Cisco Cisco Firepower Management Center 4000

Page of 1844
 
38-54
FireSIGHT System User Guide
 
Chapter 38      Working with Discovery Events 
  Working with Third-Party Vulnerabilities
General Search Syntax
The system displays examples of valid syntax next to each search field. When entering search criteria, 
keep the following points in mind:
  •
All fields accept negation (
!
).
  •
All fields accept comma-separated lists. If you enter multiple criteria, the search returns only the 
records that match all the criteria.
  •
Many fields accept one or more asterisks (
*
) as wild cards.
  •
For some fields, you can specify 
n/a
 or 
blank
 in the field to identify events where information is not 
available for that field; use 
!n/a
 or 
!blank
 to identify the events where that field is populated.
  •
Most fields are case-insensitive.
  •
IP addresses may be specified using CIDR notation. For information on entering IPv4 and IPv6 
addresses in the FireSIGHT System, see 
.
  •
Click the add object icon (
) that appears next to a search field to use an object as a search 
criterion. 
For detailed information on search syntax, including using objects in searches, see 
.
Specific Search Criteria for Vulnerabilities
Note the following information specific to searching for vulnerabilities:
  •
Enter 
TRUE
 to search for vulnerabilities that are exploited, or 
FALSE
 to exclude such vulnerabilities.
To search for third-party vulnerabilities:
Access: 
Admin/Any Security Analyst
Step 1
Select 
Analysis > Search
.
The Search page appears.
Step 2
From the 
Table
 drop-down list, select 
Third-Party Vulnerabilities
.
The page reloads with the appropriate constraints.
Step 3
Optionally, if you want to save the search, enter a name for the search in the 
Name
 field.
If you do not enter a name, one is created automatically when you save the search.
Step 4
Enter your search criteria in the appropriate fields. 
If you enter multiple criteria, the search returns only the records that match all the criteria. Click the add 
icon (
) that appears next to a search field to use an object as a search criterion. 
Step 5
If you want to save the search so that other users can access it, clear the 
Save As Private
 check box. 
Otherwise, leave the check box selected to save the search so that only you can use it. 
If you want to use the search as a data restriction for a custom user role, you must save it as a private 
search.
Step 6
You have the following options:
  •
Click 
Search
 to start the search.