Software Secure Firewall Threat Defense
Platform Secure Firewall Threat Defense Virtual
Activity Onboard

Intrusion Detection and Prevention Use Case - Configure Elephant Flow Detection Outcomes Prerequisites

Last updated: Jul 29, 2025

Prerequisites

  • Ensure that you are running management center 7.2.0 or later and that the managed threat defense is also 7.2.0 or later.

  • Only enabling elephant flow detection does not generate additional connection events. Elephant flow detection adds the Elephant Flow notation to matching connections that are already being logged to the management center. To log these events, you must enable connection logging in your access control policy. You can do that for specific rules or add a Monitor rule that logs all connections, including elephant flows.