Cisco Cisco Firepower Management Center 4000

Page of 1844
 
47-10
FireSIGHT System User Guide
 
Chapter 47      Understanding and Using Workflows 
  Components of a Workflow
Predefined Application Details Workflows
License: 
FireSIGHT
The following table describes the predefined workflows that you can use with application detail and 
client data.
Table 47-9
Predefined Applications Workflows 
Workflow Name
Description 
Application Business 
Relevance
You can use this workflow to analyze running applications of each estimated business relevance 
level on your network, so you can monitor appropriate use of your network resources. This 
workflow begins with a count of hosts running applications of each relevance level, followed by 
a table of individual applications with their business relevance levels and host counts, a table 
view of applications, and the host view. See 
 for more 
information.
Application Category
You can use this workflow to analyze running applications of each category (such as email, 
search engine, or social networking) on your network, so you can monitor appropriate use of 
your network resources. This workflow begins with a count of hosts running applications of each 
category, followed by a count of hosts running individual applications, a table view of 
applications, and the host view. See 
 for more information.
Application Risk
You can use this workflow to analyze running applications of each estimated security risk level 
on your network, so you can estimate the potential risk of users’ activity and take appropriate 
action. This workflow begins with a count of hosts running applications of each risk level, 
followed by a table of individual applications with their business relevance levels and host 
counts, a table view of applications, and the host view. See 
 
for more information.
Application Summary
You can use this workflow to obtain detailed information about the applications and associated 
hosts on your network, so you can closely examine host application activity. This workflow 
begins with a list of individual host IP addresses running applications, followed by a table view 
of applications and the host view.
Applications
You can use this workflow to analyze running applications on your network, so you can gain an 
overview of how the network is being used. This workflow begins with a count of hosts running 
individual applications, followed by a table view of applications and the host view. See 
 for more information.
Table 47-10
Predefined Application Details Workflows 
Workflow Name
Description 
Application Details
You can use this workflow to analyze the client applications on your network in more detail. 
This workflow contains a series of pages that begin with a list of the client applications and 
application products on your network and a count of the number of hosts running each 
application. You can then view the number of hosts running each version of that application. The 
next page lets you identify which applications have been accessed most frequently on specific 
hosts. The workflow then provides a table view of client applications, followed by the host view. 
See 
 for more information.
Clients
This workflow contains a table view of client applications, followed by the host view. See 
 for more information.