Cisco IOS
IOS is Cisco’s network operating system that runs mainly on their switches and routers. The IOS log data contains information about the operational state of the device and the network functions served by the device.
This data is used for troubleshooting the operations of Cisco devices running IOS. It can be used to confirm configuration settings that influence the functionality the device is expected to deliver. Examples include mismatched duplex settings, up and down state of ports, routing, and operating conditions, such as temperature and power.
|
Splunk platform
|
In the Common Information Model, Cisco IOS can be mapped to any of the following data models, depending on the field: Network Traffic and Change.
Configuration
Use Cases
|
Adaptive Security Appliance
Cisco Adaptive Security Appliance (ASA) logs combine firewall, antivirus, intrusion prevention, and virtual private network (VPN) data. The logs provides data for the following devices and solutions: firewall, antivirus, antispam, intrusion detection, intrusion prevention, VPN devices, SSL devices, and content inspection. They provide information about proactive threat defense efforts that stop attacks before they spread through networks, both large and small. Cisco ASA software also integrates with other critical security technologies to deliver comprehensive solutions that meet continuously evolving security needs. This includes multi-site and multi-node clustering, high availability, context awareness, dynamic routing and site-to-site VPN, and unified communications.
|
Splunk platform
|
Configuration
Use Cases
|
|
Email Security Appliance (ESA)
|
Splunk platform
Splunk SOAR
|
Configuration
|
|
FireAMP
|
Splunk SOAR
|
|
|
Firepower
|
Splunk platform
Splunk SOAR
|
Use Cases
|
Identity Services Engine
Cisco Identity Services Engine (ISE) is a security policy management and control platform. It automates and simplifies access control and security compliance for wired, wireless, and VPN connectivity. You can use the Splunk platform to analyze Cisco ISE syslog data directly or use it as a contextual data source to correlate with other communication and authentication data.
|
Splunk platform
Splunk SOAR
|
In the Common Information Model, Cisco Identity Services data can be mapped to any of the following data models, depending on the field: Alerts, Authentication, Change, Endpoint, Network Traffic.
Configuration
Use Cases
|
|
Meraki
|
Splunk platform
|
Configuration
Use Cases
|
|
Networking hardware
|
Splunk platform
|
Use Cases
|
Umbrella Investigate
Cisco Umbrella Investigate provides internet-wide visibility of attacker's infrastructure, predictive intelligence to identify malicious domains, IPs, and ASNs, and all the real-time and historical domain information you need in a single source. With the Splunk Add-on for Cisco Umbrella Investigate, you can automatically enrich security events inside Splunk with Cisco’s intelligence on domains, IPs, and networks across the internet.
|
Splunk platform
Splunk SOAR
|
By leveraging Investigate’s threat intelligence from within Splunk Enterprise Security, you can gain more context about a domain, IP, or ASN related to the event, allowing you to make faster, more informed decisions when responding to critical incidents and researching potential threats.
Configuration
Use Cases
|
|
Unified Computing System
|
Splunk platform
|
Configuration
|
|
Webex
|
Splunk SOAR
|
Use Cases
|
|
Web Security Appliance
|
Splunk platform
|
Configuration
|