Cisco Cisco Firepower Management Center 4000

Page of 1844
 
27-26
FireSIGHT System User Guide
 
Chapter 27      Using the FireSIGHT System as a Compliance Tool 
  Working with Shared Host Profiles
The following table describes the actions you can take to modify a shared host profile.
Table 27-2
Shared Host Profile Actions 
To...
You can...
rename the host profile
type a new name in the 
Name
 field.
change the operating system
select the new operating system and version from the 
OS Vendor
OS 
Name
, and 
Version
 drop-down lists. If you change these values, you 
may also want to rename the host profile.
add an application protocol
follow the directions in 
add a client
follow the directions in 
.
add a web application
follow the directions in 
add a protocol
follow the directions in 
.
allow all application protocols
under 
Allowed Application Protocols
, select the 
Allow all Application 
Protocols
 check box. Note that the check box does not appear until 
you delete any application protocols you have previously allowed.
allow all clients
under 
Allowed Clients
, select the 
Allow all Clients
 check box. Note 
that the check box does not appear until you delete any clients you 
have previously allowed.
allow all web applications
under 
Allowed Web Applications
, select the 
Allow all Web Applications
 
check box. Note that the check box does not appear until you 
delete any clients you have previously allowed.
modify an application protocol, 
client, web application, or 
protocol
click the element you want to modify. For more information on the 
properties you can change, see: 
  •
  •
  •
  •
Note
The changes you make to an application protocol, client, 
or protocol are reflected in every host profile that uses that 
element.
delete an application protocol, 
client, web application, or 
protocol 
next to the element you want to delete, click the delete icon (
).
survey your network
click 
Survey Network
. Surveying your network can add additional 
allowed clients, application protocols, web applications, and 
protocols to the host profiles that already exist, and can create 
additional host profiles if the survey detects hosts running 
operating systems that were not detected during any initial survey. 
For more information, see