<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Logging events via third party in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/logging-events-via-third-party/m-p/4033075#M989652</link>
    <description>&lt;P&gt;Customers who require extended log retention typically use something like Splunk ($$$) or, if they have some time to setup an open source solution, something like greylog or ELKstack.&lt;/P&gt;
&lt;P&gt;Another option is to switch over to CDO management and use Cisco's recently-introduced Security Analytics and Logging (SAL) service. It retains 90 days of events and pricing is based on volume.&lt;/P&gt;</description>
    <pubDate>Thu, 20 Feb 2020 14:08:59 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2020-02-20T14:08:59Z</dc:date>
    <item>
      <title>Logging events via third party</title>
      <link>https://community.cisco.com/t5/network-security/logging-events-via-third-party/m-p/4033063#M989651</link>
      <description>&lt;P&gt;Under the ACP logging menu, if you have the syslog alert variable set, does that mean that in addition to sending the same event logs to the FMC, it also sends the same syslog to what you configure as?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If so, what syslog servers do you guys use that provide the same functionality as the FMC where you can search based on items such as source IP and block reason.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I find the fmc is nice for the short term but doesn't retain data long enough. Could it be that the FMC needs to be reconfigured to retain more data?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2020 13:36:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-events-via-third-party/m-p/4033063#M989651</guid>
      <dc:creator>ryan14</dc:creator>
      <dc:date>2020-02-20T13:36:30Z</dc:date>
    </item>
    <item>
      <title>Re: Logging events via third party</title>
      <link>https://community.cisco.com/t5/network-security/logging-events-via-third-party/m-p/4033075#M989652</link>
      <description>&lt;P&gt;Customers who require extended log retention typically use something like Splunk ($$$) or, if they have some time to setup an open source solution, something like greylog or ELKstack.&lt;/P&gt;
&lt;P&gt;Another option is to switch over to CDO management and use Cisco's recently-introduced Security Analytics and Logging (SAL) service. It retains 90 days of events and pricing is based on volume.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2020 14:08:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-events-via-third-party/m-p/4033075#M989652</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-02-20T14:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: Logging events via third party</title>
      <link>https://community.cisco.com/t5/network-security/logging-events-via-third-party/m-p/4033093#M989653</link>
      <description>&lt;P&gt;Thanks. Does the logging get sent to the FMC still if external syslog is configured or does that override FMC? How can I ensure my fmc is configured to allow its max potential to store logging data or retention period.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2020 14:44:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-events-via-third-party/m-p/4033093#M989653</guid>
      <dc:creator>ryan14</dc:creator>
      <dc:date>2020-02-20T14:44:46Z</dc:date>
    </item>
    <item>
      <title>Re: Logging events via third party</title>
      <link>https://community.cisco.com/t5/network-security/logging-events-via-third-party/m-p/4033485#M1066833</link>
      <description>&lt;P&gt;Logging will still be sent to FMC as long as your rule entries have the selection for "event viewer" in their logging setting:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ACP Rule logging settings.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/67782i8C32BC93416B629E/image-size/large?v=v2&amp;amp;px=999" role="button" title="ACP Rule logging settings.PNG" alt="ACP Rule logging settings.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;By default the system divides up the available database storage space to favor security-related logs vs pure connection events. You can see the settings as follows:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="System database settings.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/67781i246E5F5DC5D0E5F9/image-size/large?v=v2&amp;amp;px=999" role="button" title="System database settings.PNG" alt="System database settings.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Each FMC platform has different capacity to store logs. The data sheets list that specification.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:10:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-events-via-third-party/m-p/4033485#M1066833</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-02-21T05:10:27Z</dc:date>
    </item>
  </channel>
</rss>

