Cisco_SMA¶
About¶
The Security Management Appliance (SMA) is used to centralize services from Email Security Appliances (ESAs) and Web Security Appliances (WSAs).
Product Details¶
Vendor URL: Cisco Content Security Managment Applicance
Product Type: Management Appliance
Product Tier: TIER III
Integration Method: SYSLOG
Integration URL: Reviewing the audit log for your organzation
Requirements¶
Parser Details¶
Log Format: SYSLOG
Expected Normalization Rate: 90%
Data Label: CISCO_SMA
UDM Fields (list of all UDM fields leveraged in the Parser):
Log File Field | UDM Field |
---|---|
action | metadata.product_event_type |
aggregator_message | metadata.description |
observer | observer.hostname |
process_name | metadata.description |
reporting_service | principal.application |
severity | security_result.severity |
source_filepath | src.file.full_path |
source_host | src.hostname |
target_file | target.file.full_path |
Product Event Types¶
Product Event | Description | UDM Event |
---|---|---|
All | All events | GENERIC_EVENT |
Log Sample¶
{<14>Sep 23 00:00:59 Hostname: Info: TRANSFER: Plugin TRACKINGPLUGIN downloading from Hostname1 - /file/path/example.gz}
Sample Parsing¶
metadata.event_timestamp = "2022-09-23T00:00:59Z"
metadata.event_type = "GENERIC_EVENT"
metadata.product_event_type = "TRANSFER"
metadata.product_name = "Cisco SMA"
metadata.vendor_name = "Cisco"
observer.hostname = "Hostname"
principal.application = "TRACKINGPLUGIN"
security_result[0].severity = "INFORMATIONAL"
security_result[0].severity_details = "Info"
src.file.full_path = "/file/path/example.gz"
src.hostname = "Hostname1"
Parser Alerting¶
This product currently does not have any Parser-based Alerting
Rules¶
Coming Soon