Cisco Threat Response is free as part of an investment with a Cisco Security Product.
AMP or Threat Grid account holders can use existing credentials to log in- U.S. cloud, EU cloud, or AP cloud. Customers of Umbrella, Firepower, or Email Security can create an account at “Create a Cisco Security Account” in these links U.S. cloud, EU cloud, or AP cloud.
You can find quick start guides and other resources on Threat Response here.
If you are not yet a customer of these products, you can get a free trial of one of them (e.g. Umbrella free trial), which allows you to try Threat Response as well.
... View more
1. I’m a Firepower user. How can I get access to Cisco Threat Response?
To get started with Threat Response, create your account and configure your Firepower device for Threat Response integration, simply follow the steps in this starting guide .
2. What is the cost to use Threat Response?
Threat Response is free with purchase of qualifying Cisco Security products – including Firepower devices.
3. What is the benefit of integrating my Cisco Firepower device with Threat Response?
Integrating these devices with Threat Response gives you the opportunity to do two things:
Use Threat Response’s Incident Manager to automatically triage and investigate high priority intrusion events
See intrusion events from your device alongside other reports from Cisco Security products and threat intelligence sources in your investigations
Requirements & Availability
4. What Cisco Firepower products do I need to have to integrate with Threat Response?
Threat Response integration is possible with any Firepower software at version 6.3 or higher. Configuration steps vary between version 6.3 and versions 6.4 or higher of the Firepower software.
5. Is the Firepower integration with Threat Response available in the EU or APJC clouds?
Currently, it is only available in North America. The EU and APJC Threat Response clouds will have the integration available shortly.
6. Do I need to have Cisco Defense Orchestrator (CDO) to integrate my Firepower device with Threat Response?
No, CDO is not needed. Only a device is necessary.
7. Do I need Firepower Management Center (FMC) to integrate my Firepower device with Threat Response?
No, locally managed Firepower devices can also be integrated with Threat Response.
8. What is the Firepower version release required to integrate with Threat Response?
6.4 and higher versions of Firepower software with Smart Licensing can upload events directly.
Version 6.3 is the minimal version that can be integrated with Threat Response. 6.3 devices will require additional configuration and usage of a CSSP virtual device that forwards intrusion events to the cloud. The CSSP device is free and can be downloaded as part of the configuration steps.
9. Can both Smart and Classic Licensed software integrated with Threat Response?
Yes, both Smart-licensed and Classic-licensed software are supported. Event delivery methods vary; only Smart-Licensed software can upload events directly to SSE. Devices covered by Classic Licensing will need to use the free CSSP image to relay syslog messages into SSE. See table below for license requirements and integration methods available.
Device running Firepower software
License required for operation*
Integration via Syslog
Firepower Threat Defense
Yes - v6.3+
Yes - v 6.4+
ASA with FirePOWER Services
Yes - v6.3+
Yes - v6.3+
Yes - v6.3+
* irrespective of Cisco Threat Response integration
Configuration & Troubleshooting
10. How can I configure my Firepower device to integrate with Threat Response?
To configure your device, simply follow the steps in this starting guide.
11. How can I know whether I have successfully configured my Firepower device with Threat Response?
You can verify the integration at a high level in Threat Response by clicking the Devices button in the left navigation menu under settings. You should see your Firepower or CSSP device(s) listed. Click Manage Devices to be cross-launched into SSE in a new tab, and click Events in that new tab to view your list of events. If there are events from your device, then the device is properly configured in SSE. If there are not, then either the device is not properly configured, your CSSP is not configured properly or not working (if applicable), or there have been no Intrusion events in your device since the integration was configured. Confirm on the device (and/or CSSP) to determine which is the case.
You can test the Firepower enrichment module by selecting an intrusion event from within the FMC or FDM consoles, and searching for either of the reported IP addresses in Threat Response. The selected event needs to have happened after the integration was configured, and within the last 7 days. If the integration is successful, both of the IP addresses will be displayed in the graph and the alert will be recorded as a sighting. This confirms that alerts are being sent from your device into SSE and that Threat Response has visibility into that data.
You can test Incident Manager by clicking Incidents and checking to see if any exist. Because the event promotion rules rely on certain thresholds to promote raw events to Incidents, there may legitimately not be any Incidents. If there are none, you can test event promotion by viewing the SSE event store (by clicking Settings -> Devices -> Manage Devices -> Events) and manually promoting any event to an Incident. To promote an incident click the circled up arrow on the far right of the incident row. Then refresh the view of your Incidents in Threat Response, and that Incident should be listed.
Sending data to the Cloud
12. Does Threat Response integration with Firewall require sending my data to the cloud? What information is sent to the cloud?
Intrusion events are sent to Cisco’s Security Service Exchange (SSE) cloud infrastructure. These alerts include the nature of the event that was detected, as well as the IP addresses, ports, etc. No packet data is sent.
13. What is SSE?
SSE (Security Services Exchange) is a Cisco cloud platform that handles cloud-to-cloud and premise-to-cloud identification, authentication, and data storage for use in Cisco cloud security products.
14. What is CSSP?
CSSP (Cisco Security Services Proxy) is a downloadable image provided by Cisco at no cost that forwards syslog alerts from Firepower devices to SSE.
In 6.3 version devices, this is the only way to get events to SSE and thereby to Threat Response.
6.4 and higher versions of Firepower Threat Defense have SSE connectivity capabilities built in, but CSSP may still be used with those devices as an alternative to giving them direct internet access.
Using Threat Response with Firepower
15. How is my firewall data displayed on the Threat Response relations graph?
Firewall intrusion events are a sighting and will result in two IP nodes and the relation between them being displayed in the graph. These sightings and the relevant metadata will be displayed in the Observable Details panel under the Sightings tab as well.
16. What are the criteria used to promote Intrusion Events to Incident Manager (in Threat Response)?
There are currently three ways an event can be promoted to an Incident, all implemented in the Eventing Service of SSE. All promoted Incidents are then provided to the user's Private Intel Store in Threat Response, and displayed in the Incident Manager.
Cisco-controlled automatic promotion
The Eventing Service will promote any event that involves an IP address with a sufficiently low (malicious) Talos reputation score. The promotion reason for the Incident is denoted in the Incident Manager as "ipReputation".
Other filters and thresholds are currently being developed.
User-controlled automatic promotion
Users can set lists of IP addresses and CIDR ranges for either automatic promotion, or automatic filtration. Alerts involving those IP addresses with either be promoted or discarded accordingly. At Threat Response, the promotion reason in the Incident is denoted as organizationFilter. This configuration is performed at the Eventing Service options at the Security Services Exchange. Navigate to Cloud Services > Eventing Service > Settings icon.
Other user-configurable filters and thresholds are currently being developed.
Users can manually promote one or more alerts from the SSE Event viewer to Incidents. The promotion reason in the Incident is denoted as userSelection.
17. Can I create rules on what events to send / not to send to Incident Manager?
Yes, SSE offers the ability to create user-authored lists of IP addresses and ranges to be used in event promotion and filtration. Other user-configurable filters and thresholds are currently being developed.
18. Are there limits to how many IP addresses and/or ranges I can filter?
The current supported limit for supported list items (either addresses or ranges) is 100.
19. Why am I not getting any events on Incident Manager?
A lack of Incidents in the Incident Manager can be caused by one of three things:
A lack of events uploaded to SSE
A lack of events in SSE that meet the promotion criteria
A configuration error
See the question “How can I know whether I have successfully configured my Firepower Device with Threat Response?” to determine which of these is the cause.
... View more
How can I fix a local storage access error in the plugin for Chrome?
This is caused by enablement of Chrome’s “block third party cookies” setting. To fix this error without disabling that feature, add an “allow” exception for the plugin.
Step 1: Get the ID of your Threat Response plugin.
1.1 Right click the plugin button and in the resulting drop down select Manage Extensions
1.2 The resulting page will have a URL like chrome://extensions/?id=ID_STRING
1.3 Copy that ID_STRING into your clipboard
Step 2: Create the allow rule
2.1 Go to Chrome’s cookie management page in settings (chrome://settings/content/cookies) 2.2 In the allow section, click “add”
2.3 In the Site field, enter chrome-extension://ID_STRING/ replacing the ID_STRING with the string from step 1.3
Step 3: Verify
3.1 The Allow section of the cookie settings page should now have an entry for Cisco Threat Response Casebook.
... View more