Cisco Cisco FirePOWER Appliance 7110
47-10
FireSIGHT System User Guide
Chapter 47 Understanding and Using Workflows
Components of a Workflow
Predefined Application Details Workflows
License:
FireSIGHT
The following table describes the predefined workflows that you can use with application detail and
client data.
client data.
Table 47-9
Predefined Applications Workflows
Workflow Name
Description
Application Business
Relevance
Relevance
You can use this workflow to analyze running applications of each estimated business relevance
level on your network, so you can monitor appropriate use of your network resources. This
workflow begins with a count of hosts running applications of each relevance level, followed by
a table of individual applications with their business relevance levels and host counts, a table
view of applications, and the host view. See
level on your network, so you can monitor appropriate use of your network resources. This
workflow begins with a count of hosts running applications of each relevance level, followed by
a table of individual applications with their business relevance levels and host counts, a table
view of applications, and the host view. See
for more
information.
Application Category
You can use this workflow to analyze running applications of each category (such as email,
search engine, or social networking) on your network, so you can monitor appropriate use of
your network resources. This workflow begins with a count of hosts running applications of each
category, followed by a count of hosts running individual applications, a table view of
applications, and the host view. See
search engine, or social networking) on your network, so you can monitor appropriate use of
your network resources. This workflow begins with a count of hosts running applications of each
category, followed by a count of hosts running individual applications, a table view of
applications, and the host view. See
for more information.
Application Risk
You can use this workflow to analyze running applications of each estimated security risk level
on your network, so you can estimate the potential risk of users’ activity and take appropriate
action. This workflow begins with a count of hosts running applications of each risk level,
followed by a table of individual applications with their business relevance levels and host
counts, a table view of applications, and the host view. See
on your network, so you can estimate the potential risk of users’ activity and take appropriate
action. This workflow begins with a count of hosts running applications of each risk level,
followed by a table of individual applications with their business relevance levels and host
counts, a table view of applications, and the host view. See
for more information.
Application Summary
You can use this workflow to obtain detailed information about the applications and associated
hosts on your network, so you can closely examine host application activity. This workflow
begins with a list of individual host IP addresses running applications, followed by a table view
of applications and the host view.
hosts on your network, so you can closely examine host application activity. This workflow
begins with a list of individual host IP addresses running applications, followed by a table view
of applications and the host view.
Applications
You can use this workflow to analyze running applications on your network, so you can gain an
overview of how the network is being used. This workflow begins with a count of hosts running
individual applications, followed by a table view of applications and the host view. See
overview of how the network is being used. This workflow begins with a count of hosts running
individual applications, followed by a table view of applications and the host view. See
for more information.
Table 47-10
Predefined Application Details Workflows
Workflow Name
Description
Application Details
You can use this workflow to analyze the client applications on your network in more detail.
This workflow contains a series of pages that begin with a list of the client applications and
application products on your network and a count of the number of hosts running each
application. You can then view the number of hosts running each version of that application. The
next page lets you identify which applications have been accessed most frequently on specific
hosts. The workflow then provides a table view of client applications, followed by the host view.
See
This workflow contains a series of pages that begin with a list of the client applications and
application products on your network and a count of the number of hosts running each
application. You can then view the number of hosts running each version of that application. The
next page lets you identify which applications have been accessed most frequently on specific
hosts. The workflow then provides a table view of client applications, followed by the host view.
See
for more information.
Clients
This workflow contains a table view of client applications, followed by the host view. See
for more information.