Time
11 hours
Difficulty
Intermediate
CEU/CPE
15

Video Transcription

00:00
Welcome Back. Siskel Certified Design Associate, Demo 15 Power Management Center, 6.3 The 1.1 scenario to the overview of the summary dashboard I Mean, Instructor Wayne
00:13
System Firepower provides many detailed the dashboards. This are all highly customizable, and the customer can add additional dashboards to their system. This provide at a client's visibility into the areas of your network that you are interested in seeing, says FMC. As a multi user system
00:31
with rule based access, each user
00:34
with the logging can determine which dashboards provided the information they need to see. This can't be the landing page for them whenever the logging. The summary dashboard is a great place to start as it provides an overview
00:48
off the Net rig and applications and also provides a view into threats that I've been seeing.
00:55
This is the default landing page for new users to begin with, clicking on the over veal selected dashboards on summary dashboards. Right
01:06
now, you'll get this picture
01:07
after screen loads selected. Never cap.
01:11
We go Thio never tap
01:19
from these stash sport. There is a visibility into the
01:23
which is containing nearly any type of information that all available at just that glass, each attached for each wages is completely customizable.
01:34
Each wages can also joe into specific, even information.
01:38
For example, if you want to see traffic for a high use user or application, simply click on the user. Name our application to gather more information by user. I say we click on this one. Get we can get more information.
01:56
Pop server Attackers pop Ah, server of occasion. Seeing right Good a network.
02:08
Let's see top server up application the scene right from here. If you click on the this error, you will see tops of replication. Seeing way can click on up threats. Tap
02:29
this type extremely useful because it focuses on Malaysia's traffic and our files, and I lost you to see which of our systems may have been compromised.
02:38
Right? The frights tab shows
02:42
um, Mel, where frights.
02:45
My wife writes we Jemele where files have being detected by advancement, our protection running on either a security appliance or an appointed agent.
02:54
Interesting events.
02:57
Bye impactor level.
02:59
Which attacks have been detected by snort we didn't otherwise permitted traffic types and the connections by security intelligence category
03:07
right as disgusting. The previous is scenario which categories of nations traffic of these down source or that's the nation. AKI address how being seen on the network,
03:17
right?
03:19
And the indication of a compromise My host or by users?
03:24
All right. We chose to have taken part in activities that may have cost them to be compromised. These air, often behavioral, is like a accessing a mirror file, right from the threats tap, it is easy for us to get more detailed information about a host with the IOC. Just the click of the host.
03:45
Um, next to one over the I P addresses the view of the host of Profile, for example, even Creek on this war.
03:53
On these opens a new window which this place around of the information, including who is currently logging into the device on dhe. Any IOC is ready there,
04:03
host. Right?
04:08
Go buy a new window.
04:12
From here, you can see like a hosted profile, always in for useful information so you can check out from here.
04:18
There's this part
04:19
you need to pay attention to it, right? Domain name I P address the dice. Hops, right, Mac address posted, type and lost. The scene,
04:30
also fourth
04:33
on the screw further to see things like operating system information.
04:39
She never
04:41
which application are used in the history of AH, which users have a previously being logging and right to this device
04:48
it was going to see the operating right is the Windows, which any user all got in before.
04:56
This is a user history, right? There's all the others
05:00
when they log in, and it's already too. This for information From here,
05:04
Cisco Firepower contains a powerful side of a easy to use dashboards along the network or security administrator. The fully understand the applications and frights running on their networks. The information displayed in the dashboard is available within the policy in jeans to enforce the network policies,
05:20
allowing in the most powerful and actually the next generation security systems on the market. It to me
05:28
any questions, feel free to contact me. Otherwise I'll see you in the next video Bye for now.

Up Next

CCDA (Cisco Certified Design Associate)

In this CCDA training you will learn the knowledge and skills involved in attaining your Cisco Certified Design Associate (CCDA) certification.

Instructed By

Instructor Profile Image
Wayne Xing
Network Solutions Architect
Instructor