Lesson 1 of 10

Analyzing Firewall Logs with AI

The Scenario

Your Palo Alto firewall generated 50,000 traffic logs in the last 24 hours. The security team wants a summary: what was blocked, what was allowed, any suspicious patterns. Reviewing logs manually in Panorama takes hours. AI summarizes it in minutes.


The Prompt

Analyze these Palo Alto firewall logs and give me:
1. Summary of traffic patterns (top sources, destinations, ports)
2. Any suspicious or anomalous activity
3. Rules that are allowing risky traffic (any-to-any, unused ports open)
4. Recommendations for rule tightening

Logs:
[Paste 50-100 representative log entries here]

Format: CSV with columns: date, time, source, destination, port, application, action, rule_name, bytes

What AI Gives You

  • Top talkers by source/destination
  • Unusual patterns: why is a printer talking to an external IP on port 443?
  • Rules that are too permissive: "Allow_All_Temp" has been active for 6 months
  • Specific recommendations: "Restrict rule X to only the required source IPs"

Review and Validate

  • AI is analyzing a sample, not the full 50K logs — ensure your sample is representative
  • For production, export logs to CSV first, then feed to AI in batches
  • Always verify flagged traffic against your known-good baseline

Try It Yourself

Export 100 recent deny logs from your firewall. Paste into AI and ask for analysis. You will likely find at least one surprise.