Cisco Cisco FirePOWER Appliance 7115
Version 5.3
Sourcefire 3D System User Guide
1734
Enhancing Network Discovery
Using Custom Fingerprinting
Chapter 40
2. If the fingerprints you want to delete are active, click the slider icon next to
each one to deactivate it.
3. Click the delete icon (
) next to the fingerprint you want to delete.
4. Click OK to confirm that you want to delete the fingerprint.
The fingerprint is deleted.
Editing Fingerprints
L
ICENSE
: FireSIGHT
After you create a fingerprint, you can view or edit it. This allows you to make
changes and resubmit the fingerprint or add additional vulnerability mappings to
it. You can modify fingerprints whether they are active or inactive, but depending
on a fingerprint’s state, the things that can be modified differ.
If a fingerprint is inactive, you can modify all elements of the fingerprint and
If a fingerprint is inactive, you can modify all elements of the fingerprint and
resubmit it to the Defense Center. This includes all properties you specified when
creating the fingerprint, such as fingerprint type, target IP addresses and ports,
vulnerability mappings, and so on. When you edit an inactive fingerprint and
submit it, it is resubmitted to the system and, if it is a client fingerprint, you must
resend traffic to the appliance before activating it. Note that you can select only a
single vulnerability mapping for an inactive fingerprint. After you activate the
fingerprint, you can map additional operating systems and versions to its
vulnerabilities list.
If a fingerprint is active, you can modify the fingerprint name, description, custom
If a fingerprint is active, you can modify the fingerprint name, description, custom
operating system display, and map additional vulnerabilities to it.
For more information, see the following sections:
For more information, see the following sections:
•
•
Editing an Inactive Fingerprint
L
ICENSE
: FireSIGHT
If a fingerprint is inactive, you can modify its properties and resubmit it to the
system. This includes making changes such as the type of fingerprint to use, the
target system to fingerprint, and so on.
To edit inactive fingerprints:
A
CCESS
: Admin/Discovery Admin
1. Select Policies > Network Discovery, then click Custom Operating Systems.
The Custom Fingerprint page appears.
2. Click the edit icon (
) next to the fingerprint you want to edit.
The Edit Custom Fingerprint page appears.