Cisco Cisco FirePOWER Appliance 8250
4-13
FireSIGHT System User Guide
Chapter 4 Using the Context Explorer
Understanding the Context Explorer
Viewing the Hosts by Risk/Business Relevance and Application Graph
License:
FireSIGHT
The Hosts by Risk/Business Relevance and Application graph, in donut form, displays a proportional
representation of hosts detected on your monitored network and the applications associated with those
hosts, arranged by the applications’ estimated risk (the default) or estimated business relevance. The
inner ring divides by estimated risk/business relevance level (such as
representation of hosts detected on your monitored network and the applications associated with those
hosts, arranged by the applications’ estimated risk (the default) or estimated business relevance. The
inner ring divides by estimated risk/business relevance level (such as
Medium
or
High
), while the outer
ring further divides that data by specific application (such as
SSH
or
NetBIOS
). Very scarce applications
are grouped under
Other
.
Hover your pointer over any part of the donut graph to view more detailed information. Click any part
of the graph to filter or drill down on that information.
of the graph to filter or drill down on that information.
Tip
To constrain the graph so it displays hosts by business relevance and application, hover your pointer over
the graph, then click
the graph, then click
Business Relevance
on the toggle button that appears. Click
Risk
to return to the
default view. Note that navigating away from the Context Explorer also returns the graph to the default
Risk view.
Risk view.
This graph draws data primarily from the Applications table.
Viewing the Application Details List
License:
FireSIGHT
At the bottom of the Application Information section is the Application Details List, a table that provides
estimated risk, estimated business relevance, category, and hosts count information for each application
detected on your monitored network. The applications are listed in descending order of associated host
count.
estimated risk, estimated business relevance, category, and hosts count information for each application
detected on your monitored network. The applications are listed in descending order of associated host
count.
The Application Details List table is not sortable, but you can click on any table entry to filter or drill
down on that information, or (where applicable) to view application information. This table draws data
primarily from the Applications table.
down on that information, or (where applicable) to view application information. This table draws data
primarily from the Applications table.
Note that this list reflects all available data regardless of date and time constraints. If you change the
explorer time range, the list does not change.
explorer time range, the list does not change.