The logs on the ASA can be looked up by searching Cisco syslog ID's. The "classification" you speak of are a set of logic from LogRhythm that will look at a variety of patterns in order to that alert on things such as brute force, port scanning or DDoS. Say you have logs in your ASA that shows denied connections on ports 21,22,23,25,80, 161,123 etc. The firewall will log these connections (if logging is set up correctly to capture those syslog ID's) but your SIEM will then look at the rate of the packets, which ports are being hit and then creat an alert "Possible Port Scanning Activity"
We are happy to share changes to the Cisco Threat Grid support experience! Our customers have spoken, and we have listened! You want a single, streamlined, easy to access tool to open, view, and update your cases across Cisco Services. That tool is Cisco’...
Where can I find out how to integrate my Cisco products with Threat Response?
There are quick start guides and instructional videos to help you get set up with your Cisco products and the Cisco Threat Response platform.
Inviting all Security & Networking professionals! We want you to tell us what devices you use to do your work and its screen resolution. Your response will help us improve network and security management tools.
Click here to take the 5-minute s...
This guide is intended to show some nifty and powerful use cases that a lot of customers either want or don’t know they want. There are tons of other content out there for specific knobs or capabilities, but this is looking to be a more complete...