Cisco Cisco Firepower Management Center 4000
Glossary
GL-31
FireSIGHT System User Guide
network discovery
See
.
network discovery policy
that specifies the kinds of
(including
, user, and
data) the system
collects for specific network segments, including networks monitored by
-enabled devices. The
network discovery policy also manages
resolution preferences,
priorities, and
network file trajectory
A visual representation of a file’s path as
s transfer it across your network. For any file with an
, the trajectory map displays the IP addresses of all hosts that have
, associated
s
and
network map
A detailed representation of your network. The network map allows you to view your network topology
in terms of the
in terms of the
s,
s, and
s running on your network, as well as their
s, and vulnerabilities.
network object
A reusable
that represents one or more IP addresses, CIDR blocks, or prefix lengths.
Nmap
Network Mapper, an open source active scanner that you can use to detect operating systems and
s running on a host. Running an
scan adds the information detected to your
non-access-controlled user
Any user, whether detected by the
or a managed
.
A non-access-controlled user can only be the
for a
if no
has ever
logged into the host.
non-bypass mode
A characteristic of an
s in the set fail for any reason.
object
A reusable configuration that associates a name with a value (for example, an IP address or URL) so that
when you want to use that value, you can use the named object instead. You can use objects in various
places in the web interface, including
when you want to use that value, you can use the named object instead. You can use objects in various
places in the web interface, including
s, reports,
s, and
searches. See also
,
.
object manager
The page on the web interface where you manage
s and object groups, including
s,
the
s.