Cisco Cisco Firepower Management Center 4000

Page of 1844
 
Index
IN-23
FireSIGHT System User Guide
 
correlation events
correlation policies
correlation policy remediations
correlation rules
data collection
discovery events
discovery rules
enhancing detection
host attributes
host profiles
misidentifications
network map
passive detection
performance statistics
remediation events
servers
Sourcefire Vulnerability ID (SVID)
third-party data collection
third-party vulnerabilities
vulnerabilities
white lists
network discovery events
workflows
network discovery policies
advanced options
applying
discovery rules
monitored networks
port exclusions
restricting user logging
zones
network file trajectories
data points
events tables
SHA-256 hash values
summaries
trajectory maps
network layer
network map
applications
Bugtraq ID
custom topology
CVE ID
host attributes
hosts
indications of compromise
introduction
mobile devices
network devices
SIDs
understanding
viewing hosts
vulnerabilities
network objects
as Security Intelligence objects
in intrusion rules
network routes
     6-5
Networks (DCE/RPC option)
network settings, configuring
network surveys (white lists)
new client (discovery event type)
new host (discovery event type)
new network protocol (discovery event type)
new operating system (discovery event type)
new OS (discovery event type)
new TCP port (discovery event type)
new UDP port (discovery event type)
Nmap
adding an Nmap instance
introduction
managing
on-demand scans
remediations
sample scanning profiles
scan instances
scan targets