Vendor - Cisco
Product - Application Control Engine (ACE)
| Ref | Link | 
| Splunk Add-on | None | 
Sourcetypes
| sourcetype | notes | 
| cisco:ace | This source type is also used for ACE | 
Sourcetype and Index Configuration
| key | sourcetype | index | notes | 
| cisco_ace | cisco:ace | netops | none | 
Filter type
- Cisco ACE products can be identified by message parsing alone
Setup and Configuration
Unknown this product is unsupported by Cisco
Options
| Variable | default | description | 
| SC4S_LISTEN_CISCO_ACE_UDP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_LISTEN_CISCO_ACE_TCP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_ARCHIVE_CISCO_ACE | no | Enable archive to disk for this specific source | 
| SC4S_DEST_CISCO_ACE_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=cisco:ace | stats count by host
Product - Cisco Access Control System (ACS)
| Ref | Link | 
| Splunk Add-on | https://splunkbase.splunk.com/app/1811/ | 
| Product Manual | https://community.cisco.com/t5/security-documents/acs-5-x-configuring-the-external-syslog-server/ta-p/3143143 | 
Sourcetypes
| sourcetype | notes | 
| cisco:acs | Aggregation used | 
Sourcetype and Index Configuration
| key | sourcetype | index | notes | 
| cisco_acs | cisco:acs | netauth | None | 
Filter type
PATTERN MATCH
Setup and Configuration
- Replace the following extract using Splunk local configuration. Impacts version 1.5.0 of the addond
EXTRACT-AA-signature = CSCOacs_(?<signature>\S+):?
# Note the value of this config is empty to disable
EXTRACT-AA-syslog_message = 
EXTRACT-acs_message_header2 = ^CSCOacs_\S+\s+(?<log_session_id>\S+)\s+(?<total_segments>\d+)\s+(?<segment_number>\d+)\s+(?<acs_message>.*)
Options
| Variable | default | description | 
| SC4S_LISTEN_CISCO_ACS_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_LISTEN_CISCO_ACS_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_ARCHIVE_CISCO_ACS | no | Enable archive to disk for this specific source | 
| SC4S_DEST_CISCO_ACS_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=cisco:acs
Verify timestamp, and host values match as expected    
Product - ASA AND FTD (Firepower)
Including Legacy FWSM and PIX
| Ref | Link | 
| Splunk Add-on for ASA (No long supports FWSM and PIX) | https://splunkbase.splunk.com/app/1620/ | 
| Cisco eStreamer for Splunk | https://splunkbase.splunk.com/app/1629/ | 
| Product Manual | https://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/monitor_syslog.html | 
Sourcetypes
| sourcetype | notes | 
| cisco:asa | cisco FTD Firepower will also use this source type except those noted below | 
| cisco:ftd | cisco FTD Firepower will also use this source type except those noted below | 
| cisco:fwsm | Splunk has | 
| cisco:pix | cisco PIX will also use this source type except those noted below | 
| cisco:firepower:syslog | FTD Unified events see https://www.cisco.com/c/en/us/td/docs/security/firepower/Syslogs/b_fptd_syslog_guide.pdf | 
Sourcetype and Index Configuration
| key | sourcetype | index | notes | 
| cisco_asa | cisco:asa | netfw | none | 
| cisco_fwsm | cisco:fwsm | netfw | none | 
| cisco_pix | cisco:pix | netfw | none | 
| cisco_firepower | cisco:firepower:syslog | netids | none | 
| cisco_ftd | cisco:ftd | netfw | none | 
Filter type
MSG Parse: This filter parses message content
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
- Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
- Follow vendor configuration steps per Product Manual above ensure:
- Log Level is 6 “Informational”
- Protocol is TCP/IP
- permit-hostdown is on
- device-id is hostname and included
- timestamp is included
 
Options
| Variable | default | description | 
| SC4S_LISTEN_CISCO_ASA_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_LISTEN_CISCO_ASA_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_ARCHIVE_CISCO_ASA | no | Enable archive to disk for this specific source | 
| SC4S_DEST_CISCO_ASA_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
| SC4S_LISTEN_CISCO_ASA_LEGACY_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers expecting RFC3164 format | 
| SC4S_LISTEN_CISCO_ASA_LEGACY_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers expecting RFC3164 format | 
| SC4S_ARCHIVE_CISCO_ASA_LEGACY | no | Enable archive to disk for this specific source | 
| SC4S_DEST_CISCO_ASA_LEGACY_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=cisco:asa
Verify timestamp, and host values match as expected    
Product - Cisco Email Security Appliance (ESA)
| Ref | Link | 
| Splunk Add-on | https://splunkbase.splunk.com/app/1761/ | 
| Product Manual | https://www.cisco.com/c/en/us/td/docs/security/esa/esa14-0/user_guide/b_ESA_Admin_Guide_14-0.pdf | 
Sourcetypes
| sourcetype | notes | 
| cisco:esa:http | The HTTP logs of Cisco IronPort ESA record information about the secure HTTP services enabled on the interface. | 
| cisco:esa:textmail | Text mail logs of Cisco IronPort ESA record email information and status. | 
| cisco:esa:amp | Advanced Malware Protection (AMP) of Cisco IronPort ESA records malware detection and blocking, continuous analysis, and retrospective alerting details. | 
| cisco:esa:authentication | These logs record successful user logins and unsuccessful login attempts. | 
| cisco:esa:cef | The Consolidated Event Logs summarizes each message event in a single log line. | 
| cisco:esa:error_logs | Error logs of Cisco IronPort ESA records error that occured for ESA configurations or internal issues. | 
| cisco:esa:content_scanner | Content scanner logs of Cisco IronPort ESA scans messages that contain password-protected attachments for | 
| malicious activity and data privacy. |  | 
| cisco:esa:antispam | Anti-spam logs record the status of the anti-spam scanning feature of your system, including the status on receiving updates of the latest anti-spam rules. Also, any logs related to the Context Adaptive Scanning Engine are logged here. | 
| cisco:esa:system_logs | System logs record the boot information, virtual appliance license expiration alerts, DNS status information, and comments users typed using commit command. | 
Sourcetype and Index Configuration
| key | sourcetype | index | notes | 
| cisco_esa | cisco:esa:http | email | None | 
| cisco_esa | cisco:esa:textmail | email | None | 
| cisco_esa | cisco:esa:amp | email | None | 
| cisco_esa | cisco:esa:authentication | email | None | 
| cisco_esa | cisco:esa:cef | email | None | 
| cisco_esa | cisco:esa:error_logs | email | None | 
| cisco_esa | cisco:esa:content_scanner | email | None | 
| cisco_esa | cisco:esa:antispam | email | None | 
| cisco_esa | cisco:esa:system_logs | email | None | 
Filter type
IP, Netmask or Host
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
- ESA Follow vendor configuration steps per Product Manual.
- Ensure host and timestamp are included.
- Update vi /opt/sc4s/local/context/vendor_product_by_source.confupdate the host or ip mask forf_cisco_esato identiy the esa events.
Options
| Variable | default | description | 
| SC4S_LISTEN_CISCO_ESA_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_LISTEN_CISCO_ESA_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_ARCHIVE_CISCO_ESA | no | Enable archive to disk for this specific source | 
| SC4S_DEST_CISCO_ESA_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
Verification
Use the following search to validate events are present
index=email sourcetype=cisco:esa:*
Verify timestamp, and host values match as expected
Product - Cisco Integrated Management Controller (IMC)
| Ref | Link | 
| Splunk Add-on | na | 
| Product Manual | multiple | 
Sourcetypes
| sourcetype | notes | 
| cisco:ucm | None | 
Sourcetype and Index Configuration
| key | sourcetype | index | notes | 
| cisco_cimc | cisco:infraops | infraops | None | 
Filter type
PATTERN MATCH
Setup and Configuration
- Refer to Cisco support web site
Options
| Variable | default | description | 
| SC4S_LISTEN_CISCO_CIMC_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_LISTEN_CISCO_CIMC_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_ARCHIVE_CISCO_CIMC | no | Enable archive to disk for this specific source | 
| SC4S_DEST_CISCO_CIMC_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=cisco:cimc
Verify timestamp, and host values match as expected
Product - Cisco Networking (IOS and flavors)
Cisco Network Products of multiple types share common logging characteristics the following types are known to be compatible:
- Cisco AireOS (AP & WLC)
- Cisco APIC/ACI
- Cisco IOS
- Cisco IOS-XR
- Cisco IOS-XE 
- Cisco NX-OS
- Cisco FX-OS
| Ref | Link | 
| Splunk Add-on | https://splunkbase.splunk.com/app/1467/ | 
| IOS Manual | https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_55_se/configuration/guide/scg_2960/swlog.html | 
| NX-OS Manual | https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/6-x/system_management/configuration/guide/b_Cisco_Nexus_9000_Series_NX-OS_System_Management_Configuration_Guide/sm_5syslog.html | 
| Cisco ACI | https://community.cisco.com/legacyfs/online/attachments/document/technote-aci-syslog_external-v1.pdf | 
| Cisco WLC & AP | https://www.cisco.com/c/en/us/support/docs/wireless/4100-series-wireless-lan-controllers/107252-WLC-Syslog-Server.html#anc8 | 
Sourcetypes
| sourcetype | notes | 
| cisco:ios | This source type is also used for NX-OS, ACI and WLC product lines | 
Sourcetype and Index Configuration
| key | sourcetype | index | notes | 
| cisco_ios | cisco:ios | netops | none | 
Filter type
- Cisco IOS products can be identified by message parsing alone
- Cisco WLC, and ACI products must be identified by host or ip assignment update the filter f_cisco_iosas required
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
- Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
- IOS Follow vendor configuration steps per Product Manual above ensure:
- Ensure a reliable NTP server is set and synced
- Log Level is 6 “Informational”
- Protocol is TCP/IP
- permit-hostdown is on
- device-id is hostname and included
- timestamp is included
 
- NX-OS Follow vendor configuration steps per Product Manual above ensure:
- Ensure a reliable NTP server is set and synced
- Log Level is 6 “Informational” user may select alternate levels by module based on use cases
- Protocol is TCP/IP
- device-id is hostname and included
- timestamp is included and milisecond accuracy selected
 
- ACI Logging configuration of the ACI product often varies by use case.
- Ensure NTP sync is configured and active
- Ensure proper host names are configured
 
- WLC
- Ensure NTP sync is configured and active
- Ensure proper host names are configured
- For security use cases per AP logging is required
 
Options
| Variable | default | description | 
| SC4S_LISTEN_CISCO_IOS_UDP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_LISTEN_CISCO_IOS_TCP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_ARCHIVE_CISCO_IOS | no | Enable archive to disk for this specific source | 
| SC4S_DEST_CISCO_IOS_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
Verification
Use the following search to validate events are present, for NX-OS, WLC and ACI products ensure each host filter condition is verified
index=<asconfigured> sourcetype=cisco:ios | stats count by host
Product - Cisco Identity Services Engine (ISE)
| Ref | Link | 
| Splunk Add-on | https://splunkbase.splunk.com/app/1915/ | 
| Product Manual | https://www.cisco.com/c/en/us/td/docs/security/ise/2-6/Cisco_ISE_Syslogs/Cisco_ISE_Syslogs/Cisco_ISE_Syslogs_chapter_00.html | 
Sourcetypes
| sourcetype | notes | 
| cisco:ise:syslog | Aggregation used | 
Sourcetype and Index Configuration
| key | sourcetype | index | notes | 
| cisco_ise | cisco:ise:syslog | netauth | None | 
Filter type
PATTERN MATCH
Setup and Configuration
- No special steps required
Options
| Variable | default | description | 
| SC4S_LISTEN_CISCO_ISE_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers expecting RFC5424 format | 
| SC4S_LISTEN_CISCO_ISE_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers expecting RFC5424 format | 
| SC4S_ARCHIVE_CISCO_ISE | no | Enable archive to disk for this specific source | 
| SC4S_DEST_CISCO_ISE_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=cisco:ise:syslog
Verify timestamp, and host values match as expected    
Product - Meraki Product Line (MR, MS, MX, MV)
| Ref | Link | 
| Splunk Add-on | https://splunkbase.splunk.com/app/3018/ | 
| Product Manual | https://documentation.meraki.com/zGeneral_Administration/Monitoring_and_Reporting/Syslog_Server_Overview_and_Configuration | 
Sourcetypes
| sourcetype | notes | 
| meraki | None | 
Sourcetype and Index Configuration
| key | sourcetype | index | notes | 
| cisco_meraki | meraki | netfw | The current TA does not sub sourcetype or utilize source preventing segmenation into more appropriate indexes | 
Filter type
IP, Netmask, Host or Port
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
- Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
- Follow vendor configuration steps per Product Manual above
Options
| Variable | default | description | 
| SC4S_LISTEN_CISCO_MERAKI_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers expecting RFC5424 format | 
| SC4S_LISTEN_CISCO_MERAKI_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers expecting RFC5424 format | 
| SC4S_ARCHIVE_CISCO_MERAKI | no | Enable archive to disk for this specific source | 
| SC4S_DEST_CISCO_MERAKI_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=merkai
Verify timestamp, and host values match as expected    
Product - Cisco TelePresence Video Communication Server (TVCS)
| Ref | Link | 
| Product Manual | https://www.cisco.com/c/en/us/products/unified-communications/telepresence-video-communication-server-vcs/index.html | 
Sourcetypes
| sourcetype | notes | 
| cisco:vcs | none | 
Sourcetype and Index Configuration
| key | sourcetype | index | notes | 
| cisco_tvcs | cisco:tvcs | main | none | 
Filter type
MSG Parse: This filter parses message content
Setup and Configuration
Source side unknown
| Variable       | default        | description    |
|----------------|----------------|----------------|
| SC4S_LISTEN_CISCO_TVCS_TCP_PORT      | empty string      | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers |
| SC4S_LISTEN_CISCO_TVCS_UDP_PORT      | empty string      | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers |
| SC4S_ARCHIVE_CISCO_TVCS | no | Enable archive to disk for this specific source |
| SC4S_DEST_CISCO_TVCS_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
| SC4S_LISTEN_CISCO_TVCS_LEGACY_TCP_PORT      | empty string      | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers expecting RFC3164 format |
| SC4S_LISTEN_CISCO_TVCS_LEGACY_UDP_PORT      | empty string      | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers expecting RFC3164 format |
| SC4S_ARCHIVE_CISCO_TVCS_LEGACY | no | Enable archive to disk for this specific source |
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=cisco:tvcs
Verify timestamp, and host values match as expected
Product - Cisco Unified Communications Manager (UCM)
| Ref | Link | 
| Splunk Add-on | na | 
| Product Manual | multiple | 
Sourcetypes
| sourcetype | notes | 
| cisco:ucm | None | 
Sourcetype and Index Configuration
| key | sourcetype | index | notes | 
| cisco_ucm | cisco:ucm | ucm | None | 
Filter type
PATTERN MATCH
Setup and Configuration
- Refer to Cisco support web site
Options
| Variable | default | description | 
| SC4S_LISTEN_CISCO_UCM_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_LISTEN_CISCO_UCM_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_ARCHIVE_CISCO_UCM | no | Enable archive to disk for this specific source | 
| SC4S_DEST_CISCO_UCM_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=cisco:ucm
Verify timestamp, and host values match as expected
Product - Cisco Unified Computing System (UCS)
| Ref | Link | 
| Splunk Add-on | na | 
| Product Manual | multiple | 
Sourcetypes
| sourcetype | notes | 
| cisco:ucs | None | 
Sourcetype and Index Configuration
| key | sourcetype | index | notes | 
| cisco_ucs | cisco:ucs | infraops | None | 
Filter type
PATTERN MATCH
Setup and Configuration
- Refer to Cisco support web site
Options
| Variable | default | description | 
| SC4S_LISTEN_CISCO_UCS_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_LISTEN_CISCO_UCS_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_ARCHIVE_CISCO_UCS | no | Enable archive to disk for this specific source | 
| SC4S_DEST_CISCO_UCS_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=cisco:ucs
Verify timestamp, and host values match as expected
Product - Cisco UCS Hyperflex
| Ref | Link | 
| Splunk Add-on | na | 
| Product Manual | multiple | 
Sourcetypes
| sourcetype | notes | 
| cisco:ucs:hx | None | 
Sourcetype and Index Configuration
| key | sourcetype | index | notes | 
| cisco_ucs_hx | cisco:ucs:hx | infraops | None | 
Filter type
PATTERN MATCH
Setup and Configuration
- Refer to Cisco support web site
Options
| Variable | default | description | 
| SC4S_LISTEN_CISCO_UCS_HX_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_LISTEN_CISCO_UCS_HX_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_ARCHIVE_CISCO_UCS_HX | no | Enable archive to disk for this specific source | 
| SC4S_DEST_CISCO_UCS_HX_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=cisco:ucs:hx
Verify timestamp, and host values match as expected
Product - Cisco Web Security Appliance (WSA)
| Ref | Link | 
| Splunk Add-on | https://splunkbase.splunk.com/app/1747/ | 
| Product Manual | https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7.html | 
- Update vi /opt/sc4s/local/context/vendor_product_by_source.confupdate the host or ip mask forf_cisco_wsato identiy the wsa squid events prior to WSA v11.7 andf_cisco_wsa11_7to identify the squid events since WSA v11.7. Update the host or ip mask forf_cisco_wsa_w3crecommendedto identify the wsa w3c events since WSA v12.5.
Sourcetypes
| cisco:wsa:l4tm      | The L4TM logs of Cisco IronPort WSA record sites added to the L4TM block and allow lists.                                                                                                    |
| cisco:wsa:squid      | The access logs of Cisco IronPort WSA version prior to 11.7 record Web Proxy client history in squid.                                                                                           |
| cisco:wsa:squid:new     | The access logs of Cisco IronPort WSA version since 11.7 record Web Proxy client history in squid.                                                                                           |
| cisco:wsa:w3c:recommended     | The access logs of Cisco IronPort WSA version since 12.5 record Web Proxy client history in W3C.                                                                                           |
Sourcetype and Index Configuration
| key | sourcetype | index | notes | 
| cisco_wsa | cisco:wsa:l4tm | netproxy | None | 
| cisco_wsa | cisco:wsa:squid | netproxy | None | 
| cisco_wsa | cisco:wsa:squid:new | netproxy | None | 
| cisco_wsa | cisco:wsa:w3c:recommended | netproxy | None | 
Filter type
IP, Netmask or Host
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
- WSA Follow vendor configuration steps per Product Manual.
- Ensure host and timestamp are included.
Options
| Variable | default | description | 
| SC4S_LISTEN_CISCO_WSA_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_LISTEN_CISCO_WSA_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_ARCHIVE_CISCO_WSA | no | Enable archive to disk for this specific source | 
| SC4S_DEST_CISCO_WSA_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
Verification
Use the following search to validate events are present
index=netops sourcetype=cisco:wsa:*
Verify timestamp, and host values match as expected