Cisco Cisco Firepower Management Center 2000

Página de 1844
 
39-31
FireSIGHT System User Guide
 
Chapter 39      Configuring Correlation Policies and Rules
  Creating Rules for Correlation Policies
You can create a single, simple condition, or you can create more elaborate constructs by combining and 
nesting conditions. See 
 for information on how to 
use the web interface to build conditions. 
The syntax you can use to build conditions is described in 
.
Step 3
Optionally, continue with 
.
If you are finished building the correlation rule, continue with step 
 of the procedure in 
 to save the rule.
Syntax for User Qualifications
License: 
FireSIGHT
When you build a user qualification condition, you must first select the identity you want to use to 
constrain your correlation rule. The identity you can choose depends on the type of event you are using 
to trigger the rule, as follows:
  •
If you are using a connection event, select 
Identity on Initiator 
or 
Identity on Responder
.
  •
If you are using an intrusion event, select 
Identity on Destination 
or 
Identity on Source
.
  •
If you are using a discovery event, select 
Identity on Host
.
  •
If you are using a host input event, select 
Identity on Host
.
After you select the user type, you continue building your user qualification condition, as described in 
the following table.
The Defense Center obtains certain information about users, including first and last names, department, 
telephone number, and email address, from an optional Defense Center-LDAP server connection; see 
. This information may not be 
available for all users in the database.
Adding Snooze and Inactive Periods
License: 
Any
Table 39-14
Syntax for User Qualifications 
If you specify...
Select an operator, then...
Username
Type the username of the user you want to use to constrain the correlation rule.
Authentication Protocol
Select an authentication protocol (or user type) protocol. This is the protocol that was used to 
detect the user.
First Name
Type the first name of the user you want to use to constrain the correlation rule.
Last Name
Type the last name of the user you want to use to constrain the correlation rule.
Department
Type the department of the user you want to use to constrain the correlation rule.
Phone
Type the telephone number of the user you want to use to constrain the correlation rule.
Email
Type the email address of the user you want to use to constrain the correlation rule.