Skip to content

Commit 4d7faff

Browse files
committed
link for debug logging
1 parent 6fc52cc commit 4d7faff

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

data_sources/cisco_asa_logs.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ description: >
88
operational and security telemetry (connection events, ACL denies, VPN events,
99
NAT translations, and device health). Deploy the Splunk Add-on for Cisco ASA
1010
(TA-cisco_asa) on indexers/heavy forwarders and the Cisco ASA App on search
11-
heads for best parsing, CIM mapping, and dashboards. This data is ingested via SYSLOG. You must be ingesting Cisco ASA syslog data into your Splunk environment. To ensure all detections work, configure your ASA and FTD devices to generate and forward both debug and informational level syslog messages before they are sent to Splunk. TA few analytics are designed to be used with comprehensive logging enabled, as it relies on the presence of specific message IDs.
11+
heads for best parsing, CIM mapping, and dashboards. This data is ingested via SYSLOG. You must be ingesting Cisco ASA syslog data into your Splunk environment. To ensure all detections work, configure your ASA and FTD devices to generate and forward both debug and informational level syslog messages before they are sent to Splunk. A few analytics are designed to be used with comprehensive logging enabled, as it relies on the presence of specific message IDs. You can find specific instructions on how to set this up here : https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html#toc-hId--1451069880.
1212
source: cisco:asa
1313
sourcetype: cisco:asa
1414
separator: null

detections/application/cisco_asa___core_syslog_message_volume_drop.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ search: |
2424
| xyseries _time message_id count
2525
| `cisco_asa___core_syslog_message_volume_drop_filter`
2626
how_to_implement: |
27-
This search requires Cisco ASA syslog data to be ingested into Splunk via the Cisco Security Cloud TA. To ensure this detection works effectively, configure your ASA and FTD devices to generate and forward both debug and informational level syslog messages before they are sent to Splunk. This analytic is designed to be used with comprehensive logging enabled, as it relies on the presence of specific message IDs. The search produces a time-series suitable for dashboards to visualize drops across message IDs 302013, 302014, 609002, and 710005.
27+
This search requires Cisco ASA syslog data to be ingested into Splunk via the Cisco Security Cloud TA. To ensure this detection works effectively, configure your ASA and FTD devices to generate and forward both debug and informational level syslog messages before they are sent to Splunk. This analytic is designed to be used with comprehensive logging enabled, as it relies on the presence of specific message IDs. You can find specific instructions on how to set this up here : https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html#toc-hId--1451069880. The search produces a time-series suitable for dashboards to visualize drops across message IDs 302013, 302014, 609002, and 710005.
2828
known_false_positives: |
2929
Planned maintenance, network outages, routing changes, or benign configuration
3030
updates may reduce log volume temporarily. Validate against change management

detections/application/cisco_asa___logging_disabled_via_cli.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ search: |
2626
| `security_content_ctime(lastTime)`
2727
| `cisco_asa___logging_disabled_via_cli_filter`
2828
how_to_implement: |
29-
This search requires Cisco ASA syslog data to be ingested into Splunk via the Cisco Security Cloud TA. To ensure this detection works effectively, configure your ASA and FTD devices to generate and forward both debug and informational level syslog messages before they are sent to Splunk. This analytic is designed to be used with comprehensive logging enabled, as it relies on the presence of specific message IDs.
29+
This search requires Cisco ASA syslog data to be ingested into Splunk via the Cisco Security Cloud TA. To ensure this detection works effectively, configure your ASA and FTD devices to generate and forward both debug and informational level syslog messages before they are sent to Splunk. This analytic is designed to be used with comprehensive logging enabled, as it relies on the presence of specific message IDs. You can find specific instructions on how to set this up here : https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html#toc-hId--1451069880.
3030
known_false_positives: |
3131
Administrators may intentionally disable or modify logging during maintenance,
3232
troubleshooting, or device reconfiguration. These events should be verified

0 commit comments

Comments
 (0)