Cisco Cisco FirePOWER Appliance 8250
4-12
FireSIGHT System User Guide
Chapter 4 Using the Context Explorer
Understanding the Context Explorer
Tip
To constrain the graph so it displays traffic by business relevance and application, hover your pointer
over the graph, then click
over the graph, then click
Business Relevance
on the toggle button that appears. Click
Risk
to return to the
default view. Note that navigating away from the Context Explorer also returns the graph to the default
Risk view.
Risk view.
Note
If you filter on intrusion event information, the Traffic by Risk/Business and Application graph is
hidden.
hidden.
This graph draws data primarily from the Connection Events and Application Statistics tables.
Viewing the Intrusion Events by Risk/Business Relevance and Application Graph
License:
FireSIGHT
The Intrusion Events by Risk/Business Relevance and Application graph, in donut form, displays a
proportional representation of intrusion events detected on your monitored network and the applications
associated with those events, arranged by the applications’ estimated risk (the default) or estimated
business relevance. The inner ring divides by estimated risk/business relevance level (such as
proportional representation of intrusion events detected on your monitored network and the applications
associated with those events, arranged by the applications’ estimated risk (the default) or estimated
business relevance. The inner ring divides by estimated risk/business relevance level (such as
Medium
or
High
), while the outer ring further divides that data by specific application (such as
SSH
or
NetBIOS
).
Scarcely detected applications are grouped under
Other
.
Hover your pointer over any part of the donut graph to view more detailed information. Click any part
of the graph to filter or drill down on that information, or (where applicable) to view application
information.
of the graph to filter or drill down on that information, or (where applicable) to view application
information.
Tip
To constrain the graph so it displays intrusion events by business relevance and application, hover your
pointer over the graph, then click
pointer over the graph, then click
Business Relevance
on the toggle button that appears. Click
Risk
to return
to the default view. Note that navigating away from the Context Explorer also returns the graph to the
default Risk view.
default Risk view.
This graph draws data primarily from the Intrusion Events and Application Statistics tables.