Cisco Cisco Firepower Management Center 4000

Descargar
Página de 1844
 
37-10
FireSIGHT System User Guide
 
Chapter 37      Using Host Profiles 
  Working with Operating Systems in the Host Profile
scanner or application data imported through the host input feature. The system considers the priority 
assigned to each identity source when determining which identity to use. By default, user input has the 
highest priority, followed by application or scanner sources, followed by the Cisco-discovered identity.
Sometimes the system supplies a general operating system definition rather than a specific one because 
the traffic and other identity sources do not provide sufficient information for a more focused identity. 
The system collates information from the sources to use the most detailed definition possible. 
Descriptions of the operating system information fields displayed in the host profile follow.
Hardware
The hardware platform for a mobile device.
OS Vendor/Vendor
The operating system vendor. 
OS Product/Product
The operating system determined most likely to be running on the host, based on the identity data 
collected from all sources. 
If the operating system is 
Pending
, the system has not yet identified an operating system and no 
other identity data is available. If the operating system is 
unknown
, the system cannot identify the 
operating system and no other identity data is available for the operating system.
If the host’s operating system is not one the system is capable of detecting, you may want to use one 
of the following strategies:
  –
create a custom fingerprint for the host, as described in 
  –
run an Nmap scan against the host, as described in 
  –
import data into the network map, using the host input feature described in the FireSIGHT 
System Host Input API Guide
  –
manually enter operating system information, as described in 
OS Version/Version
The operating system version. If a host is a jailbroken mobile device, 
Jailbroken
 is indicated in 
parentheses after the version.
Source
One of the following values:
  –
User: 
user_name
  –
Application: 
app_name
  –
Scanner: 
scanner_type
 (Nmap or scanner added through system policy)
  –
FireSIGHT
The system may reconcile data from multiple sources to determine the identity of an operating 
system; see 
Because the vulnerabilities list for the host and the event impact correlation for events targeting the host 
depend on the operating system, you may want to manually supply more specific operating system 
information. In addition, you can indicate that fixes have been applied to the operating system, such as 
service packs and updates, and invalidate any vulnerabilities addressed by the fixes.