Skip to content

Commit 3784436

Browse files
authored
Merge branch 'develop' into promptlock
2 parents b3c9f1a + 3514a3e commit 3784436

File tree

103 files changed

+2361
-1528
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

103 files changed

+2361
-1528
lines changed

contentctl.yml

Lines changed: 224 additions & 227 deletions
Large diffs are not rendered by default.

data_sources/cisco_ai_defense_alerts.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,5 +10,5 @@ separator: null
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.4.0
13+
version: 3.4.1
1414
fields: null

data_sources/cisco_asa_logs.yml

Lines changed: 131 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,131 @@
1+
name: Cisco ASA Logs
2+
id: 3f2a9b6d-1c8e-4f7b-a2d3-8b7f1c2a9d4e
3+
version: 1
4+
date: '2025-09-23'
5+
author: Bhavin Patel, Splunk
6+
description: >
7+
Data source object for Cisco ASA system logs. Cisco ASA logs provide firewall
8+
operational and security telemetry (connection events, ACL denies, VPN events,
9+
NAT translations, and device health). Deploy the Splunk Add-on for Cisco ASA
10+
(TA-cisco_asa) on indexers/heavy forwarders and the Cisco ASA App on search
11+
heads for best parsing, CIM mapping, and dashboards. This data is ingested via SYSLOG. You must be ingesting Cisco ASA syslog data into your Splunk environment. To ensure all detections work, configure your ASA and FTD devices to generate and forward both debug and informational level syslog messages before they are sent to Splunk. A few analytics are designed to be used with comprehensive logging enabled, as it relies on the presence of specific message IDs. You can find specific instructions on how to set this up here : https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html#toc-hId--1451069880.
12+
source: cisco:asa
13+
sourcetype: cisco:asa
14+
separator: null
15+
supported_TA:
16+
- name: Cisco Security Cloud
17+
url: https://splunkbase.splunk.com/app/7404
18+
version: 3.4.1
19+
fields:
20+
- Cisco_ASA_action
21+
- Cisco_ASA_message_id
22+
- Cisco_ASA_user
23+
- Cisco_ASA_vendor_action
24+
- IP
25+
- Username
26+
- _bkt
27+
- _cd
28+
- _eventtype_color
29+
- _indextime
30+
- _raw
31+
- _serial
32+
- _si
33+
- _sourcetype
34+
- _time
35+
- acl
36+
- action
37+
- app
38+
- assigned_ip
39+
- bytes
40+
- category
41+
- command
42+
- communication_protocol
43+
- connections_in_use
44+
- date_hour
45+
- date_mday
46+
- date_minute
47+
- date_month
48+
- date_second
49+
- date_wday
50+
- date_year
51+
- date_zone
52+
- dest
53+
- dest_host
54+
- dest_interface
55+
- dest_ip
56+
- dest_nt_domain
57+
- dest_port
58+
- dest_public_port
59+
- dest_translated_host
60+
- dest_translated_ip
61+
- dest_translated_port
62+
- dest_user
63+
- dest_zone
64+
- direction
65+
- duration
66+
- duration_day
67+
- duration_hour
68+
- duration_minute
69+
- duration_second
70+
- dvc
71+
- eventtype
72+
- group
73+
- host
74+
- ids_type
75+
- index
76+
- laction
77+
- linecount
78+
- most_used_connections
79+
- object
80+
- object_attrs
81+
- object_category
82+
- object_id
83+
- product
84+
- protocol
85+
- protocol_version
86+
- punct
87+
- reason
88+
- result
89+
- rule
90+
- rule_name
91+
- session_id
92+
- severity
93+
- signature
94+
- signature_id
95+
- source
96+
- sourcetype
97+
- splunk_server
98+
- splunk_server_group
99+
- src
100+
- src_host
101+
- src_interface
102+
- src_ip
103+
- src_nt_domain
104+
- src_port
105+
- src_public_port
106+
- src_translated_host
107+
- src_translated_ip
108+
- src_translated_port
109+
- src_user
110+
- src_zone
111+
- ssl_is_valid
112+
- status
113+
- tag
114+
- tag::action
115+
- tag::app
116+
- tag::eventtype
117+
- tag::object_category
118+
- teardown_initiator
119+
- timeendpos
120+
- timestartpos
121+
- transport
122+
- type
123+
- user
124+
- vendor
125+
- vendor_action
126+
- vendor_product
127+
- vendor_severity
128+
- zone
129+
example_log: >
130+
Sep 23 19:27:50 18.144.133.67 :2025-09-23T19:27:49Z: %ASA-session-7-609002: Teardown local-host management:54.245.234.201 duration 0:02:01
131+
Sep 23 18:07:00 18.144.133.67 :2025-09-23T18:07:00Z: %ASA-session-7-710005: TCP request discarded from 198.27.166.158/55508 to management:172.31.12.229/443

data_sources/cisco_duo_activity.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: null
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.4.0
13+
version: 3.4.1
1414
fields:
1515
- access_device.browser
1616
- access_device.browser_version

data_sources/cisco_duo_administrator.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: null
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.4.0
13+
version: 3.4.1
1414
fields:
1515
- action
1616
- actionlabel

data_sources/cisco_ios_logs.yml

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,22 @@ id: 9e4c8d7b-6f5e-4a3d-b2c1-0a9b8c7d6e5f
33
version: 1
44
date: '2025-08-21'
55
author: Michael Haag, Splunk
6-
description: Data source object for Cisco IOS system logs. Cisco IOS logs provide operational and security telemetry from Cisco network devices (IOS, IOS XE, IOS XR, NX-OS, WLC, and APs). The Cisco Networks Add-on for Splunk (TA-cisco_ios) normalizes these events by setting proper sourcetypes and extracting fields for switches, routers, controllers, and access points; deploy the TA on indexers/HFs and search heads, and the Cisco Networks (cisco_ios) App on search heads. Supported platforms include Catalyst, ASR, ISR, Nexus, CRS, and other IOS-based devices, enabling consistent investigation, alerting, and reporting in Splunk Enterprise and Splunk Cloud. This data is ingested via SYSLOG.
6+
description: Data source object for Cisco IOS system logs. Cisco IOS logs provide
7+
operational and security telemetry from Cisco network devices (IOS, IOS XE, IOS
8+
XR, NX-OS, WLC, and APs). The Cisco Networks Add-on for Splunk (TA-cisco_ios) normalizes
9+
these events by setting proper sourcetypes and extracting fields for switches, routers,
10+
controllers, and access points; deploy the TA on indexers/HFs and search heads,
11+
and the Cisco Networks (cisco_ios) App on search heads. Supported platforms include
12+
Catalyst, ASR, ISR, Nexus, CRS, and other IOS-based devices, enabling consistent
13+
investigation, alerting, and reporting in Splunk Enterprise and Splunk Cloud. This
14+
data is ingested via SYSLOG.
715
source: cisco:ios
816
sourcetype: cisco:ios
917
separator: null
1018
supported_TA:
1119
- name: Cisco Networks Add-on
1220
url: https://splunkbase.splunk.com/app/1467
13-
version: 2.7.8
21+
version: 2.7.9
1422
fields:
1523
- _time
1624
- aci_message_text
@@ -81,7 +89,8 @@ fields:
8189
output_fields:
8290
- user
8391
- dest
84-
example_log: 'Aug 20 17:10:21.639: %AAA-6-USERNAME_CONFIGURATION: user with username: attacker configured
85-
Aug 20 17:10:21.664: %AAA-6-USER_PRIVILEGE_UPDATE: username: attacker privilege updated with priv-15
86-
Aug 20 17:10:21.665: %PARSER-5-CFGLOG_LOGGEDCMD: User:ec2-user logged command:username attacker privilege 15 secret *
87-
Aug 20 17:10:21.665: %PARSER-5-CFGLOG_LOGGEDCMD: User:ec2-user logged command:!config: USER TABLE MODIFIED'
92+
example_log: 'Aug 20 17:10:21.639: %AAA-6-USERNAME_CONFIGURATION: user with username:
93+
attacker configured Aug 20 17:10:21.664: %AAA-6-USER_PRIVILEGE_UPDATE: username:
94+
attacker privilege updated with priv-15 Aug 20 17:10:21.665: %PARSER-5-CFGLOG_LOGGEDCMD:
95+
User:ec2-user logged command:username attacker privilege 15 secret * Aug 20 17:10:21.665:
96+
%PARSER-5-CFGLOG_LOGGEDCMD: User:ec2-user logged command:!config: USER TABLE MODIFIED'

data_sources/cisco_secure_firewall_threat_defense_connection_event.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ sourcetype: cisco:sfw:estreamer
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.4.0
13+
version: 3.4.1
1414
fields:
1515
- AC_RuleAction
1616
- action

data_sources/cisco_secure_firewall_threat_defense_file_event.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ sourcetype: cisco:sfw:estreamer
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.4.0
13+
version: 3.4.1
1414
fields:
1515
- app
1616
- Application

data_sources/cisco_secure_firewall_threat_defense_intrusion_event.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ sourcetype: cisco:sfw:estreamer
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.4.0
13+
version: 3.4.1
1414
fields:
1515
- Application
1616
- Classification

data_sources/splunk_common_information_model_(cim).yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,4 +9,4 @@ sourcetype: not_applicable
99
supported_TA:
1010
- name: Splunk Common Information Model (CIM)
1111
url: https://splunkbase.splunk.com/app/1621
12-
version: 6.1.0
12+
version: 6.2.0

0 commit comments

Comments
 (0)