Cisco Security Suite 3.0.1 – Now with ISE

The Cisco Security Suite was recently updated to work with Splunk 6. As mentioned in the previous release, one release is not enough to get all the Cisco security related information integrated into the suite. With version 3.0.1 of the Cisco Security Suite, Cisco Identity Services Engine (ISE) has been added. Over 20 ISE-related dashboards have been integrated into the suite.

Cisco with ISE

ISE is really powerful and adds a lot of additional data that can be correlated. For instance, say you have an IP address from somewhere in your environment. ISE can tell you which user is using that IP, what type of device the user is using, the posture of the device, and much more. Therefore, in addition to ISE being integrated into the Cisco Security Suite, a separate application has been published that focuses only on ISE.

Download Cisco Security Suite 3.0.1 here -> http://apps.splunk.com/app/525/

Download the ISE-only app here -> http://apps.splunk.com/app/1589/

Related Articles

Joint first-time participation! Cisco & Splunk as One Team ~ Hardening 2025 Invisible Divide ~
Security
12 Minute Read

Joint first-time participation! Cisco & Splunk as One Team ~ Hardening 2025 Invisible Divide ~

The Hardening Project is a community-driven competition sponsored by industries, academia and government agencies, dedicated to maximizing the value of defensive technology. Splunk joined forces with Cisco, standing together as "One Team" to protect what matters most.
Splunk Security Content for Threat Detection & Response: September Recap
Security
2 Minute Read

Splunk Security Content for Threat Detection & Response: September Recap

Splunk's September ESCU update: New security content & analytics for robust threat detection. Covers Cisco ASA, ArcaneDoor, diverse malware, and Office365 Copilot activity.
RCE à La Follina (CVE-2022-30190)
Security
7 Minute Read

RCE à La Follina (CVE-2022-30190)

The Splunk SURGe team offers a closer look into the Follina MS Office RCE, including a breakdown of what happened, how to detect it, and MITRE ATT&CK mappings.