You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: cisco_asa/assets/logs/cisco-asa.yaml
+38-38Lines changed: 38 additions & 38 deletions
Original file line number
Diff line number
Diff line change
@@ -160,9 +160,9 @@ pipeline:
160
160
110002 OR 110003 OR 110004 OR 746001 OR 746002 OR 746003 OR 746005
161
161
OR 746007 OR 746016)"
162
162
name: firewall
163
-
- name: other
164
-
filter:
163
+
- filter:
165
164
query: "@message_id:*"
165
+
name: other
166
166
target: service
167
167
- type: service-remapper
168
168
name: Define `service` as the official service of the log
@@ -183,7 +183,7 @@ pipeline:
183
183
- "[ Scanning] drop rate-1 exceeded. Current burst rate is 19 per
184
184
second, max configured rate is 33; Current average rate is 50 per
185
185
second, max configured rate is 33; Cumulative total count is 44"
186
-
- Threat-detection adds host 192.0.2.3 to shun list
186
+
- Threat-detection adds host www.example.com to shun list
187
187
- TCP Intercept SYN flood attack detected to 192.0.2.3/1194
188
188
(192.0.2.14/443). Average rate of 47 SYNs/sec exceeded the
189
189
threshold of 48.
@@ -208,7 +208,7 @@ pipeline:
208
208
209
209
rule_733102_733103 Threat-detection %{word:action} host %{ipOrHost:host} (to|from) shun list
210
210
211
-
rule_733104_733105 %{word:protocol} Intercept SYN flood attack detected to %{ip:network.destination.ip}/%{port:network.destination.port}\s*\(%{ip:real_ip}/%{port:real_port}\). %{word:rate_type} rate of %{number:rate} %{notSpace:rate_unit} exceeded the threshold of %{number:rate_threshold}
211
+
rule_733104_733105 %{word:protocol} Intercept SYN flood attack detected to %{ip:network.destination.ip}/%{integer:network.destination.port}\s*\(%{ip:real_ip}/%{integer:real_port}\). %{word:rate_type} rate of %{number:rate} %{notSpace:rate_unit} exceeded the threshold of %{number:rate_threshold}
212
212
- type: pipeline
213
213
name: User Authentication
214
214
enabled: true
@@ -236,15 +236,15 @@ pipeline:
236
236
matchRules: >-
237
237
rule_109005_109006 Authentication %{notSpace:evt.outcome} for user
238
238
'%{regex("[^']*"):usr.name}' from
239
-
%{ip:network.client.ip}/%{port:network.client.port} to
240
-
%{ip:network.destination.ip}/%{port:network.destination.port} on
241
-
interface %{data:interface}
239
+
%{ip:network.client.ip}/%{integer:network.client.port} to
rule_109010 Auth from %{ip:network.client.ip}/%{port:network.client.port} to %{ip:network.destination.ip}/%{port:network.destination.port} %{notSpace:evt.outcome} \(%{regex("[^\\)]*"):reason}\) on interface %{data:interface}
243
+
rule_109010 Auth from %{ip:network.client.ip}/%{integer:network.client.port} to %{ip:network.destination.ip}/%{integer:network.destination.port} %{notSpace:evt.outcome} \(%{regex("[^\\)]*"):reason}\) on interface %{data:interface}
244
244
245
-
rule_109023 User from %{ip:network.client.ip}/%{port:network.client.port} to %{ip:network.destination.ip}/%{port:network.destination.port} on interface %{regex(".*(?= using )"):interface} using %{regex(".*(?= must authenticate)"):service_name} must authenticate before using this service
245
+
rule_109023 User from %{ip:network.client.ip}/%{integer:network.client.port} to %{ip:network.destination.ip}/%{integer:network.destination.port} on interface %{regex(".*(?= using )"):interface} using %{regex(".*(?= must authenticate)"):service_name} must authenticate before using this service
246
246
247
-
rule_109033_109034 Authentication %{notSpace:evt.outcome} for %{notSpace:user_type} user %{regex(".*(?= from )"):usr.name} from (%{ip:network.client.ip}|%{ip:network.client.ip}/%{port:network.client.port} to %{ip:network.destination.ip}/%{port:network.destination.port}). Interactive challenge processing is not supported for %{notSpace:protocol}( connections)?
247
+
rule_109033_109034 Authentication %{notSpace:evt.outcome} for %{notSpace:user_type} user %{regex(".*(?= from )"):usr.name} from (%{ip:network.client.ip}|%{ip:network.client.ip}/%{integer:network.client.port} to %{ip:network.destination.ip}/%{integer:network.destination.port}). Interactive challenge processing is not supported for %{notSpace:protocol}( connections)?
248
248
- type: pipeline
249
249
name: User Authorization
250
250
enabled: true
@@ -272,11 +272,11 @@ pipeline:
272
272
matchRules: >-
273
273
rule_109007_109008 Authorization %{word:evt.outcome} for user
274
274
'%{regex("[^']*"):usr.name}' from
275
-
%{ip:network.client.ip}/%{port:network.client.port} to
276
-
%{ip:network.destination.ip}/%{port:network.destination.port} on
277
-
interface %{data:interface}
275
+
%{ip:network.client.ip}/%{integer:network.client.port} to
rule_109024_109025 Authorization %{word:evt.outcome} (\(acl=%{regex("[^\\)]*"):acl_id}\))?( for user '%{regex("[^']*"):usr.name}' )?from %{ip:network.client.ip}/%{port:network.client.port} to %{ip:network.destination.ip}/%{port:network.destination.port} (\(not authenticated\) )?on interface %{regex(".*(?= using )"):interface} using %{notSpace:protocol}( to)?
279
+
rule_109024_109025 Authorization %{word:evt.outcome} (\(acl=%{regex("[^\\)]*"):acl_id}\))?( for user '%{regex("[^']*"):usr.name}' )?from %{ip:network.client.ip}/%{integer:network.client.port} to %{ip:network.destination.ip}/%{integer:network.destination.port} (\(not authenticated\) )?on interface %{regex(".*(?= using )"):interface} using %{notSpace:protocol}( to)?
280
280
- type: pipeline
281
281
name: User Management
282
282
enabled: true
@@ -308,7 +308,7 @@ pipeline:
308
308
query: "@message_id:(415001 OR 415002 OR 415003 OR 415005 OR 415013 OR 415016)"
309
309
processors:
310
310
- type: grok-parser
311
-
name: Parse Application Firewall
311
+
name: Parse Application Firewall Logs
312
312
enabled: true
313
313
source: message
314
314
samples:
@@ -329,27 +329,27 @@ pipeline:
329
329
requests exceeded drop inside test:10.10.10.10/51822 to
rule_110004 %{regex("Egress interface changed"):reason} from %{regex(".*(?= to )"):old_interface} to %{regex(".*(?= on )"):new_interface} on %{notSpace:protocol} connection %{number:connection_id} for %{notSpace:outside_interface_zone}\s*/\s*%{_parse_till_colon:outside_interface}\s*:%{ip:outside_ip}\s*/\s*%{port:outside_port}\s*\(%{ip:outside_mapped_ip}\s*/\s*%{port:outside_mapped_port}\s*\) to %{notSpace:inside_interface_zone}\s*/\s*%{_parse_till_colon:inside_interface}\s*:%{ip:inside_ip}\s*/\s*%{port:inside_port}\s*\(%{ip:inside_mapped_ip}\s*/\s*%{port:inside_mapped_port}\s*\)
374
+
rule_110004 %{regex("Egress interface changed"):reason} from %{regex(".*(?= to )"):old_interface} to %{regex(".*(?= on )"):new_interface} on %{notSpace:protocol} connection %{number:connection_id} for %{notSpace:outside_interface_zone}\s*/\s*%{regex("[^:]*"):outside_interface}\s*:%{ip:outside_ip}\s*/\s*%{integer:outside_port}\s*\(%{ip:outside_mapped_ip}\s*/\s*%{integer:outside_mapped_port}\s*\) to %{notSpace:inside_interface_zone}\s*/\s*%{regex("[^:]*"):inside_interface}\s*:%{ip:inside_ip}\s*/\s*%{integer:inside_port}\s*\(%{ip:inside_mapped_ip}\s*/\s*%{integer:inside_mapped_port}\s*\)
375
375
- type: pipeline
376
376
name: Identity Firewall
377
377
enabled: true
378
378
filter:
379
379
query: "@message_id:(746001 OR 746002 OR 746003 OR 746005 OR 746007 OR 746016)"
380
380
processors:
381
381
- type: grok-parser
382
-
name: Parse Identity Firewall
382
+
name: Parse Identity Firewall Logs
383
383
enabled: true
384
384
source: message
385
385
samples:
@@ -400,7 +400,7 @@ pipeline:
400
400
401
401
rule_746007 user-identity: NetBIOS response failed from User %{regex(".*(?= at )"):usr.name} at %{ip:network.client.ip}
402
402
403
-
rule_746016 user-identity: DNS lookup for %{ip:network.client.ip} failed, reason:\s+%{data:reason}
403
+
rule_746016 user-identity: DNS lookup for %{ip:network.client.ip} failed, reason:\s*%{data:reason}
rule_106002 %{notSpace:protocol} Connection denied by outbound list %{notSpace:outbound_list} src %{ip:network.client.ip} dest %{ip:network.destination.ip}
460
460
461
-
rule_106006 Deny inbound UDP from %{ip:network.client.ip}/%{port:network.client.port} to %{ip:network.destination.ip}/%{port:network.destination.port} on interface %{data:interface}
461
+
rule_106006 Deny inbound %{regex("UDP"):protocol} from %{ip:network.client.ip}/%{integer:network.client.port} to %{ip:network.destination.ip}/%{integer:network.destination.port} on interface %{data:interface}
462
462
- type: pipeline
463
463
name: Dynamic traffic insights
464
464
enabled: true
@@ -468,7 +468,7 @@ pipeline:
468
468
338202 OR 338203 OR 338204)"
469
469
processors:
470
470
- type: grok-parser
471
-
name: Parse dynamic traffic logs
471
+
name: Parse dynamic traffic Logs
472
472
enabled: true
473
473
source: message
474
474
samples:
@@ -497,15 +497,15 @@ pipeline:
497
497
local list: mycoolapp-preview.mock, threat-level: 0, category:
0 commit comments