<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thank you for your quick in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/export-logs-events-to-other-host/m-p/2922148#M18537</link>
    <description>&lt;P&gt;Thank you for your quick answer!&lt;/P&gt;
&lt;P&gt;When I check this documentation I understand it as that this option will be logging exploits attempts from this policy match to a syslog server.&lt;/P&gt;
&lt;P&gt;What we would like to log is actual user traffic to allowed and denied sites.&lt;/P&gt;
&lt;P&gt;Like the information found when I go to Analysis-&amp;gt;Connections-&amp;gt;event&lt;/P&gt;
&lt;P&gt;Or, do I missunderstand the documentation above, will it accomplish this?&lt;/P&gt;</description>
    <pubDate>Wed, 15 Jun 2016 08:37:21 GMT</pubDate>
    <dc:creator>Jacob Jacobson</dc:creator>
    <dc:date>2016-06-15T08:37:21Z</dc:date>
    <item>
      <title>Export logs/events to other host</title>
      <link>https://community.cisco.com/t5/network-security/export-logs-events-to-other-host/m-p/2922146#M18511</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm looking into to export the connection -&amp;gt; events from Firesight to another host.&lt;/P&gt;
&lt;P&gt;What would be the best way to do this? I can not find any clear option in the GUI to export the information.&lt;/P&gt;
&lt;P&gt;Is this information in mysql or can it be found in a plaintext file on the Sourcefirehost that can be copied to another host?&lt;/P&gt;
&lt;P&gt;Or can we configure the Sourcefire to send syslog for every connection event to another syslog host?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We would like to save the information for 3 month+ but unfortunatly atm the log is about 24 hour.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;//Jacob&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jun 2016 10:46:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/export-logs-events-to-other-host/m-p/2922146#M18511</guid>
      <dc:creator>Jacob Jacobson</dc:creator>
      <dc:date>2016-06-14T10:46:47Z</dc:date>
    </item>
    <item>
      <title>Hi Jacob,</title>
      <link>https://community.cisco.com/t5/network-security/export-logs-events-to-other-host/m-p/2922147#M18528</link>
      <description>&lt;P&gt;Hi Jacob,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We can configure firesight to send connection events to syslog server.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can refer the document below for the same :&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/firesight-management-center/118464-configure-firesight-00.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rate if it helps.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Ankita&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jun 2016 13:32:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/export-logs-events-to-other-host/m-p/2922147#M18528</guid>
      <dc:creator>ankojha</dc:creator>
      <dc:date>2016-06-14T13:32:33Z</dc:date>
    </item>
    <item>
      <title>Thank you for your quick</title>
      <link>https://community.cisco.com/t5/network-security/export-logs-events-to-other-host/m-p/2922148#M18537</link>
      <description>&lt;P&gt;Thank you for your quick answer!&lt;/P&gt;
&lt;P&gt;When I check this documentation I understand it as that this option will be logging exploits attempts from this policy match to a syslog server.&lt;/P&gt;
&lt;P&gt;What we would like to log is actual user traffic to allowed and denied sites.&lt;/P&gt;
&lt;P&gt;Like the information found when I go to Analysis-&amp;gt;Connections-&amp;gt;event&lt;/P&gt;
&lt;P&gt;Or, do I missunderstand the documentation above, will it accomplish this?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2016 08:37:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/export-logs-events-to-other-host/m-p/2922148#M18537</guid>
      <dc:creator>Jacob Jacobson</dc:creator>
      <dc:date>2016-06-15T08:37:21Z</dc:date>
    </item>
    <item>
      <title>Hi Jacob, The access control</title>
      <link>https://community.cisco.com/t5/network-security/export-logs-events-to-other-host/m-p/2922149#M18545</link>
      <description>&lt;P&gt;Hi Jacob, The access control policy has logging option so if a traffic hits a particular rule in which logging is enabled and it is also set to send the logs to Syslog.&lt;/P&gt;
&lt;P&gt;You will be able to see all sort of user traffic on the Syslog no matter whether it is exploit traffic or normal traffic,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Mark it as correct if it helped in resolving your query.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;ankita&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2016 14:34:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/export-logs-events-to-other-host/m-p/2922149#M18545</guid>
      <dc:creator>ankojha</dc:creator>
      <dc:date>2016-06-15T14:34:19Z</dc:date>
    </item>
    <item>
      <title>Yes, this should solve our</title>
      <link>https://community.cisco.com/t5/network-security/export-logs-events-to-other-host/m-p/2922150#M18553</link>
      <description>&lt;P&gt;Yes, this should solve our issue. Thank you very much for your assistance!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;//Jacob&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2016 14:37:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/export-logs-events-to-other-host/m-p/2922150#M18553</guid>
      <dc:creator>Jacob Jacobson</dc:creator>
      <dc:date>2016-06-15T14:37:11Z</dc:date>
    </item>
  </channel>
</rss>

