Cisco Cisco FirePOWER Appliance 8250
27-26
FireSIGHT System User Guide
Chapter 27 Using the FireSIGHT System as a Compliance Tool
Working with Shared Host Profiles
The following table describes the actions you can take to modify a shared host profile.
Table 27-2
Shared Host Profile Actions
To...
You can...
rename the host profile
type a new name in the
Name
field.
change the operating system
select the new operating system and version from the
OS Vendor
,
OS
Name
, and
Version
drop-down lists. If you change these values, you
may also want to rename the host profile.
add an application protocol
follow the directions in
add a client
.
add a web application
add a protocol
.
allow all application protocols
under
Allowed Application Protocols
, select the
Allow all Application
Protocols
check box. Note that the check box does not appear until
you delete any application protocols you have previously allowed.
allow all clients
under
Allowed Clients
, select the
Allow all Clients
check box. Note
that the check box does not appear until you delete any clients you
have previously allowed.
have previously allowed.
allow all web applications
under
Allowed Web Applications
, select the
Allow all Web Applications
check box. Note that the check box does not appear until you
delete any clients you have previously allowed.
delete any clients you have previously allowed.
modify an application protocol,
client, web application, or
protocol
client, web application, or
protocol
click the element you want to modify. For more information on the
properties you can change, see:
properties you can change, see:
•
•
•
•
Note
The changes you make to an application protocol, client,
or protocol are reflected in every host profile that uses that
element.
or protocol are reflected in every host profile that uses that
element.
delete an application protocol,
client, web application, or
protocol
client, web application, or
protocol
next to the element you want to delete, click the delete icon (
).
survey your network
click
Survey Network
. Surveying your network can add additional
allowed clients, application protocols, web applications, and
protocols to the host profiles that already exist, and can create
additional host profiles if the survey detects hosts running
operating systems that were not detected during any initial survey.
For more information, see
protocols to the host profiles that already exist, and can create
additional host profiles if the survey detects hosts running
operating systems that were not detected during any initial survey.
For more information, see