reader.exe
flashplayerplugin_25_0_0_127.exe foxitreader.exe
flashplayerplugin_25_0_0_148.exe groovemonitor.exe
flashplayerplugin_25_0_0_171.exe hxmail.exe
flashplayerplugin_26_0_0_120.exe i_view32.exe
flashplayerplugin_26_0_0_131.exe iexplore.exe
flashplayerplugin_26_0_0_137.exe infopath.exe
flashplayerplugin_27_0_0_130.exe ipodservice.exe
flashplayerplugin_27_0_0_159.exe itunes.exe
flashplayerplugin_27_0_0_170.exe ituneshelper.exe
journal.exe outlook.exe
jqs.exe plugin-container.exe
lsass.exe powerpnt.exe
microsoft.photos.exe pptview.exe
microsoftedge.exe qttask.exe
microsoftedgecp.exe quicktimeplayer.exe
migwiz.exe rar.exe
mmc.exe reader_sl.exe
msaccess.exe realconverter.exe
msmpeng.exe realplay.exe
mspub.exe realsched.exe
nginx.exe rundll32.exe
notepad++.exe runtimebroker.exe
skypehost.exe vmware-authd.exe
slmail.exe vmware-hostd.exe
soffice.exe vmware-vmx.exe
spoolsv.exe vpreview.exe
svchost.exe vprintproxy.exe
sysprep.exe w3wp.exe
taskeng.exe webkit2webprocess.exe
taskhost.exe winrar.exe
telnet.exe winword.exe
unrar.exe wireshark.exe
vboxservice.exe wmiprvse.exe
vboxsvc.exe wmplayer.exe
vboxtray.exe wmpnetwk.exe
video.ui.exe wwahost.exe
visio.exe xpsrchvw.exe
vlc.exe
Disk Space —
Customize the amount of disk space Traps uses to store logs
and information about events.
User Interface — —
Determine whether and how end users can access the Traps
console.
Agent Security — — —
Uninstall Password — — —
Change the default uninstall password to prevent
unauthorized users from uninstalling the Traps software.
Exploit Profiles Exploit profiles block attempts to exploit system flaws in browsers, and in the
operating system. For example, Exploit profiles help protect against exploit
kits, illegal code execution, and other attempts to exploit process and system
vulnerabilities. Exploit profiles are supported for Windows, Mac, and Linux
platforms.
To customize an Exploit Profile, see Add a New Exploit Security Profile.
Malware Profiles Malware profiles protect against the execution of malware including trojans,
viruses, worms, and grayware. Malware profiles serve two main purposes: to
define how to treat behavior common with malware such as ransomware or
script-based attacks, and to define how to treat known malware and unknown
files. Malware profiles are supported for Windows, and Mac platforms.
To customize a Malware Profile, see Add a New Malware Security Profile.
Restrictions Profiles Restrictions profiles limit where executables can run on the endpoint. For
example, you can restrict files from running from specific local folders or from
removable media. Restriction profiles are supported for Windows platforms.
To customize a Malware Profile, see Add a New Restrictions Security Profile.
Agent Settings Profiles Agent Settings profiles enable you to customize settings that apply to the
Traps app such as the disk space quota for log retention. For Mac and
Windows platforms, you can also customize user interface options for the
Traps console such as accessibility and notifications.
To customize an Agent Settings profile, see Add a New Agent Settings Profile.
The Traps management service displays the security capabilities supported for the platform you
selected.
STEP 3 | Configure the action to take when Traps detects an attempt to exploit each type of software
flaw.
For details on the different exploit protection capabilities, see Protection Capabilities.
• Block—Block the exploit attack.
• Report—Allow the exploit activity but report it to the Traps management service.
• Disabled—Disable the module and do not analyze or report exploit attempts.
• Default—Use the default configuration to determine the action to take. The Traps management
service displays the current default configuration for each capability in parenthesis, for example
Default (Block).
To view which processes are protected by each capability, expand Protected Processes. To drill down or
locate a specific process, use the search, or tab through the results.
For Exploit Protection for Additional Processes, you also add one or more additional processes.
On new tenants created in June 2018 or later, you must change the default uninstall
password to a new password which meets the Traps management service security
standards before you can create a new profile.
The Traps management service displays the security capabilities supported for the platform you
selected. For details, see Protection Capabilities.
STEP 3 | (Windows only) Configure Ransomware Protection to define the Action mode to take when
Traps detects ransomware activity.
STEP 4 | (Windows only) Configure Traps to Prevent Malicious Child Process Execution.
1. Select the Action mode to take when Traps detects malicious child process execution:
• Default—Use the default configuration to determine the action to take. The Traps management
service displays the default value for each capability in parenthesis, for example Default (Block).
• Block—Block the activity.
• Report—Allow the activity but report it to the Traps management service.
• Disabled—Disable the module and do not analyze or report the activity.
2. To allow specific processes to launch child processes for legitimate purposes, whitelist the child
process with optional execution criteria.
Click +, and then specify the whitelist criteria including the Parent Process Name, Child Process
Name, and Command Line Params. Use a ? to match a single character or an * to match any string of
characters.
If you are adding child process evaluation criteria based on a specific security
event, note that the event indicates both the source process and the command line
parameters in one line. Copy only the command line parameter for use in the profile.
STEP 6 | (Windows, Mac, and Android only) Configure Traps to examine executable files or DLL files on
Windows endpoints, Mach-O files on Mac endpoints, or APK files on Android endpoints.
1. Configure the Action mode, the behavior of Traps, when malware is detected:
• Default—Use the default configuration to determine the action to take. The Traps management
service displays the default value in parenthesis, for example Default (Block).
• Block—Block attempts to run malware.
• Report—Report but do not block malware that attempts to run.
• (Android only) Prompt—Enable Traps to prompt the user when malware is detected and allow the
user to choose to allow malware, dismiss the notification, or uninstall the app.
• Disabled—Disable the module and do not examine files for malware.
2. Configure additional actions to take to examine files for malware.
By default, Traps management service uses the settings specified in the default malware security
profile and displays the default configuration in parenthesis. When you select a setting other than the
default, you override the default configuration for the profile.
• (Mac only) Upload Mach-O files for cloud analysis—Enable Traps to send unknown Mach-O files
to the Traps management service, which sends the files to WildFire for analysis. WildFire accepts
files up to 100MB in size.
• (Android only) Upload APK files for cloud analysis—Enable Traps to send unknown APK files to
the Traps management service, which sends the files to WildFire for analysis. WildFire accepts
files up to 100MB in size.
• (Windows only) Quarantine malicious executables—By default, Traps blocks malware from
running but does not quarantine the file. Enable this option to quarantine files when either
WildFire or an administrative policy override identifies a file as malware. To quarantine files issued
a malware verdict by Traps local analysis, enable Traps to Quarantine local analysis. Otherwise, if
you disable this option (default) files with a malware verdict issued by local analysis will remain on
the endpoint in its original location.
The quarantine feature is not available for malware identified in network drives.
• Treat grayware as malware—Treat all grayware with the same Action mode you configure for
malware. Otherwise, if this option is disabled, grayware is considered benign and is not blocked.
• (Windows only) Upload PE files for cloud analysis—Enable Traps to send unknown PE and DLL
files to the Traps management service, which sends the files to WildFire for analysis. WildFire
accepts files up to 100MB in size.
• Local analysis—Enable Traps to use embedded machine learning to determine the likelihood that
an unknown file is malware and issue a local verdict for the file. When this option is disabled and
STEP 7 | (Windows only) Configure Traps to examine macros in Microsoft Office files.
1. Configure the Action mode, the behavior of Traps, when a malicious macros is detected:
• Default—Use the default configuration to determine the action to take. The Traps management
service displays the default value in parenthesis, for example Default (Block).
• Block—Block attempts to run malicious macros.
• Report—Report but do not block malicious macros that attempts to run.
• Disabled—Disable the module and do not examine macro for malware.
2. Configure additional actions to take to examine files for malware.
By default, Traps management service uses the settings specified in the default malware security
profile and displays the default configuration in parenthesis. When you select a setting other than the
default, you override the default configuration for the profile.
• Upload Office files for cloud analysis—Enable Traps to send Office files containing unknown
macros to the Traps management service, which sends the files to WildFire for analysis. The Traps
management service only uploads the Office file if it contains a macro. WildFire accepts files up to
100MB in size.
• Local analysis—Enable Traps to use embedded machine learning to determine the likelihood that
an unknown macro is malware and issue a local verdict for the file. When this option is disabled
and you also configure Traps to block unknown files, users will not be permitted to run unknown
macros. As a result, the unknown macros remains blocked until Traps receives an official WildFire
verdict.
• Block files with unknown verdict—When the file is unknown in the local and server cache, block it
from running.
3. Whitelist Folders from examination.
1. Click the + to add a folder.
2. Enter the path and press Enter or click the check mark when done. You can also use wildcards to
match a partial name for the folder. Use a ? to match any single character or an * to match any
string of characters. To match a folder you must terminate the path with a * which matches all
files in the folder (for example, c:\temp\*).
3. Repeat to add additional folders.
1. Configure the Action mode for Traps to periodically scan the endpoint for malware, Enabled to scan
at the configured intervals, Disabled if you do not want Traps to scan the endpoint, or Default to use
the default configuration to determine the action to take. The Traps management service displays the
default value in parenthesis, for example Default (Disabled).
2. To configure the Scan schedule, set the frequency (Weekly or Monthly) and day and time at which
the scan will run on the endpoint.
3. To include removable media drives in the scheduled scan, enable Traps to Scan removable media
drives.
By default, Traps management service uses the settings specified in the default malware security
profile and displays the default configuration in parenthesis. When you select a setting other than the
default, you override the default configuration for the profile.
4. Whitelist Folders from examination.
1. Click the + to add a folder.
2. Enter the folder path. Use a ? to match a single character or an * to match any string of characters
in the folder path (for example, C:\*\temp).
3. Press Enter or click the check mark when done.
4. Repeat to add additional folders.
STEP 10 | Assign the profile to a policy rule (see Configure a Policy Rule).
STEP 5 | Assign the profile to a policy rule (see Configure a Policy Rule).
On new tenants created in June 2018 or later, you must change the default uninstall
password to a new password which meets the Traps management service security
standards before you can create a new profile. If you later need to change the password,
you can do so by configuring or editing an Agent Settings Profile.
STEP 3 | (Windows, Mac, and Linux only) Configure the Disk Space to allot for Traps logs.
STEP 4 | (Windows and Mac only) Configure User Interface options for the Traps console.
By default, Traps management service uses the settings specified in the default agent settings profile
and displays the default configuration in parenthesis. When you select a setting other than the default,
you override the default configuration for the profile.
• Hide tray icon—Enable this option to hide the Traps icon from the notification area (system tray).
• Disable access to the Traps console—Enable this option to prevent users from opening the Traps
console.
• Hide Traps user notifications—Enable this option to operate Traps in silent mode where the Traps
agent does not display any notifications in the notification area.
STEP 6 | (Windows only) Configure Agent Security options that prevent unauthorized access or
tampering with Traps components.
Similar to the User Interface options, use the default agent settings or customize them for the profile.
1. Enable or disable Agent Anti-Tampering Protection.
2. When Agent Anti-Tampering Protection is enabled, configure granular protection options for Traps
services, processes, files, and registry values, if desired.
STEP 7 | (Windows only) Set a password the user must enter to uninstall the Traps agent.
The default uninstall password is Password1. To set a new password, the password must satisfy the
following requirements:
• Contain eight or more characters.
• Contain English letters, numbers, or any of the following symbols: !()-._`~@#"'.
To change the password:
1. Click the edit icon in the Uninstall Password area.
2. Enter and confirm the new uninstall password.
Traps discards any policy rules that do not match the endpoint platform. For example, if you
create a rule for Mac endpoints but select an endpoint group containing both Windows and
Mac endpoints, Traps applies the rule only to the Mac endpoints.
STEP 2 | Select the platform for which you want to create a new policy rule: Windows, macOS, Linux, or
Android.
STEP 4 | Select one or more endpoints, endpoint groups, or AD objects to which the rule applies.
1. Select + Add host.
2. Use the search field and/or endpoint filters to narrow the results:
• Type—By default the Traps management service displays all Agent hostnames that match your
search term and selected platform type. You can also narrow the results by:
• Group—Select an endpoint group to which to apply the rule. To define or modify an endpoint
group, see Define Endpoint Groups. You can also use the search to display endpoint groups
that match your search term.
• AD object—AD Computer, AD OU (organizational unit), AD User, or AD Group. To assign
policy rules to AD objects, you must associate the Traps management service with a Directory
Sync Service instance. AD objects also require you to select a Domain and are available for
Windows endpoints only.
If you select Group or an AD object as the type, the Traps management service
displays all results that match the Type and your search term regardless of the
platform you selected.
• Domain—By default, the Traps management service displays results for all domains. To see results
for a specific domain, select one from the list. The Domain filter is not available if you also filtered
by endpoint Group.
You can also use wildcards to search for endpoints or groups that match a partial name. Use a ? to
match any single character or an * to match any string of characters. The Traps management service
filters the results to match your search term as you type.
When there are no customized profiles available, Traps management service automatically selects the
default policy.
STEP 6 |
To save the rule, click .
STEP 7 | Change the rule order, if needed, to position the rule relative to other rules.
Traps evaluates rules from top to bottom. When Traps finds the first match it applies that rule as the
active policy. Use one of the following methods to change the rule order:
• Hover over the rule, select the anchor on the left, and drag the rule to a new place in the rule
hierarchy.
• Select the edit icon next to the policy rule, and then select Move Up to precede the rule below it or
Move Down to follow the rule above.
75
76 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events
© 2018 Palo Alto Networks, Inc.
What is a Security Event?
A security event occurs when the Traps agent identifies an attempt to run a malicious file or process. Traps
agents report security events when the file or process matches your applied policy rules (either default
policy rules or custom rules you define). When the event occurs, Traps applies the action specified in the
applied security profile, either block the malicious activity, or allow and report the malicious activity. Some
examples of events that can trigger a security event include attempts to:
• Run known malware
• Run unknown files
• Leverage bugs or flaws in software for a malicious purpose
The following topics provide more information to help you Assess Security Events:
• Security Event Severity Levels
• Security Event Details
• WildFire Analysis Details
Module Severity
DEP Medium
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events 77
© 2018 Palo Alto Networks, Inc.
Module Severity
UASLR Medium
78 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events
© 2018 Palo Alto Networks, Inc.
Security Event Details
When the Traps agent reports a security event, the Traps management service provides a detailed view
of the security event that you can use to assess the event and determine if it poses a security threat that
requires additional mitigation and remediation. The details for each security event vary depending on the
type of event: or a process with a software flaw, what rule or rules were violated, and what profile triggered
the event. These details can include some or all of the following information:
Field Description
Security Event
AGENT LOCAL TIME Local time on the endpoint when the event
occurred.
Data Retrieval
This displays only if you attempt to retrieve data from the endpoint.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events 79
© 2018 Palo Alto Networks, Inc.
Field Description
complete, the Traps management service displays
a link to Download Retrieved Data.
Module
PROFILE TYPE Type of profile associated with the rule. For details
on profile types, see Traps Profiles.
Endpoint: <endpointName>
Additional information about the endpoint.
LOGGED ON USER User that was logged into the endpoint when the
security event occurred.
80 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events
© 2018 Palo Alto Networks, Inc.
Field Description
Processes
Additional information about the affected process.
FULL PATH Full path for the file, for example C:\Users
\User\Desktop\ROP\notepad++.exe
Files
Information about files accessed by the affected process.
Users
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events 81
© 2018 Palo Alto Networks, Inc.
WildFire Analysis Details Description
Analysis Reports
82 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events
© 2018 Palo Alto Networks, Inc.
Assess Security Events
The Traps management service ranks all events in order of severity so you can quickly and easily see the
most important events when you log in to the Traps management service. You can then drill down into the
security events to determine if a security event is a real threat and, if so, you can remediate it. In some cases
you may determine that a security event does not pose a real threat and can create an exception for it. Use
the following workflow to drill down into a security event and assess whether it poses a security threat.
If the name of the endpoint changes, the Traps management service automatically
updates the name associated with the security event to use the new name, but
preserves the original endpoint name in the details view of the event. To search for
events for a renamed endpoint, use the current endpoint name as match criteria.
To instead search for an endpoint by its unique endpoint ID, select Endpoint ID instead of Endpoint
Name and enter the full ID value. You can identify the endpoint ID—which is assigned by the Traps
management service—in the details view for an endpoint (for more information, see View Details
About an Endpoint on page 39).
• By username—Enter a full or partial Username to filter security events that occurred when a user
was logged into one or more endpoints. You can also include the user domain in the format domain
\username to filter security events for a user that belongs to a specific domain.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events 83
© 2018 Palo Alto Networks, Inc.
• By process or file name—Enter a full or partial Process/File Name to filter security events for a
specific file.
STEP 3 | To drill down into additional Security Event Details, select the Event name.
This detailed view provides context around the event and provides information you can use to help you
assess whether the security event is a valid threat.
STEP 4 | While you are investigating a security event, consider changing the event STATUS to
Investigating (click the
After you set the status, you can easily filter the Security Events dashboard by the events you are
currently assessing.
STEP 5 | If the threat violated a Malware policy rule, you can also view information about the hash
and the associated WildFire Analysis Report to learn about the malicious behavior WildFire
observed.
You can then use this information to help you remediate the malware on your endpoints to prevent
it from propagating. If you disagree with a WildFire verdict, you can submit a report describing why
you believe the verdict is incorrect to Palo Alto Networks. For more information, see Review WildFire
Analysis Details.
84 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events
© 2018 Palo Alto Networks, Inc.
You can also go to the Logs > Data Retrieval page to view all data collected from Traps agents. See
Data Retrieval Logs.
3. After the Traps agent uploads the data to the Traps management service, you can download it to
further assess and understand the activity associated with the event.
To view additional details about an endpoint including the policy applied on the endpoint, see
Manage Registered Endpoints.
STEP 8 | (Optional) If after reviewing the details about a security event, you want to grant an exception
to the security policy that triggered the event, Create a Policy Exception.
To configure an exception for an event triggered by your exploit policy, configure a Process Exception.
To configure an exception for an event triggered by your malware policy, configure a Hash Exception.
Exceptions are not available for restriction policy rules.
STEP 9 | After you complete your investigation, change the STATUS of the security event to Closed
to indicate to other administrators that no additional assessment is required. You can also
optionally archive the event:
1. From the Security Events dashboard, select the events you want to archive.
The Traps management service displays a menu of actions to manage the event.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events 85
© 2018 Palo Alto Networks, Inc.
Create a Policy Exception
In some cases, you may need to override the applied security policy to change whether Traps allows a
process or file to run on an endpoint. To override the security policy, you can configure any of the following
types of policy exceptions:
• Create a Process Exception—Allow processes blocked by an exploit security module to run on an
endpoint. You can also disable all exploit protection modules for a process.
• Create a Hash Exception—Explicitly define a verdict for a file (Benign or Malware). The Traps
management service distributes the verdict to all Traps agents that attempt to run the file. Traps will
evaluate the verdict you specify for the file instead of the WildFire verdict.
• Manage Support Exceptions—Palo Alto Networks defined exceptions that can be used to temporarily
address policy issues for specific customers.
86 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events
© 2018 Palo Alto Networks, Inc.
3. Add additional Hosts, if needed.
1. Click + to open the endpoint search dialog.
2. Add endpoints by the endpoint hostname.
To narrow the list of endpoints you can begin typing the name in the search field. The Traps
management service provides autocompletion as you type. In a multi-domain environment, you
can also filter the list of endpoints by Domain. To add all endpoints that match the platform type,
type any into the search field. Use the any option with caution and instead consider assigning
a different security profile to your policy rule if the applied security policy is not meeting your
needs.
4. Enter a comment to explain why you are granting an exception to the security policy.
5. To save the policy exception, click .
After the Traps management service distributes the updated security policy to the agent at the next
heartbeat communication, the next time the activity is repeated, Traps will permit the process to run.
6. At any time, you can return to the Exceptions > Process Exceptions page to make changes to the
exception or Disable or delete a process exception. if it is no longer required.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events 87
© 2018 Palo Alto Networks, Inc.
3. Enter the Process Name for which you want to disable protection.
4. Select the Platform to which the exception applies.
5. Select the exploit protection Module that you want to disable on the process.
6. Select Disable.
The Traps management service adds the exception to the Process Exceptions page.
7. Apply the exception to one or more Hosts.
Until you apply the exception to one ore more hosts, the exception is active but does not apply to
any endpoint.
1. Click the edit icon .
2. Click + to open the endpoint search dialog.
3. Add endpoints by the endpoint hostname.
To narrow the list of endpoints you can begin typing the name in the search field. The Traps
management service provides autocompletion as you type. In a multi-domain environment, you
can also filter the list of endpoints by Domain. To add all endpoints that match the platform type,
type any into the search field. Use the any option with caution and instead consider assigning
a different security profile to your policy rule if the applied security policy is not meeting your
needs.
8.
Click save .
The Traps management service sends the latest policy with the hash exception to the specified
endpoints at the next heartbeat communication with the Traps agent.
9. At any time, you can return to the Exceptions > Process Exceptions page to make changes to the
exception or Disable or delete a process exception. if it is no longer required.
Use the any option with caution and instead consider assigning a different security
profile to your policy rule if the applied security policy is not meeting your needs.
7.
Click save .
88 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events
© 2018 Palo Alto Networks, Inc.
The Traps management service sends the latest policy with the hash exception to the specified
endpoints at the next heartbeat communication with the Traps agent.
8. At any time, you can return to the Exceptions > Process Exceptions page to make changes to the
exception or Disable or delete a process exception. if it is no longer required.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events 89
© 2018 Palo Alto Networks, Inc.
As an alternative to defining individual hashes, you can also use the Import CSV
action to import hashes and verdicts as a comma-separated values (CSV) file. The
Traps management service accepts a CSV file with the following fields: Verdict,
Hash, Name, and FileType, where:
• Verdict—0 for benign or 1 for malware
• Hash—SHA256 hash value
• Name—Name of the file
• FileType—One of the following:
• 0—Unknown
• 1—PE
• 2—Mach-O
• 3—DLL
• 4—Office File
• 5—ELF
For example:
90 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events
© 2018 Palo Alto Networks, Inc.
Manage Support Exceptions
Support exceptions are not configurable but are available as a tool for Palo Alto Networks to use to issue
temporary amendments or changes to your specific security policy. Palo Alto Networks can issue support
exceptions which change the default configuration of an internal module and other settings related to your
security policy. To deliver a support exception, Support can provide a JSON file containing the configuration
changes or amendments to your default policy. After receiving the support exception file, you can manually
import it to the Traps management service.
The Support Exceptions page displays all support exceptions issued to your Traps management service
tenant. This page is typically blank unless you are actively working with Support to address a policy-related
issue. When present, the Traps management service displays the Name of the support exception, the
Profile Type changed by the support exception, any Endpoints to which the support exception applies, the
creation time, and any administrative comments logged for the exception.
After Palo Alto Networks issues your tenant a support exception, you can assign it to one or more hosts.
STEP 1 | Delete or disable any exceptions you defined which will conflict with the support exception.
Administrator-defined exceptions take precedence over support exceptions.
STEP 6 | Enter an administrative comment that explains the purpose of the support exception or
provides any additional details.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events 91
© 2018 Palo Alto Networks, Inc.
The Traps management service issues the policy exception to the host at the next heartbeat
communication.
STEP 8 | After you are done with the support exception, you can temporarily disable it or permanently
delete it.
Select the check box for the support exception and click the icon for the desired action.
92 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events
© 2018 Palo Alto Networks, Inc.
Scan an Endpoint for Malware
In addition to blocking the execution of malware, Traps can scan your Windows endpoints and attached
removable drives for dormant malware that is not actively attempting to run. If you enable Traps to
quarantine malicious files, Traps can also automatically quarantine any malware it finds during the scan.
Otherwise, Traps only reports the malware to the Traps management service so that you can manually take
additional action to remove the malware before it is triggered and attempts to harm the endpoint.
You can scan your endpoints for malware in two ways: You can enable automatic periodic scanning of
endpoints as part of a malware security profile (see Add a New Malware Security Profile) and you can run
an on-demand scan on one or more endpoints.
When a scan is triggered on an endpoint, Traps collects hashes of all executable files, Office files containing
macros, and DLLs and sends them to the Traps management service. The Traps management service
then submits the hashes to WildFire to determine whether any of the files are malware. If the hash is
unknown to WildFire, the Traps management service can also submit the file for in-depth analysis. The
Traps management service then logs a security event for each file that WildFire returns with a malware
verdict.
After the scan completes, you can view the high level Scanning Report on the Endpoints >
<endpoint_name> > Policy tab.
The Scanning Report provides clickable results to help you quickly identify any files that require
remediation.
• Malware—Takes you to a filtered view of Security Events reported by the Traps agent for this scan. For
additional details about an event, select the event name. Use the information—such as the quarantine
status and file path—to determine whether you need to take additional action to remediate the file on
the endpoint.
• Errors—Takes you to a filtered view of total events categorized by the event type File Scan Failed on the
specific endpoint.
To run a scan on-demand:
To reduce the number of results, use the endpoint name search and filters (Status,
Operating System (OS), or endpoint Group) at the top of the table.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events 93
© 2018 Palo Alto Networks, Inc.
You can also initiate a scan on an endpoint from the details view (click Scan Now).
If at anytime, you want to abort the scan, select the endpoints, and then click the abort scan icon . Or,
to abort the scan of a specific endpoint, select Abort Scan from the details view of an endpoint and then
confirm the action.
94 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events
© 2018 Palo Alto Networks, Inc.
The Traps management service logs scanning events for malicious files with an EVENT type of
WildFire Malware and the ACTION of Scanned. To view in-depth details about the file behavior, you
can Review WildFire Analysis Details.
5. To view files which failed to scan, select Errors.
The Scanning Report displays the total number of errors that occurred during the scan. When you
select Errors, the Traps management service jumps to the filtered list of all file scanning errors logged
for the endpoint during the selected time period (by default, 30 days). If you ran multiple scans on
an endpoint, the total number of events logged for the endpoint can be greater than the number
displayed in an individual Scanning Report.
To repeat the query without locating the Scanning Report, use the query filters at the
top of the Endpoint Logs page (Time, endpoint name, and event Type).
For additional context on an event, review the Message field to determine the file and reason for the
scan failure.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events 95
© 2018 Palo Alto Networks, Inc.
Investigate a File
Each time a file attempts to run on a Mac, or Windows endpoint, Traps logs the event and reports it to the
Traps management service. The File Analytics page in the Traps management service displays all the files
that run on your endpoints, their corresponding verdicts, and other details about the files. When a security
event occurs or a specific file warrants investigation, you can review the WildFire Analysis Report, view
which endpoints have attempted to run the file, and if necessary, create an exception to override the official
verdict.
To investigate a file:
STEP 3 | Select the File Name to view additional details about the file.
The Traps management service summarizes details about the file and displays the most recent verdict
assigned to the file along with the verdict source.
STEP 4 | To view the endpoints on which a file attempted to run during the last month, click the
Endpoints tab.
The Traps management service displays details about each Endpoint including the Endpoint name, User
that was logged in when the file attempted to run, full File path, local analysis verdict (if issued), Content
Version for the local policy, and the date when the file was Last seen.
96 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events
© 2018 Palo Alto Networks, Inc.
STEP 5 | Select the WildFire tab to Review WildFire Analysis Details
STEP 6 | If after analyzing the WildFire Analysis Report and completing any additional research, you
believe the verdict for the file is incorrect:
• Report an incorrect verdict to Palo Alto Networks.
• Create a Hash Exception
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events 97
© 2018 Palo Alto Networks, Inc.
Review WildFire Analysis Details
For each file, the Traps management service receives a file verdict and the WildFire Analysis Report
detailing additional information you can use to assess the nature of a file.
• Drill down into WildFire Analysis Details.
• Download the official WildFire report.
• Report an incorrect verdict to Palo Alto Networks.
98 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events
© 2018 Palo Alto Networks, Inc.
3. Select the testing environment, for example Windows 7 x64 SP1, to review the summary and
additional details for that testing environment.
4. Expand the different sections of the report to view the reported behavior for the file.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events 99
© 2018 Palo Alto Networks, Inc.
Manage Quarantined Files
You can enable Traps to quarantine malicious files on Windows endpoints as part of a malware security
profile. When malware attempts to run, Traps automatically quarantines the file by moving it from a local or
removable hard-drive to a local quarantine folder (%PROGRAMDATA%\Cyvera\Quarantine). This isolates
and prevents the file from causing any harm to your endpoints.
To evaluate whether an executable file is considered malicious, Traps uses information from the following
sources:
• WildFire threat intelligence
• Local analysis
• Hash exception poilcy
Due to the nature of our ever-changing threat landscape, WildFire can reevaluate the nature of a file and,
if it determines the file to be benign, update the WildFire verdict. You can also Create a Hash Exception to
change the file verdict in your Traps management service tenant. You might create a hash exception if, after
using available threat intelligence—such as from WildFire or AutoFocus—you believe a quarantined file is
not malicious and is instead benign.
To manage quarantined files, you can:
• View the quarantine status for a malicious file.
• Review details about files that are eligible for restoration.
• Restore a benign file to its original location.
• Archive a restoration candidate.
100 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events
© 2018 Palo Alto Networks, Inc.
• Pending Restore—The Traps management service has instructed the Traps agent to restore the
file, but Traps has not yet completed the action.
• Restore Succeeded—The Traps agent successfully restored the file to its original location on the
endpoint.
• Restore Failed—The Traps agent failed to restore the file within the timeout.
For each file, the Traps management service displays the following information:
• First File Name—The name of file when Traps first logged an attempt to run.
• Verdict—Verdict change which made the file eligible for restoration
• Hash—SHA256 hash value for the file.
• Endpoints—Name and platform type of the endpoints on which the file was quarantined.
• Statuses—Quarantine or restoration status of the file, one of the following: Quarantined, Restore
Succeeded, Pending Restore, Restore Failed, Quarantine Record Deleted. For details on these
statuses, see View the quarantine status for a malicious file.
2. To view additional details about the file, select the First File Name associated with the file.
In addition to the fields above, the Traps management service displays the following information for
each endpoint on which the file was quarantined.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events 101
© 2018 Palo Alto Networks, Inc.
• Endpoint—Name and platform type of the endpoint.
• File Name—File name on the endpoint.
• Status—Quarantine/restoration status of the file on the endpoint.
• Event—Unique identifier and link to the original security event.
102 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events
© 2018 Palo Alto Networks, Inc.
2. Review the details of the exception and enter any comments to explain the reason for the
exception.
3. Click to save the exception.
The Traps management service prompts you to Restore the file, if desired.
4. Click Restore to restore the file immediately. Otherwise, to restore the file at a later time, click
Cancel. When you are ready to restore the file, go to the Logs > Restore Candidates page.
The Traps management service sends the instruction to restore the file at the next heartbeat
communication with the Traps agent on all endpoints on which the file was quarantined.
If you remove a file before you restore it, the file will remain in quarantine.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events 103
© 2018 Palo Alto Networks, Inc.
104 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | Assess and Remediate Security Events
View and Manage Logs
A log is an automatically generated, time-stamped file that provides an audit trail for system
events on the Traps management system or the endpoint that the Traps agent monitors. Log
entries contain artifacts, which are properties, activities, or behaviors associated with the
logged event, such as the name of the endpoint and the action recorded.
The Traps management service categorizes logs as follows:
> Threat logs—Information about all security events logged by Traps, including malware and
exploit preventions, post-detection events, and notifications related to restriction rules that
occur on the endpoints in your organization. These logs are visible on the Security Events
page.
> Config logs—Audit logs recorded by Traps management service. These logs include
policy events, such as changes to the security policy, exception management, and
profile management. Audit logs also include other configuration changes, such as device
management, distribution management and system management. These logs are visible on
the Logs >Server Logs page.
> System logs—System logs contain data about the ongoing monitoring of Traps management
service and agent events. This includes changes or updates to license management, agent
registration, user authentication, agent connectivity status, agent upgrade and agent
protection status. System logs are often required for day-to-day operations as well as
support and troubleshooting activities. Traps management service system logs are visible on
the Logs >Server Logs page and Traps agent system logs are visible on the Logs > Endpoint
Logs page.
> Analytics Logs—File execution logs reported on an hourly basis. Information derived from
these logs is available on the File Analytics page.
105
106 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs
© 2018 Palo Alto Networks, Inc.
Log Types and Severity Levels
• Endpoint Logs
• Configuration Logs
• Policy Logs
• System Logs
Endpoint Logs
Endpoint logs display entries for events monitored by the Traps agent and are classified with a record type
of system and a category. The Traps agent logs an endpoint event for the following categories of events:
• Audit—Changes to the agent software, policy, or services as initiated by the administrator.
• Monitoring—Change in status for actions carried out or monitored by the Traps agent such as
quarantine, log quota, or policy applications.
• Status—Changes to the agent protection status.
Each entry includes the event category which identifies the type of configuration event that occurred, the
specific type of event, the severity of the event which corresponds to the event type, a descriptive message
which describes the log event, the username of the local active user on the endpoint, and the date and time
the event occurred.
The following describes the endpoint logs that you can view on the Traps management service.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs 107
© 2018 Palo Alto Networks, Inc.
Log Type Severity Record Type Category
108 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs
© 2018 Palo Alto Networks, Inc.
Log Type Severity Record Type Category
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs 109
© 2018 Palo Alto Networks, Inc.
Log Type Severity Record Type Category
Server Logs
From the Server Logs pages, you can view the following classes of logs:
• Configuration Logs
• Policy Logs
• System Logs
Configuration Logs
Configuration logs display entries for changes to the Traps management service and are classified with a
record type of config. The Traps management service logs a configuration event for the following categories
of events:
• Device Management—Administrative changes to endpoint groups and agent uninstall and upgrade
messages.
• Distribution Management—Administrative management of Traps software packages.
• Restore Candidate—Administrative management of quarantined files.
• Security Event Management—Administrative management of security events.
• System Management—Data management actions such as requests for, download, or export of data.
Each log entry includes the event category which identifies the type of configuration event that occurred,
the specific type of event, the severity of the event which corresponds to the event type (Configuration
logs all receive the Info severity level), a descriptive message which describes the log event, the username
of the administrator who initiated the change, and the date and time the event occurred.
The following table describes the configuration logs that you can view on the Traps management service.
110 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs
© 2018 Palo Alto Networks, Inc.
Log Type Severity Record Type Category
Message: A retrieve security event data message was created for event
{preventionKey} on endpoint {endpointID} by admin user {userFullName} -
{userName}
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs 111
© 2018 Palo Alto Networks, Inc.
Log Type Severity Record Type Category
Policy Logs
Policy logs display entries for changes to the security policy and are classified with a record type of config.
The Traps management service logs a policy event for the following subclasses of events:
• Exception Management—Administrative management of policy exceptions.
• Policy Management—Administrative management of policy rules.
• Profile Management—Administrative management of security profiles.
• System Management—Errors applying policies.
Each entry includes the event category which identifies the type of configuration event that occurred,
the specific type of event, the severity of the event which corresponds to the event type (Policy logs all
receive the Info severity level), a descriptive message which describes the log event, and the date and time
the event occurred. If an administrator initiated the change, the entry also includes the username of the
administrator.
The following table describes the policy logs that you can view on the Traps management service.
112 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs
© 2018 Palo Alto Networks, Inc.
Log Name Severity Record Type Category
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs 113
© 2018 Palo Alto Networks, Inc.
Log Name Severity Record Type Category
114 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs
© 2018 Palo Alto Networks, Inc.
Log Name Severity Record Type Category
System Logs
System logs display entries for changes to the Traps management service and are classified with a record
type of system and category. The Traps management service logs a system event for the following
categories of events:
• Licensing—License capacity and change events.
• Provisioning—Agent onboarding issues.
• Security Event—Issues saving prevention data related to a security event.
• User Authentication—Agent authentication issues commonly due to an unauthorized endpoint.
Each entry includes the event category which identifies the type of event that occurred, the specific type of
system event, the severity of the event which corresponds to the event type, a descriptive message which
describes the log event, and the date and time the event occurred.
The following table describes the system logs that you can view on the Traps management service.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs 115
© 2018 Palo Alto Networks, Inc.
Log Name Severity Record Type Category
116 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs
© 2018 Palo Alto Networks, Inc.
Log Name Severity Record Type Category
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs 117
© 2018 Palo Alto Networks, Inc.
Data Retrieval
To help you troubleshoot a system or security event, you can collect the following types of files:
• Tech Support File—On-demand aggregation of all logs for an endpoint to aid Technical Support in
troubleshooting and diagnosing system issues.
• Security Event Data—On demand aggregation of all forensic data (such as the memory dump) associated
with a security event.
For each log, you can view the following information:
Field Description
FILE NAME Name of the log ZIP file. If the Traps management service has received
the file, the file name also provides a link to download the file.
STATUS Status of the file upload. Finished when the Traps management service
has received the file, Pending while the upload is in progress, or Failed if
the upload was not successful or timed out.
TYPE Type of file requested: Tech Support File or Security Event Data.
UPLOAD TIME Universal coordinated time (UTC) when the data was requested,
adjusted for your local system time.
118 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs
© 2018 Palo Alto Networks, Inc.
View Logs from the Traps Management
Service
You can view the different log types on the Traps management service in a tabular format. The logs on the
Traps management service are categorized by type and appear in various places throughout the interface.
Endpoint, server, and data management logs are available on the main Logs page and threat logs are
available on the Security Events pages. To learn more about the events that trigger the creation of entries,
see Log Types and Severity Levels.
STEP 2 | Select the type of logs you want to review: Data Retrieval, Endpoint Logs, or Server Logs.
To view threat logs, go to the Security Events page.
From the Data Retrieval page, you can review the status of all files that have not been purged by the
data retention policy.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs 119
© 2018 Palo Alto Networks, Inc.
Filter Logs on the Traps Management Service
Endpoint and server logs have a filter area that allows you to set a criteria for which log entries to display.
The ability to filter logs is useful for focusing on events on your Traps management service that possess
particular properties or attributes. Filter logs by artifacts that are associated with individual log entries.
• Filter by Time.
Select the Time period for which you would like to filter security events: Last 24 hours, Last 7 days, Last
30 days, Last 3 Months.
120 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs
© 2018 Palo Alto Networks, Inc.
Export Logs from the Traps Management
Service
To archive or save endpoint and server logs for future use, you can export logs from the Traps management
service in comma-separated values (CSV) format.
STEP 2 | Select the type of logs you want to export: Endpoint Logs or Server Logs.
To view threat logs, go to the Security Events page.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs 121
© 2018 Palo Alto Networks, Inc.
Forward Traps Logs to a Syslog Server
The logs stored on the Logging Service are available for queries and reports using Panorama and the
Application Framework. If you need to fulfill your organization's legal compliance requirements, the Log
Forwarding app enables you to easily forward logs stored on the Logging Service to an external Syslog
receiver. For example, you can forward logs to a SIEM for long term storage, SOC, or internal audit
obligations.
To meet your long term storage, reporting and monitoring, or legal and compliance needs, you can configure
a Syslog receiver and export all logs or a subset of logs stored on the Logging Service in the IETF Syslog
message format defined in RFC 5424. For each instance of the Logging Service, you can one deploy an
instance of the Log Forwarding app and forward logs to a single Syslog destination.
The communication between the Logging Service and the Syslog destination uses Syslog over TLS, and
upon connection, the Logging Service validates that the Syslog receiver has a certificate signed by a trusted
root CA. The Log Forwarding app does not support self-signed certificates.
To begin forwarding logs:
• Configure Log Forwarding
• Traps Logs Format for Syslog Export from the Logging Service
122 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs
© 2018 Palo Alto Networks, Inc.
When you configure the Log Forwarding app, you can choose the Log Types you want to forward (all
subtypes within a log source, such as Traps, or only specific subtypes). For Traps, you can send Threat,
Config, System, or Analytics logs.
Traps Logs Format for Syslog Export from the Logging Service
The following topics list the standard fields of each Traps log type that the Logging Service app can forward
to an external server. To facilitate parsing, the delimiter is a comma: each field is a comma-separated value
(CSV) string. The FUTURE_USE tag applies to fields that the Traps management service does not currently
implement.
• Threat Logs
• Config Logs
• System Logs
• Analytics Logs
Threat Logs
Format: recordType, class, FUTURE_USE, eventType, generatedTime, serverTime, agentTime, tzOffset,
FUTURE_USE, facility, customerId, trapsId, , serverHost, serverComponentVersion, regionId, isEndpoint,
agentId, osType, isVdi, osVersion, is64, agentIp, deviceName, deviceDomain, , severity, trapsSeverity,
agentVersion, contentVersion, , protectionStatus, preventionKey, moduleId, profile, moduleStatusId,
verdict, preventionMode, terminate, terminateTarget, quarantine, block, postDetected, FUTURE_USE,
eventParameters(Array), sourceProcessIdx(Array), targetProcessIdx(Array), fileIdx(Array), processes(Array),
files(Array), users(Array), urls(Array), description(Array)
recordType Record type associated with the event which you can use when managing
logging quotas. Values are:
• config—Traps management service administration and configuration
changes.
• system—Automated system management and agent reporting events.
• analytics—Hourly hash execution report from the agent.
• threats—Security events that occur on the endpoints.
class Class of the Traps management service log; Values are: config, policy, system,
agent_log.
generatedTime Universal Time Coordinated (UTC) equivalent of the time at which an event
was logged. For agent events, this represents the time on the endpoint. For
policy, configuration, and system events, this represents the time on the
Traps management service. ISO-8601 string representation (for example,
2017-01-24T09:08:59Z).
serverTime Universal Time Coordinated (UTC) equivalent of the time at which the server
generated the log. If the log was generated on an endpoint, this field identifies
the time the server received the log. ISO-8601 string representation (for
example, 2017-01-24T09:08:59Z).
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs 123
© 2018 Palo Alto Networks, Inc.
Field Name Description
agentTime Universal Time Coordinated (UTC) equivalent of the time at which an agent
logged an event. ISO-8601 string representation.
facility The Traps system component that initiated the event, for example:
TrapsAgent, TrapsServiceCore, TrapsServiceManagement,
TrapsServiceBackend.
customerId The ID that uniquely identifies the Logging Service instance which received
this log record.
osVersion Full version number of the operating system running on the endpoint. For
example, 6.1.7601.19135.
124 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs
© 2018 Palo Alto Networks, Inc.
Field Name Description
trapsSeverity Severity level associated with the event defined for the Traps management
service. Each of these severities correspond to a syslog severity level:
• 0—Critical. Identical to the syslog 0 (Critical) severity level.
• 1—High. Corresponds to the syslog 1 (Error) severity level.
• 2—Medium. Corresponds to the syslog 2 (Warning) severity level.
• 3—Low. Corresponds to the syslog 3 (Notice) severity level.
• 4—Informational. Corresponds to the syslog 4 (Info) severity level.
• 5—Configuration. Corresponds to the syslog 4 (Info) severity level.
See also the severity log field.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs 125
© 2018 Palo Alto Networks, Inc.
Field Name Description
preventionMode Action carried out by the Traps agent (block or notify). The prevention mode
is specified in the rule’s configuration.
terminateTarget Termination action taken on the target file (relevant for some child process
execution events where we terminate the child process but not the parent
process); Values are:
• 0—Target file was not terminated.
• 1—Target file was terminated.
eventParameters(Array) Parameters associated with the type of event. For example, username,
endpoint hostname, and filename.
targetProcessIdx(Array) Target process index in the processes array. A missing or negative value
means there is no target process.
fileIdx(Array) Index of target files for specific security events such as: Scanning, Malicious
DLL, Malicious Macro events.
processes(Array) All related details for the process file that triggered an event; Values are:
• 1—System process ID
• 2—Parent process ID
• 3—File object corresponding to the process executable file
• 4—Command line arguments (if any)
• 5—Description field of the VERSIONINFO resource
• 6—File version field of the VERSIONINFO resource
126 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs
© 2018 Palo Alto Networks, Inc.
Field Name Description
• 3—Raw full filepath
• 4—A predefined drive type: local, network mapped drive, UNC path host,
removable media, etc.
• 5—File name (with no extension), such as AdapterTroubleshooter
• 6—File extension (for example, EXE or DLL)
• 7—File type defined by the Traps agent
• 8—UTC file creation time
• 9—UTC file modification time
• 10—UTC file access time
• 11—File attributes bitmask
• 12—File size in bytes
• 13—Signer field of the code signing certificate
users(Array) Details about the active user on the endpoint when the event occurred:
• 1—Username of the active user on the endpoint.
• 2—Domain to which the user account belongs.
description(Array) (Mac only) Description of components related to Traps. For example, the
description of the ROP, JIT, Dylib hijacking modules for Mac endpoints is
Memory Corruption Exploit.
Config Logs
Format: recordType, class, FUTURE_USE, subClassId, eventType, eventCategory, generatedTime,
serverTime, FUTURE_USE, facility, customerId, trapsId, serverHost, serverComponentVersion, regionId,
isEndpoint, agentId, severity, trapsSeverity, messageCode, friendlyName, FUTURE_USE, msgTextEn,
userFullName, userName
recordType Record type associated with the event which you can use when managing
logging quotas. Values are:
• config—Traps management service administration and configuration
changes.
• system—Automated system management and agent reporting events.
• analytics—Hourly hash execution report from the agent.
• threats—Security events that occur on the endpoints.
class Class of the Traps management service log. Config logs have a value of config.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs 127
© 2018 Palo Alto Networks, Inc.
Field Name Description
subClass Subclass of event. Used to categorize logs in the Traps management service
user interface.
subClassId Numeric representation of the subClass field for easy sorting and filtering.
eventCategory Category of event, used internally for processing the flow of logs. Event
categories vary by class:
• config—deviceManagement, distributionManagement,
securityEventManagement, systemManagement
• policy—exceptionManagement, policyManagement, profileManagement
• system—licensing, provisioning, userAuthentication, workerProcessing
• agent_log—agentFlow
generatedTime Universal Time Coordinated (UTC) equivalent of the time at which an event
was logged. For agent events, this represents the time on the endpoint. For
policy, configuration, and system events, this represents the time on the
Traps management service. ISO-8601 string representation (for example,
2017-01-24T09:08:59Z).
serverTime Universal Time Coordinated (UTC) equivalent of the time at which the server
generated the log. If the log was generated on an endpoint, this field identifies
the time the server received the log. ISO-8601 string representation (for
example, 2017-01-24T09:08:59Z).
facility The Traps system component that initiated the event, for example:
TrapsAgent, TrapsServiceCore, TrapsServiceManagement,
TrapsServiceBackend.
customerId The ID that uniquely identifies the Logging Service instance which received
this log record.
128 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs
© 2018 Palo Alto Networks, Inc.
Field Name Description
• 0—Critical
• 1—Error
• 2—Warning
• 3—Notice
• 4—Info
Each event also has an associated Traps severity. See the
messageData.trapsSeverity field for details.
trapsSeverity Severity level associated with the event defined for the Traps management
service. Each of these severities correspond to a syslog severity level:
• 0—Critical. Identical to the syslog 0 (Critical) severity level.
• 1—High. Corresponds to the syslog 1 (Error) severity level.
• 2—Medium. Corresponds to the syslog 2 (Warning) severity level.
• 3—Low. Corresponds to the syslog 3 (Notice) severity level.
• 4—Informational. Corresponds to the syslog 4 (Info) severity level.
• 5—Configuration. Corresponds to the syslog 4 (Info) severity level.
See also the severity log field.
System Logs
Format: recordType, class, FUTURE_USE, subClassId, eventType, eventCategory, generatedTime,
serverTime, FUTURE_USE, facility, customerId, trapsId, serverHost, serverComponentVersion, regionId,
isEndpoint, agentId, severity, trapsSeverity, messageCode, friendlyName, FUTURE_USE, msgTextEn,
userFullName, userName
recordType Record type associated with the event which you can use when managing
logging quotas. Values are:
• config—Traps management service administration and configuration
changes.
• system—Automated system management and agent reporting events.
• analytics—Hourly hash execution report from the agent.
• threats—Security events that occur on the endpoints.
class Class of the Traps management service log. System logs have a value of
system.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs 129
© 2018 Palo Alto Networks, Inc.
Field Name Description
subClass Subclass of event. Used to categorize logs in the Traps management service
user interface.
subClassId Numeric representation of the subClass field for easy sorting and filtering.
eventCategory Category of event, used internally for processing the flow of logs. Event
categories vary by class:
• config—deviceManagement, distributionManagement,
securityEventManagement, systemManagement
• policy—exceptionManagement, policyManagement, profileManagement
• system—licensing, provisioning, userAuthentication, workerProcessing
• agent_log—agentFlow
generatedTime Universal Time Coordinated (UTC) equivalent of the time at which an event
was logged. For agent events, this represents the time on the endpoint. For
policy, configuration, and system events, this represents the time on the
Traps management service. ISO-8601 string representation (for example,
2017-01-24T09:08:59Z).
serverTime Universal Time Coordinated (UTC) equivalent of the time at which the server
generated the log. If the log was generated on an endpoint, this field identifies
the time the server received the log. ISO-8601 string representation (for
example, 2017-01-24T09:08:59Z).
facility The Traps system component that initiated the event, for example:
TrapsAgent, TrapsServiceCore, TrapsServiceManagement,
TrapsServiceBackend.
customerId The ID that uniquely identifies the Logging Service instance which received
this log record.
130 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs
© 2018 Palo Alto Networks, Inc.
Field Name Description
• 0—Critical
• 1—Error
• 2—Warning
• 3—Notice
• 4—Info
Each event also has an associated Traps severity. See the
messageData.trapsSeverity field for details.
trapsSeverity Severity level associated with the event defined for the Traps management
service. Each of these severities correspond to a syslog severity level:
• 0—Critical. Identical to the syslog 0 (Critical) severity level.
• 1—High. Corresponds to the syslog 1 (Error) severity level.
• 2—Medium. Corresponds to the syslog 2 (Warning) severity level.
• 3—Low. Corresponds to the syslog 3 (Notice) severity level.
• 4—Informational. Corresponds to the syslog 4 (Info) severity level.
• 5—Configuration. Corresponds to the syslog 4 (Info) severity level.
See also the severity log field.
Analytics Logs
Format: recordType, class, eventType, eventCategory, generatedTime, serverTime, agentTime, tzOffset,
FUTURE_USE, facility, customerId, trapsId, , serverHost, serverComponentVersion, regionId, isEndpoint,
agentId, osType, isVdi, osVersion, is64, agentIp, deviceName, deviceDomain, severity, agentVersion,
contentVersion, , protectionStatus, sha256, type, parentSha256, lastSeen, fileName, filePath, fileSize,
localAnalysisResult, reported, blocked, executionCount
recordType Record type associated with the event which you can use when managing
logging quotas. Values are:
• config—Traps management service administration and configuration
changes.
• system—Automated system management and agent reporting events.
• analytics—Hourly hash execution report from the agent.
• threats—Security events that occur on the endpoints.
class Class of the Traps management service log; Values are: config, policy, system,
agent_log.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs 131
© 2018 Palo Alto Networks, Inc.
Field Name Description
eventCategory Category of event, used internally for processing the flow of logs. Event
categories vary by class:
• config—deviceManagement, distributionManagement,
securityEventManagement, systemManagement
• policy—exceptionManagement, policyManagement, profileManagement
• system—licensing, provisioning, userAuthentication, workerProcessing
• agent_log—agentFlow
generatedTime Universal Time Coordinated (UTC) equivalent of the time at which an event
was logged. For agent events, this represents the time on the endpoint. For
policy, configuration, and system events, this represents the time on the
Traps management service. ISO-8601 string representation (for example,
2017-01-24T09:08:59Z).
serverTime Universal Time Coordinated (UTC) equivalent of the time at which the server
generated the log. If the log was generated on an endpoint, this field identifies
the time the server received the log. ISO-8601 string representation (for
example, 2017-01-24T09:08:59Z).
agentTime Universal Time Coordinated (UTC) equivalent of the time at which an agent
logged an event. ISO-8601 string representation.
facility The Traps system component that initiated the event, for example:
TrapsAgent, TrapsServiceCore, TrapsServiceManagement,
TrapsServiceBackend.
customerId The ID that uniquely identifies the Logging Service instance which received
this log record.
132 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs
© 2018 Palo Alto Networks, Inc.
Field Name Description
• 1—Windows
• 2—OS X/macOS
• 3—Android
• 4—Linux
osVersion Full version number of the operating system running on the endpoint. For
example, 6.1.7601.19135.
TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs 133
© 2018 Palo Alto Networks, Inc.
Field Name Description
• 4—Office file (containing a macro)
lastSeen Universal Time Coordinated (UTC) equivalent of the time when the file
last ran on an endpoint. ISO-8601 string representation (for example,
2017-01-24T09:08:59Z).
fileName File name, without the path or the file type extension.
localAnalysisResult This object includes the content version, local analysis module version, verdict
result, file signer, and trusted signer result. The trusted signer result is an
integer value:
• 0—Traps did not evaluate the signer of the file.
• 1—The signer is trusted.
• 2—The signer is not trusted.
executionCount The total number of times a file identified by a specific hash was executed.
134 TRAPS MANAGEMENT SERVICE ADMINISTRATOR’S GUIDE | View and Manage Logs