Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions contentctl.yml
Original file line number Diff line number Diff line change
Expand Up @@ -44,9 +44,9 @@ apps:
- uid: 7404
title: Cisco Security Cloud
appid: CiscoSecurityCloud
version: 3.4.1
version: 3.4.2
description: description of app
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-security-cloud_341.tgz
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-security-cloud_342.tgz
- uid: 6652
title: Add-on for Linux Sysmon
appid: Splunk_TA_linux_sysmon
Expand Down
2 changes: 1 addition & 1 deletion data_sources/cisco_ai_defense_alerts.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,5 +10,5 @@ separator: null
supported_TA:
- name: Cisco Security Cloud
url: https://splunkbase.splunk.com/app/7404
version: 3.4.1
version: 3.4.2
fields: null
33 changes: 20 additions & 13 deletions data_sources/cisco_asa_logs.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,19 +3,25 @@ id: 3f2a9b6d-1c8e-4f7b-a2d3-8b7f1c2a9d4e
version: 1
date: '2025-09-23'
author: Bhavin Patel, Splunk
description: >
Data source object for Cisco ASA system logs. Cisco ASA logs provide firewall
operational and security telemetry (connection events, ACL denies, VPN events,
NAT translations, and device health). Deploy the Splunk Add-on for Cisco ASA
(TA-cisco_asa) on indexers/heavy forwarders and the Cisco ASA App on search
heads for best parsing, CIM mapping, and dashboards. This data is ingested via SYSLOG. You must be ingesting Cisco ASA syslog data into your Splunk environment. To ensure all detections work, configure your ASA and FTD devices to generate and forward both debug and informational level syslog messages before they are sent to Splunk. A few analytics are designed to be used with comprehensive logging enabled, as it relies on the presence of specific message IDs. You can find specific instructions on how to set this up here : https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html#toc-hId--1451069880.
description: "Data source object for Cisco ASA system logs. Cisco ASA logs provide\
\ firewall operational and security telemetry (connection events, ACL denies, VPN\
\ events, NAT translations, and device health). Deploy the Splunk Add-on for Cisco\
\ ASA (TA-cisco_asa) on indexers/heavy forwarders and the Cisco ASA App on search\
\ heads for best parsing, CIM mapping, and dashboards. This data is ingested via\
\ SYSLOG. You must be ingesting Cisco ASA syslog data into your Splunk environment.\
\ To ensure all detections work, configure your ASA and FTD devices to generate\
\ and forward both debug and informational level syslog messages before they are\
\ sent to Splunk. A few analytics are designed to be used with comprehensive logging\
\ enabled, as it relies on the presence of specific message IDs. You can find specific\
\ instructions on how to set this up here : https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html#toc-hId--1451069880.\
\ \n"
source: cisco:asa
sourcetype: cisco:asa
sourcetype: cisco:asa
separator: null
supported_TA:
- name: Cisco Security Cloud
url: https://splunkbase.splunk.com/app/7404
version: 3.4.1
- name: Cisco Security Cloud
url: https://splunkbase.splunk.com/app/7404
version: 3.4.2
fields:
- Cisco_ASA_action
- Cisco_ASA_message_id
Expand Down Expand Up @@ -126,6 +132,7 @@ fields:
- vendor_product
- vendor_severity
- zone
example_log: >
Sep 23 19:27:50 18.144.133.67 :2025-09-23T19:27:49Z: %ASA-session-7-609002: Teardown local-host management:54.245.234.201 duration 0:02:01
Sep 23 18:07:00 18.144.133.67 :2025-09-23T18:07:00Z: %ASA-session-7-710005: TCP request discarded from 198.27.166.158/55508 to management:172.31.12.229/443
example_log: 'Sep 23 19:27:50 18.144.133.67 :2025-09-23T19:27:49Z: %ASA-session-7-609002:
Teardown local-host management:54.245.234.201 duration 0:02:01 Sep 23 18:07:00 18.144.133.67
:2025-09-23T18:07:00Z: %ASA-session-7-710005: TCP request discarded from 198.27.166.158/55508
to management:172.31.12.229/443'
2 changes: 1 addition & 1 deletion data_sources/cisco_duo_activity.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: null
supported_TA:
- name: Cisco Security Cloud
url: https://splunkbase.splunk.com/app/7404
version: 3.4.1
version: 3.4.2
fields:
- access_device.browser
- access_device.browser_version
Expand Down
2 changes: 1 addition & 1 deletion data_sources/cisco_duo_administrator.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: null
supported_TA:
- name: Cisco Security Cloud
url: https://splunkbase.splunk.com/app/7404
version: 3.4.1
version: 3.4.2
fields:
- action
- actionlabel
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ sourcetype: cisco:sfw:estreamer
supported_TA:
- name: Cisco Security Cloud
url: https://splunkbase.splunk.com/app/7404
version: 3.4.1
version: 3.4.2
fields:
- AC_RuleAction
- action
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ sourcetype: cisco:sfw:estreamer
supported_TA:
- name: Cisco Security Cloud
url: https://splunkbase.splunk.com/app/7404
version: 3.4.1
version: 3.4.2
fields:
- app
- Application
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ sourcetype: cisco:sfw:estreamer
supported_TA:
- name: Cisco Security Cloud
url: https://splunkbase.splunk.com/app/7404
version: 3.4.1
version: 3.4.2
fields:
- Application
- Classification
Expand Down