Sample Logs in JSON for Azure Firewall Log Types

Kashyap Gandhi 0 Reputation points
2025-08-20T10:03:19.67+00:00

Hello Team,

We have the Active Subscription Account with MS Azure. We setup Azure Firewall for our Testing and to integrate with QRadar System. We require to have a sample event payload logs (in JSON) for below log types:

  • Threat Intelligence log
  • IDPS log
  • Internal FQDN resolve failure log
  • Application rule aggregation log
  • Network rule aggregation log
  • NAT rule aggregation log
  • Top flow log
  • Flow trace
Azure Firewall
Azure Firewall
An Azure network security service that is used to protect Azure Virtual Network resources.
{count} votes

1 answer

Sort by: Most helpful
  1. Jeevan Shanigarapu 255 Reputation points Microsoft External Staff Moderator
    2025-08-20T12:13:00.7033333+00:00

    Hello @Kashyap Gandhi,

    Welcome to Microsoft Q&A Platform. Thank you for reaching out & hope you are doing well.

    I understand that you currently have an active Microsoft Azure subscription and have configured Azure Firewall for testing purposes, aiming to integrate it with QRadar. You raised that you need sample event payload logs in JSON format for log categories including Threat Intelligence, IDPS, DNS proxy failures, Application rule aggregation, Network rule aggregation, NAT rule aggregation, Top flows, and Flow trace.

    Azure Firewall can generate the log types what you need, but Microsoft does not provide the sample event payload logs in JSON. If you need these logs, you will need to enable diagnostic settings on your Azure Firewall and select the required log categories. Once you are enabled, you can send the logs to Log Analytics, Event Hub, or a Storage Account.

    1.      To enable diagnostic settings, just go to your Azure Firewall resource in the portal -> Monitoring -> Diagnostic settings and select the log categories what you need.

    2.      Generate traffic that activates each rule type, such as using a known blocked domain for Threat Intel or creating traffic that matches your NAT/Application rules. This will help ensure the firewall generates actual log entries.

    3.      You have the option to send the logs via Event Hub or a Storage Account, allowing you to download them directly in JSON format. Alternatively, you can send the logs to Log Analytics and use KQL queries to obtain the JSON payloads. Once you get the log samples, you can set up QRadar to process and import them.

    Below link will help you on Firewall logs:
    Monitor Azure Firewall | Microsoft Learn
    https://learn.microsoft.com/en-us/azure/azure-monitor/platform/resource-logs?tabs=log-analytics

    Kindly let us know if the above helps or you need further assistance on this issue.

    Please "Accept the answer" if the information helped you. This will help us and others in the community as well.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.