<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Siem on it-learn.io | IT, Networking &amp; Cybersecurity Blog</title><link>https://blog.it-learn.io/tags/siem/</link><description>Recent content in Siem on it-learn.io | IT, Networking &amp; Cybersecurity Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Tue, 07 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.it-learn.io/tags/siem/index.xml" rel="self" type="application/rss+xml"/><item><title>Splunk + Cisco ISE: Syslog Integration and RADIUS Dashboard</title><link>https://blog.it-learn.io/posts/2026-04-07-splunk-cisco-ise-syslog-integration-radius-dashboard/</link><pubDate>Tue, 07 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.it-learn.io/posts/2026-04-07-splunk-cisco-ise-syslog-integration-radius-dashboard/</guid><description>&lt;p&gt;Cisco ISE is generating a continuous stream of authentication, authorization, and posture data — every 802.1X login, every guest registration, every failed auth attempt. Out of the box, that data lives in ISE&amp;rsquo;s internal MnT database where it&amp;rsquo;s searchable but limited. Sending it to Splunk unlocks full SIEM capabilities: long-term retention, correlation with other security data, custom dashboards, and automated alerting.&lt;/p&gt;
&lt;p&gt;This guide covers the complete integration from ISE syslog configuration through Splunk field extractions, SPL queries, and a live RADIUS operations dashboard.&lt;/p&gt;</description></item></channel></rss>