<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Analyzing threat-detection - who did what when?! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/analyzing-threat-detection-who-did-what-when/m-p/2662608#M194931</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm trying to identify who is the source of several 733100 messages in my syslogs on an ASA 5520. &amp;nbsp;I have the following threat-detection configurations enabled:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group threat&lt;/P&gt;&lt;P&gt;However, when the 733100 syslogs come in, they do not say the source or destination ip address. &amp;nbsp;I am able to look at the statistics for each of these detected threats, but I am not sure how to correlate the syslog message to a host in the list. &amp;nbsp;For example,&lt;/P&gt;&lt;P&gt;Apr 16 2015 10:44:05 ASA-1&amp;nbsp;: %ASA-4-733100: [ Scanning] drop rate-1 exceeded. Current burst rate is 18 per second, max configured rate is 10; Current average rate is 38 per second, max configured rate is 5; Cumulative total count is 23268&lt;/P&gt;&lt;P&gt;I then issue the following:&lt;/P&gt;&lt;P&gt;show threat-detection statistics top rate-1&lt;/P&gt;&lt;P&gt;And I see several hosts, but there doesn't seem to be an easy way to say "syslog @ 10:44:05 was host 8.8.8.8" (or whatever the source would be). &amp;nbsp;Is there a document that helped you figure this out? Any advice?&lt;/P&gt;&lt;P&gt;We don't want to shun any hosts, but we do want to know who is doing what and when, so we can talk to the internal user and tell them to stop.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 05:47:26 GMT</pubDate>
    <dc:creator>pdub206</dc:creator>
    <dc:date>2019-03-12T05:47:26Z</dc:date>
    <item>
      <title>Analyzing threat-detection - who did what when?!</title>
      <link>https://community.cisco.com/t5/network-security/analyzing-threat-detection-who-did-what-when/m-p/2662608#M194931</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm trying to identify who is the source of several 733100 messages in my syslogs on an ASA 5520. &amp;nbsp;I have the following threat-detection configurations enabled:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group threat&lt;/P&gt;&lt;P&gt;However, when the 733100 syslogs come in, they do not say the source or destination ip address. &amp;nbsp;I am able to look at the statistics for each of these detected threats, but I am not sure how to correlate the syslog message to a host in the list. &amp;nbsp;For example,&lt;/P&gt;&lt;P&gt;Apr 16 2015 10:44:05 ASA-1&amp;nbsp;: %ASA-4-733100: [ Scanning] drop rate-1 exceeded. Current burst rate is 18 per second, max configured rate is 10; Current average rate is 38 per second, max configured rate is 5; Cumulative total count is 23268&lt;/P&gt;&lt;P&gt;I then issue the following:&lt;/P&gt;&lt;P&gt;show threat-detection statistics top rate-1&lt;/P&gt;&lt;P&gt;And I see several hosts, but there doesn't seem to be an easy way to say "syslog @ 10:44:05 was host 8.8.8.8" (or whatever the source would be). &amp;nbsp;Is there a document that helped you figure this out? Any advice?&lt;/P&gt;&lt;P&gt;We don't want to shun any hosts, but we do want to know who is doing what and when, so we can talk to the internal user and tell them to stop.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:47:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/analyzing-threat-detection-who-did-what-when/m-p/2662608#M194931</guid>
      <dc:creator>pdub206</dc:creator>
      <dc:date>2019-03-12T05:47:26Z</dc:date>
    </item>
    <item>
      <title>Hi,I don't think you would be</title>
      <link>https://community.cisco.com/t5/network-security/analyzing-threat-detection-who-did-what-when/m-p/2662609#M194932</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I don't think you would be able to get more information from these syslog.&lt;/P&gt;&lt;P&gt;As you have Statistics Threat Detection enabled , I would recommend enabling other commands and then you would be able to find out more information on them.&lt;/P&gt;&lt;P&gt;Refer:-&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113685-asa-threat-detection.html&lt;/P&gt;&lt;P&gt;These command you would be able to use:-&lt;/P&gt;&lt;P&gt;show threat-detection statistics host&lt;BR /&gt;show threat-detection statistics port&lt;BR /&gt;show threat-detection statistics protocol&lt;BR /&gt;show threat-detection statistics top&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Also , ASDM graphs would be helpful.&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa80/asdm60/user/guide/usrguide/intro.html#wp1044840&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Fri, 17 Apr 2015 12:00:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/analyzing-threat-detection-who-did-what-when/m-p/2662609#M194932</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-04-17T12:00:03Z</dc:date>
    </item>
  </channel>
</rss>

