
Summary
This analytical rule aims to detect the suppression of specific logging messages on Cisco ASA devices, which can indicate malicious attempts to obfuscate security-critical events. By employing the command \"no logging message\", adversaries can prevent the logging of crucial alerts related to authentication failures, configuration modifications, or other suspicious activities. The focus is on monitoring command execution events associated with logging messages 111008 and 111010. These events are closely tied to suppression actions that could indicate a security breach or evasion strategy. The rationale for this detection is to capture command executions during atypical hours, by non-administrative users, or without appropriate authorization. This can help security teams identify potential unauthorized configurations that could hinder their ability to monitor security effectively.
Categories
- Network
- Endpoint
Data Sources
- Logon Session
- Network Traffic
- Application Log
ATT&CK Techniques
- T1562.002
- T1070
Created: 2025-11-18