Cisco Cisco FirePOWER Appliance 7020
47-36
FireSIGHT System User Guide
Chapter 47 Understanding and Using Workflows
Using Workflows
Navigating Between Workflows
License:
Any
You can navigate to other workflows using the links in the
Jump to...
drop-down list on a workflow page.
Select the drop-down list to view and select additional workflows.
When you select a new workflow, properties shared by the rows you select and the constraints you set
are used in the new workflow, if they are applicable. If configured constraints or event properties do not
map to fields in the new workflow, they are dropped. In addition, compound constraints are not retained
when you switch from one workflow to another. In addition, constraints from the captured files workflow
only transfer to file and malware event workflows.
are used in the new workflow, if they are applicable. If configured constraints or event properties do not
map to fields in the new workflow, they are dropped. In addition, compound constraints are not retained
when you switch from one workflow to another. In addition, constraints from the captured files workflow
only transfer to file and malware event workflows.
Note
When you view event counts over a time range, the total number of events may not reflect the number
of events for which more detailed data is available. This occurs because the system sometimes prunes
older event details to manage disk space usage. To minimize the occurrence of event detail pruning, you
can fine-tune event logging to log only those events most important to your deployment. For more
information, see
of events for which more detailed data is available. This occurs because the system sometimes prunes
older event details to manage disk space usage. To minimize the occurrence of event detail pruning, you
can fine-tune event logging to log only those events most important to your deployment. For more
information, see
Note that unless you have either paused the time window or have configured a static time window, the
time window changes when you change workflows. For more information, see
time window changes when you change workflows. For more information, see
.
The Jump to drop-down list provides quick access to workflows for the following tables:
•
connection events
•
security intelligence events
•
intrusion events
•
malware events
•
file events
•
hosts
•
indications of compromise
•
applications
•
application details
•
servers
•
host attributes
•
discovery events
•
users
•
vulnerabilities
•
third-party vulnerabilities
jump to the last page
>|
jump to the first page
|<
Table 47-29
Navigating Pages (continued)
To...
Click...