Cisco Cisco Firepower Management Center 4000
Glossary
GL-44
FireSIGHT System User Guide
vulnerability database
Also called the VDB, a database of known vulnerabilities to which
s may be susceptible. The system
correlates the operating system,
s detected on each host with the VDB
to help you determine whether a particular host increases your risk of network compromise. VDB
updates may contain new and updated vulnerabilities, as well as new and updated
updates may contain new and updated vulnerabilities, as well as new and updated
vulnerability detail
The final page in
s. Vulnerability details provide information about a specific
, including technical details and known solutions.
vulnerability ID
An identification number associated with a particular
. The Cisco
and
databases, such as Bugtraq and CVE, have different vulnerability ID
numbering schemes.
vulnerability mapping
The association of
information with
, so that you can perform
web application
A type of
that represents the content of, or requested URL for, HTTP traffic.
whitelist
, a
, the
, or a list of IP addresses
that you can configure within a
to exempt IP addresses from some kind of action.
white list event
An
generated when the system detects that a valid target host has become non-compliant with a
. White list events are a special kind of
white list violation
Information that you can view in the
that details how a host is non-compliant with a
widget
See
.
workflow
A series of pages you can use to view and evaluate
s by moving from a broad view of event data to
a more focused view that contains only the events of interest to you. Workflows can include three types
of pages, each of which performs a unique function:
of pages, each of which performs a unique function:
s, and a final page.
Depending on the workflow type, the final page may be a
,
, or
X-Series
The short name for