Send Security Event Syslog Messages from FTD Devices
This procedure documents the best practice configuration for sending syslog messages for security events (connection, Security Intelligence, intrusion, file, and malware events) from FTD devices.
Note | Many FTD syslog settings are not applicable to security events. Configure only the options described in this procedure. |
Before you begin
-
In Cisco Defense Orchestrator, configure policies to generate security events and verify that the events you expect to see appear in the applicable tables under the Analysis menu.
-
Gather the syslog server IP address, port, and protocol (UDP or TCP):
-
Ensure that your devices can reach the syslog server(s).
-
Confirm that the syslog server(s) can accept remote messages.
-
For important information about connection logging, see the chapter on Connection Logging.
Procedure
Step 1 | Configure syslog settings for your FTD device: |
Step 2 | Configure general logging settings for the access control policy (including file and malware logging):
|
Step 3 | Enable logging for Security Intelligence events for the access control policy: |
Step 4 | Enable syslog logging for each rule in the access control policy: |
Step 5 | If you will send intrusion events: |
What to do next
-
(Optional) Configure different logging settings for individual policies and rules.
See the applicable table rows in Configuration Locations for Syslogs for Connection and Security Intelligence Events (All Devices)the "Configuration Locations for Syslogs for Connection and Security Intelligence Events (All Devices)" topic in the CDO online help.
These settings will require syslog alert responses, which are configured as described in Creating a Syslog Alert Response. They do not use the platform settings you configured in this procedure.
-
To configure security event syslog logging for Classic devices, see Send Security Event Syslog Messages from Classic Devices.
-
If you are done making changes, deploy your changes to managed devices.