Cisco eStreamer log collection and comprehensive selection of dashboards optimized for Sourcefire System 5.2+ and Splunk 6.
NEW ESTREAMER-SPLUNK SOLUTION IS AVAILABLE FOR SECURE FIREWALL (f.k.a. FIREPOWER) CUSTOMERS RUNNING FMC VERSION 6.X HERE: https://splunkbase.splunk.com/app/3662/
The supported event types are:
• Intrusion Events
• Intrusion Event Packet Data (optional)
• Intrusion Event Extra Data
• Malware Events
• File Events
* Connection Logs and Security Intelligence Events
• Correlation and White List Events
• Impact Flag Alerts
• Connection Events (optional)
Please note this app was developed for, and tested on, Unix platforms only. Windows support is not currently available.
This app is only community supported -- no official support is available. Be sure to visit the Documentation tab for initial assistance with setup, configuration, important notes, and a version change log.
eStreamer for Splunk is copyright © 2013-2014 Cisco and/or its affiliates. All rights reserved. Sourcefire is now part of Cisco.
Categories
Security, Fraud & Compliance
Resources
Log in to report this app listing