Cisco Cisco Firepower Management Center 4000

Page of 1844
 
27-13
FireSIGHT System User Guide
 
Chapter 27      Using the FireSIGHT System as a Compliance Tool
  Creating Compliance White Lists
To delete a white list target:
Access: 
Admin 
Step 1
Next to the target you want to delete, click the delete icon (
).
Step 2
When prompted, confirm that you want to delete the target.
The target is deleted.
Configuring Compliance White List Host Profiles
License: 
FireSIGHT
Host profiles in a compliance white list specify which operating systems, clients, application protocols, 
web applications, and protocols are allowed to run on the target hosts. There are three kinds of host 
profiles you can configure in a white list: 
  •
global host profiles, which specify the application protocols, clients, web applications, and 
protocols that are allowed to run on target hosts, regardless of the host’s operating system
  •
host profiles for specific operating systems, which specify not only which operating systems are 
allowed to run on your network, but also the application protocols, clients, web applications, and 
protocols that are allowed to run on those operating systems
  •
shared host profiles, which function exactly like the host profiles for specific operating systems, 
except they are not tied to a single white list; you can use them across multiple white lists
For a more detailed introduction to compliance white list host profiles, see 
When you are finished creating compliance white list host profiles, you can add the white list to an active 
correlation policy to begin evaluating the target hosts for compliance, generating white list events when 
a host violated the white list, and optionally, triggering responses based on white list violations.
For information on how to create, modify, and delete compliance white list host profiles, see:
  •
  •
  •
  •
  •
Configuring the Global Host Profile
License: 
FireSIGHT
Every white list contains a global host profile, which specifies the application protocols, clients, web 
applications, and protocols that are allowed to run on target hosts, regardless of the host’s operating 
system. For a more detailed introduction to the global host profile, see 
To configure the global host profile:
Access: 
Admin