<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower awareness - user, appl in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-awareness-user-appl/m-p/4012057#M922735</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/169403"&gt;@cadet&lt;/a&gt;&amp;nbsp;If the proxy follows the conventional method of including the X-Forwarded-For (XFF) or similar field in the packets, Firepower can extract and display that information. It's a non-displayed by default so you would have to enable it in your Connection events table viewer.&lt;/P&gt;
&lt;P&gt;The option for it is under Policies &amp;gt; Intrusion &amp;gt; Network Analysis Policy&lt;/P&gt;</description>
    <pubDate>Wed, 15 Jan 2020 19:02:57 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2020-01-15T19:02:57Z</dc:date>
    <item>
      <title>Firepower awareness - user, appl</title>
      <link>https://community.cisco.com/t5/network-security/firepower-awareness-user-appl/m-p/3990659#M922730</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"Cisco &lt;STRONG&gt;Firepower&lt;/STRONG&gt; provides full contextual threat analysis and protection, &lt;STRONG&gt;with awareness into users, user history on every machine, mobile devices, client-side applications, operating systems, virtual machine-to-machine communications, vulnerabilities, threats, and URLs.&lt;/STRONG&gt;" -&amp;nbsp;&lt;A href="https://www.cisco.com/c/m/en_us/products/security/firewalls/competitive-comparison.html#~competitive=0" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/m/en_us/products/security/firewalls/competitive-comparison.html#~competitive=0&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What products do customers need to offer to implement the "User, network, and endpoint awareness" features?&lt;/P&gt;&lt;P&gt;It seems to me that in addition to &lt;STRONG&gt;Firepower&lt;/STRONG&gt; + &lt;STRONG&gt;FMC&lt;/STRONG&gt;, &lt;STRONG&gt;Network Visibility module for Anyconnect&lt;/STRONG&gt;&amp;nbsp; is also needed?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Or please explain how Firepower, which is located on the external edge of the network, receives information about "a user working on a workstation + client-side applications" in the local network behind a proxy server ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:43:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-awareness-user-appl/m-p/3990659#M922730</guid>
      <dc:creator>cadet</dc:creator>
      <dc:date>2020-02-21T17:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower awareness - user, appl</title>
      <link>https://community.cisco.com/t5/network-security/firepower-awareness-user-appl/m-p/3990702#M922731</link>
      <description>&lt;P&gt;If Firepower is only sitting on the network edge then you might not see intra-network visibility. It can be architected instead to also cover "east-west" traffic and provide the visibility mentioned in the data sheet without any additional products.&lt;/P&gt;
&lt;P&gt;If you don't put it into the east-west path then other products such as Stealthwatch can provide this sort of visibility. It can ingest Netflow records from many locations, including the Anyconnect Network Visibility module. Generally though it suffices to gather flow records from the network equipment.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 11:49:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-awareness-user-appl/m-p/3990702#M922731</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-11-28T11:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower awareness - user, appl</title>
      <link>https://community.cisco.com/t5/network-security/firepower-awareness-user-appl/m-p/3990751#M922732</link>
      <description>&lt;P&gt;Thanks, Marvin!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I understand, is the &lt;STRONG&gt;same situation with the "Network file trajectory"&amp;nbsp;&lt;/STRONG&gt;?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"Cisco maps how &lt;STRONG&gt;hosts transfer files, including malware files, across your network&lt;/STRONG&gt;. It can see if a file transfer was blocked or the file was quarantined. This provides a means to scope, provide outbreak controls, and identify patient zero." -&amp;nbsp;&lt;A href="https://www.cisco.com/c/m/en_us/products/security/firewalls/competitive-comparison.html#~competitive=0" target="_blank"&gt;https://www.cisco.com/c/m/en_us/products/security/firewalls/competitive-comparison.html#~competitive=0&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If &lt;SPAN&gt;we don't put Firepower&amp;nbsp; into the east-west path of the traffic than we can not see &lt;STRONG&gt;file trajectory&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;across customer network without additional&amp;nbsp;products&amp;nbsp;such as, for example, AMP for Endpoint ?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, in design (case 1 in attach)&amp;nbsp;&lt;SPAN&gt;&lt;STRONG&gt;without&amp;nbsp; AMP for Endpoint do I not see&amp;nbsp;file trajectory between host B and C ?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Or do I need &lt;STRONG&gt;additional Firepower between&amp;nbsp;host B and C&lt;/STRONG&gt; (case 2 in attach) or&amp;nbsp;&lt;STRONG&gt;AMP for Endpoint on both hosts ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Could you correct me if I am wrong?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 13:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-awareness-user-appl/m-p/3990751#M922732</guid>
      <dc:creator>cadet</dc:creator>
      <dc:date>2019-11-28T13:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower awareness - user, appl</title>
      <link>https://community.cisco.com/t5/network-security/firepower-awareness-user-appl/m-p/3991379#M922733</link>
      <description>&lt;P&gt;In the hypothetical use case #2&amp;nbsp;you describe, Malware traffic that was exclusively between B and C would never transit the firewall so of course the firewall would have to way to detect or provide insight into that particular flow.&lt;/P&gt;
&lt;P&gt;However in the real world, the malware would often be making calls to the Internet. In that case Firepower would see those calls from both B and C and thus be able to report that the same malware was seen on two hosts.&lt;/P&gt;
&lt;P&gt;See this example:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://popravak.wordpress.com/2015/07/11/sourcefire-file-policies-aka-advanced-malware-protection/" target="_blank"&gt;https://popravak.wordpress.com/2015/07/11/sourcefire-file-policies-aka-advanced-malware-protection/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Nov 2019 05:50:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-awareness-user-appl/m-p/3991379#M922733</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-11-30T05:50:49Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower awareness - user, appl</title>
      <link>https://community.cisco.com/t5/network-security/firepower-awareness-user-appl/m-p/4011800#M922734</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;However in the real world, the malware would often be making calls to the Internet. In that case Firepower would see those calls from both B and C and thus be able to report that the same malware was seen on two hosts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;, Thanks!&amp;nbsp;I missed your answer.&lt;/P&gt;&lt;P&gt;I agree with you. But also in &lt;STRONG&gt;real-world scenarios&lt;/STRONG&gt;, the customer often uses a &lt;STRONG&gt;proxy server&lt;/STRONG&gt; that &lt;STRONG&gt;hides the IP addresses of users&lt;/STRONG&gt; when they access to the Internet. And again we come back to a solution that r&lt;STRONG&gt;equires additional software (for example, AMP for Endpoint on hosts)&amp;nbsp;&lt;/STRONG&gt;for&amp;nbsp;&lt;STRONG&gt;Network file trajectory&amp;nbsp;&lt;/STRONG&gt;functionality.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you correct me if I am wrong?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2020 12:33:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-awareness-user-appl/m-p/4011800#M922734</guid>
      <dc:creator>cadet</dc:creator>
      <dc:date>2020-01-15T12:33:51Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower awareness - user, appl</title>
      <link>https://community.cisco.com/t5/network-security/firepower-awareness-user-appl/m-p/4012057#M922735</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/169403"&gt;@cadet&lt;/a&gt;&amp;nbsp;If the proxy follows the conventional method of including the X-Forwarded-For (XFF) or similar field in the packets, Firepower can extract and display that information. It's a non-displayed by default so you would have to enable it in your Connection events table viewer.&lt;/P&gt;
&lt;P&gt;The option for it is under Policies &amp;gt; Intrusion &amp;gt; Network Analysis Policy&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2020 19:02:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-awareness-user-appl/m-p/4012057#M922735</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-01-15T19:02:57Z</dc:date>
    </item>
  </channel>
</rss>

