Cisco Cisco FirePOWER Appliance 8130
3-28
FireSIGHT System User Guide
Chapter 3 Using Dashboards
Understanding the Predefined Widgets
The preferences also control how often the widget updates. For more information, see
.
On the Intrusion Events widget, you can:
•
on a Defense Center, click a graph corresponding to dropped packets, to would have dropped
packets, or to a specific impact to view intrusion events of that type
packets, or to a specific impact to view intrusion events of that type
•
click the graph corresponding to dropped events to view dropped events
•
click the graph corresponding to would have dropped events to view would have dropped events
•
click the
All
graph to view all intrusion events
Note that the resulting event view is constrained by the dashboard time range; accessing intrusion events
via the dashboard changes the events (or global) time window for the appliance. For more information
on intrusion events, see
via the dashboard changes the events (or global) time window for the appliance. For more information
on intrusion events, see
Note also that packets in a passive deployment are not dropped, regardless of the rule state or the inline
drop behavior of the intrusion policy. For more information, see
drop behavior of the intrusion policy. For more information, see
and
Understanding the Network Compliance Widget
License:
FireSIGHT
The Network Compliance widget summarizes your hosts’ compliance with the white lists you configured
(see
(see
). By default, the widget displays a
pie chart that shows the number of hosts that are compliant, non-compliant, and that have not been
evaluated, for all compliance white lists in active correlation policies. This widget appears by default on
the Correlation tab of the Detailed Dashboard.
evaluated, for all compliance white lists in active correlation policies. This widget appears by default on
the Correlation tab of the Detailed Dashboard.
You can configure the widget to display network compliance either for all white lists or for a specific
white list by modifying the widget preferences.
white list by modifying the widget preferences.
If you choose to display network compliance for all white lists, the widget considers a host to be
non-compliant if it is not compliant with any white list in an active correlation policy.
non-compliant if it is not compliant with any white list in an active correlation policy.