Cisco Cisco Firepower Management Center 2000

Página de 1844
 
4-13
FireSIGHT System User Guide
 
Chapter 4      Using the Context Explorer
  Understanding the Context Explorer
Viewing the Hosts by Risk/Business Relevance and Application Graph
License: 
FireSIGHT
The Hosts by Risk/Business Relevance and Application graph, in donut form, displays a proportional 
representation of hosts detected on your monitored network and the applications associated with those 
hosts, arranged by the applications’ estimated risk (the default) or estimated business relevance. The 
inner ring divides by estimated risk/business relevance level (such as 
Medium
 or 
High
), while the outer 
ring further divides that data by specific application (such as 
SSH
 or 
NetBIOS
). Very scarce applications 
are grouped under 
Other
.
Hover your pointer over any part of the donut graph to view more detailed information. Click any part 
of the graph to filter or drill down on that information.
Tip
To constrain the graph so it displays hosts by business relevance and application, hover your pointer over 
the graph, then click 
Business Relevance 
on the toggle button that appears. Click 
Risk
 to return to the 
default view. Note that navigating away from the Context Explorer also returns the graph to the default 
Risk view.
This graph draws data primarily from the Applications table.
Viewing the Application Details List
License: 
FireSIGHT
At the bottom of the Application Information section is the Application Details List, a table that provides 
estimated risk, estimated business relevance, category, and hosts count information for each application 
detected on your monitored network. The applications are listed in descending order of associated host 
count.
The Application Details List table is not sortable, but you can click on any table entry to filter or drill 
down on that information, or (where applicable) to view application information. This table draws data 
primarily from the Applications table.
Note that this list reflects all available data regardless of date and time constraints. If you change the 
explorer time range, the list does not change.