Configure Cisco Secure Email monitoring
Arctic Wolf® can monitor Cisco Secure Email® logs and alert you about suspicious or malicious activity.
-
Logs are forwarded from Cisco Secure Email to your Amazon Web Services (AWS)® Simple Storage Service (S3) bucket at 10-minute intervals.
-
There is no additional cost from Arctic Wolf to configure AWS monitoring for Cisco Secure Email.
These resources are required:
-
Access to the AWS Management Console
-
An Amazon Web Services (AWS)® user or AWS Identity and Access Management (IAM) role with administrator permissions or an equivalent IAM policy. This user must have permissions to create, update, and delete these stacks and dependent resources:
-
CloudFormation stacks
-
CloudTrail trails
-
Amazon CloudWatch Logs log groups
-
IAM roles and managed policies
-
Lambda functions and custom resources
-
Amazon Kinesis Data Firehose delivery streams
-
S3 buckets
-
SNS topics and topic policies
-
-
An AWS S3 bucket to store Cisco Secure Email logs.
Note:-
For information about configuring an S3 bucket, see Configure an AWS S3 bucket for Arctic Wolf monitoring.
-
If you have already configured Cisco Secure Email to forward logs to this S3 bucket, contact your Concierge Security® Team (CST) for assistance.
-
- Contact your CST to verify that Arctic Wolf is processing logs from your Cisco Secure Email environment.
Obtain your AWS account number
- Sign in to the AWS Management Console.
- In the menu bar, click the
question mark icon, and then click Support Center.
- Find your Account number in the navigation pane.
- Copy the Account number value, and then save it to a safe, encrypted location to provide to Arctic Wolf later.
Provide AWS credentials to Arctic Wolf
Create the base stack
Launch the S3 CloudFormation stack
Confirm subscription to the Arctic Wolf SNS topic
Create an IAM policy
Create an IAM user
- Sign in to the AWS IAM console.
- In the Access Management section, click Users.
- Click Add users.
- Enter a name for the IAM user.
- Click Next.
- Select Attach policies directly, and then select the policy that you created in Create an IAM policy.
- Click Next.
- Click Create user.
Create an access key
Configure log forwarding from Cisco Secure Email
- Sign in to Security Cloud Sign On.
- Click .
- Optional: If necessary, configure a log subscription for each Cisco Secure Email client that you want Arctic Wolf to monitor:
- On the Log Subscriptions page, select the log subscriptions that you want Arctic Wolf to monitor.
- Click .