cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
938
Views
0
Helpful
2
Replies

Identifying a network breach

sprocket10
Level 2
Level 2

 

In the event of a network breach, for example someones device is hacked while on the network, I have been asked to identify what logging we have in place to trace whats happened.

 

What is required is logging that shows all traffic that passes through the ASA to and from a device on the network so anything malicious can be traced.

 

Currently we log level4 to syslog.

 

Can this be done with Syslogs or as I suspect we would need something like netflow.

2 Replies 2

omz
VIP Alumni
VIP Alumni

Leo Laohoo
Hall of Fame
Hall of Fame

@sprocket10 wrote:

Currently we log level4 to syslog.


A lot of the "big hitters" APT (and their scripts) look for syslog server(s) and delete the files found inside.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card