Cisco IQ Getting Started Guide

 
Updated April 27, 2026
PDF
Is this helpful? Feedback

Introduction

Cisco IQ™ provides customers with enhancements and features designed to improve asset visibility, deliver smarter insights across their environments, and streamline case management. In addition, AI features such as the Cisco IQ AI Assistant optimize operational outcomes and the Cisco IQ user experience by providing contextual understanding that empowers users to make proactive, informed decisions and streamlines processes for customer engagement and success.

This document provides information about getting started with Cisco IQ and its applications. For more information, see the Cisco IQ Release Notes or Cisco IQ Frequently Asked Questions documents.

Onboarding

Prerequisites

Ensure that the following prerequisites are met before using Cisco IQ.

Supported Browsers

Cisco IQ is supported on the latest stable releases of the following browsers:

  • Google Chrome

  • Microsoft Edge

  • Apple Safari

  • Mozilla Firefox

Note: Support is limited to current browser versions and older versions may not provide full functionality or may be unsupported as new updates are released.

Cisco Account

To access Cisco IQ, you must have a Cisco.com account. See Login and Account Help for more information about Cisco accounts.

Account Creation

Creating a New Cisco IQ Account

To create a new Cisco IQ account:

  1. Navigate to Cisco IQ. The Cisco Log in page displays.

    Cisco IQ Log inCisco IQ Log in
  2. Click Create an account.

  3. Enter your Cisco Connection Online (CCO) ID credentials into the Email field. 
  4. Click Next.
  5. Enter your Password
  6. Click Verify. The Create a Cisco IQ Account page displays.

    Create a Cisco IQ AccountCreate a Cisco IQ Account
  7. Enter the unique name you want to use for your organization’s Cisco IQ account in the Enter a company account name field.

  8. Select the primary data storage region.

  9. Click Create account. You are redirected to the Cisco IQ Launchpad.

Migrating CX Cloud Accounts to Cisco IQ

Note: Only Account Administrators can migrate existing CX Cloud accounts to Cisco IQ.

If you have an existing CX Cloud account, you can migrate existing CX Cloud data to Cisco IQ. The following data is automatically migrated from the existing CX Cloud account:

  • Users and user groups (excludes partner users and groups)

  • Contracts

  • Cloud data source addition for Intersight, Webex, Software-Defined Wide Area Network (SD-WAN), and Meraki

Note: To ensure a smooth transition and to gain more accurate insights from Cisco IQ’s personalized, predictive, and proactive AI-powered intelligence, consider validating and organizing your CX Cloud account data prior to migration.

Warning: If you create a new Cisco IQ account without migrating CX Cloud data, you cannot migrate CX Cloud account data at a later time.

Note: Only one CX Cloud account can be migrated at a time. If you need to migrate additional accounts, repeat the steps outlined in this section.

To migrate an existing CX Cloud account:

  1. Navigate to Cisco IQ. The Cisco Log in page displays.

  2. Click Create an account.

  3. Enter your Cisco Connection Online (CCO) ID credentials into the Email field.
  4. Click Next.
  5. Enter your Password.
  6. Click Verify. The Create a Cisco IQ Account page displays.

    Select CX Cloud AccountSelect CX Cloud Account
  7. Select the CX Cloud account you want to migrate data from.

  8. Enter the unique name you want to use for your organization’s Cisco IQ account.

    Note: The data storage region from the original account is auto-populated and migrated to the Cisco IQ company account. To change the data storage region, you must create a new Cisco IQ company account.

  9. Click Create account and migrate data. The Migration Status page displays.

    The Migration Status page displays the completion status of the data being migrated to Cisco IQ. The following statuses are available:

    Migration StatusMigration Status
    • In progress: Data is in the process of being migrated

    • Completed: Migration is complete

    • Unable to Migrate: Data migration is incomplete and Cisco IQ is unable to migrate the data

    If data is unable to migrate, you must manually migrate the data to the new Cisco IQ company account. See System Settings for more information about adding additional data to Cisco IQ.

  10. Once the migration process is complete, click Continue. You are redirected to the Cisco IQ Launchpad.

Logging In to Existing Accounts

Note: Customers with an existing Cisco IQ account who have not been added to a company account must contact the company’s Account Administrator to request access to the account.

To log in to an existing account:

  1. Navigate to Cisco IQ. The Cisco Log in page displays.

  2. Click Log in with SSO.

  3. Enter your CCO ID credentials into the Email field.

  4. Click Next.

  5. Enter your Password.

  6. Click Verify.

If you have one account, you are redirected to the Cisco IQ Launchpad.

If you have more than one account, you are redirected to the Welcome to Cisco IQ page.

Select Account NameSelect Account Name

Getting Started

Note: Before getting started, ensure you have fully onboarded to Cisco IQ. See Onboarding for more information.

Support Tiers

Cisco IQ Support Tier levels define the access and capabilities available to you within Cisco IQ and are designed to enhance your support and professional services experience. These levels are tied to your valid Cisco support contract and determine which features and tools you can utilize, from AI-driven insights and troubleshooting to asset and contract management. Understanding your level ensures you can fully leverage Cisco IQ’s capabilities while maintaining compliance with your contractual rights. The following table outlines the Cisco IQ features available for each level.

Note: Capabilities are cumulative across support tier levels; higher levels include all capabilities from lower levels.

Basic Level 

Standard Level 

Signature Level 

Know what you have

Prioritize for operation resilience

Accelerate operational excellence

Complete landscape clarity

Track every Cisco asset and subcomponent with dynamic high-confidence using the following features.

  • Asset Inventory

  • End-of-Life (EOL) Reports

  • Service Coverage Reports

  • Last Date of Support (LDOS) Dashboard

Use the following features to analyze your network’s performance to determine where to allocate resources, helping you make informed decisions about infrastructure investments.

  • EOL Insights1

  • Service Coverage Insights1

  • LDOS Insights1

  • Asset Criticality Insights1

  • Asset Tagging

Proactive Resilience

Gain visibility into important notifications that help you identify and address potential risks within your environment using the following features.

  • Security Advisories Reports

  • Field Notices Reports

Cisco IQ turns data into insights by correlating asset risks, allowing you to identify and prioritize the most critical security risks.

  • Security Advisory Insights1

  • Security Hardening Insights1

  • Field Notice Insights1

  • Configuration Insights1

The following features provide actionable recommendations to help improve security posture and optimize configurations within your environment.

  • Configuration Recommendations1

  • Security Hardening Recommendations1

Rapid resolution

Manage your support cases and track resolution status in one location to resolve issues faster using the following features.

  • Case Management
  • Self-serve Troubleshooting1

Use the following feature to track case trends and efficiency metrics to show continuous operational improvement. Cisco IQ provides a context-aware resolution assistant to help you resolve active issues and investigate underlying root causes.

  • Case Insights1

1 Supports device and telemetry connection via Cisco IQ Link, Intersight, Meraki, SD-WAN Manager, and WebEx Control Hub.

Basic Capabilities

The Basic support tier provides foundational control through reliable and reactive support, including access to technical product support experts, self-serve troubleshooting, and centralized case management. To ensure full visibility, Cisco IQ unifies asset telemetry, contract information, and support history, providing a comprehensive view of your asset lifecycles, security advisories, and field notices. Additionally, you can strengthen your technical expertise by accessing foundational learning resources available through Cisco U.

The following table outlines the available capabilities for the Basic support tier.

Capability 

Description

Asset Inventory

Asset Inventory provides an up-to-date list and rich visualizations for Hardware products, model and serial numbers, OS version, installed-at location, and service coverage details. It also provides a way to filter by ‘Last Signal’, which is when Cisco knew the asset was active based on Technical Assistance Center (TAC) Cases, contract renewal, telemetry, and so on.

EOL Report

EOL reports provide an up-to-date list and rich visualizations for Hardware and Software approaching, at, or having passed EOL milestones from End of Sales to LDOS, enabling lifecycle and technology refresh planning. 

Service Coverage Report

Service coverage reports provide an up-to-date list and rich visualizations for covered and uncovered assets.

LDOS Dashboard

The LDOS Dashboard provides a centralized view of LDOS milestones, allowing for improved asset planning and budget forecasting before hardware or software reaches end-of-life, enabling operational risk reduction.

Security Advisories

Security advisories provide an automated solution that detects exposures, prioritizes vulnerabilities based on risk severity and criticality, and delivers executive-level insights to accelerate mitigation of critical threats, thereby enhancing enterprise resilience against evolving threats.

Field Notices

Field Notices provide an automated solution that detects non-security related product issues, prioritizes issues based on impact severity and criticality, and delivers executive-level insights to accelerate resolution of critical operational concerns, thereby enhancing enterprise resilience and maintaining optimal performance.

Case Management

Case Management provides an up-to-date list of Cisco TAC cases including case counts, status, severity, and Return Material Authorizations (RMAs) associated with cases. It also provides the ability to open TAC cases (via cross-launch to Support Case Manager (SCM)) and rapidly update case information to facilitate resolution. 

Self-serve Troubleshooting1

Self-serve Troubleshooting provides a way to resolve issues instantly with the Cisco IQ AI Assistant. This interactive tool provides real-time, context-aware troubleshooting and expert recommendations directly from Cisco’s verified knowledge base, allowing you to solve problems without the need to open a support case.

1 Supports device and telemetry connection via Cisco IQ Link, Intersight, Meraki, SD-WAN Manager, and WebEx Control Hub.

Standard Capabilities

The Standard support tier enhances your operational efficiency by providing centralized triaging for solution-level issues and a dedicated case owner who coordinates with the necessary technical experts. You can proactively mitigate risks using AI-powered insights that correlate asset data with business criticality, offering clear visibility into your inventory, security, and configuration assessments. Additionally, you can align your team’s expertise with your specific business needs through personalized learning paths available in Cisco U.

The following table outlines available capabilities for the Standard support tier.

Capability 

Description

EOL Insights1

EOL Insights provide intelligent querying, summarization, visualization, and reporting of EOL milestones to enable personalized prioritization of lifecycle and technology refresh planning. 

Service Coverage Insights1

Service Coverage Insights provide a visualization and analysis of service coverage details and renewal milestones, enabling personalized prioritization of coverage updates and renewal planning. 

Asset Tagging

Asset Tagging provides a way to organize inventory according to business needs by using Asset Tags, enabling the flexible organization of hardware and software assets by department, location, or project as key-value pairs.

LDOS Insights1

LDOS Insights provide a visualization and analysis of assets beyond or approaching their LDOS milestones, enabling personalized prioritization of lifecycle and technology refresh planning. 

Asset Criticality Insights1

Asset Criticality Insights enable the evaluation and identification of asset roles and their relative importance in your network for prioritization of risk mitigation efforts and improved operational resilience.

Security Advisory Insights1

Security Advisory Insights provide intelligent querying, summarization, visualization, and reporting of assets affected by Security Advisories, enabling personalized prioritization of risk and security incident response. 

Security Hardening Insights1

Security Hardening Insights provide an automated solution that assesses device configurations, identifies security hardening gaps based on impact severity and criticality, and delivers executive-level insights to accelerate implementation of critical hardening measures. It enhances enterprise resilience and reduces the attack surface against evolving threats while enabling the personalized prioritization of an improved security posture through intelligent querying, summarization, visualization, and reporting of assets at risk. 

Field Notice Insights1

Field Notice Insights provide intelligent querying, summarization, visualization, and reporting of assets affected by Field Notices, enabling personalized prioritization of risk and response to known issues. 

Configuration Insights1

Configuration Insights provide an automated solution that assesses device configurations against Cisco-recommended best practices based on field-proven expertise. Intelligent querying, summarization, visualization, and reporting of affected assets enable personalized prioritization and accelerate remediation of critical configuration gaps, enhancing infrastructure resilience and reducing operational risk across the network.

Case Insights1

Case Insights provide intelligent querying, summarization, visualization, and reporting on Cisco TAC cases, enabling personalized monitoring of operational efficiency. 

1 Supports device and telemetry connection via Cisco IQ Link, Intersight, Meraki, SD-WAN Manager, and WebEx Control Hub.

Signature Capabilities

The Signature support tier builds upon the Standard support tier to elevate your operational performance through defined restoration Service Level Agreements and access to a dedicated team of experts familiar with your unique environment. This tier focuses on preventing disruptions before they impact your operations by providing proactive security hardening, systematic root-cause elimination, and continuous expert-driven analysis of your assets. Additionally, you can utilize advanced Cisco U. certification training and virtual practice labs to build deep, technical proficiency.

The following table outlines available capabilities for the Signature support tier.

Capability 

Description

Configuration Recommendation1

Configuration Recommendation provides actionable recommendations to address potential misconfigurations and inconsistencies.

Security Hardening Recommendations1

Security Hardening Recommendations provide an automated solution that delivers generic recommendations specific to each failed hardening check, addressing the underlying security issues clearly and concisely.

1 Supports device and telemetry connection via Cisco IQ Link, Intersight, Meraki, SD-WAN Manager, and WebEx Control Hub.

Get Started Journey for Administrators

When logging in to your newly created or migrated Cisco IQ account for the first time, the Welcome page displays a Get Started journey. The Get Started journey differs depending on whether the account was created with or without migrated data.

Note: The Get Started journey experience varies based on Role-Based Access Control (RBAC) permissions.

New Account via Creation

The Get Started journey for newly created accounts guides you through the initial onboarding steps required to configure your Cisco IQ environment and explore Cisco IQ.

Connecting Cisco Cloud Products

Note: You must connect at least one (1) cloud product for this step to be complete.

Connecting your Cisco cloud product data to Cisco IQ is the fastest way to start using its powerful, personalized features. You can receive tailored insights in minutes after setting up your data connections.

To connect your Cisco cloud products, see Data Connectors.

Linking Service Contracts

Note: You must link at least one (1) service contract for this step to be complete.

Linking contracts unites data from contracts associated with different team members and incorporates assets not connected to your inventory via telemetry, enabling centralized support coverage visibility and preventing renewal surprises.

To link your service contracts, see Service Contracts.

Connecting On-prem Devices

Note: You must register at least one (1) Cisco IQ Link for this step to be complete.

To establish communication with your on-premises devices, you must configure Cisco IQ Link. Cisco IQ Link brings all the power of Cisco IQ to your on-premises devices not already managed by a Cisco cloud platform. Cisco IQ Link can be installed as a Virtual Machine (VM) in your data center and linked to your Cisco IQ account.

To connect your on-prem devices, see Data Connectors.

Managing User Access

Note: You must add at least two (2) users for this step to be complete.

Cisco IQ’s simple access control features are designed for both small teams and large organizations. You can add users and assign administrator or view-only roles to groups and individuals.

To add users and assign permissions, see Users.

Exploring Cisco IQ

Explore Cisco IQ’s features and applications that are available to you, including:

  • Launchpad: Access applications, discover new features, and create dashboards

  • Assets Application: See Assets Application for more details

  • Assessments Application: See Assessments Application for more details

  • Support Application: See Support Application for more details

  • Cisco IQ AI Assistant: See AI Assistant for more details

  • System Settings: Manage your account settings, grant users access, configure data connections, and view activity and logs for your account; see System Settings for more details

New Account via Migration

If your new Cisco IQ account was created via migration, information from your previous account is already available. As a result, the Get Started journey for newly migrated accounts is limited to reviewing the migration, detailed below.

Reviewing Migration

To review the migration:

  • Verify your contracts migrated successfully in HomeSystem Settings > Service Contracts

  • Validate all required data connections are properly configured in HomeSystem Settings > Data Connectors

  • Verify user data migrated successfully and grant access to migrated users by activating their accounts in HomeSystem Settings > Identity & Access > Users

  • Verify your assets migrated successfully in Home > Assets > Inventory

Get Started Journey for General Users

When logging in to your Cisco IQ account for the first time, the Welcome page displays a Get Started journey. This journey guides you through Cisco IQ features and common workflows.

Note: The Get Started journey experience varies based on RBAC permissions.

Exploring Cisco IQ

Explore Cisco IQ’s features and applications that are available to you, including:

Generating Your First AI Report

Cisco IQ’s AI-powered Analyze feature generates customizable, targeted reports based on selected assets which can be tailored to your specific business needs.

See Assets Application for more information on generating your first AI report.

Asking the Cisco IQ AI Assistant a Question

The final step of your Get Started journey is to launch the Cisco IQ AI Assistant from anywhere and ask a question about your assets, cases, or assessments.

See AI Assistant for more information on using the Cisco IQ AI Assistant.

Dashboards

The Dashboards tab provides a view of the following available dashboards in Cisco IQ.

LDOS Dashboard

The LDOS dashboard provides comprehensive, detailed insights into LDOS metrics, enabling customer visibility, empowering users to proactively manage risks, and supporting more efficient and informed decision-making.

LDOS DashboardLDOS Dashboard

Filtering Views for LDOS Dashboard

You can filter the dashboard view by choosing a filter from the drop-down lists or click Filters and choose from the list of available filter options.

Note: Some filters may be hidden depending on screen zoom settings.

Note: Different filters are available depending on the user’s roles and permissions.

Viewing Details for LDOS Dashboard

When clicking Open in Assets, the page redirects to the Inventory page. See Inventory for more details.

Cisco Support Tiers

The Cisco Support Tiers page provides an overview of what features are available for the purchased support tier and the number of Assets related to linked support contracts, enabling you to easily understand included support capabilities and take action to manage and review them. See Support Tiers for more detailed information about support tier features.

Cisco Support TiersCisco Support Tiers

Your Reports

The Reports feature allows you to centralize and manage AI-generated insights from across Cisco IQ by saving them to a personalized Your Reports list, ensuring you have quick, secure access to your own data.

Your ReportsYour Reports

System Settings

To navigate to the System Settings menu, choose Home > System Settings. The Account Details page displays.

Note: System Settings are only available to Account Administrators.

Account Details

The System Settings feature facilitates easy management, access control, and data allocation, ensuring comprehensive visibility and access for Account Administrators. When viewing the Account Details page, the Details section displays the following information:

  • Account name

  • Account type

  • Data storage region

  • Users

  • Create date

  • Account admins

  • Account ID

  • Last login date

Editing the Account Name

Only the Account name can be changed from the Account Details page.

Note: To change fields, such as Data storage region, a new company account must be created.

To edit an account name:

Account DetailsAccount Details
  1. Click Edit.

    Edit Account NameEdit Account Name
  2. Revise the Account Name.

  3. Click Save.

Users

User accounts are created, modified, and deleted on the Users page. To navigate to the Users page, choose System Settings > Identity & Access > Users. The Users page displays.

UsersUsers

You can Search and Filter to narrow the list by using the fields at the top of the page.

Adding New Users

To add a new user:

Note: Only Account Administrators or other authorized users can add new users.

  1. From the Users page, click Add User. The Add User page displays.

    Add UserAdd User
  2. Enter an Email address.

  3. Optionally, choose the user group(s) from the Select user groups drop-down list.

  4. Choose the Role from the drop-down list.

    Note: Users must belong to at least one user group with a role or be assigned at least one role.

  5. Optionally, choose the Resource groups from the drop-down list.

    Note: The Resource groups drop-down list only displays for select roles.

  6. Confirm that the Send invitation email check box is checked.

  7. Click Save. A confirmation displays on the Users page.

    Users receive an email after being invited by an Account Administrator.

    Email InvitationEmail Invitation

    Invited users can click Log In from the email to log in to their account. After logging in, the user’s status becomes Active.

Editing User Access

To edit the user groups, role, or resource groups of a user account:

Edit AccessEdit Access
  1. From a desired user on the Users page, choose the More Options icon > Edit access. The Edit User Details page displays.

    Edit User DetailsEdit User Details
  2. Edit the desired user groups, role, and resource groups.

    Note: Resource groups only display for select roles.

  3. Click Save.

Sending Invitation Emails

To send an invitation email to an existing user account:

  1. Navigate to the Users page.

  2. From a desired user, choose the More Options icon > Send invitation email. A confirmation displays.

Deactivating Users

To deactivate a user account:

  1. From a desired user on the Users page, choose the More Options icon > Deactivate user. The Deactivate user window opens.

    Deactivate User ConfirmationDeactivate User Confirmation
  2. Click Deactivate user to confirm. A confirmation displays.

Deleting Users

Warning: Deleting users cannot be reversed.

To delete a user:

  1. From a desired user on the Users page, choose the More Options icon > Delete. The Delete user window opens.

    Delete User ConfirmationDelete User Confirmation
  2. Click Delete user. The user is deleted.

Resource Groups

Resource groups are dynamic collections that specify resources based on their type and attributes. Configuring resource groups enables you to restrict data access of a role to the resources that meet the conditions of the group. Resources can belong to multiple resource groups. As an Account Administrator, you can create, edit, and delete resource groups.

To view resource groups:

  1. Choose System Settings > Identity & Access > Resource Groups. The Resource Groups page displays.

    Resource GroupsResource Groups
  2. Use the Search and Filter fields to narrow the list.

  3. Click a resource group name to display its details.

    Resource Group DetailsResource Group Details

Creating Resource Groups

To create a new resource group:

  1. From the Resource Groups page, click Create resource group. The Create Resource Group page displays.

    Create Resource GroupCreate Resource Group
  2. Enter a Name for the resource group

  3. Optionally, enter a Description.

  4. Click Manage assets. The Manage assets window opens.

    Manage AssetsManage Assets
  5. Check the check box of the desired assets.

  6. Click Apply.

  7. Click Save.

Editing Resource Groups

To edit a resource group:

EditEdit
  1. From a record on the Resource Groups page, choose the More Options icon > Edit. The Edit Resource Group page displays.

    Edit Resource GroupEdit Resource Group
  2. Edit the resource group attributes, as desired.

  3. Click Save.

Deleting Resource Groups

Warning: Deleting resource groups cannot be reversed.

To delete a resource group:

  1. From a record on the Resource Groups page, choose the More Options icon > Delete. The Delete resource group window opens.

    Delete Resource GroupDelete Resource Group
  2. Click Delete resource group. The resource group is deleted.

User Groups

User groups enable you to control users effectively across the account by creating, editing, and deleting user groups.

Note: The All account users user group exists by default on all accounts in Cisco IQ and cannot be deleted or edited. It always includes all account users of any specific type. Its purpose is to apply roles to all users on the account.

To view user groups:

  1. Choose System Settings > Identity & Access > User Groups. The User Groups page displays.

    User GroupsUser Groups
  2. Use the Search and Filter fields to narrow the list.

  3. Click a user group name to display its details.

    User Group DetailsUser Group Details

Creating User Groups

To create a new user group:

  1. Click Create User Group. The Create user group page displays.

    Create User GroupCreate User Group
  2. Enter a Name for the user group.

  3. Optionally, enter a Description.

  4. Click Manage users. The Manage users window opens.

    Manage UsersManage Users
  5. Check the check boxes of the desired users.

  6. Click Apply.

  7. Choose a Role from the drop-down list.

  8. Optionally, choose a Resource group from the drop-down list.

    Note: Adding resource groups limits the resources the user group has access to. If a role is assigned but no resource groups are selected, the role is applied to all resources relevant to the role in the account.

  9. Click Save. The new user group displays in the User Groups table.

Editing User Groups

To edit a user group:

EditEdit
  1. From a record on the User Groups page, choose the More Options icon > Edit. The Edit user group page displays.

    Edit User GroupEdit User Group
  2. Edit the user group attributes as desired.

  3. Click Save.

Deleting User Groups

Warning: Deleting user groups cannot be reversed.

To delete a user group:

  1. From a record on the User Groups page, choose the More Options icon > Delete. The Delete user group window opens.

    Delete User GroupDelete User Group
  2. Click Delete user groups. The user group is deleted.

Tags

Asset tags are custom labels you assign to inventory assets in Cisco IQ. A tag is a key:value pair—for example, Environment:Prod or Label:Campus—that you define. Account Administrators can create and delete tags and can assign users to a resource group, enabling them to assign asset tags to a device. See Resource Groups for more information about assigning users to a resource group.

Creating Asset Tags

To create a tag:

  1. Choose Home > System Settings > Tags. The Tags page displays.
    TagsTags
  2. Click Create tag. The Create tag page displays.

    Create TagCreate Tag
  3. Enter the tag value in the Enter key:value field.

    Note: Tag names are in key:value format (for example, City:NYC).

  4. Click Create. The new tag displays in the tag list on the Tags page.

Deleting Asset Tags

To delete a tag:

  1. Choose Home > System Settings > Tags. The Tags page displays.

    TagsTags
  2. Check the check box(es) of the tag(s) to delete.

  3. Click Delete tags. A confirmation displays.

    Delete TagDelete Tag
  4. Click Delete to confirm.

Data Connectors

Cisco IQ uses data connectors as part of a multi-layered data ingestion approach to provide comprehensive network insights. Data Connectors gather telemetry from assets on your network, enabling Cisco IQ to deliver relevant insights and trusted expertise.

Adding Cloud Connectors

Connecting your Cisco cloud product data to Cisco IQ is the fastest way to start using its powerful, personalized features. You can receive tailored insights in minutes after setting up your data connections to the following product controllers: Intersight®, Meraki Dashboard, SD-WAN Manager, Webex® Control Hub.

To connect your Cisco cloud products:

  1. Choose System Settings > Data Connectors. The Data Connectors page displays.

    Cloud ConnectorsCloud Connectors
  2. Click Connect for the desired cloud connector.

  3. Complete the following steps for the selected cloud connector:

    • Intersight

      Connect IntersightConnect Intersight
      1. Check the check box(es) of the desired account(s).

      2. Click Connect accounts. You are redirected to the Data Connectors page and a confirmation displays.

    • Webex

      Connect WebexConnect Webex
      1. Click Open case from the Add Webex Organization window. You are redirected to SCM.

      2. Create a support case in SCM.

    • Catalyst SD-WAN Manager 

      Connect Catalyst SD-WAN ManagerConnect Catalyst SD-WAN Manager
      1. Check the check box(es) of the desired organization(s).

      2. Click Connect organizations. You are redirected to the Data Connectors page and a confirmation displays.

    • Meraki

      Connect MerakiConnect Meraki
      1. Follow the on-screen instructions.

      2. Enter the API Key.

      3. Click Connect. You are redirected to the Data Connectors page and a confirmation displays.

Adding Cisco IQ Link Instances

Cisco IQ Link is an on-premises component of Cisco IQ designed to provide you with richer and more intelligent insights, such as hardware and software lifecycle and inventory reports. It consolidates previous collectors into a single connector that you install on a Virtual Machine (VM) to gather detailed telemetry data from your devices.

Cisco IQ Link is deployed within your on-premises network to perform automated device discovery and telemetry collection. Cisco IQ Link supports the direct connection and integration with Catalyst Center. In addition, if your account was created via migration, you can leverage your CX Agent or CSPC to connect telemetry.

Note: For cloud-managed controllers, Cisco IQ Link is not required, as the necessary data can be accessed directly via Cisco Cloud.

To add Cisco IQ Link instances to Cisco IQ:

  1. Navigate to the Data Connectors page.

    Add Cisco IQ LinkAdd Cisco IQ Link
  2. Click Add Cisco IQ Link.
    Download the OVA or VHDDownload the OVA or VHD

  3. Download the Open Virtual Appliance (OVA) or Virtual Hard Disk (VHD):

    1. Choose the Hypervisor from the drop-down list.

    2. Choose the Version from the drop-down list.

    3. Click Download.

  4. Click Review the full documentation to access the Cisco IQ Link Getting Started Guide. This document provides comprehensive, step-by-step instructions to install Cisco IQ Link using the file downloaded in the previous step. It covers the complete deployment workflow, including all necessary transitions between the Cisco IQ and Cisco IQ Link interface to finalize pairing and configuration.

Editing Cisco IQ Link Instance Names

To edit a Cisco IQ Link instance name:

  1. Navigate to the desired Cisco IQ Link instance on the Data Connectors page.

    Edit NameEdit Name
  2. Choose the More Options icon > Edit name.

  3. Edit the name as desired.

  4. Click Update.

Removing Connected Accounts from Cloud Connectors

To remove a connected account from your cloud connectors:

  1. Navigate to the desired cloud connector on the Data Connectors page.

    Cloud Connectors SettingsCloud Connectors Settings
  2. Click the Settings icon. The Connected accounts window opens.

    Remove Cloud Connector Connected AccountRemove Cloud Connector Connected Account
  3. From the desired account, choose the More Options icon > Remove. A confirmation displays.

  4. Click Remove to confirm.

Removing Cisco IQ Link Instances

To remove a Cisco IQ Link instance from your data connectors:

  1. Navigate to the desired Cisco IQ Link instance on the Data Connectors page.

    Remove Cisco IQ LinkRemove Cisco IQ Link
  2. Choose the More Options icon > Remove Cisco IQ Link. A confirmation displays.

  3. Click Open case to open a support case to remove Cisco IQ Link.

Removing Legacy Collectors

Note: Legacy collectors only display in accounts that were migrated from CX Cloud.

To remove a connected legacy connector:

  1. Navigate to the desired legacy collector on the Data Connectors page.

    Unlink Legacy CollectorUnlink Legacy Collector
  2. Choose the More Options icon > Remove. A confirmation displays.

  3. Click Open case to open a support case to remove the legacy collector.

Service Contracts

Linking contracts unites data from contracts associated with different team members and incorporates devices not connected to your inventory via telemetry, centralizing support coverage visibility and preventing renewal surprises. Linking contracts requires the contract number used to open support cases.

Note: For contract number support, contact your Partner or Cisco sales representative.

Key benefits of Service Contracts include:

  • Creation of a centralized view of your organization’s support coverage

  • Customizable dashboards that allow you to stay ahead of your renewals months in advance

  • Expansion of inventory visibility to include assets not connected to telemetry or part of air-gapped environments

Linking Contracts

To link a contract from the Service Contracts page:Add ContractAdd Contract

  1. Click Add contract. The Add Contract page displays.

    Note: Additional contracts can be added after an initial contract is added to the account.

    Enter Contract NumberEnter Contract Number
  2. Enter the Contract number.

  3. Click Add contract. The contract is added to the account.

Software Catalog

The Software Catalog displays software instances available to you. It empowers you to monitor and manage updates seamlessly, ensuring efficient tracking and management of your system instances.

To access the Software Catalog, navigate to HomeSystem Settings > Software Catalog. The Software Catalog page displays. On this page, available software instances display as Link collector availability cards. Each Link collector availability card displays a software instance’s name, description, publisher, and version.

Viewing Details for Software Instances

To view release notes for a software instance, click Details. A window opens with the instance’s most recent release notes. To view previous release notes, choose a release version from the drop-down list.

Installing Packages for New Software Instances

To download an installer to create a new instance:

  1. From a desired Link collector availability card, choose Download options > Install packages. The install package window opens.

  2. Select one of the following Hypervisor options from the drop-down list:

    • ESXi: for VMware ESXi

    • Hyper-V: for Microsoft Hyper-V

    • KVM: for Linux Kernel-based Virtual Machine (KVM)

  3. Select a Version from the drop-down list.

  4. Click Download to save the file locally.

    Note: Installation files are large (10-25 GB); ensure you have sufficient disk space before downloading.

  5. Deploy the file on your data center. See the Cisco IQ Link Getting Started Guide for more information.

Activity & Logs

The Activity & Logs service centralizes the tracking of all user actions and system events across Cisco IQ for compliance, troubleshooting, and monitoring. It captures immutable audit records for authentication events, authorization decisions, resource access, configuration changes, and administrative actions with detailed context including user identity, timestamps, source IP addresses, and affected resources. Activity & Logs enforces retention policies and enables flexible querying and filtering of audit events with support for time-range searches, user-based filters, and resource-specific activity tracking.

Activity & LogsActivity & Logs

Assets Application

The Assets application delivers comprehensive visibility and management capabilities for Cisco assets and serves as the foundation of Cisco IQ, providing a centralized listing of all devices within an organization. By collecting information from multiple sources, it acts as a single source of truth for device inventory. Maintaining a complete and accurate asset list is essential, as other applications within Cisco IQ—such as the Assessments application—rely on this data to assess the health and security of your devices.

Home MenuHome Menu

Core Concepts

The Assets Application is built on the following core concepts:

  • Asset: Any physical device, hardware, or software that is inventoried and managed as part of Cisco’s service delivery with detailed tracking of its identity, function, service coverage, and lifecycle
  • Last Date of Support (LDOS): End-of-life and end-of-support milestone tracking for Cisco products
  • Service Coverage: Active support contracts, warranties, and entitlement levels associated with a specific piece of hardware or software
  • Asset Tag: A user-defined label assigned to an asset for organization, filtering, and operational workflows
  • Device Signal: Refers to when Cisco last observed a device (by its serial number) based on device telemetry, support cases, and contract renewals; asset telemetry data is ingested and enriched through a multi-layer data pipeline

Accessing the Assets Application

To access asset management features in Cisco IQ, choose the Home menu > Assets. The Overview page displays.

Assets Overview

The Overview page displays a dashboard that enables you to quickly evaluate the health and status of devices.

Assets OverviewAssets Overview

The dashboard displays the following information:

  • Total Assets: The total number of assets within the Cisco IQ account

  • Covered assets: The total number and percentage of assets covered by service contracts

  • Uncovered assets: The total number and percentage of assets not covered by service contracts

  • Assets Covered by Service Contracts: A breakdown of the number of assets—hardware or software-that service contracts cover, categorized by entitlement level

  • Last Date of Support Snapshot: A breakdown of the number of assets past LDOS or reaching LDOS

  • Key Asset Metrics: Additional key metrics such as telemetry status, critical security advisories, and LDOS information

    • Assets with telemetry: Total number and percentage of assets with telemetry enabled

    • Assets without telemetry: Total number and percentage of assets without telemetry enabled

    • Assets with Critical or High Security Advisories: The percentage of total assets with telemetry enabled and have critical or high security advisories

    • Assets by Criticality: A breakdown of the priority assigned to a device relative to other devices in the network.

  • Asset Breakdown: A detailed display of asset information, such as product families, install-at locations, software versions, and asset roles

Filtering Views for Assets

You can filter the dashboard view by choosing a filter from the drop-down lists or clicking Filters and choosing an option from the list of available filters.

Note: Some filters may be hidden depending on screen zoom settings.

Note: Different filters are available depending on your roles and permissions.

Viewing Details for Assets

When clicking View Details, the page redirects to the Inventory page. See Inventory for more information.

Asset Criticality Insights

Cisco IQ includes Asset Criticality Insights, a new capability in the Assets app that predicts the functional role and business importance of network devices. By analyzing device configurations and enabled features, Asset Criticality Insights helps you identify which assets have the greatest impact on your network — so you can prioritize them for security remediation, software upgrades, EOL planning, and coverage decisions.

Note: Asset Criticality Insights are available exclusively for assets with Standard or Signature levels that have active telemetry connections. Please ensure your assets meet the configuration requirements to populate these insights within the dashboard.

Asset Criticality Insights are available in the Assets app in the following areas:

  • Assets Overview: Filter and view summary breakdowns by Asset Criticality Insights attributes

  • Assets Inventory: Display, search, filter, and sort devices by Role and Importance

  • Asset Details: View Role and Importance for individual devices, with informational tooltips explaining each value

Inventory

The Inventory page provides a list of all Cisco assets within the Cisco IQ account.

InventoryInventory

Searching and Filtering Views for Asset Inventory

You can filter the list view by choosing a filter from the drop-down lists or clicking Filters and choosing an option from the list of available filters. You can also search for assets by entering the asset name in the Search field.

Note: Some filters may be hidden depending on screen zoom settings.

Note: Different filters are available depending on your roles and permissions.

Inventory Analysis

The Insights panel on the Inventory page displays an AI-driven analysis that provides a summary of assets with a focus on support coverage, connectivity, and milestones. Click Full Analysis for visualizations like graphs, dashboards, and charts which provide additional insights. See Analyzing Data in Common Application Features for more details.

Exporting Inventory

Click Export to save a filtered inventory list in .xls or .csv format. See Exporting Information in Common Application Features for more details.

Viewing Asset Details

Click an asset to view asset details. An asset’s detail view displays with the following tabs:

  • Details: Displays asset details such as product, signal data, identity, location, warranty, and coverage information
Asset DetailsAsset Details
  • Product Alerts: Displays related product alerts such as Security Advisories and Field Notices

  • Hardware: Provides a detailed timeline view for hardware EOL (for example, End of Sale, Last Ship, and Last Date of Support dates)

  • Software: Provides a detailed timeline view for software EOL

Asset Tags

Asset tags are custom labels you assign to inventory assets in Cisco IQ. A tag is a key:value pair—for example, Environment:Prod or Label:Campus—that you define. You can assign tags to individual assets or many assets at once, and you can filter your inventory by tag to quickly find the assets you care about.

Note: After a tag is created by an Account Administrator, users can assign a tag to an asset. 

Creating and Deleting Asset Tags

See Tags in System Settings for more information about creating and deleting asset tags.

Note: Only Account Administrators can create and delete tags.

Assigning Tags

Assigning tags to selected assets in the Inventory view enables the organization and categorization of assets for enhanced filtering, reporting, and management.

To assign a tag to an asset:

  1. Navigate to Assets > Inventory.

    Tagging AssetsTagging Assets
  2. Select the check boxes of the desired assets.

  3. Click Manage Tags. The Manage Tags window opens.

    Assigning TagsAssigning Tags
  4. In the text field, input or select the tag name from the existing options and press Enter.

    Note: Tags are in key:value format (for example, City:NYC).

  5. Click Apply.

Removing Asset Tags

To remove a tag from one or more assets:

  1. Navigate to Assets > Inventory.

  2. Select the check box next to one or more assets.

  3. Click Manage tags. The Manage tags window opens.

    Removing TagsRemoving Tags
  4. Click the X on any tag to remove it from the selection.

  5. Click Apply.

Using Asset Tags as Filters

After creating a tag, you can use the tag as a filter.

To use a tag as a filter:

  1. Navigate to the Inventory page.

  2. Click Filters. The Filters window opens.

    Using Tag as FilterUsing Tag as Filter
  3. From the Tags drop-down list, check the check boxes of the desired tags. After selecting the tag, the view on the Inventory page updates to the filtered view.

Service Contracts

The Service Contracts page streamlines support contract oversight by providing summaries and detailed contract information, supporting effective renewal planning and coverage strategies.

Service ContractsService Contracts

Searching and Filtering Views for Service Contracts

You can filter the list view by choosing a filter from the drop-down lists. You can also search for service contracts by entering the contract number in the Search field.

Exporting Service Contracts

Click Export to save a filtered list of contracts in .xls or .csv format. See Exporting Information in Common Application Features for more details.

End of Life

The Hardware End of Life and Software End of Life pages provide detailed EOL information, equipping users with the support needed to proactively manage product refresh cycles and support coverage. Clicking an asset on the End of Life pages redirects you to the relevant asset in the Inventory page.

Software End of LifeSoftware End of Life

End of Life Analysis

The Insights panel on the End of Life page displays an AI-driven overview of assets with a defined Last Day of Support. Click Full Analysis for visualizations like graphs, dashboards, and charts which provide additional insights. See Analyzing Data in Common Application Features for more details.

Exporting End of Life

Click Export to save a filtered list of EOL assets in .xls or .csv format. See Exporting Information in Common Application Features for more details.

Assessments Application

The Assessments application provides an assessment framework that enables users to proactively investigate and mitigate risks related to security, stability, capacity, compliance, and aging, keeping networks secure, stable, and reliable.

Core Concepts

The Assessments application is built on the following core concepts:

  • Assessment: A systematic evaluation of infrastructure entities against predefined criteria to measure performance, compliance, security, or operational capability; Assessments are triggered on demand, on a schedule, or by an event

  • Assessment Execution: An instance or single run of an assessment; Each execution creates a new execution record that tracks the scope, trigger mechanism, timestamp, and resulting data produced by the evaluation

  • Finding: A validated, actionable observation identifying a gap, risk, issue, or noteworthy state. Findings represent the ground-level data during an evaluation

  • Insight: A higher-level analytical conclusion derived from patterns or trends across multiple findings. Insights interpret what findings mean in a broader business or operational context

  • Recommendation: A specific, actionable prescription linked to findings or insights; Recommendations provide clear guidance on the necessary steps to address identified issues or capitalize on opportunities

  • Report: A structured document that aggregates findings, insights, and recommendations for a target audience; Reports are the primary deliverable for communicating assessment outcomes to customers, executives, and technical teams

Accessing Assessments Application

AssessmentsAssessments

To access security and assessment features in Cisco IQ, choose the Home menu > Assessments. The Assessments Overview page displays.

Assessments Overview

The Assessments Overview page displays the following dashboard:

Assessments OverviewAssessments Overview

The dashboard displays the following information:

  • Security Advisory Assessments: Displays assessments of security advisories, categorized by Critical and High severity

  • Security Hardening Rules With Assets That Didn’t Pass: Displays assets failing security hardening rules, categorized by High, Medium, Low and Informational severity

  • Configuration Rules With Assets That Didn’t Pass: Displays assets failing configuration compliance rules, categorized by Critical, High, Medium, Low and Informational severity

  • Field Notice Assessments: Displays assessments of field notices, categorized by Critical, High, Medium and No severity

Note: Customers can only view the assets that they are entitled to access.

Findings by Asset

The Findings by Asset page provides you with list of assets that have been evaluated using at least one of the following assessments including Security Advisories, Security Hardening, Configuration, and Field Notices.

Findings by AssetFindings by Asset

Searching and Filtering Views for Findings by Asset

You can filter the list view by choosing a filter from the drop-down lists or clicking Filters and choosing an option from the list of available filters. You can also search for Findings by Asset in the Search field.

Note: Some filters may be hidden depending on screen zoom settings.

Note: Different filters are available depending on your roles and permissions.

Exporting Findings by Asset

To export a Finding by Asset list view, click Export. See Exporting Information for more information about exporting.

Viewing Findings by Asset Details

To view Findings by Asset details, click an Asset. The following tabs display details for the selected asset:

  • Summary: Provides detailed asset information including the number of Security Advisories, Security Hardening, Configuration, and Field Notices

  • Security Advisories: Provides a list of related Security Advisory assessments

  • Security Hardening: Provides a list of assets failing Security Hardening rules

  • Configuration: Provides a list of assets failing Configuration Best Practice rules

  • Field Notices: Provides a list of related Field Notice assessments

Findings by Asset DetailsFindings by Asset Details

When clicking View Details on a tile, the page redirects to the relevant page within the application.

When clicking View full asset details, asset detail view page displays.

Security Advisories

Security Advisory assessments identify vulnerabilities and prioritize them based on their risk, severity, and criticality, thereby enhancing the organization’s risk management capabilities. Security Advisories deliver granular insights into vulnerabilities, help accelerate mitigation of critical threats, and ensure alignment with compliance and business objectives. This strengthens security posture, optimizes resource allocation, and fosters resilience against evolving threats across the enterprise. Security Advisories are automatically updated in Cisco IQ as soon as they are released.

The Security Advisories page provides a list of all Security Advisories with vulnerabilities detected within the organization. Clicking an advisory from the Security Advisory assessments list navigates to the corresponding detail view.

Security AdvisoriesSecurity Advisories

Searching Filtering Views for Security Advisories

You can filter the list view by choosing a filter from the drop-down list. You can also search for Security Advisory assessments by entering the assessment name in the Search field.

Note: Some filters may be hidden depending on screen zoom settings.

Note: Different filters are available depending on your roles and permissions.

Note: Missing severity values display as “–” with a descriptive tooltip.

Exporting Security Advisories

To export Security Advisory assessments, click Export. See Exporting Information for more information about exporting.

Viewing Security Advisory Assessment Details

To view additional details about an assessment, click an Advisory. This details page provides information such as Common Vulnerability Scoring System (CVSS) Score, Common Vulnerabilities and Exposures (CVE), Severity, and a link to the referenced Cisco Security Advisory.

You can view the following types of results in the Assessment outcome table:

  • Affected: Indicates that the asset or component has a confirmed vulnerability that can be exploited by an attacker, requiring remediation

  • Potentially Affected: Indicates that the asset or component shows signs that may lead to vulnerability, but it is not definitively confirmed; further investigation may be needed

Security Advisories DetailsSecurity Advisories Details

Searching and Filtering Views for Asset Assessment Results

You can filter the list view by choosing a filter from the drop-down lists or clicking Filters and choosing an option from the list of available filters. You can also search for assets by entering the asset name in the Search field.

Note: Some filters may be hidden depending on screen zoom settings.

Note: Different filters are available depending on your roles and permissions.

Viewing Asset Assessment Results

To view details of an assessment result, click an asset from the Asset Assessment Results table. The Assessment Result details page displays.

Result DetailsResult Details

Exporting Asset Results for Security Advisories

To export asset results, click Export. See Exporting Information for more information about exporting.

Security Hardening

Security Hardening provides automated, near real-time visibility into the security posture of your network infrastructure by continuously evaluating routers, switches, and firewalls against industry-standard benchmarks. It identifies configuration gaps and provides actionable remediation guidance, enabling administrators to effectively reduce the attack surface and maintain consistent alignment with Cisco’s rigorous security best practices. By centralizing compliance monitoring and simplifying the hardening process, the application transforms security management from a reactive task into a proactive, data-driven strategy, ensuring a resilient and secure enterprise network.

Note: Security Hardening Assessments are available exclusively for assets with Standard or Signature support tiers.

Viewing Security Hardening Assessments

To view additional details about Security Hardening, click an Assessment. The Security Hardening Assessment page displays the following information: Security HardeningSecurity Hardening

  • About the Assessment: Provides additional details by summarizing the purpose of the assessment

  • Execution Summary: Provides a summary of asset assessment results, including the total number of Rule evaluations and Assets included

  • Rule evaluations: Provides detailed information about the rule, including Severity, Assets Evaluated, Did Not Pass, Passed, Inconclusive, Not Applicable, and Software type

    • Severity: Provides the level of importance or impact of the rule evaluation

    • Assets Evaluated: Provides the total number of assets that were assessed against the rule criteria

    • Did not Pass: Provides the assets that failed to meet the rule criteria during the assessment

    • Passed: Provides the assets that met the rule criteria during the assessment

    • Inconclusive: Provides the assets for which the assessment could not determine failure
    • Not Applicable: Indicates the assets or scenarios where the rule does not apply or is not relevant

    • Software type: Provides the software type of assets

Searching and Filtering Views for Rules

You can filter the list view by choosing a filter from the drop-down lists or clicking Filters and choosing an option from the list of available filters. You can also search for a rule by entering the rule name in the Search field.

Note: Some filters may be hidden depending on screen zoom settings.

Note: Different filters are available depending on your roles and permissions.

Viewing Rule Evaluation Details

To view additional details about a rule evaluation, click any rule. The rule’s evaluation details page displays with the following information:

Rule ViewRule View
  • About the Rule: Provides details about the rule such as Severity, Software type, Version, and Assets evaluated.

  • Results Summary: Provides a summary of asset results related to the rule such as Passed, Did not pass, Inconclusive, and Not applicable

  • Assets Results: Provides a list of assets with details such as Asset, Result, Product ID, Serial Number, IP Address, and Support Tier

Searching and Filtering Views for Asset Rules

You can filter the list view by choosing a filter from the drop-down lists or clicking Filters and choosing an option from the list of available filters. You can also search for asset assessment results by entering the asset name in the Search field.

Note: Some filters may be hidden depending on screen zoom settings.

Note: Different filters are available depending on your roles and permissions.

Exporting Asset Results

To export assessment results for rules, click Export. See Exporting Information for more information about exporting.

Searching and Filtering Views for Asset Results

You can filter the list view by choosing a filter from the drop-down lists or clicking Filters and choosing an option from the list of available filters. You can also search for asset results by entering the asset name in the Search field.

Note: Some filters may be hidden depending on screen zoom settings.

Note: Different filters are available depending on your roles and permissions.

Viewing Asset Results for Security Hardening

To view the details of an asset result, click an asset from Asset results. The asset result’s details page displays information according to your entitlement level or tier.

  • Standard Tier

    • Finding Details: Provides information about the configuration deviations identified during the assessment along with evidence logs

    • Recommendations: Provides guidance to address the findings and ensure configuration consistency

Security Hardening Signature TierSecurity Hardening Signature Tier
  • Signature Tier

    • Finding Details: Provides information about the configuration deviations identified during the assessment along with evidence logs

    • Recommendation: Provides device-level, actionable guidance with code snippet to ensure configuration consistency

Viewing Asset and Rule Information for Security Hardening

To view the details of an Asset and its rules, click the Asset and Rule Info tab. The Asset and Rule Info page displays.

Asset and Rule InfoAsset and Rule Info
  • About the Asset: Provides the details of the asset such as Product ID, Product type, IP address, Serial number, Software versionLocation, and Support Tier

  • About the Rule: Provides rule details (including Severity and Software type) and the importance of that particular hardening check

Configuration

Configuration assessments evaluate your assets against recommended best practices based on Cisco’s proven expertise to detect configuration deviations that may affect availability, security, or performance across your infrastructure. Each best practice rule is assessed across your covered assets, and findings prioritized by severity to ensure configuration consistency, enhanced resilience, and reduced operational risk.

Note: Configuration Assessments are available exclusively for assets with Standard or Signature support tiers. 

Viewing Configuration Assessment

To view additional details about configuration, click an Assessment. The Configuration Assessment page displays the following information:

Configuration AssessmentConfiguration Assessment
  • About the Assessment: Provides additional details by summarizing the purpose of the assessment

  • Summary: Provides a summary of configuration execution like Rules evaluated and Assets evaluated

  • Insights: Provides insights into identified configuration gaps generated through pattern analysis and a correlation of findings; they are displayed as intelligently grouped key cards to highlight the most critical areas that require attention

  • Rule Evaluations: Provides detailed information about the rule, including Severity, Assets Evaluated, Did Not Pass, Passed, Inconclusive, Not Applicable, Category, and Software type

    • Severity: Provides the level of importance or impact of the rule evaluation

    • Assets Evaluated: Provides the total number of assets that were assessed against the rule criteria

    • Did not Pass: Provides the total number of assets that failed to meet the rule criteria during the assessment

    • Inconclusive: Provides the total number of assets for which the assessment could not run

    • Passed: Provides the assets that met the rule criteria during the assessment

    • Not Applicable: Indicates the assets or scenarios where the rule does not apply or is not relevant

    • Category: Provide the domain area to which the rule belongs

    • Software Type: Indicate the type of software assets to which rule applies to

Searching and Filtering Views for Rules

Rule EvaluationsRule Evaluations

You can filter the list view by choosing a filter from the drop-down lists or clicking Filters and choosing an option from the list of available filters. You can also search for a rule by entering the rule name in the Search field.

Note: Some filters may be hidden depending on screen zoom settings.

Note: Different filters are available depending on your roles and permissions.

Viewing Rule Evaluation Details

To view additional details about a rule evaluation, click any rule. The rule’s evaluation details page displays with the following information:

EvaluationEvaluation
  • About the Rule: Provides details about a rule like Severity, Category, Software type, and Assets evaluated and includes links to relevant source documentation

  • Results Summary: Provides overall asset results by displaying the number of assets in Passed, Did not pass, Inconclusive, and Not applicable statuses

  • Asset Results: Provides a list of assets impacted by the selected rule with result status

Exporting Asset Results

To export asset results for rules, click Export. See Exporting Information for more information about exporting.

Searching and Filtering Views for Asset Results

You can filter the list view by choosing a filter from the drop-down lists or clicking Filters and choosing an option from the list of available filters. You can also search for asset results by entering the asset name in the Search field.

Note: Some filters may be hidden depending on screen zoom settings.

Note: Different filters are available depending on your roles and permissions.

Viewing Asset Results for Configuration Assessments

To view details of asset results, click an asset from the Asset results.

The asset result’s details page displays information according to your entitlement level or tier.

  • Standard Tier

    • Finding Details: Provides information about the configuration deviations identified during the assessment along with evidence logs

    • Recommendations: Provides guidance to address the findings and ensure configuration consistency

Configuration Signature TierConfiguration Signature Tier
  • Signature Tier

    • Finding Details: Provides information about the configuration deviations identified during the assessment along with evidence logs

    • Recommendation: Provides device-level, actionable guidance with code snippets to address the findings and ensure configuration consistency

Viewing Asset and Rule Information for Configuration Assessments

To view asset and rule information details, click the Asset and Rule Info tab.

Asset and Rule InfoAsset and Rule Info

The Asset and Rule Info page displays with the following information:

  • About the Asset: Provides the details of an asset, such as Product ID, Product type, IP address, Serial number, Software version, Location and Support tier
  • About the Rule: Provides details of a rule such as Severity, Category, and Software type

Viewing Insights

Insights are AI-generated and serve as an intelligent dashboard that synthesizes assessment data into prioritized key cards, highlighting critical configuration disparities across multiple findings. It enables you to address the most impactful infrastructure risks efficiently by focusing on these urgent areas. It also highlights strengths by identifying areas where your infrastructure is performing well as per best practices.

InsightsInsights

To view Insights details:

  1. From the Insights panel, click View all. The Insights page displays all insights.

    Insights PageInsights Page
  2. Click View details. The Insights detail page displays with the following information: You can also click any card to open the detail page.

    Insights DetailInsights Detail
    • Insight: Provide a summary that highlights recurring patterns of configuration deviations identified through comprehensive analysis across multiple findings, as well as areas of excellence in your infrastructure where configurations align with best practices

    • Recommendation: Provides actionable steps to remediate the identified configuration gaps

    • Affected Assets: Provides a list of specific devices where the configuration deviation has been identified as defined under the Insight section

  3. Click Source Findings. The Source findings page displays the detailed individual findings that support your insights.

    Source FindingsSource Findings

    You can filter the table view by choosing a filter from the Severity and Result drop-down lists.

    Note: Recommendations and Affected Assets are optional depending on the output of each insight.

Field Notices

Field Notices identify significant non-security-related product issues and organizes them based on their impact severity and criticality, enhancing the organization’s ability to manage product risks. Field Notices deliver actionable insights into product defects, accelerate mitigation through recommended upgrades or workarounds, and ensure alignment with operational and business objectives. This strengthens product reliability, optimizes resource allocation, and fosters resilience against evolving product challenges across the enterprise.

Field NoticesField Notices

Searching and Filtering Views for Field Notices

You can filter the list view by choosing a filter from the drop-down lists. You can also search for field notice assessments by entering the assessment name in the Search field.

Viewing Assessments for Field Notices

To view additional details about a field notice, click an Assessment. The following asset assessment details display:

  • About the Assessment: Provides additional details by summarizing the purpose of the assessment

  • Field Notice Assessments with Vulnerabilities Detected: Displays a list of assets impacted by the selected field notice, including assets with detected vulnerabilities

Viewing Assessments for Field NoticesViewing Assessments for Field Notices

Searching and Filtering Views for Asset Results for Field Notices

You can filter the list view by choosing a filter from the drop-down lists or clicking Filters and choosing an option from the list of available filters. You can also search for asset results by entering the asset name in the Search field.

Note: Some filters may be hidden depending on screen zoom settings.

Note: Different filters are available depending on your roles and permissions.

Exporting Assessment Asset Results for Field Notices

To export assessment asset results for field notices, click Export. See Exporting Information for more information about exporting.

Viewing Assessment Asset Results for Field Notices

To view an assessment asset result’s details, click an asset from Asset Assessment Results. The assessment asset result’s details page displays.

You can view the following types of results:

  • Affected: Indicates assets that meet all the criteria automatically checked for a Field Notice and require no additional manual verification to confirm they are impacted

  • Potentially Affected: Indicates assets that meet all the automatically checked criteria for a Field Notice but require additional manual verification to confirm if they are truly impacted

Support Application

The Support application offers a consolidated view of customer support cases. It enables you to filter, sort, and customize the case list view, providing visibility into both open and closed cases you are entitled to access.

To access the Support application in Cisco IQ, choose Home > Support. The Support Overview page displays.

Support Overview

Support OverviewSupport Overview

The Support Overview page is an interactive dashboard of graphs with the following information:

  • Open Cases by Severity: All open cases from the last 90 days categorized by S1 through S4 severity

  • Open Cases by Case Status: All open cases from the last 90 days categorized by their case status

  • RMAs by Status: All RMAs from the last 90 days categorized by their status

  • Closed Cases by Severity: The total number of closed cases from the last 90 days categorized by severity

Viewing Details for Cases

Clicking View details redirects the page to the account’s Cases page. Clicking a bar from a graph on the Overview page redirects the page to the account’s Cases page with relevant filters applied. For example, clicking the S1 severity bar from the Open Cases by Severity graph redirects to the account’s Cases page with Case status set to “Open” and Severity set to “S1”. See Cases for more information.

Cases

Account Cases

Navigate to the Cases page by clicking Cases from the left-hand panel.

CasesCases

The Cases page displays a consolidated list of all cases associated with the contracts in your Cisco IQ account. You can configure the columns displayed in the list by clicking the Settings icon, checking the check boxes of the desired columns, and clicking Apply. The Case number, Severity, Case state, Case status, Title, and Created columns always display and cannot be deselected.

Available Actions

The following actions can be performed from the Cases page:

  • Open a case: Click Open a case to cross launch SCM and create a case

  • Export Data: Click Export to download all data currently displayed in the dashboard as a CSV file

  • View Case Details: Click a case number or a table row to open a case’s detail view (see Case Detail Views for more information)

  • Close a Case: Choose an open case’s More Options icon > Close case to open the Close case window, where you can provide a reason for the closure and close the case

  • Reopen a Case: Choose a closed case’s More Options icon > Reopen case to open the Reopen case window, where you can provide a reason for the reopening and open the case

Note: Closed cases can be reopened within 14 days of closure.

Filtering Views for Cases

You can filter the list view by choosing a filter from the drop-down lists or checking the Customer contact is you check box. Optionally, click Filters and choose from the list of available filter options. Filters and selections persist across sessions and logins to personalize the dashboard. The default filters applied are:

  • Case state: Opened

  • Created: Created within 90 days

Note: Some filters may be hidden depending on screen zoom settings.

Your Cases

Navigate to the Your Cases page by clicking Your cases from the left-hand panel.

Your CasesYour Cases

The Your Cases page displays a consolidated list of cases you are entitled to view and manage. You can configure the columns displayed in the list by clicking the Settings icon, checking the check boxes of the desired columns, and clicking Apply. The Case number, Severity, Case state, Case status, Title, and Created columns always display and cannot be deselected.

Available Actions

The following actions can be performed from the Your Cases page:

  • Open a Case: Open a case: Click Open a case to cross launch SCM and create a case

  • Export Data: Click Export to download all data currently displayed in the dashboard as a CSV file

  • View Case Details: Click a case number or a table row to open a case’s detail view (see Case Detail Views for more information)

  • Close a Case: Choose an open case’s More Options icon > Close case to open the Close case window, where you can provide a reason for the closure and close the case

  • Reopen a Case: Choose a closed case’s More Options icon > Reopen case to open the Reopen case window, where you can provide a reason for the reopening and open the case

Note: Closed cases can be reopened within 14 days of closure.

Filtering Views for Your Cases

You can filter the list view by choosing a filter from the drop-down lists or checking the Customer contact is you check box. Optionally, click Filters and choose from the list of available filter options. Filters and selections persist across sessions and logins to personalize the dashboard. The default filters applied are:

  • Case state: Opened

  • Customer contact is you check box
  • Created: Created within 90 days

Note: Some filters may be hidden depending on screen zoom settings.

Case Detail Views

To view a case’s details, click a case from the list.

Case Detail ViewCase Detail View

The case detail view displays and provides a centralized view of a support case, allowing you to review case information, affected asset information, track TAC progress, and access available case actions. Available actions include reopening a closed case by clicking Reopen case, closing an open case by clicking Close case, and launching the AI Assistant with the case’s context by clicking Ask AI. The available tabs are described in the sections below.

Note: Fields that are AI-generated are labeled with a Star icon where applicable.

Star IconStar Icon
Summary

The Summary tab displays key case information, enabling you to quickly understand the current state, context, and progress of an individual support case. You can review case details and affected assets, monitor the lifecycle of your case through TAC progress details, modify contact information, and specify email addresses to receive case update notifications. Only select fields are editable.

Notes

NotesNotes

Clicking the Notes tab opens the Notes page. You can view all notes associated with a case whether a customer or Cisco Engineer submitted them.

To add a new note:

Warning: Notes cannot be deleted.

  1. Click Add note. The Add note window opens.

  2. Enter a Title.

  3. Enter the Details.

  4. Click Add.

Files

FilesFiles

Clicking the Files tab opens the Files page. You can view the name, size, and date of a case’s files as well as add or delete them. Filter files by selecting an option from the Category drop-down list. Optionally, click Filters and choose from the available filter options. You can also configure the columns displayed in the list by clicking the Settings icon, checking the check boxes of the desired columns, and clicking Apply.

To add a file, click Attach file. You are redirected to SCM where you can upload a file for the case.

To delete a file, check the checkbox(es) of the desired file(s) and click Delete. The Delete file(s) window opens. Click Delete file(s).

Note: File downloads are not supported.

Associated Bugs

Associated BugsAssociated Bugs

Clicking the Associated bugs tab opens the Associated bugs page. You can click a bug’s ID to cross launch detailed bug information in Cisco.com’s Bug Search Tool.

Associated RMAs

Associated RMAsAssociated RMAs

Clicking the Associated RMAs tab opens the Associated RMAs page. You can configure the columns displayed in the list by clicking the Settings icon, checking the check boxes of the desired columns, and clicking Apply. The following actions can be performed from the Associated RMAs page:

  • Close a Case: Click Close case to open the Close case window, where you can provide a reason for the closure and close the case

  • View RMA Details: Click an RMA number or table row to open a RMA’s detail view (see RMA Details Views for more information)

  • Contact Cisco Logistics: Choose a row’s More Options icon > Contact Cisco logistics to contact the Cisco Logistics Team

RMAs

Account RMAs

RMAs ListRMAs List

Navigate to the RMAs page by clicking RMAs from the left-hand panel. The RMAs page displays a consolidated list of all RMAs associated with the cases in your Cisco IQ account. You can configure the columns displayed in the list by clicking the Settings icon, checking the check boxes of the desired columns, and clicking Apply.

Available Actions

The following actions can be performed from the RMAs page:

  • Export Data: Click Export to download all data currently displayed as a CSV file

  • View RMA Details: Click an RMA number or table row to open a RMA’s detail view (see RMA Details Views for more information)

  • Contact Cisco Logistics: Choose a row’s More Options icon > Contact Cisco logistics to contact the Cisco Logistics Team

Filtering Views for Account RMAs

You can filter the list view by choosing filters from the drop-down lists.

Your RMAs

Navigate to the Your RMAs page by clicking Your RMAs from the left-hand panel.

Your RMAsYour RMAs

The Your RMAs page displays a consolidated list of RMAs you have the necessary entitlements to view and manage. You can configure the columns displayed in the list by clicking the Settings icon, checking the check boxes of the desired columns, and clicking Apply.

Available Actions

The following actions can be performed from the Your RMAs page:

  • Export Data: Click Export to download all data currently displayed as a CSV file

  • View RMA Details: Click an RMA number or table row to open a RMA’s detail view (see RMA Details Views for more information)

  • Contact Cisco Logistics: Choose a row’s More Options icon > Contact Cisco logistics to contact the Cisco Logistics Team

Filtering Views for Your RMAs

You can filter the list view by choosing an option from the Created drop-down list. 

RMA Details Views

RMA Detail ViewRMA Detail View

The RMA details view provides a centralized view of an RMA, allowing you to review RMA information, track progress, and access available RMA actions. Available actions include contacting the Cisco Logistics Team, accessing tracking numbers, and scheduling asset pickups.

Common Application Features

Analyzing Data

The Insights panel delivers AI-driven analysis of the data on that page, providing actionable insights to improve the security and health of your network environment.

Note: The Analysis feature is only available on select pages.

Insights PanelInsights Panel

The following options are available inside the Insights panel:

  • Click the Expand icon to expand the panel and display additional insights

  • Click the Thumbs Up or Thumbs Down icon to provide feedback on the AI-generated information

  • Click Full Analysis to display additional information, deeper analysis, and visualizations like graphs, dashboards, and charts

Full AnalysisFull Analysis

The following options are available within a full analysis:

  • Click Download PDF to save an offline copy of the analysis, for your records or for collaboration

Exporting Information

The export feature allows you to export custom views for Assets and Security information in .xls or .csv format.

Note: The export feature is only available for select pages.

To export information from a page:

  1. Navigate to the page.

    Exporting Inventory in the Assets ApplicationExporting Inventory in the Assets Application
  2. Click Export. The Export Options display.

    Export OptionsExport Options
  3. Select a File type.

  4. Check the check box(es) in the desired column(s).

  5. Click Export. The file downloads to the browser’s local download folder.

Table Settings

You can configure table settings to create custom and refined views for different application features.

Table SettingsTable Settings

To change the columns that display on selected pages, click the Table Settings icon. The Table settings display.

Table Setting OptionsTable Setting Options

Changing Table View

To change the table view:

  1. Select one of the following Table Density options:

    • Condensed: Minimizes visual elements and spacing to display more information

    • Compact: Reduces whitespace and tightens spacing between UI elements

    • Comfy: Utilizes more whitespace and larger spacing between elements

    • Spacious: Emphasizes abundant whitespace and larger UI elements

  2. Click Apply.

Adding and Removing Columns

To add or remove columns:

  1. Select or clear the Column Settings check box(es).

  2. Click Apply.

    Note: The Name column cannot be removed from the table view.

Changing Column Order

To change the column order:

  1. Drag-and-drop the column name to arrange the items in the desired order.

  2. Click Apply.

Customizing Dashboards

The Custom Dashboard feature enables you to personalize standard dashboards through a range of intuitive customization options:

  • Rearrange dashboard widgets or panels using the drag-and-drop functionality

  • Remove any components that are not relevant to your workflow

  • Your personalized dashboard layout is securely stored to your user profile and automatically applied across all sessions and devices

  • Restore the original dashboard layout with a simple reset option

To customize a dashboard:

  1. Navigate to the dashboard.

    CustomizeCustomize
  2. Click Customize.

    Edit DashboardEdit Dashboard
  3. Change the dashboard as desired:

    • Rearrange: Drag-and-drop the widgets into the desired layout

    • Remove: Click the Delete icon to remove a widget

    • Reset: Click Reset to default to reset the dashboard to its original layout

  4. Click Save. A Dashboard Saved message displays.

    Your dashboard layout is automatically applied across all sessions and devices.

Customizing Filters

You can save custom filter configurations for any dashboard view, enabling you to easily return to your preferred settings as needed. All filter preferences are securely stored on a per-user, per-account basis, ensuring a personalized and consistent experience each time you access Cisco IQ.

Creating a Filter

To create a custom filter:

  1. Navigate to the dashboard.

  2. Click Filters.

    FiltersFilters
  3. Choose the desired filters from the drop-down lists.

  4. Click Save Filter. The Name saved Filter window opens.

    Filter NameFilter Name
  5. Enter a Filter name.

  6. Click Save Filter to confirm.

Editing a Filter Name

To edit a custom filter:

  1. Click Filters.

    Manage Saved FiltersManage Saved Filters
  2. Click the Managed saved filters icon.

  3. Navigate to the filter.

    Edit FilterEdit Filter
  4. Click the Edit icon. The Name saved Filter window opens.

  5. Edit the filter name.

  6. Click Save Filter to confirm.

Deleting a Filter

To delete a custom filter:

  1. Click Filters.

  2. Click the Managed Saved Filters icon

  3. Navigate to the filter.

    Delete Saved FilterDelete Saved Filter
  4. Click the Delete icon. The Delete saved filter window opens.

  5. Click Yes, delete to confirm.

AI Assistant

Overview

The Cisco IQ AI Assistant is designed to improve the understanding and usage of Cisco IQ by transforming raw data into actionable insights, recommendations, and guided actions. It integrates into existing tools where it leverages individual data sources and synthesizes intelligence across multiple data streams to deliver real-time suggestions. By providing contextual understanding that empowers users to make proactive, informed decisions and streamlining processes for customer engagement and success, the Cisco IQ AI Assistant optimizes operational outcomes and enhances the Cisco IQ user experience.

Cisco IQ AI Assistant capabilities include:

  • Robust Edge Case Handling: Receive transparent explanations and clear re-direction, ensuring a seamless support experience and higher user satisfaction

  • Streaming Capability: View responses as they are generated

  • Enhanced Contextual Data: Dynamic context enables seamless interactions across applications, pages, and sessions

  • Case Management Support: Create, view, and manage cases displayed in the Cases list view

  • Asset Inventory Management: Track, manage, and generate reports for an organization’s assets or resources

  • Asset Criticality: Prioritize assets for risk mitigation activities based on their role and importance within the network

  • Risk Assessment and Management: Assess and manage potential risks associated with an organization’s assets

  • Security Hardening: Compare customer device-running configurations for supported devices to related Cisco and Cybersecurity and Infrastructure Security Agency (CISA) hardening guidelines

  • Configuration: Evaluate customer device-running configurations against recommended best practices, identify configuration deviations and provide actionable recommendations

Note: Cisco IQ AI Assistant can be launched from anywhere within Cisco IQ. It is available to all users, but the capabilities offered differ based on the support tier level (Basic, Standard, or Signature).

Accessing the Cisco IQ AI Assistant

To use the Cisco IQ AI Assistant:

AI Assistant IconAI Assistant Icon
Ask AIAsk AI
  1. Launch the Cisco IQ AI Assistant by clicking the AI Assistant icon or clicking Ask AI.

    Note: The Cisco IQ AI Assistant can be accessed from anywhere within Cisco IQ by clicking these two (2) options. It utilizes data and context from the specific page where users launch it, enabling it to provide highly relevant insights and recommendations. By understanding your current task, it delivers personalized guidance, troubleshooting steps, and increased efficiency.

    Landing PageLanding Page

    Note: You can enter a new prompt or browse the library of pre-made prompts.

    Landing Page with Application ContextLanding Page with Application Context

    Note: By default, the Cisco IQ AI Assistant’s view is set to full screen. When you select a new view, the Cisco IQ AI Assistant retains the view you previously selected.

    The Cisco IQ AI Assistant displays the following available options:

    • Previous threads: Provides 30 days of prompt history

    • Browse Prompts: Opens the prompt library; see Appendix A: Cisco IQ AI Assistant Prompts for a list of all questions available in the prompt library

    • Ask the AI Assistant a question field: Text field to ask the AI Assistant a question; use full, descriptive sentences to receive better responses

  2. Choose a prompt using one of the following methods:

    • Search for prompts by entering one (1) or more key words into the Ask the AI Assistant a question field and click the prompt

    • Enter a free-form question using descriptive and full sentences into the Ask the AI Assistant a question field

    Prompt LibraryPrompt Library
    • Click Browse Prompts to open the prompt library and choose any of the following prompt category tabs:

        • Assets (General): Prompts related to asset lifecycle, including LDOS and general inventory queries

        • Cases: Prompts to support case management actions such as viewing, updating, escalating, and closing cases, enabling efficient tracking and connecting with Cisco support engineer
        • Troubleshooting: Prompts to assist with error syslog messages or configuration questions

        • Assessments – Security Advisories: Prompts related to evaluating overall network security posture, identifying critical vulnerabilities, and listing specific assets affected by high-severity security threats or configuration weaknesses
        • Asset Criticality: Prompts related to prioritizing assets for risk mitigation activities based on their role and importance within the network

        • Assessments – Configuration: Prompts related to summarizing configuration assessment results, identifying configuration deviations against recommended best practices, and generating actionable recommendations

        • Assessments – Security Hardening: Prompts related to identifying recommended security baseline configurations, best practices for device hardening, and step-by-step procedures for securing Cisco network infrastructure

  3. Click a prompt. A response generates.

Enhanced Contextual Data for the AI Assistant

The Cisco IQ AI Assistant ensures that context is dynamic, enabling seamless interactions across applications, pages, and sessions. This ensures that every response leverages contextual data to provide highly relevant responses tailored to your question.

LDOS Summarization and Prioritization

LDOS ReportLDOS Report

The LDOS Summarization and Prioritization feature enables you to quickly identify and address risks associated with network assets. This feature classifies assets by their expected network roles and security vulnerability status, enabling vulnerability remediation and enhancing overall service quality.

Key Benefits

Key benefits of the LDOS Summarization and Prioritization feature include:

  • Prioritized Risk View

  • Operational Impact Analysis

  • Actionable Insights

As a part of this feature, you can view a limited set of pre-seeded questions (marked by “*”) in the user interface or when viewing LDOS insights.

Reports

LDOS Report Generation

AI-generated, curated LDOS reports provide summaries of assets approaching or past their LDOS. The reports also highlight refresh options as well as identify security advisories and vulnerabilities to help you quickly understand your network’s risk landscape.

Analyze Response

Analyze ResponseAnalyze Response

When clicking Analyze Response, you receive an AI-driven summary that summarizes data and generates various visualizations like graphs, dashboards, and charts, providing insightful information.

AI SummaryAI Summary

The AI-driven summary contains a Download PDF button to download the report as PDF.

Data Sources for LDOS Summarization and Report Generation

The following key data sources are leveraged by the LDOS Summarization and Prioritization feature:

  • Install Base Assets and Contracts

  • Telemetry Assets and Contracts

  • CX Signal Data

  • EOL Milestones for Hardware and Software Assets

Troubleshooting with the Cisco IQ AI Assistant

Cisco IQ empowers you to resolve device issues independently with the Cisco IQ AI Assistant. Built on Cisco’s certified troubleshooting tools and a proven knowledge base, this intuitive, interactive assistant provides real-time, contextual recommendations.

It’s designed for day-to-day troubleshooting scenarios and helps network Engineers to investigate Cisco product issues, review symptoms, and identify actionable next steps. It interprets technical details such as error messages, syslogs, software defects, release guidance, and configuration-related questions. By addressing challenges instantly, you can maintain optimal performance and save time by resolving issues without the need to open a support case.

Best Practices

When using the Cisco IQ AI Assistant for troubleshooting, use the following best practices:

  • Be as specific as possible; include the platform, product family, and software version in your first message

Note: When launching the Cisco IQ AI Assistant from an Asset, it already has this information.

  • Paste the exact error, alarm, or syslog text instead of paraphrasing it

  • Describe what changed before the issue started, such as an upgrade, configuration update, or topology change

  • Share the impact clearly, such as whether the issue affects one (1) device, one (1) site, or multiple users

Cases

The Cases Management feature enables users to manage their support cases through self-service, ensuring that business applications and services are restored promptly. This feature helps you efficiently manage cases and streamline the support experience. See Support Application for more information about Case Management.

With Cases Management, users can quickly view and track their support cases in one place. It helps you check case status, review updates, follow progress, and stay informed on the next steps, making it easier to manage issues and get support faster.

Appendix A: Cisco IQ AI Assistant Prompts

This appendix provides a detailed overview of the prompts available in the Cisco IQ AI Assistant, organized into bullet lists by question themes.

Note: You can browse available prompts by selecting relevant suggestions as the prompt library narrows options based on your input, or you can submit your own custom prompt. Cisco IQ AI Assistant relies on natural language input and does not include input forms such as drop-down menus, ensuring a seamless user experience.

The following prompts are available under the Assets (General) tab:

  • Summarize assets past Last Date of Support (LDOS).
  • Summarize assets reaching Last Date of Support (LDOS) in the next 12 months.
  • Generate a PPT summary report for all Last Date of Support (LDOS) assets.
  • How many sub-components will reach LDOS in the next 12 months?
  • How many different software versions are present in my top 5 software types?
  • How many assets are both covered and past their Last Date of Support (LDOS)?
  • Summarize the top 5 product families with the most devices past LDOS and affected by security advisories.
  • Summarize cards and modules past LDOS and affected by security advisories.
  • How many sub-components are hitting end of life milestones earlier than their parent chassis?

The following prompts are available under the Cases tab:

  • Show me my open cases
  • Summarize a case
  • Show me the status of a RMA
  • Show me the status of a bug
  • Give me an update on a case
  • Give the most recent update and any pending action items for a case
  • Close an open case
  • Add a participant to a case’s contact list
  • Create a Webex space communication about a case
  • Connect me with the engineer handling the case
  • Raise the severity level of an open case
  • Escalate an open case
  • Request a new engineer for a case
  • Re-queue an open case
  • Add note to a case

The following prompts are available under the Troubleshooting tab:

  • How do I troubleshoot Syslog error [Error] and identify the root cause?
  • How do I troubleshoot configuration issues and identify the root cause for [ABCD]?
  • How do I configure [XYZ] on Product ID [ABCD]?

The following prompts are available under the Assessments – Security Advisories tab:

  • Are there any advisories related to DHCP?
  • Is there a security advisory to check for webUI privilege escalation vulnerabilities related to salt typhoon?
  • Before I enable HTTP, can you check for known security advisories or vulnerabilities related to enabling HTTP?
  • How many security advisories are vulnerable in my network?
  • How many devices are vulnerable to security advisories?

The following prompts are available under the Asset Criticality tab:

  • What are my most critical assets by role and importance?
  • How many core devices are affected by security advisories?
  • Summarize critical and high importance devices with coverage expiring in the next 12 months
  • Prioritize LDOS assets for refresh based on role and importance.
  • Prioritize uncovered or soon-to-be uncovered assets for renewal based on role and importance.
  • Prioritize expiring contracts for renewal based on role and importance of those covered assets.
  • Prioritize PSIRT vulnerabilities based on severity and role and importance of affected assets.

The following prompts are available under the Assessments – Configuration tab:

  • Can you provide a summary of my recent Configuration Assessment?
  • How many configuration best practice rules were evaluated, and how many resulted in at least one asset that did not pass?
  • What are the most common configuration deviations across my network?
  • Which Cisco product families have the most deviations from configuration best practices?
  • How many assets were evaluated, and what percentage did not pass?
  • Which categories have the most deviations from configuration best practices?
  • Which configuration deviations pose the highest risk to my network, and what corrective actions are recommended?
  • Which assets have the maximum of critical and high severity configuration deviations? What corrective actions are recommended?
  • Show breakdown of critical and high severity configuration deviations by asset criticality
  • Show breakdown of configuration best practice rules deviations by severity, category, and software type

The following prompts are available under the Assessments – Security Hardening tab:

  • What are Cisco security hardening best practices for network devices?
  • How do I harden my Cisco IOS XE devices?
  • List key security hardening steps for routers and switches.
  • What are recommended baseline hardening settings for Cisco devices?
  • How many assets are in violation of security hardening best practices?