Configure Syslog Settings
You can configure general syslog settings to set the facility code to be included in syslog messages that are sent to syslog servers, specify whether a timestamp is included in each message, specify the device ID to include in messages, view and modify the severity levels for messages, and disable the generation of specific messages.
If you are configuring devices to send syslog messages about security events (such as connection and intrusion events), some settings on this page do not apply to these messages. See Threat Defense Platform Settings That Apply to Security Event Syslog Messages in the Cisco Secure Firewall Management Center Administration Guide.
Procedure
Step 1 | Choose threat defense policy. and create or edit the |
Step 2 | Select . |
Step 3 | Select a system log facility for syslog servers to use as a basis to file messages in the Facility drop-down list. The default is LOCAL4(20), which is what most UNIX systems expect. However, because your network devices share available facilities, you might need to change this value for system logs. Facility values are not typically relevant for security events. |
Step 4 | Select the Enable timestamp on each syslog message check box to include the date and time a message was generated in the syslog message. |
Step 5 | Select the Timestamp Format for the syslog message:
|
Step 6 | If you want to add a device identifier to syslog messages (which is placed at the beginning of the message), check the Enable Syslog Device ID check box and then select the type of ID.
|
Step 7 | Use the Syslog Message table to alter the default settings for specific syslog messages. You need to configure rules in this table only if you want to change the default settings. You can change the severity assigned to a message, or you can disable the generation of a message. By default, Netflow is enabled and the entries are shown in the table. |
Step 8 | Click Save. You can now go to and deploy the policy to assigned devices. The changes are not active until you deploy them. |
What to do next
-
Deploy configuration changes.