Skip to main content

Cisco Email Security Appliance (IronPort)

Download With Dependencies

Cisco Email Security protects against ransomware, business email compromise, spoofing, and phishing

Cisco ESA (Email Security Appliance)

This pack includes Cortex XSIAM content.

Integration:

The Cisco Email Security Appliance is an email security gateway product. It is designed to detect and block a wide variety of email-born threats, such as malware, spam and phishing attempts.

What does this pack do?

  • Retrieve spam quarantined messages.
  • Release and delete messages from spam quarantine.
  • Retrieve, add, append, edit or delete a list entry - blocklist and safelist of spam quarantine.
  • Retrieve tracking messages.
  • Retrieve tracking messages enrichment summaries - AMP, DLP, URL.
  • Reporting - get Cisco SMA's statistics reports.
  • Fetch quarantine messages as incidents.

Cisco ESA (Email Security Appliance)

This pack includes Cortex XSIAM content.

Integration:

The Cisco Email Security Appliance is an email security gateway product. It is designed to detect and block a wide variety of email-born threats, such as malware, spam and phishing attempts.

What does this pack do?

  • Retrieve spam quarantined messages.
  • Release and delete messages from spam quarantine.
  • Retrieve, add, append, edit or delete a list entry - blocklist and safelist of spam quarantine.
  • Retrieve tracking messages.
  • Retrieve tracking messages enrichment summaries - AMP, DLP, URL.
  • Reporting - get Cisco SMA's statistics reports.
  • Fetch quarantine messages as incidents.

Creating a Log Subscription in the Cisco ESA GUI

  1. Choose System Administration > Log Subscriptions.
  2. Click Add Log Subscription.
  3. Select a log type and enter the log name (for the log directory) as well as the name for the log file itself.
  4. Specify the maximum file size before AsyncOS rolls over the log file as well as a time interval between
    rollovers.
  5. Select the log level. The available options are Critical, Warning, Information, Debug, or Trace.
  6. Configure the log retrieval method.
  7. Submit and commit your changes.

link to the website

Collect Events from Vendor

In order to use the collector, use the Broker VM option.

Broker VM

To create or configure the Broker VM, use the information described here.

You can configure the specific vendor and product for this instance.

  1. Navigate to Settings > Configuration > Data Broker > Broker VMs.
  2. Go to the apps tab and add the Syslog app. If it already exists, click the Syslog app and then click Configure.
  3. Click Add New.
  4. When configuring the Syslog Collector, set the following values:
    • vendor as vendor - cisco
    • product as product - esa

PUBLISHER

Cortex

PLATFORMS

Cortex XSOARCortex XSIAM

INFO

CertificationRead more
Supported ByCortex
CreatedNovember 9, 2020
Last ReleaseFebruary 12, 2024
WORKS WITH THE FOLLOWING INTEGRATIONS:

DISCLAIMER
Content packs are licensed by the Publisher identified above and subject to the Publisher’s own licensing terms. Palo Alto Networks is not liable for and does not warrant or support any content pack produced by a third-party Publisher, whether or not such packs are designated as “Palo Alto Networks-certified” or otherwise. For more information, see the Marketplace documentation.