Firewall Analyzer integrates with Splunk to forward critical firewall events, access logs, audit logs, and alerts to the Splunk platform in real time as syslogs. This integration allows Firewall Analyzer to act as a centralized log monitoring solution that collects, analyzes, and forwards security event data to external platforms, enabling efficient threat detection, incident response, compliance auditing, and improved network security visibility.
This integration allows Firewall Analyzer to forward access logs and audit module entries to Splunk for improved security monitoring and correlation. Follow the steps below to set up and configure the integration.

Note: The RFC-5424 syslog format is used to forward the logs.

Note:
Firewall Analyzer allows you to define how alert messages are formatted and forwarded to Splunk when specific events occur.

Once configured, Firewall Analyzer continuously monitors firewall logs and alerts. When an event that matches a configured notification template is triggered, Firewall Analyzer formats the alert according to the template and forwards it to Splunk using the standard syslog protocol. Splunk can then ingest these logs for correlation, search, visualization, and advanced analysis.