Cisco Cisco FirePOWER Appliance 8130
47-12
FireSIGHT System User Guide
Chapter 47 Understanding and Using Workflows
Components of a Workflow
Predefined User Workflows
License:
FireSIGHT
The following table describes the predefined user workflows included on the Defense Center.
Predefined Vulnerabilities Workflows
License:
FireSIGHT
The following table describes the predefined vulnerabilities workflow included on the Defense Center.
Predefined Third-Party Vulnerabilities Workflows
License:
FireSIGHT
The following table describes the predefined third-party vulnerabilities workflows included on the
Defense Center.
Defense Center.
Table 47-13
Predefined Discovery Event Workflows
Workflow Name
Description
Discovery Events
This workflow provides a detailed list, in table view form, of discovery events, followed by the
host view. For more information, see
host view. For more information, see
.
Table 47-14
Predefined User Workflows
Workflow Name
Description
Users
This workflow provides a list of user information collected from user events or from the LDAP
server connection. For details about the user identity workflow, see
server connection. For details about the user identity workflow, see
.
Table 47-15
Predefined Vulnerabilities Workflows
Workflow Name
Description
Vulnerabilities
You can use this workflow to review s a table view of vulnerabilities showing all the
vulnerabilities in the database, followed by a table view of only those active vulnerabilities that
apply to the detected hosts on your network.The workflow ends in a vulnerability detail view,
which contains a detailed description for every vulnerability that meets your constraints. For
more information, see
vulnerabilities in the database, followed by a table view of only those active vulnerabilities that
apply to the detected hosts on your network.The workflow ends in a vulnerability detail view,
which contains a detailed description for every vulnerability that meets your constraints. For
more information, see