<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FMC host profile accuracy. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-host-profile-accuracy/m-p/4092486#M1070494</link>
    <description>&lt;P&gt;Hello Everyone,&lt;BR /&gt;&amp;nbsp;I hope you are all doing well, despite whats going on with the pandemic.&lt;BR /&gt;&amp;nbsp;Anyways, I was trying to improve the Host Profile quality exploring several alternatives. Nmap, API, etc.&lt;BR /&gt;&amp;nbsp;At this time I focused on nmimport.pl and was able to achieve the basics; addition, removal, OS, protocols, Third-Party Product Maps, etc.&lt;BR /&gt;&amp;nbsp;What I was trying next is Vulnerabilities. To set which ones are Valid and Invalid.&lt;BR /&gt;So far I was playing with "SetValidVuln" y "SetInvalidVuln" but neither had any effect that I could see.&lt;BR /&gt;My hope was being able to move vulnerabilities from Valid to Invalid as we do manually.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot from 2020-05-26 18-32-12.png" style="width: 572px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/75405iD3D44C5D8431BD76/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot from 2020-05-26 18-32-12.png" alt="Screenshot from 2020-05-26 18-32-12.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Very briefly, according to the documentation, one of the parameters for either command is "vuln_id". And "vuln_id" can be a "Valid Cisco vulnerability IDs", or "mapped third-party vulnerability IDs".&lt;BR /&gt;I was kind of able to create a mapping, but I'm more interested in finding the Cisco vulnerability IDs to natively and directly validate/invalidate vulnerabilities. Mapping is fine for small jobs.&lt;BR /&gt;Neither SVID, nor CVE ID worked as written in FMC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Nmap doesn't work for me all that consistently. Sometimes it takes too long, other times the collection is poor, and, most shockingly, brief-but-notable traffic interruption took place while running.&lt;BR /&gt;API, I'm no expert so would rather have that as a last resort.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Lastly, is there a tool to parse and format CSV files to make them suitable for the nmimport.pl?&lt;/P&gt;&lt;P&gt;If anyone has a better approach, and care to share some details, I'd appreciate it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&lt;BR /&gt;Regards&lt;BR /&gt;Peter&lt;/P&gt;</description>
    <pubDate>Tue, 26 May 2020 22:48:02 GMT</pubDate>
    <dc:creator>ggalteroo</dc:creator>
    <dc:date>2020-05-26T22:48:02Z</dc:date>
    <item>
      <title>FMC host profile accuracy.</title>
      <link>https://community.cisco.com/t5/network-security/fmc-host-profile-accuracy/m-p/4092486#M1070494</link>
      <description>&lt;P&gt;Hello Everyone,&lt;BR /&gt;&amp;nbsp;I hope you are all doing well, despite whats going on with the pandemic.&lt;BR /&gt;&amp;nbsp;Anyways, I was trying to improve the Host Profile quality exploring several alternatives. Nmap, API, etc.&lt;BR /&gt;&amp;nbsp;At this time I focused on nmimport.pl and was able to achieve the basics; addition, removal, OS, protocols, Third-Party Product Maps, etc.&lt;BR /&gt;&amp;nbsp;What I was trying next is Vulnerabilities. To set which ones are Valid and Invalid.&lt;BR /&gt;So far I was playing with "SetValidVuln" y "SetInvalidVuln" but neither had any effect that I could see.&lt;BR /&gt;My hope was being able to move vulnerabilities from Valid to Invalid as we do manually.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot from 2020-05-26 18-32-12.png" style="width: 572px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/75405iD3D44C5D8431BD76/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot from 2020-05-26 18-32-12.png" alt="Screenshot from 2020-05-26 18-32-12.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Very briefly, according to the documentation, one of the parameters for either command is "vuln_id". And "vuln_id" can be a "Valid Cisco vulnerability IDs", or "mapped third-party vulnerability IDs".&lt;BR /&gt;I was kind of able to create a mapping, but I'm more interested in finding the Cisco vulnerability IDs to natively and directly validate/invalidate vulnerabilities. Mapping is fine for small jobs.&lt;BR /&gt;Neither SVID, nor CVE ID worked as written in FMC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Nmap doesn't work for me all that consistently. Sometimes it takes too long, other times the collection is poor, and, most shockingly, brief-but-notable traffic interruption took place while running.&lt;BR /&gt;API, I'm no expert so would rather have that as a last resort.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Lastly, is there a tool to parse and format CSV files to make them suitable for the nmimport.pl?&lt;/P&gt;&lt;P&gt;If anyone has a better approach, and care to share some details, I'd appreciate it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&lt;BR /&gt;Regards&lt;BR /&gt;Peter&lt;/P&gt;</description>
      <pubDate>Tue, 26 May 2020 22:48:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-host-profile-accuracy/m-p/4092486#M1070494</guid>
      <dc:creator>ggalteroo</dc:creator>
      <dc:date>2020-05-26T22:48:02Z</dc:date>
    </item>
  </channel>
</rss>

