
Summary
This detection rule targets potential tampering with logging filters on Cisco ASA devices, which is crucial for maintaining security oversight. It identifies reduced logging levels or disabled log categories that could allow adversaries to operate undetected. The rule focuses on log configuration commands with specific message IDs, monitoring any changes to the logging destinations without appropriate severity increases. Such alterations could hinder detection mechanisms, making it essential for security teams to investigate any unauthorized changes, particularly those made by unauthorized user accounts or during atypical hours. Implementing this detection requires proper configuration of Cisco ASA devices to forward relevant log messages to a monitoring system.
Categories
- Network
- Endpoint
- Infrastructure
Data Sources
- Pod
- Container
- User Account
- Application Log
- Network Traffic
- Sensor Health
- Logon Session
- Process
ATT&CK Techniques
- T1562
Created: 2025-11-18