heroui logo

Cisco ASA - Core Syslog Message Volume Drop

Splunk Security Content

View Source
Summary
This detection rule focuses on monitoring Cisco ASA syslog message volumes, which may drop or display suspicious trends potentially due to tampering or malicious activities conducted by adversaries. The rule identifies key syslog message IDs (302013, 302014, 609002, and 710005) associated with critical TCP connection events to proactively detect incidents. The implementation utilizes Splunk to query the ASA logs and visualize message ID counts over a defined time, enabling analysts to quickly identify anomalies and investigate incidents more effectively. This helps maintain a robust security posture by ensuring that organizations can react promptly to possible log suppressions indicative of a breach.
Categories
  • Network
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Firewall
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1562
Created: 2025-09-25