Cisco Cisco Firepower Management Center 4000

Page of 1844
 
42-14
FireSIGHT System User Guide
 
Chapter 42      Enhancing Network Discovery 
  Using Custom Fingerprinting
You can activate, deactivate, delete, view, and edit custom fingerprints. When creating a fingerprint, you 
assign a single vulnerability mapping for the fingerprint. For more information on creating a fingerprint, 
see 
 an
. After the fingerprint is 
created and activated, you can edit the fingerprint to make changes or add vulnerability mappings.
To access the Custom Fingerprints page:
Access: 
Admin/Discovery Admin
Step 1
Select 
Policies 
Network Discovery
, then click 
Custom Operating Systems
.
The Custom Fingerprint page appears.
If the system is awaiting data to create a fingerprint, it automatically refreshes the page every 10 seconds 
until the fingerprint is created.
See the following sections for more information:
  •
  •
  •
  •
Activating Fingerprints
License: 
FireSIGHT
After creating a custom fingerprint, you must activate it before the system can use it to identify hosts. 
After the new fingerprint is activated, the system uses it to re-identify previously discovered hosts and 
discover new hosts.
To activate a fingerprint:
Access: 
Admin/Discovery Admin
Step 1
Select 
Policies 
Network Discovery
, then click 
Custom Operating Systems
.
The Custom Fingerprint page appears.
Step 2
Click the slider next to the fingerprint you want to activate.
Note
The activate option is only available if the fingerprint you created is valid. If the slider is not 
available, try creating the fingerprint again. 
The Defense Center activates the fingerprint and propagates it to all managed devices. The icon next to 
the fingerprint name changes to indicate that the fingerprint is active.