Skip to content

Commit 1fc1c56

Browse files
committed
adding updates to how to implement
1 parent 46ab910 commit 1fc1c56

File tree

2 files changed

+2
-12
lines changed

2 files changed

+2
-12
lines changed

detections/application/cisco_asa___core_syslog_message_volume_drop.yml

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -24,13 +24,7 @@ search: |
2424
| xyseries _time message_id count
2525
| `cisco_asa___core_syslog_message_volume_drop_filter`
2626
how_to_implement: |
27-
This search requires Cisco ASA syslog data to be ingested into Splunk.
28-
Ensure comprehensive syslog collection (including key connection-related messages)
29-
is configured for ASA/FTD devices. The search produces a time-series suitable for
30-
dashboards to visualize drops across message IDs 302013, 302014, 609002, and 710005.
31-
For alerting, consider pairing this with a baseline or anomaly detection approach
32-
(e.g., comparing rolling averages or historical medians) to identify statistically
33-
significant downward shifts.
27+
This search requires Cisco ASA syslog data to be ingested into Splunk via the Cisco Security Cloud TA. To ensure this detection works effectively, configure your ASA and FTD devices to generate and forward both debug and informational level syslog messages before they are sent to Splunk. This analytic is designed to be used with comprehensive logging enabled, as it relies on the presence of specific message IDs. The search produces a time-series suitable for dashboards to visualize drops across message IDs 302013, 302014, 609002, and 710005.
3428
known_false_positives: |
3529
Planned maintenance, network outages, routing changes, or benign configuration
3630
updates may reduce log volume temporarily. Validate against change management

detections/application/cisco_asa___logging_disabled_via_cli.yml

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,11 +26,7 @@ search: |
2626
| `security_content_ctime(lastTime)`
2727
| `cisco_asa___logging_disabled_via_cli_filter`
2828
how_to_implement: |
29-
This search requires Cisco ASA syslog data to be ingested into Splunk.
30-
Ensure that syslog collection is configured correctly for ASA devices including all the debug logs.
31-
The search leverages syslog message IDs 111009, 111010, and 111008,
32-
which record executed commands. You may need to tune the search
33-
to your environment by updating the list of suspicious logging commands.
29+
This search requires Cisco ASA syslog data to be ingested into Splunk via the Cisco Security Cloud TA. To ensure this detection works effectively, configure your ASA and FTD devices to generate and forward both debug and informational level syslog messages before they are sent to Splunk. This analytic is designed to be used with comprehensive logging enabled, as it relies on the presence of specific message IDs.
3430
known_false_positives: |
3531
Administrators may intentionally disable or modify logging during maintenance,
3632
troubleshooting, or device reconfiguration. These events should be verified

0 commit comments

Comments
 (0)