<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firepower IPS Syslog Classification in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-ips-syslog-classification/m-p/4413853#M1081335</link>
    <description>&lt;P&gt;I would like to ask for assistance in determining what time of syslog events are being received by our syslog server:&lt;/P&gt;&lt;P&gt;These are, I think Intrusion Events&lt;/P&gt;&lt;P&gt;Device SFIMS: [1:43687:2] "INDICATOR-COMPROMISE Suspicious .top dns query" [Impact: Potentially Vulnerable] From "Device" at Tue Jun 1 23:44:54 2021 UTC [Classification: Misc Activity] [Priority: 3] {udp} x.x.x.x:60786 (unknown)-&amp;gt;y.y.y.y:53 (unknown)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Device SFIMS: [1:38355:3] "MALWARE-CNC Win.Trojan.NetWiredRC variant keepalive" [Impact: Vulnerable] From "Device" at Tue Jun 1 22:12:50 2021 UTC [Classification: A Network Trojan was Detected] [Priority: 1] {tcp} x.x.x.x:14411 (unknown)-&amp;gt;y.y.y.y:3306 (japan)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is a Connection Event:&lt;/P&gt;&lt;P&gt;Device SFIMS: Protocol: UDP, SrcIP: x.x.x.x, DstIP: y.y.y.y, SrcPort: 55745, DstPort: 53, TCPFlags: 0x0, IngressInterface: s1p2, EgressInterface: s1p1, IngressZone: Inside Zone, EgressZone: Outside Zone, DE: Primary Detection Engine (removed), Policy: Access Control Policy, ConnectType: Start, AccessControlRuleName: (removed), AccessControlRuleAction: Allow, Client: DNS, InitiatorPackets: 1, ResponderPackets: 0, InitiatorBytes: 83, ResponderBytes: 0, NAPPolicy: Balanced Security and Connectivity, DNSQuery: (removed), DNSRecordType: a host address, DNSResponseType: No Error, Sinkhole: Unknown, URLCategory: Unknown, URLReputation: Risk unknown&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But how about this one, I'm unsure if it is also an Intrusion Event, as the format is different:&lt;/P&gt;&lt;P&gt;2021-05-30 14:00:16.000 +08:00 Device SFIMS: &amp;lt;*- Host IOC Set From Device at Sun May 30 14:00:16 2021 UTC -*&amp;gt; IP Address: x.x.x.x Category: CnC Connected; Event Type: Intrusion Event - malware-cnc&lt;/P&gt;</description>
    <pubDate>Mon, 07 Jun 2021 08:23:01 GMT</pubDate>
    <dc:creator>Jarby23</dc:creator>
    <dc:date>2021-06-07T08:23:01Z</dc:date>
    <item>
      <title>Firepower IPS Syslog Classification</title>
      <link>https://community.cisco.com/t5/network-security/firepower-ips-syslog-classification/m-p/4413853#M1081335</link>
      <description>&lt;P&gt;I would like to ask for assistance in determining what time of syslog events are being received by our syslog server:&lt;/P&gt;&lt;P&gt;These are, I think Intrusion Events&lt;/P&gt;&lt;P&gt;Device SFIMS: [1:43687:2] "INDICATOR-COMPROMISE Suspicious .top dns query" [Impact: Potentially Vulnerable] From "Device" at Tue Jun 1 23:44:54 2021 UTC [Classification: Misc Activity] [Priority: 3] {udp} x.x.x.x:60786 (unknown)-&amp;gt;y.y.y.y:53 (unknown)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Device SFIMS: [1:38355:3] "MALWARE-CNC Win.Trojan.NetWiredRC variant keepalive" [Impact: Vulnerable] From "Device" at Tue Jun 1 22:12:50 2021 UTC [Classification: A Network Trojan was Detected] [Priority: 1] {tcp} x.x.x.x:14411 (unknown)-&amp;gt;y.y.y.y:3306 (japan)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is a Connection Event:&lt;/P&gt;&lt;P&gt;Device SFIMS: Protocol: UDP, SrcIP: x.x.x.x, DstIP: y.y.y.y, SrcPort: 55745, DstPort: 53, TCPFlags: 0x0, IngressInterface: s1p2, EgressInterface: s1p1, IngressZone: Inside Zone, EgressZone: Outside Zone, DE: Primary Detection Engine (removed), Policy: Access Control Policy, ConnectType: Start, AccessControlRuleName: (removed), AccessControlRuleAction: Allow, Client: DNS, InitiatorPackets: 1, ResponderPackets: 0, InitiatorBytes: 83, ResponderBytes: 0, NAPPolicy: Balanced Security and Connectivity, DNSQuery: (removed), DNSRecordType: a host address, DNSResponseType: No Error, Sinkhole: Unknown, URLCategory: Unknown, URLReputation: Risk unknown&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But how about this one, I'm unsure if it is also an Intrusion Event, as the format is different:&lt;/P&gt;&lt;P&gt;2021-05-30 14:00:16.000 +08:00 Device SFIMS: &amp;lt;*- Host IOC Set From Device at Sun May 30 14:00:16 2021 UTC -*&amp;gt; IP Address: x.x.x.x Category: CnC Connected; Event Type: Intrusion Event - malware-cnc&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 08:23:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-ips-syslog-classification/m-p/4413853#M1081335</guid>
      <dc:creator>Jarby23</dc:creator>
      <dc:date>2021-06-07T08:23:01Z</dc:date>
    </item>
  </channel>
</rss>

