Cisco Cisco Firepower Management Center 4000
Glossary
GL-25
FireSIGHT System User Guide
health policy
The criteria used when checking the health of an
in your deployment. Health policies use
s to indicate whether your FireSIGHT System hardware and software are working
correctly. You can use the default health policy or create your own.
high availability
A feature that allows you to configure redundant physical
s to manage groups of
Event data streams from managed devices to both Defense Centers and most configuration elements are
maintained on both Defense Centers. If your primary Defense Center fails, you can monitor your
network without interruption using the secondary Defense Center. Compare with
maintained on both Defense Centers. If your primary Defense Center fails, you can monitor your
network without interruption using the secondary Defense Center. Compare with
, which
allows you to designate redundant devices.
host
A device that is connected to a network and has a unique IP address. To the FireSIGHT System, a host
is any identified host that is not categorized as a
is any identified host that is not categorized as a
device, or
host attribute
A tool you can use to provide information about
s detected by the system, classifying them in ways
that are important to your network environment. The system has two predefined host attributes,
and notes, as well as host attributes that indicate the compliance of each host with each active
. You can also create your own host attributes.
host criticality
A
that indicates the business criticality (importance) of any given
system.
host history
A graphical representation of the last 24 hours of a user’s activity. The host history, which you can view
in a user’s
in a user’s
, displays the IP addresses of the
s that the user logged into, with approximate
login and logout times represented by bar graphs.
host input
A feature that allows you to
data from third-party sources using scripts or command-line files to
augment the information in the
. The web interface also provides some host input
functionality; you can modify operating system or
identities, validate or invalidate
vulnerabilities, and delete various items from the network map, including
ports.
host input event
A kind of
that is generated when you use the
feature. In general, the system
treats host input and passive discovery events identically, though they are distinguished when building