Skip to content

Commit 6fc52cc

Browse files
committed
updating to text
1 parent 1fc1c56 commit 6fc52cc

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

data_sources/cisco_asa_logs.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ description: >
88
operational and security telemetry (connection events, ACL denies, VPN events,
99
NAT translations, and device health). Deploy the Splunk Add-on for Cisco ASA
1010
(TA-cisco_asa) on indexers/heavy forwarders and the Cisco ASA App on search
11-
heads for best parsing, CIM mapping, and dashboards. This data is ingested via SYSLOG.
11+
heads for best parsing, CIM mapping, and dashboards. This data is ingested via SYSLOG. You must be ingesting Cisco ASA syslog data into your Splunk environment. To ensure all detections work, configure your ASA and FTD devices to generate and forward both debug and informational level syslog messages before they are sent to Splunk. TA few analytics are designed to be used with comprehensive logging enabled, as it relies on the presence of specific message IDs.
1212
source: cisco:asa
13-
sourcetype: cisco:asa
13+
sourcetype: cisco:asa
1414
separator: null
1515
supported_TA:
1616
- name: Cisco Security Cloud

0 commit comments

Comments
 (0)