<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPS 7.1 Event Analysis in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-7-1-event-analysis/m-p/2381108#M53131</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Daniel -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your two most common options for getting event data off your sensors are:&lt;/P&gt;&lt;P&gt;1. Get/build/buy a SIEM that will pull the evetns via the SDEE protocol.&lt;/P&gt;&lt;P&gt;2. Edit the action of the signatures in question (&amp;gt;85% RR) to generate an SNMP trap for the event.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For real analysis you will also want to grab a PCAP of both sides of the attack (so you can tell if it was sucessful or a false positive).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 02 Jan 2014 17:49:47 GMT</pubDate>
    <dc:creator>rhermes</dc:creator>
    <dc:date>2014-01-02T17:49:47Z</dc:date>
    <item>
      <title>IPS 7.1 Event Analysis</title>
      <link>https://community.cisco.com/t5/network-security/ips-7-1-event-analysis/m-p/2381107#M53130</link>
      <description>&lt;P&gt;Hi Folks, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Happy new year!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I'm trying to interface my IPS Event with an external log analyzer. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;This exercise (Log Management) has become vital as my SLA required IPS Event (particularly those with risk rating above 85) be documented and reported &amp;lt;90mins on a day-to-day basis. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Anyone with ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards, &lt;/P&gt;&lt;P&gt;Daniel&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:07:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-7-1-event-analysis/m-p/2381107#M53130</guid>
      <dc:creator>dadaramola</dc:creator>
      <dc:date>2019-03-10T13:07:08Z</dc:date>
    </item>
    <item>
      <title>IPS 7.1 Event Analysis</title>
      <link>https://community.cisco.com/t5/network-security/ips-7-1-event-analysis/m-p/2381108#M53131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Daniel -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your two most common options for getting event data off your sensors are:&lt;/P&gt;&lt;P&gt;1. Get/build/buy a SIEM that will pull the evetns via the SDEE protocol.&lt;/P&gt;&lt;P&gt;2. Edit the action of the signatures in question (&amp;gt;85% RR) to generate an SNMP trap for the event.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For real analysis you will also want to grab a PCAP of both sides of the attack (so you can tell if it was sucessful or a false positive).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Jan 2014 17:49:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-7-1-event-analysis/m-p/2381108#M53131</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2014-01-02T17:49:47Z</dc:date>
    </item>
    <item>
      <title>IPS 7.1 Event Analysis</title>
      <link>https://community.cisco.com/t5/network-security/ips-7-1-event-analysis/m-p/2381109#M53132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Rhermes, &lt;SPAN style="font-size: 10pt;"&gt;nice one.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On your response, I have tried pulling events using Splunk- seems to be getting errors integrating splunk with the sensor; is there a way around this, or are there other SIEM (preferably open source) one can use to pull events via SDEE? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Jan 2014 07:27:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-7-1-event-analysis/m-p/2381109#M53132</guid>
      <dc:creator>dadaramola</dc:creator>
      <dc:date>2014-01-03T07:27:45Z</dc:date>
    </item>
    <item>
      <title>IPS 7.1 Event Analysis</title>
      <link>https://community.cisco.com/t5/network-security/ips-7-1-event-analysis/m-p/2381110#M53133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I don't have any experience with Splunk and Cisco IPS, but there is a Wiki for it, so I assume other people have it working:&amp;nbsp; &lt;A href="http://wiki.splunk.com/Set_up_Splunk_for_Cisco_IPS"&gt;http://wiki.splunk.com/Set_up_Splunk_for_Cisco_IPS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I would imagine all commercial SEM vendors should support Cisco's implementation of SDEE, I have experience with Trustwave (formerly Intelitactics) and Arcsight. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How many sensors are you attempting to monitor? The free Cisco IME can pull events from up to 5 sensors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Bob &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Jan 2014 17:43:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-7-1-event-analysis/m-p/2381110#M53133</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2014-01-03T17:43:31Z</dc:date>
    </item>
    <item>
      <title>IPS 7.1 Event Analysis</title>
      <link>https://community.cisco.com/t5/network-security/ips-7-1-event-analysis/m-p/2381111#M53134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi rhermes, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have since gotten Cisco IME 7.2.1. It pretty great working with this interface. Thanks! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Daniel. &lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 18:07:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-7-1-event-analysis/m-p/2381111#M53134</guid>
      <dc:creator>dadaramola</dc:creator>
      <dc:date>2014-02-19T18:07:38Z</dc:date>
    </item>
  </channel>
</rss>

