We would like to collect Cisco ISE authentication logs in the SIEM. The device is on the supported list, but the default parser doesn't appear to have a matching rule for these type of logs. We see performance and system state logs, but nothing related to authentication. If we set the support generic syslogs in the data source configuration to log "unknown syslog" events, we do see such events start coming in, but I was wondering if there was a rule update that may be on the horizon to address this. Otherwise, I'm assuming the only recourse will be to create a custom rule with a custom regular expression, correct?
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.
Community Help Hub
New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.