Cisco Cisco Firepower Management Center 4000

Page of 1844
 
Glossary
GL-44
FireSIGHT System User Guide
 
vulnerability database 
Also called the VDB, a database of known vulnerabilities to which 
s may be susceptible. The system 
correlates the operating system, 
s detected on each host with the VDB 
to help you determine whether a particular host increases your risk of network compromise. VDB 
updates may contain new and updated vulnerabilities, as well as new and updated 
vulnerability detail
The final page in 
s. Vulnerability details provide information about a specific 
, including technical details and known solutions.
vulnerability ID
An identification number associated with a particular 
. The Cisco 
and 
 databases, such as Bugtraq and CVE, have different vulnerability ID 
numbering schemes.
vulnerability mapping
The association of 
 information with 
, so that you can perform 
web application
A type of 
 that represents the content of, or requested URL for, HTTP traffic.
whitelist
, a 
, the 
, or a list of IP addresses 
that you can configure within a 
 to exempt IP addresses from some kind of action.
white list event
An 
 generated when the system detects that a valid target host has become non-compliant with a 
. White list events are a special kind of 
white list violation
Information that you can view in the 
 that details how a host is non-compliant with a 
widget
See 
.
workflow
A series of pages you can use to view and evaluate 
s by moving from a broad view of event data to 
a more focused view that contains only the events of interest to you. Workflows can include three types 
of pages, each of which performs a unique function: 
s, and a final page. 
Depending on the workflow type, the final page may be a 
, or 
X-Series
The short name for