on 06-26-2019 08:14 PM - edited on 06-12-2020 11:44 AM by ben.greenbaum
Getting Started
1. I’m a Firepower user. How can I get access to Cisco Threat Response?
To get started with Threat Response, create your account and configure your Firepower device for Threat Response integration, simply follow the steps in this starting guide.
2. What is the cost to use Threat Response?
Threat Response is free with the purchase of qualifying Cisco Security products – including Firepower devices.
3. What is the benefit of integrating my Cisco Firepower device with Threat Response?
Integrating these devices with Threat Response gives you the opportunity to do two things:
Requirements & Availability
4. What Cisco Firepower products do I need to have to integrate with Threat Response?
Threat Response integration is possible with any Firepower software at version 6.3 or higher. Configuration steps vary between version 6.3 and versions 6.4 or higher of the Firepower software.
5. Is the Firepower integration with Threat Response available in the EU or APJC clouds?
Yes, it is available in all clouds. The North American cloud is supported as of version 6.3+, and support for the Europe and APJC clouds was introduced in version 6.5 and higher.
6. Do I need to have Cisco Defense Orchestrator (CDO) to integrate my Firepower device with Threat Response?
No, CDO is not needed. Only a device is necessary.
7. Do I need Firepower Management Center (FMC) to integrate my Firepower device with Threat Response?
No, locally managed Firepower devices can also be integrated with Threat Response.
8. What is the Firepower version release required to integrate with Threat Response?
9. Can both Smart and Classic Licensed software integrated with Threat Response?
Yes, both Smart-licensed and Classic-licensed software are supported. Event delivery methods vary; only Smart-Licensed software can upload events directly to SSE. Devices covered by Classic Licensing will need to use the free CSSP image to relay syslog messages into SSE. See table below for license requirements and integration methods available.
Device running Firepower software |
License required for operation* |
Integration via Syslog |
Direct Integration |
Firepower Threat Defense |
Smart |
Yes - v6.3+ |
Yes - v 6.4+ |
ASA with FirePOWER Services |
Classic |
Yes - v6.3+ |
No |
Firepower NGIPS |
Classic |
Yes - v6.3+ |
No |
Firepower NGIPSv |
Classic |
Yes - v6.3+ |
No |
* irrespective of Cisco Threat Response integration
10. Can I link more than one Smart Account to the same Threat Response account?
Yes, by linking them. See this article.
11. Can I link one Smart Account to multiple Threat Response accounts?
No. Attempts to do this will result in an error message that the Smart Account is already linked to a different Cisco Account.
Configuration & Troubleshooting
12. How can I configure my Firepower device to integrate with Threat Response?
To configure your device, simply follow the steps in this starting guide.
13. How can I know whether I have successfully configured my Firepower device with Threat Response?
Sending data to the Cloud
14. Does Threat Response integration with Firewall require sending my data to the cloud? What information is sent to the cloud?
All supported events (Intrusion events at v6.3+, and file/malware/intelligence events at higher versions) are sent to Cisco’s Security Service Exchange (SSE) cloud infrastructure. These alerts include the nature of the event that was detected, as well as the IP addresses, ports, etc. No packet data is sent.
15. What is SSE?
SSE (Security Services Exchange) is a Cisco cloud platform that handles cloud-to-cloud and premise-to-cloud identification, authentication, and data storage for use in Cisco cloud security products.
16. What is CSSP?
Using Threat Response with Firepower
17. How is my firewall data displayed on the Threat Response relations graph?
Firewall events are a sighting and will result in two IP nodes and the relation between them being displayed in the graph. Depending on event type, there may be other observables as well such as a URL or file hash. These sightings and the relevant metadata will be displayed in the Observable Details panel under the Sightings tab as well.
18. What are the criteria used to promote Events to Incident Manager (in Threat Response)?
There are currently three ways an event can be promoted to an Incident, all implemented in the Eventing Service of SSE. All promoted Incidents are then provided to the user's Private Intel Store in Threat Response, and displayed in the Incident Manager.
19. Can I create rules on what events to send / not to send to Incident Manager?
Yes, SSE offers the ability to create user-authored lists of IP addresses and ranges to be used in event promotion and filtration. Other user-configurable filters and thresholds are currently being developed.
20. Are there limits to how many IP addresses and/or ranges I can filter?
The current supported limit for supported list items (either addresses or ranges) is 100.
21. Why am I not getting any events on Incident Manager?
A lack of Incidents in the Incident Manager can be caused by one of three things:
See the question “How can I know whether I have successfully configured my Firepower Device with Threat Response?” to determine which of these is the cause.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: