Cisco Cisco FirePOWER Appliance 7010
38-23
FireSIGHT System User Guide
Chapter 38 Working with Discovery Events
Working with Hosts
Step 1
On a table view in the hosts workflow, select the check boxes next to the hosts for which you want to
create a traffic profile.
create a traffic profile.
Step 2
At the bottom of the page, click
Create Traffic Profile
.
The Create Profile page appears, populated with the IP addresses of the hosts you specified as the hosts
to be monitored.
to be monitored.
Step 3
Modify and save the traffic profile according to your specific needs.
For more information on creating traffic profiles, see
Creating a Compliance White List Based on Selected Hosts
License:
FireSIGHT
Compliance white lists allow you to specify which operating systems, clients, and network, transport, or
application protocols are allowed on your network.
application protocols are allowed on your network.
You can use the Hosts page to create a compliance white list based on the host profiles of a group of
hosts that you specify. Use the sort and search features to isolate the hosts that you want to use to create
a white list.
hosts that you specify. Use the sort and search features to isolate the hosts that you want to use to create
a white list.
To create a compliance white list based on selected hosts:
Access:
Admin
Step 1
On a table view in the hosts workflow, select the check boxes next to the hosts for which you want to
create a white list.
create a white list.
Step 2
At the bottom of the page, click
Create White List
.
The Create White List page appears, populated with the information in the host profiles of the hosts you
specified.
specified.
Step 3
Modify and save the white list according to your specific needs.
For more information on creating compliance white lists, see
.
Searching for Hosts
License:
FireSIGHT
You can search for specific hosts by using one of the predefined searches or by using your own search
criteria.
criteria.
When searching for hosts, you should keep in mind that although you can configure the network
discovery policy to add hosts to the network map based on data exported by NetFlow-enabled devices,
the available information about these hosts is limited. For example, there is no operating system data
available for these hosts, unless you provide it using the host input feature. For more information, see
discovery policy to add hosts to the network map based on data exported by NetFlow-enabled devices,
the available information about these hosts is limited. For example, there is no operating system data
available for these hosts, unless you provide it using the host input feature. For more information, see
.