<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco eNcore: Sample logs in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eNcore-Sample-logs/m-p/362858#M43804</link>
    <description>&lt;P&gt;thanks @douglashurd. &lt;BR /&gt;
any chance, can you please update some sample events in your app to be used for eventgen etc.?&lt;/P&gt;</description>
    <pubDate>Thu, 15 Mar 2018 15:47:37 GMT</pubDate>
    <dc:creator>koshyk</dc:creator>
    <dc:date>2018-03-15T15:47:37Z</dc:date>
    <item>
      <title>Cisco eNcore: Sample logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eNcore-Sample-logs/m-p/362856#M43802</link>
      <description>&lt;P&gt;First of all, thanks @douglashurd for creating the app. &lt;BR /&gt;
I had two questions regarding the app&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Any chance to put samples directory within the app with different samples of eStreamer sourcetypes? to be used for eventgen etc.&lt;/LI&gt;
&lt;LI&gt;Can Cisco estreamer devices send the similar data via syslog ? (i.e push to splunk, rather than Splunk pulling them)&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Wed, 15 Nov 2017 16:31:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eNcore-Sample-logs/m-p/362856#M43802</guid>
      <dc:creator>koshyk</dc:creator>
      <dc:date>2017-11-15T16:31:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eNcore: Sample logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eNcore-Sample-logs/m-p/362857#M43803</link>
      <description>&lt;P&gt;You should be able to send Intrusion events and connection events right off the sensor in syslog.  Cisco TAC can explain the configuration steps for this.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2018 18:41:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eNcore-Sample-logs/m-p/362857#M43803</guid>
      <dc:creator>douglashurd</dc:creator>
      <dc:date>2018-02-06T18:41:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eNcore: Sample logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eNcore-Sample-logs/m-p/362858#M43804</link>
      <description>&lt;P&gt;thanks @douglashurd. &lt;BR /&gt;
any chance, can you please update some sample events in your app to be used for eventgen etc.?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Mar 2018 15:47:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eNcore-Sample-logs/m-p/362858#M43804</guid>
      <dc:creator>koshyk</dc:creator>
      <dc:date>2018-03-15T15:47:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eNcore: Sample logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eNcore-Sample-logs/m-p/362859#M43805</link>
      <description>&lt;P&gt;Unfortunately I cannot tell you what changes are added since the 5.4 schema was explained here:&lt;/P&gt;

&lt;P&gt;Discovery Event:&lt;/P&gt;

&lt;P&gt;"   Configuration:&lt;/P&gt;

&lt;P&gt;Discovery Event syslog alerts can be configured under Policies &amp;gt; Actions &amp;gt; Alerts by selecting the Discovery Event Alerts tab, selecting the syslog alert you would like use and selecting the types of events that should generate an alert.&lt;BR /&gt;
"   Schema:&lt;/P&gt;

&lt;P&gt;SFIMS: &amp;lt;&lt;EM&gt;-  From "" at -&lt;/EM&gt;&amp;gt; IP Address:    Port:  Service:  Confidence: &lt;BR /&gt;
"   Example:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;SFIMS: &amp;lt;*- New TCP Port From "X.X.X.X" at Tue Feb 24 18:59:45 2015 UTC -*&amp;gt; IP Address: X.X.X.X Port: 6370 Service: HTTP Apache Confidence: 50
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Intrusion Event:&lt;/P&gt;

&lt;P&gt;"   Configuration:&lt;/P&gt;

&lt;P&gt;To enable Intrusion Event sysloggin first go to Policies &amp;gt; Intrusion &amp;gt; Intrusion Policy and edit the policy referenced by the Access Control Policy. Click on Advanced Settings and select enabled. Then, click edit and input your sylog server configuration.&lt;BR /&gt;
"   Schema:&lt;/P&gt;

&lt;P&gt;SFIMS: [ ()][][::] "" [Classification: ] User: , Application: , Client: , App Protocol: Interface Ingress: , Interface Egress: , Security Zone Ingress:, Security Zone Egress: , [Priority: ] {} : -&amp;gt; :&lt;BR /&gt;
"   Example:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;SFIMS: [Primary Detection Engine (9882464a-3c3d-11e3-875b-c166af9fa6c0)][Default Security Over Connectivity][1:17392:6] "INDICATOR-SHELLCODE JavaScript var shellcode" [Classification: Executable Code was Detected] User: Unknown, Application: Unknown, Client: Internet Explorer, App Protocol: HTTP Interface Ingress: s1p1, Interface Egress: s1p2, Security Zone Ingress: Internal, Security Zone Egress: External, [Priority: 1] {TCP} xxx.xx.xx.xx:80 -&amp;gt; xxx.xxx.x.x:1113 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Connection Event:&lt;/P&gt;

&lt;P&gt;"   Configuration:&lt;/P&gt;

&lt;P&gt;To configure connection event syslogging edit an Access Control Policy, and edit each rule that you would like connection event syslogging for, check syslog for the "Send Connection Events to:" section, and select your Syslog alert configuration.&lt;BR /&gt;
"   Schema:&lt;/P&gt;

&lt;P&gt;5.3.X&lt;BR /&gt;
: [ ()][] Connection Type: , User:, Client:, Application Protocol: , Web App: , Firewall Rule Name: , Firewall Rule Action: , Firewall Rule Reasons:, URL Category: , URL_Reputation: , URL: , Interface Ingress:, Interface Egress:, Security Zone Ingress:, Security Zone Egress:, Security Intelligence Matching IP:, Security Intelligence Category: , {} : -&amp;gt;: &lt;/P&gt;

&lt;P&gt;5.4.X&lt;BR /&gt;
: [ ()][] Connection Type: , User:, Client:, Application Protocol: , Web App: , Firewall Rule Name: , Firewall Rule Action: , Firewall Rule Reasons:, URL Category: , URL_Reputation: , URL: , Interface Ingress:, Interface Egress:, Security Zone Ingress:, Security Zone Egress:, Security Intelligence Matching IP:, Security Intelligence Category: ,Client Version: , Number of File Events: , Number of IPS Events: , TCP Flags: , NetBIOS Domain:, Initiator Packets: , Responder Packets: , Initiator Bytes:, Responder Bytes: , Context:, SSL Rule Name: , SSL Flow Status: , SSL Cipher Suite: , SSL Certificate:, SSL Subject CN: , SSL Subject Country: , SSL Subject OU: , SSL Subject Org:, SSL Issuer CN: , SSL Issuer Country:, SSL Issuer OU:, SSL Issuer Org:, SSL Valid Start Date:, SSL Valid End Date:, SSL Version: , SSL Server Certificate Status: , SSL Actual Action:, SSL Expected Action:, SSL Server Name: , SSL URL Category: , SSL Session ID:, SSL Ticket Id:, {} : -&amp;gt;: &lt;/P&gt;

&lt;P&gt;NOTE: The SSL Fields will be in all connections regardless of whether SSL was used in the connection.&lt;BR /&gt;
"&lt;BR /&gt;&lt;BR /&gt;
Example:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sn54 54DC: [Primary Detection Engine (2c0f417e-bb63-11e4-90aa-a536b3757dce)][Default Access Control] Connection Type: Start, User: Unknown, Client: SSL client, Application Protocol: HTTPS, Web App: Cisco, Access Control Rule Name: catchall, Access Control Rule Action: Allow, Access Control Rule Reasons: Unknown, URL Category: Business and Economy, URL Reputation: Well known, URL:https://nourl.cisco.com, Interface Ingress: eth1, Interface Egress: eth1, Security Zone Ingress: Internal, Security Zone Egress: Internal, Security Intelligence Matching IP: None, Security Intelligence Category: None, Client Version: (null), Number of File Events: 0, Number of IPS Events: 0, TCP Flags: 0x0, NetBIOS Domain: (null), Initiator Packets: 3, Responder Packets: 1, Initiator Bytes: 727, Responder Bytes: 74, Context: Unknown, SSL Rule Name: N/A, SSL Flow Status: N/A, SSL Cipher Suite: N/A, SSL Certificate: 0000000000000000000000000000000000000000, SSL Subject CN: N/A, SSL Subject Country: N/A, SSL Subject OU: N/A, SSL Subject Org: N/A, SSL Issuer CN: N/A, SSL Issuer Country: N/A, SSL Issuer OU: N/A, SSL Issuer Org: N/A, SSL Valid Start Date: N/A, SSL Valid End Date: N/A, SSL Version: N/A, SSL Server Certificate Status: N/A, SSL Actual Action: N/A, SSL Expected Action: N/A, SSL Server Name: (null), SSL URL Category: N/A, SSL Session ID: 0000000000000000000000000000000000000000000000000000000000000000, SSL Ticket Id: 0000000000000000000000000000000000000000, {TCP} X.X.X.X:49205 -&amp;gt; X.X.X.X:443
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Health Monitor Event:&lt;/P&gt;

&lt;P&gt;"   Configuration:&lt;/P&gt;

&lt;P&gt;To configure health monitor syslogging, go to Health &amp;gt; Health Monitor Alerts, select the severities and modules you would like to alert on, name the alert and save.&lt;BR /&gt;
"   Schema:&lt;BR /&gt;
: HMNOTIFY:  (): Severity: : &lt;BR /&gt;
"   Example:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;dc54 DC54: HMNOTIFY: License Monitor (Sensor dc54.example.com): Severity: warning: Violations due to licenses expiring within 90 days: USER used count will exceed total by 2 licenses.
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Correlation Event:&lt;/P&gt;

&lt;P&gt;"   Configuration: &lt;/P&gt;

&lt;P&gt;To configure correlation event syslogging, navigate to Policies &amp;gt; Correlation edit the correlation policy configured, click on the responses icon for the rule you would like syslog alerts from, and select your syslog alert action.&lt;BR /&gt;
"   Schema:&lt;/P&gt;

&lt;P&gt;: Correlation Event: / at&lt;BR /&gt;&lt;BR /&gt;
"   Example:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;dc54 DC54: Correlation Event: Test Correlation Rule/Test Correlation Policy at Tue Sep 15 13:05:52 2015 UTCConnection Type: FireSIGHT X.X.X.X:45652 (unknown) -&amp;gt; X.X.X.X:443 (united states) (tcp)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Impact Alert:&lt;/P&gt;

&lt;P&gt;"   Configuration:&lt;/P&gt;

&lt;P&gt;To configure impact alert syslogging go to Policies &amp;gt; Actions &amp;gt; Alerts, select Impact Flag Alerts, select your syslog alerting mechanism and the impact flags you would like to alert on.&lt;BR /&gt;
"   Schema:&lt;BR /&gt;
: [::] "" [Impact:] From "" at  UTC [Classification: ] [Priority: ] {} -&amp;gt;&lt;/P&gt;

&lt;P&gt;"   Example:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;dc54 DC54: [1:1000000:1] "Ping Test Rule" [Impact: Unknown] From "X.X.X.X" at Tue Sep 15 13:41:52 2015 UTC [Classification: Misc Activity] [Priority: 3] {icmp} X.X.X.X-&amp;gt;X.X.X.X
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Network Malware Event:&lt;/P&gt;

&lt;P&gt;"   Configuration:&lt;/P&gt;

&lt;P&gt;To configure network malware event syslogging, navigate to Policies &amp;gt; Actions &amp;gt; Alerts, select Advanced Malware Protection Alerts, select your syslog alerting mechanism, and select the types of events you want alerts for.&lt;BR /&gt;
"   Schema:&lt;BR /&gt;
: &amp;lt;&lt;EM&gt;- Network Based Malware From "" at  UTC -&lt;/EM&gt;&amp;gt; Sha256:  Disposition: Threat name:  Addresses: &lt;/P&gt;

&lt;P&gt;"   Example:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;dc54 DC54: &amp;lt;*- Network Based Malware From "X.X.X.X" at Tue Sep 15 14:32:47 2015 UTC -*&amp;gt; Sha256: 00b32c3428362e39e4df2a0c3e0950947c147781fdd3d2ffd0bf5f96989bb002 Disposition: Malware Threat name: W32.Zombies.NotAVirus IP Addresses: X.X.X.X&amp;lt;-X.X.X.X
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Audit Log Event:&lt;/P&gt;

&lt;P&gt;"   Configuration:&lt;BR /&gt;
      To configure audit log event syslogging, navigate to System &amp;gt; Local &amp;gt; System Policy &amp;gt; Audit Log Settings, select the&lt;BR /&gt;
      appropriate settings for your environment, click the Save Policy and Exit button, and reapply the System Policy.&lt;/P&gt;

&lt;P&gt;"   Schema:&lt;BR /&gt;
      &lt;DATE&gt; &lt;INITIATOR ip=""&gt; ids.cgi: &lt;REPORTING firesight="" appliance=""&gt;: &lt;A href="mailto:user@IP"&gt;user@IP&lt;/A&gt;, &lt;NAVIGATION path="" to="" event=""&gt;, &lt;TYPE of="" event=""&gt;&lt;/TYPE&gt;&lt;/NAVIGATION&gt;&lt;/REPORTING&gt;&lt;/INITIATOR&gt;&lt;/DATE&gt;&lt;/P&gt;

&lt;P&gt;"   Example:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; Oct 13 13:54:32 X.X.X.X ids.cgi: Sourcefire3D: admin@X.X.X.X, Policies &amp;gt; Intrusion &amp;gt; Intrusion Policy, Page View
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 26 Mar 2018 23:13:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eNcore-Sample-logs/m-p/362859#M43805</guid>
      <dc:creator>douglashurd</dc:creator>
      <dc:date>2018-03-26T23:13:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eNcore: Sample logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eNcore-Sample-logs/m-p/362860#M43806</link>
      <description>&lt;P&gt;thanks again for your help. &lt;/P&gt;</description>
      <pubDate>Thu, 29 Mar 2018 14:01:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eNcore-Sample-logs/m-p/362860#M43806</guid>
      <dc:creator>koshyk</dc:creator>
      <dc:date>2018-03-29T14:01:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eNcore: Sample logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eNcore-Sample-logs/m-p/362861#M43807</link>
      <description>&lt;P&gt;There is a detailed document on the syslog output.  Do you have it?  &lt;/P&gt;

&lt;P&gt;If you want it please email me &lt;A href="mailto:dohurd@cisco.com"&gt;dohurd@cisco.com&lt;/A&gt; and I'll attach.  I cannot attach it here.&lt;/P&gt;

&lt;P&gt;Doug&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2019 14:51:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eNcore-Sample-logs/m-p/362861#M43807</guid>
      <dc:creator>douglashurd</dc:creator>
      <dc:date>2019-05-22T14:51:18Z</dc:date>
    </item>
  </channel>
</rss>

