Cisco Cisco Firepower Management Center 4000

Seite von 1844
 
18-12
FireSIGHT System User Guide
 
Chapter 18      Working with Intrusion Events 
  Viewing Intrusion Events
This column displays the first fifty characters of the extracted URI. You can hover your pointer over 
the displayed portion of an abbreviated URI to display the complete URI, up to 2048 bytes. You can 
also display the complete URI, up to 2048 bytes, in the packet view. See 
 for more information.
This field is disabled by default.
Email Sender
The address of the email sender that was extracted from the SMTP MAIL FROM command. To 
display a value for this field, you must enable the SMTP preprocessor 
Log From Address
 option. 
Multiple sender addresses are supported. See 
 for more 
information. 
This field is disabled by default.
Email Recipient
The address of the email recipient that was extracted from the SMTP RCPT TO command. To 
display a value for this field, you must enable the SMTP preprocessor 
Log To Addresses
 option. 
Multiple recipient addresses are supported. See 
more information.
This field is disabled by default.
Email Attachments
The MIME attachment file name that was extracted from the MIME Content-Disposition header. To 
display attachment file names, you must enable the SMTP preprocessor 
Log MIME Attachment Names
 
option. Multiple attachment file names are supported. See 
 for more information.
This field is disabled by default.
Reviewed By
The name of the user who reviewed the event. See 
Count
The number of events that match the information that appears in each row. Note that the Count field 
appears only after you apply a constraint that creates two or more identical rows.
Viewing Connection Data Associated with Intrusion Events
License: 
Protection
When you associate an intrusion policy with an access control rule or the default action of an access 
control policy, the system can log the connections where intrusion events are detected. Although this 
logging is automatic for access control rules, you must manually enable connection logging to see 
associated connection data for the default action; see 
.
To view connection data associated with one or more intrusion events:
Access: 
Admin
Step 1
Select 
Analysis > Intrusions > Events
.