Cisco Cisco Firepower Management Center 4000

Page of 1844
 
Glossary
GL-31
FireSIGHT System User Guide
 
network discovery
See 
.
network discovery policy
 that specifies the kinds of 
 (including 
, user, and 
 data) the system 
collects for specific network segments, including networks monitored by 
-enabled devices. The 
network discovery policy also manages 
 resolution preferences, 
priorities, and 
network file trajectory
A visual representation of a file’s path as 
s transfer it across your network. For any file with an 
, the trajectory map displays the IP addresses of all hosts that have 
transferred the file, the time the file was detected, the file’s 
, associated 
and 
network map
A detailed representation of your network. The network map allows you to view your network topology 
in terms of the 
s, 
s, and 
s running on your network, as well as their 
s, and vulnerabilities.
network object
A reusable 
 that represents one or more IP addresses, CIDR blocks, or prefix lengths.
Nmap
Network Mapper, an open source active scanner that you can use to detect operating systems and 
s running on a host. Running an 
 scan adds the information detected to your 
non-access-controlled user
Any user, whether detected by the 
 or a managed 
that is not used for 
A non-access-controlled user can only be the 
 for a 
 if no 
 has ever 
logged into the host.
non-bypass mode
A characteristic of an 
 that blocks traffic if th
s in the set fail for any reason.
object
A reusable configuration that associates a name with a value (for example, an IP address or URL) so that 
when you want to use that value, you can use the named object instead. You can use objects in various 
places in the web interface, including 
s, reports, 
s, and 
 searches. See also 
.
object manager
The page on the web interface where you manage 
s and object groups, including 
s, 
the 
s.