cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
683
Views
0
Helpful
1
Replies

Secure Endpoint / AMP : Possible to capture ALL cmd line arguments?

stipend
Level 1
Level 1

My ultimate goal is to have some form of CMD line logs sent into Splunk. Due to reasons, Sysmon or any other tool is not possible. We only have AMP logs being sent to Splunk. Currently we only get what CMD line arguments were used if there is a cloud IOC compromise event. 

Is it possible to get what CMD line arguments were used even if there is a benign event? For example, I go into Device Trajectory and see the following event. AMP doesn't classify it as a compromise or malicious event so that particular event doesn't get sent into Splunk. 

stipend_0-1680717079357.png

 

1 Reply 1

srigovi2
Cisco Employee
Cisco Employee

AMP logs can be sent to the SIEM Splunk tool for investigation. However, only malicious logs will be filtered and sent to Splunk. Clear or non-malicious logs cannot be sent for secure endpoint purposes. You can refer to the following links for Splunk integration:

You can also reach out to the TAC team to inquire about any new versions of the AMP connector that support this feature.