We would like to collect Cisco ISE authentication logs in the SIEM. The device is on the supported list, but the default parser doesn't appear to have a matching rule for these type of logs. We see performance and system state logs, but nothing related to authentication. If we set the support generic syslogs in the data source configuration to log "unknown syslog" events, we do see such events start coming in, but I was wondering if there was a rule update that may be on the horizon to address this. Otherwise, I'm assuming the only recourse will be to create a custom rule with a custom regular expression, correct?
Moved to Business > SIEM for faster support.