<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Display certificate information in Security Analytics</title>
    <link>https://community.cisco.com/t5/security-analytics/display-certificate-information/m-p/5375730#M1280</link>
    <description>&lt;P&gt;If you are using ETA and not seeing TLS version you may want to check the exporter configuration. If you are using a Flow Sensor, is it set to export HTTPS Header Data?&amp;nbsp; By all means reach out to me directly if you are still not seeing TLS telemetry.&lt;/P&gt;</description>
    <pubDate>Tue, 10 Mar 2026 16:09:45 GMT</pubDate>
    <dc:creator>David Salter</dc:creator>
    <dc:date>2026-03-10T16:09:45Z</dc:date>
    <item>
      <title>Display certificate information</title>
      <link>https://community.cisco.com/t5/security-analytics/display-certificate-information/m-p/5375633#M1276</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I configured a CSE for alerting everytime a TLS connection using a version lower than 1.3 is made. I'm getting the flow alerts but I cannot see any URL information that helps me identifying which particular URL is not compliant. Is there any way to get the details? Looking into the flow details the "encryption TLS/SSL version" is not populated either as you can see in the image attached.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 08:56:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/display-certificate-information/m-p/5375633#M1276</guid>
      <dc:creator>Antonio Macia</dc:creator>
      <dc:date>2026-03-10T08:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: Display certificate information</title>
      <link>https://community.cisco.com/t5/security-analytics/display-certificate-information/m-p/5375664#M1277</link>
      <description>&lt;P&gt;check if this applies for the certificate:&lt;BR /&gt;&amp;nbsp;&lt;A href="https://docs.thousandeyes.com/product-documentation/alerts/creating-and-editing-alert-rules/transport-layer-security-tls-alerts" target="_blank"&gt;https://docs.thousandeyes.com/product-documentation/alerts/creating-and-editing-alert-rules/transport-layer-security-tls-alerts&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="flex-1 z-1 justify-self-start max-w-full break-words text-start self-start justify-start leading-tight"&gt;Caveats&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;UL class="min-w-0 space-y-2 mx-auto page-width-wide:mx-0 w-full decoration-primary/6 max-w-3xl page-api-block:ml-0"&gt;
&lt;LI class="leading-normal flex items-start"&gt;
&lt;DIV class="flex min-w-0 flex-1 flex-col space-y-2"&gt;
&lt;P class="has-[.button,input]:flex has-[.button,input]:flex-wrap has-[.button,input]:gap-2 has-[.button,input]:items-center page-width-wide:mx-0 w-full decoration-primary/6 max-w-3xl print:break-inside-avoid min-h-lh [h2]:pt-0 [h3]:pt-0 [h4]:pt-0 mx-0 text-start self-start justify-start"&gt;If the target site uses HTTP/2 and issues at least one redirect, and the last request is to the same domain as the previous request, then the certificates will be lost.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 10 Mar 2026 11:19:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/display-certificate-information/m-p/5375664#M1277</guid>
      <dc:creator>pieterh</dc:creator>
      <dc:date>2026-03-10T11:19:58Z</dc:date>
    </item>
    <item>
      <title>Re: Display certificate information</title>
      <link>https://community.cisco.com/t5/security-analytics/display-certificate-information/m-p/5375705#M1278</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Screenshot 2026-03-10 141049.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/260872iF9C8B63D27B0820D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2026-03-10 141049.png" alt="Screenshot 2026-03-10 141049.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have the '&lt;SPAN&gt;Encryption TLS/SSL Version' field added to your Flow Search?&amp;nbsp; It's not added by default.&amp;nbsp; You can find it under 'Manage Columns' in the Flow Search results.&amp;nbsp; The field is in the 'Connections' section.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 14:14:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/display-certificate-information/m-p/5375705#M1278</guid>
      <dc:creator>David Salter</dc:creator>
      <dc:date>2026-03-10T14:14:57Z</dc:date>
    </item>
    <item>
      <title>Re: Display certificate information</title>
      <link>https://community.cisco.com/t5/security-analytics/display-certificate-information/m-p/5375723#M1279</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The TLS fields are empty, not getting populated. Anyway, I was wondering if I could see the actual hostname of the domain? Let's say I want to gather information about the domains that use a encryption version lower than TLS 1.3. Is this possible?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 15:36:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/display-certificate-information/m-p/5375723#M1279</guid>
      <dc:creator>Antonio Macia</dc:creator>
      <dc:date>2026-03-10T15:36:07Z</dc:date>
    </item>
    <item>
      <title>Re: Display certificate information</title>
      <link>https://community.cisco.com/t5/security-analytics/display-certificate-information/m-p/5375730#M1280</link>
      <description>&lt;P&gt;If you are using ETA and not seeing TLS version you may want to check the exporter configuration. If you are using a Flow Sensor, is it set to export HTTPS Header Data?&amp;nbsp; By all means reach out to me directly if you are still not seeing TLS telemetry.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 16:09:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/display-certificate-information/m-p/5375730#M1280</guid>
      <dc:creator>David Salter</dc:creator>
      <dc:date>2026-03-10T16:09:45Z</dc:date>
    </item>
  </channel>
</rss>

