Introduction

About Cisco Security Cloud Control

Cisco Security Cloud Control is a security platform that allows you to manage your security products and achieve security outcomes from a single integrated interface.

Integrating security products in the platform is a streamlined experience. After purchasing your subscriptions to Cisco security products, you receive a single email, with a single claim code for all the subscriptions you purchased. Entering the claim code in your new Security Cloud Control organization provisions all your products to Security Cloud Control simultaneously.

Within Security Cloud Control, user and group management occurs at the platform level. Roles are assigned to these users and groups to define their privileges for administering Security Cloud Control and the integrated products.

Navigation between products and tools is intuitive and standardized with a common platform menu and toolbar for all integrated products.

Security Cloud Control provides these additional core services to all integrated products on the platform:

  • Platform Management: Common services such as managing role-based access control, claiming subscriptions and standardized regional deployment of product instances are provided by Security Cloud Control. By centralizing these functions, Security Cloud Control ensures a consistent user experience in provisioning and managing access across all Cisco security products managed from the platform. Administrators reach these common services from the Platform Management menu in the main navigation bar of Security Cloud Control.

  • AI Assistant: The Cisco AI Assistant in Security Cloud Control is designed to streamline security operations by providing AI-driven insights, automation, and contextual guidance. It assists administrators in managing security policies, troubleshooting issues, and optimizing configurations across Cisco’s security products, including Firewall, Duo, , and Secure Access. By leveraging natural language processing and cross-platform intelligence, the assistant enhances efficiency, accelerates incident response, and simplifies security workflows.

  • Global Search: The ability to search for values across products in the platform.

  • Shared Objects: Creating and managing objects that can be shared across devices and policies.

  • Unified documentation portal: A documentation "Help" experience where all documentation is accessible in one portal.

Products You Can Integrate with Security Cloud Control

From Security Cloud Control, you can manage all of these security products:

  • AI Defense

  • Firewall in Security Cloud Control

  • Multicloud Defense

  • Secure Access

  • Secure Workload

Learn more about these products at Products Supported by Security Cloud Control.

Products You Can Launch from Security Cloud Control

From Security Cloud Control, you can launch these security products. After launch, these products operate as standalone products and you cannot manage them through Security Cloud Control. You can only claim or deactivate the licenses of such products from Security Cloud Control.

In the Security Cloud Control toolbar, click the nine-dot menu to launch these products:

  • Cisco Secure Email Threat Defense

  • Cisco Secure Endpoint

  • Cisco Duo

  • Cisco XDR

Products Supported by Security Cloud Control

Currently, these are the products you can integrate with Security Cloud Control .

AI Defense: AI Defense addresses risks for users and providers of AI. Using network visibility and enforcement points in the Security Cloud Control, AI Defense adds detection and enforcement measures to discover sanctioned and unsanctioned AI workloads, applications, models, data, and user access across your distributed cloud environment. For organizations that develop and deliver AI-powered services, AI Defense detects vulnerabilities in your AI models before they're delivered. For your running AI applications, AI Defense guardrails intercept rapidly evolving threats, including prompt injections, denial of service, and data leakage. See AI Defense Documentation for more information.

Firewall in Security Cloud Control: Firewall in Security Cloud Control (formerly Cisco Defense Orchestrator) is a cloud-based security policy manager that simplifies and unifies policy across your Cisco firewalls and other devices. See Firewall in Security Cloud Control Documentation for more information.

Multicloud Defense: Multicloud Defense provides a simplified and highly automated approach to multicloud security. This solution allows organizations to manage and secure their multicloud environments using a single SaaS delivered control plane, and centralized or distributed PaaS-delivered data plane architectures. Multicloud Defense provides continuous visibility, unified protection and dynamic policy updates across all major cloud providers, thereby eliminating the need for separate point solutions for solutions for each cloud provider. See Multicloud Defense Documentation for more information.

Secure Access: Cisco Secure Access is a cloud-based platform that provides multiple levels of defense against internet-based threats. Connect securely to the internet, SaaS apps, and private digital resources from your organization's network or roaming off-network. Using policy rules, configure and enforce security controls on collections of resources, users, and devices. See Secure Access Documentation for more information. Secure Access subscriptions also include the Identity Intelligence integration via Security Cloud Control at no additional charge—this does not include access to the standalone Identity Intelligence dashboard. For more information, see Integrate Cisco Identity Intelligence with Secure Access.

Secure Workload: Cisco Secure Workload (formerly Tetration) seamlessly delivers zero-trust micro-segmentation across any workload, environment, or location from a single console. With comprehensive visibility into every workload interaction and powerful AI/ML-driven automation, Secure Workload reduces the attack surface by preventing lateral movement, identifies workload behavior anomalies, helps rapidly remediate threats, and continuously monitors policy compliance. See Secure Workload Documentation for more information.

About Firewall in Security Cloud Control

Firewall in Security Cloud Control (formerly Cisco Defense Orchestrator) simplifies the management of security policies in distributed environments, ensuring consistent policies across all managed firewalls. The firewalls and devices are managed in Firewall, which is listed under Products in the Security Cloud Control.

It optimizes security policies by identifying inconsistencies and providing resolution tools. The platform enables object and policy sharing, as well as the creation of configuration templates, ensuring policy uniformity across devices.

Coexisting with local device managers like the Adaptive Security Device Manager (ASDM), Security Cloud Control tracks configuration changes made by both itself and other managers, reconciling any discrepancies.

Featuring an intuitive user interface, Security Cloud Control allows management of various devices from a single platform. Advanced users can also utilize an enhanced CLI interface for more efficient management.

The platform offers a guided "Day 0" experience, facilitating the quick onboarding of threat defense devices to your on-premises or Cloud-Delivered Firewall Management Center. It highlights key features for potential benefits and assists in their activation and configuration.

Onboard Devices

Before you onboard a device, make sure that you have successfully completed the installation wizard and licensed the device. Then use Security Cloud Control's onboarding wizard to onboard your device. Security Cloud Control can easily manage large deployments.

See Onboard Devices and Services.


Note


Once you have onboarded devices to a Security Cloud Control tenant, you cannot migrate the devices from one Security Cloud Control tenant to another. If you want to move your devices to a new tenant, you need to re-onboard the devices to the new tenant.


For a complete list of devices that Security Cloud Control supports and manages, see Supported Devices, Software, and Hardware.

Cisco Online Privacy Statement

Cisco Systems, Inc. and its subsidiaries (collectively "Cisco") are committed to protecting your privacy and providing you with a positive experience on our websites and while using our products and services ("Solutions"). Please read Cisco Online Privacy Statement carefully to get a clear understanding of how we collect, use, share, and protect your personal information.

Managing FDM-Managed Devices with Firewall in Security Cloud Control


Important


Secure Firewall Device Manager (FDM) support and functionality is only available upon request. If you do not already have Firewall Device Manager support enabled on your tenant you cannot manage or deploy to FDM-managed devices. Send a request to the support team to enable this platform.


Firewall in Security Cloud Control(formerly Cisco Defense Orchestrator) provides a simplified management interface and cloud-access to your Secure Firewall Device Manager devices. FDM-managed administrators will notice many similarities between the device interface and the Security Cloud Control interface. We built Security Cloud Control with the idea of keeping things as consistent as possible between managers.

Use Security Cloud Control to manage these aspects of your physical or virtual FDM-managed device:

Software and Hardware Support

Security Cloud Control supports version 6.4 and later, which can be installed on a number of different devices or virtual machines. See FDM-Managed Support Specifics for more information.

Managing Smart Licenses

You can use Cisco Smart Licenses to license the FDM-managed devices during onboarding or after onboarding the devices to Security Cloud Control. Smart Licensing is conveniently built into our workflows and easily accessible from the Security Cloud Control interface. For more information, see Applying or Updating a Smart License.


Note


If the device you want to onboard is running software version 6.4 or 6.5, and is already smart-licensed, the device is likely to be registered with Cisco Smart Software Manager. You must unregister the device from Cisco Smart Software Manager before you onboard it to Security Cloud Control with a registration Key. When you unregister, the license and all optional licenses associated with the device, are freed in your virtual account.

If the device you want to onboard is running software version 6.6 and later and is already registered with the Cisco cloud, you must unregister the device from Cisco Cloud Services before you onboard it to Security Cloud Control with a registration key.


Security Cloud Control User Interfaces

Security Cloud Control GUI and CLI Interfaces

Security Cloud Control is a web-based management product that provides you with both a graphic user interface (GUI) and a command line interface (CLI) to manage your devices one at a time or many at once.

With the CLI interface, you can send commands to your FDM-managed devices directly from Security Cloud Control. Use CLI macros to save and run commonly used commands. See Use the Security Cloud Control Command Line Interface Tool for more information.

API Support

Security Cloud Control provides the API tool interface that can perform advanced actions on an FDM-managed device using the device's REST API. Additionally, this interface provides the following features:

  • Records a history of already executed API commands.

  • Provides system-defined API macros that can be reused.

  • Allows creating user-defined API macros using the standard API macros, from a command you have already executed, or another user-defined macro.

For more information about the API tool, see Using the API Tool.

Onboarding FDM-Managed Devices

Before you onboard an FDM-managed device, review the general device requirements and onboarding prerequisites.

The best practice is to onboard FDM-managed devices with a registration token. See Onboard an FDM-Managed Device Running Software Version 6.6+ Using a Registration Key for more information.

You can use these additional methods to onboard an FDM-managed device to Security Cloud Control as well:

Device Management

Use Security Cloud Control to upgrade software, configure high availability, configure device settings and network resources for your FDM-managed devices.

  • System Settings. Once you have licensed your FDM-managed device and onboarded it, you can manage your FDM-managed device settings entirely from Security Cloud Control. You will be able to configure management access protocols, logging settings, DHCP and DNS server interaction, the device's hostname, the time server it uses, and URL filtering preferences.

  • Security Database Updates. Keep your device up to date and compliant with current security database updates with a recurring task to check and update your device when necessary.

  • High Availability. Manage HA configuration and operations with the FDM-Managed High Availability Page.

Device Upgrade

Perform immediate upgrades to your FDM-managed devices, or schedule them, using one of following methods:

Interface Management

You can use Security Cloud Control to configure and edit data interfaces or the management/diagnostic interface on an FDM-managed device.

Routing

Routing is the act of moving information across a network from a source to a destination. Routing involves two basic activities: determining optimal routing paths and transporting packets through a network. Use Security Cloud Control to configure these aspects of routing:

  • Configuring Static Routes and Default Routes. Using Security Cloud Control, you can define a default route, and other static routes, for your FDM-managed devices.

  • Bridge Group Support. A bridge group is a virtual interface that groups one or more interfaces. The main reason to group interfaces is to create a group of switched interfaces. Using Security Cloud Control you can configure and edit bridge groups on your device.

  • NAT (Network Address Translation). NAT rules help route your traffic from your inside (private) network to the Internet. NAT rules also play a security role by keeping internal IP addresses hidden from the world outside your network. You can create and edit NAT rules for your device using Security Cloud Control. See Network Address Translation for more information.

Security Policies

Security policies examine network traffic with the ultimate goal of either allowing network traffic to reach or prevent network traffic from reaching its intended destination. Use Security Cloud Control to manage all the components of the device's security policies:

  • Copy and paste rules. Make sharing rules across policies easy by copying and pasting rules from policy to another. See Copy FDM Access Control Rules for more information.

  • SSL Decryption Policy. Some protocols, such as HTTPS, use Secure Sockets Layer (SSL) or its follow-on version, Transport Layer Security (TLS), to encrypt traffic for secure transmissions. Because the system cannot inspect encrypted connections, you must apply SSL decryption policy to decrypt them if you want to apply access rules that consider higher-layer traffic characteristics to make access decisions. See FDM-Managed Device SSL Decryption Policy for more information.

  • Identity Policy. Use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user group.

  • Security Intelligence Policy. The Security Intelligence policy gives you an early opportunity to drop unwanted traffic based on source/destination IP address or destination URL. The system drops the traffic on the blocked list before evaluating it with the access control policy, thus reducing the amount of system resources used.

  • Access Control Policy. The access control policy controls access to network resources by evaluating network traffic against access control rules. Secure Firewall Device Manager compares the criteria of the access control rules, in the order they appear in the access control policy, to the network traffic. When all the traffic conditions in an access control rule are matched, Secure Firewall Device Manager takes the action defined by the rule. You can configure all aspects of access control policy using Security Cloud Control.

  • TLS 1.3 Security Identity Discovery. Introduced in version 6.7, this feature allows you to perform URL filtering and application control on traffic encrypted with TLS 1.3. See TLS Server Identity Discovery in Firepower Threat Defense for more information.

  • Intrusion Policy. Cisco delivers several intrusion policies with the Firepower system. These policies are designed by the Cisco Talos Security Intelligence and Research Group, who set the intrusion and preprocessor rule states and advanced settings. Intrusion policies are aspects of access control rules. See Intrusion Policy Settings in an FDM Access Control Rule for more information.


    Note


    Snort 3 is available for FDM-managed devices running version 6.7 and later. Please note that you can toggle between Snort 2 and Snort 3 at will, but risk incompatible configurations. For more information about Snort 3, supported devices and software, and any limitations see Upgrade to Snort 3.0.


  • Threat Events. A threat event is a report of traffic that has been dropped, or that has generated an alert, after matching one of Cisco Talos's intrusion policies. In most cases, there's no need to tune IPS rules. If necessary, you have the option to override how an event is handled by changing the matching rule action in Security Cloud Control. Security Cloud Control supports IPS rule tuning on all versions of versions 6.4 and 6.6.1. Security Cloud Control does not support IPS rule tuning on any version 6.5, any 6.6 version other than 6.6.1, or any 6.7 version.

  • NAT (Network Address Translation). NAT rules help route your traffic from your inside (private) network to the Internet. NAT rules also play a security role by keeping internal IP addresses hidden from the world outside your network. You can create and edit NAT rules for your Firepower Threat Defense using Security Cloud Control.

Promote Policy and Configuration Consistency

Object Management

An object is a container of information that you can use in one or more security policies. Objects make it easy to maintain policy consistency because you can modify an object and that change affects all the other policies that use that object. Without objects, you would need to modify all the policies, individually, that require the same change.

Use Security Cloud Control to create and manage these object types:

Resolve Object Issues

Security Cloud Control calls an object used on multiple devices a "shared object" and identifies them in the Objects page with this badge . Sometimes a shared object develops some "issue" and is no longer perfectly shared across multiple policies or devices. Security Cloud Control makes it easy to Resolve Duplicate Object Issues, Resolve Unused Object Issues, and Resolve Inconsistent Object Issues to manage your devices as well as your repository of objects.

Templates

A Secure Firewall Device Manager template is a complete copy of an onboarded FDM-managed device's configuration. You can then modify that template and use it to configure other FDM-managed devices you manage. Secure Firewall Device Manager templates promote policy consistency between devices. See FDM Templates for more information.

High Availability

Security Cloud Control makes it easy to configure and manage a high availability pair of FDM-managed devices. You can onboard an existing HA pair or create an HA pair in Security Cloud Control. HA configurations make it possible to maintain a secure network in scenarios where a device might be unavailable, such as during an upgrade period or an unexpected device failure; in failover mode, the standby device is already configured to become active, meaning that even if one of the HA devices becomes unavailable, the other device continues to handle traffic.

You can upgrade FDM-managed HA pairs in Security Cloud Control. See Upgrade an FDM-Managed High Availability Pair for more information.

Configuring Virtual Private Networks

Site-to-Site VPN

A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, thusly connecting network to network. Security Cloud Control uses tunnels to encapsulate data packets within normal IP packets for forwarding over IP-based networks, using encryption to ensure privacy and authentication to ensure data integrity. See Site-to-Site VPN for more information.

For additional information about Virtual Private Networks, refer to the Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager.

Remote Access VPN

Remote Access (RA) VPN allows individuals to establish a secure connection to your network using supported laptop, desktop, and mobile devices. Security Cloud Control provides an intuitive user interface for you to setup RA VPN on FDM-managed devices. AnyConnect is the only client that is supported on endpoint devices for RA VPN connectivity to FDM-managed devices.

Security Cloud Control supports the following aspects of RA VPN functionality on FDM-managed devices:

  • Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) for privacy, authentication, and data integrity

  • SSL client-based remote access

  • IPv4 and IPv6 addressing

  • Shared RA VPN configuration across multiple FDM-managed devices

See RA VPN for more information. For additional information about Virtual Private Networks, refer to the Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager.

Monitoring Your Network

Security Cloud Control provides reports summarizing the impact of your security policies and methods of viewing notable events triggered by those security policies. Security Cloud Control also logs the changes you make to your devices and provides you with a way to label those changes so you can associate the work you do in Security Cloud Control with a help ticket or other operational request.

Executive Summary Report

Executive summary reports display a collection of operational statistics such as encrypted traffic, intercepted threats, detected web categories, and more. Data in the reports is generated when network traffic triggers an access rule or policy on an FDM-managed device. We recommend enabling malware and licenses, as well as enabling file logging for access rules, to allow a device to generate the events that are reflected in the reports.

Read FDM-Managed Device Executive Summary Report for more information about what the report offers and how you can use it to improve your network infrastructure. To create and manage your reports, see Managing Reports.

Cisco Security Analytics and Logging

Cisco Security Analytics and Logging allows you to capture connection, intrusion, file, malware, and Security Intelligence events from all of your FDM-managed devices and view them in one place in Security Cloud Control.

The events are stored in the Cisco cloud and viewable from the Event Logging page in Security Cloud Control where you can filter and review them to gain a clear understanding of what security rules are triggering in your network. The Logging and Troubleshooting package gives you these capabilities.

With the Firewall Analytics and Monitoring package, the system can apply Secure Cloud Analytics dynamic entity modeling to your FDM-managed device events, and use behavioral modeling analytics to generate Secure Cloud Analytics observations and alerts. If you obtain a Total Network Analytics and Monitoring package, the system applies dynamic entity modeling to both your FDM-managed device events and your network traffic, and generates observations and alerts. You can cross-launch from Security Cloud Control to a Secure Cloud Analytics portal provisioned for you, using Cisco Single Sign-On. See Cisco Security Analytics and Logging for more information.

Change Log

The Manage Change Logs in Security Cloud Control continuously captures configuration changes as they are made in Security Cloud Control.

This single view includes changes across all supported devices and services. These are some of the features of the change log:

  • Side-by-side comparison of changes made to device configuration

  • Plain-English labels for all change log entries.

  • Records on-boarding and removal of devices.

  • Detection of policy change conflicts occurring outside of Security Cloud Control.

  • Answers who, what, and when during an incident investigation or troubleshooting.

  • The full change log, or only a portion, can be downloaded as a CSV file.

Change Request Management

Change request management allows you to associate a change request and its business justification, opened in a third-party ticketing system, with an event in the Change Log. Use change request management to create a change request in Security Cloud Control, identify it with a unique name, enter a description of the change, and associate the change request with change log events. You can later search the Change Log for the change request name.

The Firewall Dashboard

The Firewall dashboard is your central hub for monitoring and managing tenant-level details across various categories. Upon logging in, you can access a customizable dashboard that offers critical insights and actions to optimize security and operational efficiency.

Customize Your Dashboard

Make your dashboard fit your specific needs by customizing the visible widgets.

  1. On the Home page, click Customize.

  2. Select or deselect the widgets you want to view on the dashboard.

  3. You can drag and drop the widgets to arrange them as you prefer.

The dashboard is divided into three main sections: Top Insights & Alerts, Top Actions, and Top Information. Each section provides different categories of insights to help you maintain optimal security and operational control.

Top Insights & Alerts

This section is visible only if AIOps Insights is enabled for your tenant. You can view insights related to high traffic caused by elephant flows, RA VPN forecast, access control policy anomalies, high CPU and memory usage, snort CPU and memory usage.

Top Actions

This section is visible only if AIOps Insights is enabled for your tenant. If enabled, you can view the following widgets:

  • Policy Analyzer and Optimizer: Analyzes security policies, detects anomalies, and provides optimization recommendations to improve firewall performance.

    For more information, see Policy Analyzer and Optimizer.

  • AIOps Insights: Offers detailed information on all active insights and trends, categorizing anomalies by Configuration, Health & Operations, or Traffic & Capacity.

    For more information, see AIOps Insights.

  • Feature Adoption: Provides insights into feature adoption rates to optimize usage patterns and enhance security measures.

    For more information, see Assess and Improve Feature Adoption.

Top Information

This section provides detailed insights into various tenant-level metrics. If enabled, you can view the following widgets:

  • Configuration States: Indicates the discrepancies between the configurations on your devices and those maintained by Security Cloud Control. This comparison helps identify any inconsistencies or conflicts that may exist.

    For more information, see Device Management.

  • Change Log Management: Helps you to manage the change logs for precise operational control. The widget displays Completed and Pending change logs.

    For more information, see Change Logs.

  • RA VPN Sessions: Helps you to monitor your Remote Access VPN sessions.

    For more information, see RA VPN Sessions.

  • Overall Inventory: Helps you to monitor the health and status of all devices. The widget displays the total number of devices, categorized into Issues, Pending Actions, Other, and Online.

    For more information, see All Devices.

  • Site-to-Site VPN: Helps you to manage and assess your site-to-site VPN connections. The widget displays the total number of VPN tunnels and the percentage that are Active and Idle.

    For more information, see Site-to-site VPN.

  • Accounts and Assets:

    • Helps you to track and manage your multicloud accounts and resources effectively. You can launch the Multicloud Defense Controller from here.

    • Click +Add Account to add a new account.

    For more information, see Multicloud Defense Controller.

  • Top Risky Destinations: Helps you identify and monitor the top risky destinations that are granted access. The widget lists Applications and URL Categories and allows you to filter data for the last 90, 60, or 30 days. You can filter between Allowed (default) and Blocked traffic.

  • Top Intrusion and Malware Events: Helps you to monitor and respond to top intrusion and malware events. The widget displays Intrusion Events and Malware Events and allows you to filter data for the last 90, 60, and 30 days. You can filter between Allowed (default) and Blocked events.

Figure 1. Dashboard with AIOps Insights Enabled

Announcements

Click the Announcements icon to look at the most recent Security Cloud Control features and updates. Links to related doucmentation is provided if you need more information on any of the items listed.