Cisco Cisco FirePOWER Appliance 8130

下载
页码 1844
 
47-12
FireSIGHT System User Guide
 
Chapter 47      Understanding and Using Workflows 
  Components of a Workflow
Predefined User Workflows
License: 
FireSIGHT
The following table describes the predefined user workflows included on the Defense Center.
Predefined Vulnerabilities Workflows
License: 
FireSIGHT
The following table describes the predefined vulnerabilities workflow included on the Defense Center. 
Predefined Third-Party Vulnerabilities Workflows
License: 
FireSIGHT
The following table describes the predefined third-party vulnerabilities workflows included on the 
Defense Center.
Table 47-13
Predefined Discovery Event Workflows 
Workflow Name
Description 
Discovery Events
This workflow provides a detailed list, in table view form, of discovery events, followed by the 
host view. For more information, see 
.
Table 47-14
Predefined User Workflows 
Workflow Name
Description 
Users
This workflow provides a list of user information collected from user events or from the LDAP 
server connection. For details about the user identity workflow, see 
.
Table 47-15
Predefined Vulnerabilities Workflows 
Workflow Name
Description 
Vulnerabilities
You can use this workflow to review s a table view of vulnerabilities showing all the 
vulnerabilities in the database, followed by a table view of only those active vulnerabilities that 
apply to the detected hosts on your network.The workflow ends in a vulnerability detail view, 
which contains a detailed description for every vulnerability that meets your constraints. For 
more information, see