Cisco Cisco Firepower Management Center 4000 Guía Del Desarrollador
6-2
FireSIGHT System Database Access Guide
Chapter 6 Schema: Discovery Event and Network Map Tables
the host attributes associated with each host in your
monitored network.
monitored network.
5.2+
the client applications detected on the hosts in your
monitored network.
monitored network.
5.2+
the payloads associated with HTTP (web browser) client
applications detected on the hosts in your monitored
network.
applications detected on the hosts in your monitored
network.
5.2+
stores compromise state for hosts.
5.3+
correlates host IDs to MAC addresses for hosts in your
monitored network.
monitored network.
5.2+
the operating systems detected on the hosts in your
monitored network.
monitored network.
5.2+
the vulnerabilities associated with the hosts in your
monitored network.
monitored network.
5.2+
the protocols detected on the hosts in your monitored
network.
network.
4.10.x+
the hosts in your monitored network with regard to the
managed device that detected them.
managed device that detected them.
5.2+
the services detected on the hosts in your monitored
network.
network.
5.2+
headers from network traffic that advertise service
vendors and versions (“banners”) for the services detected
on hosts in your monitored network.
vendors and versions (“banners”) for the services detected
on hosts in your monitored network.
5.2+
details of the services detected on the hosts in your
monitored network.
monitored network.
5.2+
the payloads associated with services detected on the hosts
in your monitored network.
in your monitored network.
5.2+
the sub-services for the services detected on the hosts in
your monitored network.
your monitored network.
5.2+
the vulnerabilities associated with the services detected on
the hosts in your monitored network.
the hosts in your monitored network.
5.2+
the third-party vulnerabilities associated with the hosts in
your monitored network.
your monitored network.
5.2+
the third-party vulnerabilities associated with the hosts in
your monitored network that are also associated with a
vulnerability in the Bugtraq database
(
your monitored network that are also associated with a
vulnerability in the Bugtraq database
(
http://www.securityfocus.com/bid/
).
5.2+
the third-party vulnerabilities associated with the hosts in
your monitored network that are also associated with a
vulnerability in MITRE’s CVE database.
(
your monitored network that are also associated with a
vulnerability in MITRE’s CVE database.
(
http://www.cve.mitre.org/
).
5.2+
Table 6-1
Schema for Discovery Event and Network Map Tables (continued)
See...
For the table that stores information on...
Version