Configure Logging Settings
This procedure describes how to enable logging of diagnostic (data) messages, file and malware events, intrusion events, and console events. Connection events are not logged as a result of these settings; they are logged if connection logging is configured on access rules, security intelligence policies, or SSL decryption rules.
Procedure
Step 1 | |||||
Step 2 | On the System Settings page click Logging in the settings menu. | ||||
Step 3 | Data logging. Slide the Data Logging slider to On to capture diagnostic logging syslog messages. Click the plus button to specify the syslog server object that represents the syslog server that you want to send the events to. (You can also create a syslog server object at this point.) Additionally, select the minimum level of event severity you want to log. This will send data logging events for any type of syslog message, with your minimum chosen severity level, to the syslog server.
| ||||
Step 4 | File/Malware Log Settings. Slide the slider to On to capture file and malware events. Specify the syslog server object that represents the syslog server that you want to send the events to. You can also create a syslog server object at this point if you have not already. File and malware events are generated at the same severity level. The minimum level of event severity you select will be assigned to all file and malware events. File and malware events are reported when a file or malware policy in any access control rule has been triggered. This is not the same as a connection event. Note that the syslog settings for file and malware events are relevant only if you apply file or malware policies, which require the and Malware licenses. For Cisco Security Analytics and Logging subscribers:
| ||||
Step 5 | Intrusion Logging. Send intrusion events to a syslog server by specifying the syslog server object that represents the syslog server you want to send events to. You can also create a syslog server object at this point if you have not already. Intrusion events are reported when an intrusion policy in any access control rule has been triggered. This is not the same as a connection event. Note that the syslog settings for intrusion events are relevant only if you apply intrusion policies, which require the license. For Cisco Security Analytics and Logging subscribers:
| ||||
Step 6 | Console Filter. Slide the slider to On to send data logging (diagnostic logging) events to a console rather than to a syslog server. Additionally, select the minimum level of event severity you want to log. This will send a data logging event for any type of syslog message, with your chosen severity level. You will see these messages when you log into the CLI on the console port of your FDM-managed device. You can also see these logs in an SSH session to other FDM-managed device interfaces (including the management interface) by using the show console-output command. In addition, you can see these messages in real time in the diagnostic CLI by entering system support diagnostic-cli from the main CLI. | ||||
Step 7 | Click Save. | ||||
Step 8 | Review and deploy the changes you made now, or wait and deploy multiple changes at once. |