Procedure
Procedure
Step 1 | Create or edit the access control rule and click the Logging tab. | ||
Step 2 | Specify the log action:
| ||
Step 3 | Specify where to send connection events: If you want to send a copy of the events to an external syslog server, select the server object that defines the syslog server. If the required object does not already exist, you will need to create one. See Create and Edit Syslog Server Objects for more information. Because event storage on the device is limited, sending events to an external syslog server can provide more long-term storage and enhance your event analysis. For Cisco Security Analytics and Logging subscribers:
| ||
Step 4 | File Events Check Log Files if you want to enable logging of prohibited files or malware events. You must select a file policy in the rule to configure this option. The option is enabled by default if you select a file policy for the rule. We recommend you leave this option enabled. When the system detects a prohibited file, it automatically logs one of the following types of event to the FDM-manageds internal buffer.
For connections where a file was blocked, the action for the connection in the connection log is Block even though to perform file and malware inspection you must use an Allow rule. The connection's Reason is either File Monitor (a file type or malware was detected), or Malware Block or File Block (a file was blocked) | ||
Step 5 | Click Save. | ||
Step 6 | Review and deploy now the changes you made, or wait and deploy multiple changes at once. |