Introduction to Cyber Vision

Cisco Cyber Vision GUI

A Cisco Cyber Vision GUI is a user interface component of the Cisco Cyber Vision platform that

  • enables real-time visualization and management of industrial network data,

  • provides access to platform features according to user rights and licensing, and

  • supports collaborative actions that may affect or be visible to other users.

  • Real-time visualization: The GUI lets you monitor network traffic and device status as events occur.

  • Collaboration: When you perform actions in the GUI, other users with permission may see or be affected by these actions.

Requirements

  • Your access to some features in the GUI depends on your license type and assigned role.

  • You must enroll at least one network sensor for data to appear in the GUI.

  • For setup instructions or installation prerequisites, refer to the relevant quickstart guides.

Interactive help

The interactive help feature is a user assistance tool that

  • provides contextual guidance within Cisco Cyber Vision,

  • offers easy access to a wide range of documentation resources, and

  • provides step-by-step walkthroughs for selected task flows.

Cisco may collect certain anonymous product usage data as described in the End User License Agreement and the Privacy Statement to optimize delivery of Interactive Help.

Users can access interactive help in Cisco Cyber Vision to quickly find instructions or guidance relevant to their current task.

Manage interactive help

Enable or disable the Interactive Help feature to assist users with guided support in Cisco Cyber Vision.

Interactive help provides users with contextual assistance and guides within the Cyber Vision interface.

Interactive Help is enabled by default.

Procedure


Step 1

In the Classic UI, click the Interactive Help ribbon.

Step 2

In the New UI, click ? icon and choose Interactive Help.

Step 3

To disable Interactive Help, choose Admin > System and disable the Interactive Help plugin.


Depending on your configuration, Interactive Help is enabled to provide contextual user guidance, or it is disabled and no user guidance is shown.

Presets

Presets are sets of selection criteria that

  • enable focused filtering of network metadata processed by Cyber Vision,

  • provide rapid access to views matching specific business needs, and

  • offer multiple perspectives for efficient navigation of network data.

Presets are designed to simplify navigation and enhance business-oriented visibility into network activity and status, based on recommendations from Cyber Vision playbooks.

Table 1. Feature History Table

Feature

Release Information

Feature Description

Consistent Groups and Subgroups on the Zones and Conduits Map

Release 5.4.x

Easily visualize network communications to ensure devices remain within their designated boundaries. The system now supports one level of sub-zones within existing zones and conduits. You can quickly identify devices that should not communicate outside their networks.

Preset views

A preset view is a display mode that

  • stores data elements, such as components, tags, and activities,

  • refreshes only when necessary or upon explicit user request to reduce system load, and

  • optimizes system performance to prevent lags and application crashes, especially when managing large data flows.

Preset views help prevent system overload by showing previously computed data and relying on user actions for updates. This benefits users who interact with preset views frequently or occasionally.

Behavior of preset views

  • The elements visible in preset views are based on the last completed computation.

  • Data displayed in the user interface and database are asynchronous, lowering workload on the GUI.

  • Computation frequency adapts to preset usage. Presets that are viewed frequently are recomputed often. Presets that are not used are skipped.

  • An automated background process computes data when a preset is active, but does not auto-refresh the display.

  • Two update buttons are available in preset views:

    • New data button: Appears when new computation is available, but the updated view may not show all new data.

    • Refresh button: Forces data computation and a full view refresh, which consumes more system resources. Use this when you expect changes, such as a new device or custom data updates.

Types of preset views

You can access different preset views for various perspectives. To do this, open the main menu, select Explore, and use the top navigation bar to choose a preset.

Table 2. Views

Name

Description

Dashboard

The dashboard view appears by default and gives you a preset data overview. This tag-oriented view lets you quickly review the network at a high level.

Map

Use the map view to see how devices and components in your industrial network are connected. You can organize them into groups and explore the network structure. The map view then shows devices, components, and activity based on your selected criteria.

It also shows grayed-out items if they are needed to represent preset activities, even if they don’t match the criteria.

Device list and Activity list

Use these views to filter and find specific data. You can see both general and technical details for each element in the preset.

Vulnerabilities

This view displays and lists all vulnerabilities detected in a preset.

Security Insights

Each tab displays the most frequent requests, the least frequent requests, and a list of all requests for you to review.

Flows with no tag: This section lists traffic that Cyber Vision Center cannot analyze, often due to the use of unsupported protocols.

To resolve this, first verify that the content should be on the network. Next, determine why analysis is not possible. Finally, check flows with a high number of packets.

Purdue Model

Use the Purdue model view to see how assets in your preset are distributed across the layers of the Purdue model architecture based on tags. This view organizes assets into those layers:

  • Level 0–1: Process and basic control (IO Modules)

  • Level 2: Area supervisory control (PLCs, SCADA stations)

  • Level 3–4: Manufacturing zone and DMZ (all others)

Communication display options in map preset view

Cyber Vision Center offers three options for presenting communications in the preset map view.

Table 3. Map view options

Option

Description

Show all activities

You can view all activities between groups or individual devices.

Aggregate activities by group

The system increases map readability by grouping and displaying communications between device groups.

Show only zones and conduits

To optimize performance with large data sets or to get a broad overview, show only top-level groups (zones) and summarized communications (conduits) between them.

Devices not assigned to any zone appear in a separate group called Ungrouped.

If group hierarchies segment the control system, the map displays zones and conduits that meet ISA/IEC 62443 standards.

A conduit appears as a thick, dashed line and shows communication between two groups. If both the source and destination groups are known, an arrow indicates the direction of communication. By default, Conduits View mode is enabled. To disable it, select Aggregate activities by group.

Show sub-zones: This map mode shows sub-zones embedded within zones. You can view communications involving sub-zones and communications between zones and sub-zones.

Default preset categories

Generic presets are available by default in Cyber Vision, based on recommended practices and operational categories.

Table 4. Default categories

Preset category

Presets available

Basics

View all data or filter to information technology (IT) or operational technology (OT) components.

  • All data

  • Essential data

  • Active Discovery activities

Asset management

Identify and inventory assets associated with OT systems, facilities, and IT components.

  • OT devices

  • IT devices

  • IT infrastructure devices

  • All Microsoft Windows systems

  • All controllers

Control Systems Management

Check the state of industrial processes.

  • OT activities

  • Control system activities

  • Process control activities

IT Communication management

Flows categorized as OT, IT, infrastructure, IPv6 communications, and Microsoft flows

  • IT activities

  • Web activities

  • Email activities

  • File activities

  • Microsoft activities

Security

Remote access control and insecure activity monitoring

  • DNS activities

  • Remote procedure call activities

  • Remote access

  • Insecure activities

  • Encrypted activities

  • Authentication activities

Network Management

Network detection issue identification and resolution

  • IT infrastructure activities

  • IT technical activities

  • IPv6 communications

  • Multicast traffic only

  • Broadcast traffic only

Create a new category

Create a category to organize and locate your custom presets easily.

Use categories to order and search custom presets. You can bookmark entries saved on the Explore page with URL filters in your browser for quick access.

Procedure


Step 1

From the main menu, choose Explore.

Step 2

Click New Category.

Step 3

Enter the name and preset details.

Step 4

Click Create.


The new category appears on the Explore > All Presets page.

What to do next

  • You can edit the category name and preset details or delete the category from Explore > All Presets.

  • You can search for categories on the Explore page to view associated presets.

Create a new preset from an existing data set

Create a customized preset by selecting criteria from an existing data set tailored to your business logic

Customized presets help you tailor views to your operational needs. Presets that you create are available to other users.

Procedure


Step 1

From the main menu, choose Explore > All Presets.

Step 2

Select a predefined data preset from the All Presets list.

Step 3

Select the required criteria from RISK SCORE, NETWORKS, DEVICE TAGS, ACTIVITY TAGS, GROUPS, and SENSORS.

Step 4

Click Save as.

Step 5

Enter a new Name and select a Category.

Step 6

Click OK.


Your new preset uses the filter criteria you selected and appears in the category you chose.

What to do next

  • Search for the selected category on the Explore page to view the newly created preset with your filter criteria.

  • You can edit or delete presets from the Explore page.

Understanding Concepts

Filters

A filter is a data visualization mechanism that

  • enables users to refine and restrict datasets presented in dashboards and preset views,

  • allows selection of devices, activities, or attributes using predefined criteria, and

  • operates using inclusive or exclusive logic to control which data appears in each view.

Filters provide flexibility. They allow the combination of multiple categories, such as device tags, networks, and sensors, to produce precise visualizations. Applying different filter types helps focus analysis on specific risks, behaviors, and assets.

Filter combination

You can define filters in several categories simultaneously. The process first filters activities using all activity-based filters. Then, it filters devices using their specific criteria. This sequence results in the preset dataset that Cyber Vision uses to precompute your view. To further refine your dataset, select a time frame.

Use filters in the Cyber Vision Center

Use filters in the Cyber Vision Center to refine your data view.

Use filters to narrow the list of devices or activities for analysis or monitoring in dashboards and preset views.

Procedure

Step 1

From the main menu, choose Explore.

Step 2

From the navigation bar, select a preset from the preset category.


Filters become available for refining data visualization according to the chosen criteria.

Filter categories and usage options

Use filters to organize and view data about your devices and activities. Each filter helps you focus or expand the data shown in dashboards and preset views.

Table 5. Filter types

Filter type

Description

Risk score

Filters devices based on individual risk rating and supports both inclusive and exclusive ranges.

Networks

Filters based on device IP address ranges or VLAN IDs. Affects activities and devices with corresponding network attributes.

The system selects activities with at least one device in the corresponding network.

Only devices with at least one IP address in the network range are selected in device lists.

Device tags

Selects devices by tags using inclusive or exclusive rules. Combining tags broadens or narrows the results. Exclusive filters exclude all components with the selected device tags.

Activity tags

Filters activities with specific tags. Exclusive filtering hides activities only if all activity tags are excluded.

Groups

Filters devices by membership in groups or subgroups. Inclusive and exclusive logic applies. Activity selection requires at least one endpoint in a selected group.

Sensors

Filters based on the analyzing sensor using inclusive or exclusive rules.

Keyword

Searches devices by name, property, IP/MAC address, or tags.

Filter application logic:

  • You can combine filters across multiple categories at once. The result is the intersection of all selected categories.

  • When you apply both device and activity filters, you further refine datasets in dashboards or preset views.

Notes:

  • Negative (exclusive) selections are not supported for multiple network filters in version 4.0.0.

  • For activity tags, activities are included if at least one tag is selected. They are hidden only if all tags match the excluded tag set.

Examples:

  • To remove both broadcast and ARP activities, select both tags for exclusion.

  • Use device tag filters to restrict views to device types, such as controllers or HMIs. You can also see their communication partners on maps.

Components

A component is a network object that

  • represents a physical or logical network endpoint such as a network interface, PC, SCADA station, broadcast, or multicast address,

  • is detected through details such as MAC address and, if available, IP address, and

  • is visually represented in the center by a specific icon, grouping, and border style.

  • The center groups components within devices. In the UI, the components of a device appear together inside a bordered area in the drawer and on the technical sheet.

  • The center displays components that are not assigned to a device with a double border.

Types of component icons

Component icons visually differentiate component types in the UI.

Table 6. Component icons

Icon type

Example image

Description

Manufacturer

A detected manufacturer

SIEMENS PLC

A S7-300 PLC

A Scalance X300 switch

Default cogwheel

Used when the manufacturer is undetected or icon not assigned

Public IP

Represents a public IP

Broadcast

Broadcast destination component

Multicast

Multicast destination component

Icons in both the map and the component’s panel display the manufacturer, model, and additional component information.

Component detection in Cyber Vision

Cyber Vision detects components from network activity using Deep Packet Inspection (DPI):

  • Components are discovered by observing emissions or receptions on the network.

  • Detection details include MAC address, IP address, manufacturer, and model. They also include operating system, firmware, tags, and activity timestamps.

  • DPI inspects the communication flows between components to extract these attributes.


Note


MAC addresses correspond to physical network interfaces, while IP addresses depend on network configuration.


View component details

Display information about a specific component.

After you discover and aggregate components, access technical details as needed. Analyze activity to troubleshoot issues or manage assets.

Procedure

Step 1

From the main menu, choose Explore.

Step 2

Select the required preset from the preset category.

Step 3

Select the relevant preset view.

Step 4

Click the component count in Devices.

Step 5

Select a component to display its details.


You see detailed component information in the drawer.

Devices

A device is a network entity that

  • aggregates multiple components with similar properties,

  • represents a physical machine in an industrial network, including a switch, engineering station, controller, PC, or server,

  • and simplifies management, inventory, and data presentation within Cyber Vision.

Device aggregation details

  • Devices aggregate components based on shared attributes such as IP address, MAC address, NetBIOS name, tags, and properties detected in network protocols.

  • Aggregation logic uses rules, prioritizing attributes such as controller tags and brands to define device type and assign properties at the device level.

  • Devices enhance application performance and make network visualization more effective by grouping related components under one entity.

Device representation examples

  • When you click on a Schneider controller, a side panel opens to show its components grouped as a device.

  • The list of a Rockwell Controller device components in Cyber Vision shows technical details like activity time, IP addresses, MAC addresses, and tags. If a “Controller” component is found, the device gets a “Controller” tag to define its type. Brand tags like “Rockwell Automation” may also be added if detected.

Device icons and visual indicators

Device icons and visual indicators help you identify your network devices.

  • If a device has a double border, you see the manufacturer’s icon when the device is recognized, a specific model icon when it is known, or a default cogwheel when the device is unknown.

  • The red counter badge on a device icon indicates the number of vulnerabilities detected for that device.

Activities

An activity is a network communications entity that

  • represents the communications exchanged between devices or components,

  • is represented as a connecting line or arrow that links devices or components, and

  • encompasses multiple types of flows in both directions between components.

Network activity details

Activities let you see how devices or components in a network interact by showing their communication flows. The system updates the visual display depending on whether both the source and destination components are known. When possible, the mapping uses arrows.

Devices or components with no visible activity may still have communicated. The system detects a device or component only if it has participated in network activity. If you do not see visible activity, the other device or component may not be included in your current selection or preset filters.

View activity details on the map

Review detailed information about communications between your devices or components using the activity map.

Procedure

Step 1

From the main menu, choose Explore.

Step 2

Select the required preset in the preset categories.

Step 3

Select the Map preset view.

Step 4

Click the communication link between two devices or components.

The details drawer appears and shows you information about the communication and the flows exchanged.


  • You can review details such as

    • The date of the first and last communication

    • Details such as name, IP, MAC, group, and criticality

    • Flow tags, number of flows, number of packets, volume of data exchanged, and number of events

Flows

A flow is a network communication event that represents a single exchange of data between two system components or devices.

Flows can be analyzed for properties such as endpoints, ports, activity times, and tags.

An activity is a collection of flows that occur between two or more components or devices. The Map shows an activity using a line that links the relevant components or devices.

Access a flow

You can view detailed information about a flow and its properties.

Procedure

Step 1

From the main menu, choose Explore.

Step 2

Select the appropriate preset and preset view.

Step 3

Click a component or device on the map.

Step 4

Open the technical sheet and select the Activity tab.

Step 5

View the list of flows.


You see detailed information for each flow, including source, destination, ports, activity times, and tags.

What to do next

To manage many flows, apply filters to sort by component name, port, or tags. Choose a flow to view its technical sheet, where you can find additional properties and tags.

External communications

External communications are network interactions that

  • occur between monitored network components or devices and external (non-monitored) components or devices,

  • are logged and listed in Cisco Cyber Vision,

  • are typically identified based on IP addresses that do not match private address formats.

External communication indicators

  • By default, communications involving IP addresses outside standard private ranges are considered external. Private-format IPs are considered internal. If your industrial network uses public IPs for internal purposes, you can define which IP ranges are internal or external on the Network Organization administration page in Cyber Vision center.

  • Components with external communications are shown with an icon bordered in orange. Devices are shown with a double orange border.

  • External components and their flows are not stored or displayed to optimize system performance.

View external communications

Monitor and review connections between internal devices and external endpoints for security and activity tracking.

Cyber Vision records external communications between network devices and outside endpoints. External devices and their flows are not tracked. This approach helps keep the interface clear and optimizes performance.

Procedure

Step 1

From the main menu, choose Explore.

Step 2

Select the appropriate preset and then select the Map preset view.

Step 3

Select the component or device you want to review.

Icons with an orange border (single or double) indicate external communications.

Step 4

Click External communications.

Step 5

Review the displayed list of external communications in the technical details.

Step 6

(Optional) To save the data, click Export to CSV.


You can view and optionally export all logged external communications for the selected device or component.

Time spans

A time span is a data viewing filter that

  • enables users to focus on network activity during a specific period,

  • determines which historical or real-time information is displayed in monitoring views, and

  • helps users analyze trends, detect anomalies, or investigate incidents within the chosen interval.

Application of time spans in monitoring views

In Cisco Cyber Vision, time spans are applied throughout monitoring views to limit or expand the period of network data you analyze. This helps tailor data visualization for ongoing and retrospective investigation.

Set a time span for data visualization

Select and adjust the period for which network data is displayed in Cisco Cyber Vision.

Use a time span to filter displayed network activity in the various preset views. This helps you focus on recent events, conduct historical analysis, or investigate specific incidents.

Procedure

Step 1

From the main menu, choose Explore.

Step 2

Select appropriate preset and preset view.

Step 3

To set a time span, click the pencil icon.

Step 4

To set the TIMESPAN SETTING, select a Duration, or define a custom period in the Time window.

Note

 

While configuring a Time window, if you do not select an end date, it defaults to the current date and time.

Step 5

Click OK.

Step 6

Click Refresh to update and display network data for the selected period.


The data view updates to reflect activity within the chosen time span.

What to do next

If no data is visible in the current view, the time span may be set to an interval when no activity occurred. If data is missing or the view is empty, adjust the time span.

Network tags

Network tags are metadata labels that:

  • succinctly describe and categorize network components and activities,

  • are visually denoted by icon color and description based on their category, and

  • support network exploration, filtering, and behavioral analysis.

  • Device tags: Device tags represent the functions and properties of a device or component. They are synthesized at both the component and device (aggregation) levels.

  • Activity tags: Activity tags describe the protocols used in network flows. They are synthesized at both the flow and activity (group of flows) levels.

Tag classification and usage information

  • Tags are added directly by the system automatically based on data received from the sensor.

  • Tags are classified under categories in the filtering area.

  • Device tag categories include levels such as "Device – Level 0–1" and "Device – Level 2."

  • Device levels correspond to ISA–95 international standard definitions.

  • You can set criteria for network views and filters by leveraging tags to organize and focus on relevant network data.

  • In Monitor mode, use tags with port and flow properties to help define network behaviors inside industrial networks.

Tag types include IO Module, Wireless IO Module, and more.

Locate tag information in Cyber Vision

View and analyze the tags associated with devices, activities, or components in Cisco Cyber Vision.

Use this procedure to identify or review tag assignments for devices, activities, or components. This helps manage, filter, and report in your network environment.

Procedure

Step 1

From the main menu, choose Explore.

Step 2

Select the appropriate preset and preset view.

Step 3

Select the relevant device, activity, or component.

Step 4

Open the Technical sheet.

Step 5

Click Basics, then Tags.


You can view and analyze the tags associated with the selected device, activity, or component.

Properties

Properties are informational attributes that

  • provide key details about a device, component, or flow (such as IP address, MAC address, hardware version, or serial number),

  • are extracted or inferred from network traffic and device/computer identification, and

  • may be normalized across all platforms or specific to certain protocols or vendors.

Application of properties

  • Properties categorize and group devices, generate tags, and define network behaviors, especially in Monitor mode.

  • When Cisco Cyber Vision supports new protocols, more protocol-specific and vendor-specific properties become available.

  • The combination of properties and tags helps define and monitor behavior within the industrial network environment.

  • Some properties apply to all devices and components. Others are unique to specific protocols or vendors and can change as support expands.

View properties

Locate and view the properties of your devices and components in Cisco Cyber Vision.

Procedure

Step 1

From the main menu, choose Explore.

Step 2

Select the preset and view required for your search.

Step 3

Select a device or a component.

Step 4

Click Technical sheet.

Step 5

Under Basics, click Properties.


You see the properties grouped by type in the selected panel or technical sheet.

Vulnerabilities

A vulnerability is a security weakness that

  • is detected on a device or component,

  • can be exploited by an attacker to perform unauthorized or harmful actions on a network, and

  • may result from software flaws, misconfigurations, or unpatched components.

In Cisco Cyber Vision, vulnerabilities are identified by correlating device and component properties with security rules stored in the Knowledge database. These rules are sourced from computer emergency response teams (CERTs), manufacturers, and partner organizations such as Schneider and Siemens. When a device or component matches a rule from the Knowledge database, Cisco Cyber Vision registers a vulnerability.


Note


Always update the Knowledge database in Cisco Cyber Vision as soon as possible after notification of a new version. This helps protect your network against vulnerabilities.


Severity measurement

Cisco Cyber Vision uses a score based on the Common Vulnerability Scoring System (CVSS) to measure the severity of each vulnerability. This score reflects criteria such as ease of attack, potential impact, component criticality, and attack vector (remote or local), and ranges from 0 (least critical) to 10 (most critical).

Acknowledge a vulnerability for a device

Suppress notifications and track when you have reviewed or addressed a vulnerability on a device.

Use this procedure when you have reviewed a reported vulnerability and do not want to receive further notifications for it on a specific device.

Before you begin

Make sure you have access to the device and can view vulnerabilities in the Explore menu.

Procedure

Step 1

From the main menu, choose Explore.

Step 2

Select the desired preset from the preset category.

Step 3

Select the required preset view.

Step 4

Click device.

Step 5

Click the count for Vulnerabilities from the drawer.

Step 6

Click the vulnerability you want to acknowledge.

Step 7

Add a comment, then click Acknowledge for the device.


You stop receiving notifications about this issue for the device until you cancel the acknowledgement.

What to do next

Cancel the acknowledgement to reverse this action.

How vulnerability detection and event notification work

Summary

Cisco Cyber Vision matches your device or component properties with rules in the Knowledge database to detect vulnerabilities. You receive notifications about new detections and status changes.

The key components involved in the process are:

  • Knowledge database: Stores rules from computer emergency response teams (CERTs), manufacturers, and partners.

  • Device and component properties: These are system-normalized details of devices or components.

  • Cisco Cyber Vision detection engine: Correlates properties and rules to identify vulnerabilities.

Workflow

The process involves these stages:

  1. Always update the Knowledge database in Cisco Cyber Vision as soon as possible after notification of a new version.
  2. Cisco Cyber Vision checks device or component properties against the latest rules.
  3. If a device or component matches a rule, Cisco Cyber Vision detects the vulnerability.
  4. Cisco Cyber Vision generates an event to notify you for each vulnerable component.
  5. Cisco Cyber Vision generates additional events whenever a vulnerability is acknowledged or resolved.

Result

You receive event notifications about new, acknowledged, or resolved vulnerabilities for your monitored network devices and components.

Credentials

A credential is a security element that

  • includes logins and passwords exchanged between components over the network,

  • sometimes carries sensitive information, such as plaintext passwords if unsafe, and

  • may be visible on network monitoring platforms, thereby exposing them to anyone on the network.

Credential visibility on network monitoring platforms

Credential frames are extracted from network traffic using deep packet inspection. If credentials are visible in systems such as Cisco Cyber Vision, secure the underlying network protocols to prevent others on the network from accessing credentials.

View credentials for a component

Use this task to access and review credentials detected for a component, including protocol and user details.

Before you begin

Ensure you have appropriate access rights to view credentials for the desired component.

Procedure

Step 1

From the main menu, choose Explore.

Step 2

Select the desired preset and select the preset view.

Step 3

Select the component device you want to review.

Step 4

Click Credentials in the drawer to see detected credentials.


The Credentials panel displays the number of detected credentials, the transmission protocol, the associated username and password, and information about credential exposure. If any password appears in plain text, ensure it is secured, even if it is hashed in another location.

Variable accesses

Variable accesses are process control monitoring records that

  • track when devices, such as PLCs or data servers, read from or write to variables,

  • record which component performed each access, and

  • log the timestamp of each event for operational supervision and security auditing.

Table 7. Feature History Table

Feature

Release Information

Feature Description

Detect and process variable data

Release 5.3.x

Sensors capture and relay measurable variables, such as pressure or temperature, to Cisco Cyber Vision Center.

Enable Variables Storage in the Admin > Data Management > Ingestion Configuration page of Cisco Cyber Vision Center. This allows the center to add the variables to the database for processing.

Significance of variable accesses

Industrial process equipment, like PLCs and OPC data servers, use variables to store values such as temperatures, control settings, or sensor readings. A variable access occurs whenever a system component reads or writes one of these values. Each access is associated with a specific variable name and a physical memory address on the equipment.

Monitor variable accesses to maintain process integrity. Unexpected writes can indicate an attacker attempting to influence equipment operation. Solutions like Cisco Cyber Vision automatically report detected variable accesses, helping operators identify unauthorized or abnormal activity.

Examples:

  • Reading the temperature of an industrial oven from its PLC controller is a variable access.

  • Writing a new temperature setpoint to the oven’s PLC is also a variable access.

  • Multiple controllers may access the same variable, as when one PLC reads a value that another PLC writes.

Variable accesses details

The variable accesses table provides detailed information on each variable access detected on industrial network equipment. You can review, sort, and investigate variable activity for operational or security purposes.

Table 8. Fields in the variable accesses table

Field

Description

Variable name

The identifier or label of the variable accessed.

Type

Indicates whether access is READ or WRITE, but does not show the variable’s value.

Component

Shows which device or system accessed the variable (for example, a PLC model or OPC server).

First accessed

The timestamp of the first access event for the variable by the component.

Last accessed

The timestamp of the most recent access for the variable by the component.

To locate variable access information
  • To view more details about variable accesses, open the technical sheet for the component. For a focused view, select Automation or refer to PLC access reports.

  • The component list view displays the total number of variable accesses per device. You can sort this list by the "var" column.

  • For detailed information on a specific component’s variable accesses, click the component.

Enable variable processing in a sensor template

Variable processing enables the center to detect and collect measurable variables from network traffic for monitoring and analysis. Sensors identify these variables and return them to the center.

Before you begin

Enable Variable Storage.

  1. From the main menu, choose Admin > Data Management > Ingestion Configuration.

  2. Enable Variable Storage and save changes.


    Note


    Variable Storage is disabled by default.


Procedure

Step 1

From the main menu, choose Admin > Sensors > Templates.

Step 2

Locate the template and select Edit from the Actions column.

Note

 

You can also create a new template.

Step 3

Locate the protocols with variable inspection capability.

Step 4

Check the checkbox under the Variable Processing column.

Step 5

Save changes.


After you complete the configuration, the center sends information to the sensors. The sensors process and identify the variables. You can view detected variables in the center.

What to do next

To view Variable accesses, choose Explore > All Data > Device list, select a device, click Variable in the drawer, then click Automation.

Group hierarchies

A group hierarchy is a network organization method that

  • allows nesting of groups within parent groups,

  • enables layering and structured representation of devices and components, and

  • facilitates flexible grouping based on user needs.

Filtering data using groups

You can use groups created in the system as criteria to filter data within Cisco Cyber Vision.

  • Created groups are added to filters, helping to refine datasets and compose presets.

  • Filtering by group improves data management and analysis.

Create and customize groups

Organize devices and components into a meaningful group to improve network management and representation.

Use groups to organize devices and components in a hierarchy by location, process, severity, or type. Nesting groups enables a more structured data representation.

Before you begin

Ensure your user account has Admin, Product, or Operator access.

Procedure

Step 1

From the main menu, choose Explore.

Step 2

Select the desired preset and preset view.

Step 3

Select the devices or components to group.

Step 4

Click Manage selection.

Step 5

To create a new group, click Create a new group with selection.

Step 6

Enter group details:

  • Under Basic information, provide the name, description, parent group, and industrial impact.

  • Under Customization, specify color and properties.

  • To add a custom property, click Add new property. Enter a Label, and specify a Value.

Step 7

Click OK to create the group.


The system creates a customized group. This improves organization, visibility, and the management of devices and components.

What to do next

You can manage group hierarchies.

  • To create new parent group, select groups and click Create a new parent group from the manage group icon.

  • To move a group into another group, click Move to existing group from the manage group icon.

  • To delete a group, select it from the preset view and click the delete icon in the drawer.

Group properties

Group properties allow you to store customized information about a group. This includes both standardized labels and user-defined labels.

  • Predefined labels are aligned with the 62443 standard, which specifies security policies and requirements.

  • Users can add custom property labels as needed for additional classification.

Lock groups

Prevent additions, removals, or deletion of a group to secure its structure.

Locking a group is useful when you want to freeze its composition and prevent any accidental or unauthorized changes. Once locked, you cannot add or remove components or delete the group until it is unlocked.

Procedure

Step 1

From the main menu, choose Explore.

Step 2

Select the desired preset, then choose Map view.

Step 3

Select the group you want to lock.

Step 4

Click the edit icon in the drawer.

Step 5

Enable the lock option, then click OK to confirm.


The group is locked. ou cannot add components, remove components, or delete the group until you unlock it.

What to do next

If you need to make changes, unlock the group before editing its components or deleting it.

Conduits

A conduit is a network grouping mechanism that

  • aggregates activity among related devices and components,

  • enhances visibility into network interactions within the group, and

  • simplifies monitoring and management of grouped resources.

Usage

Conduits enable you to combine multiple devices or components into a single group for tracking and analyzing network activity. With conduits, you can identify patterns, detect anomalies, and apply policies across all group members instead of configuring devices or components individually.

Active Discovery

Active Discovery is a feature to enforce data enrichment on the network. Active Discovery is an optional feature that explores traffic in an active way. All components are not found by Cisco Cyber Vision because those devices have not been communicating from the moment the solution started to run on the network. Some information, like firmware version, can be difficult to obtain because it is not exchanged often between components.

With Active Discovery enabled, broadcast and/or unicast messages are sent to the targeted subnetworks or devices through sensors, to speed up network discovery. Returned responses are analyzed and tagged as Active Discovery. Components and activitiesare clarified with additional and more reliable information than may be found through passive DPI. The following table lists the supported protocols.

Broadcast

Unicast

EtherNet/IP

EtherNet/IP

Profinet

SiemensS7

SiemensS7

SNMPv2c

ICMPv6

SNMPv3

WMI

Active Discovery is available on the following devices:

  • Cisco Catalyst IE3300 10G Rugged Series Switch

  • Cisco Catalyst IE3400 Rugged Series Switch

  • Cisco Catalyst IE9300 Rugged Series Switch

  • Cisco Catalyst 9300 Series Switch

  • Cisco Catalyst 9400 Series Switch

  • Cisco IC3000 Industrial Compute Gateway

  • Cisco IR8340 Integrated Services Router Rugged

Active Discovery jobs can be launched at fixed time intervals or just once.

For more information and instructions on how to configure Active Discovery in Cisco Cyber Vision, refer to the Active Discovery Configuration Guide.

Risk Score

Risk Score Definition

A risk score is an indicator of the good health and criticality level of a device. The scale is from 0 to 100 with a color code indicating the level of risk.

Score

Color

Risk level

From 0 to 39

Green

Low

From 40 to 69

Orange

Medium

From 70 to 100

Red

High

Risk scores apply to the following:

  • Filter criteria

  • Device list

  • Device technical sheet

  • Device risk score widget (Home page)

  • Preset highlight widget (Home page)

Risk Score Use

Risk score helps you easily identifying which devices are the most critical within the overall network. It provides limited and simple information on the cybersecurity of the monitored system. It is a first step in security management by showing values and providing solutions to reduce them. The goal: minimize values and keep risk scores as low as possible.

Proposed solutions are:

  • Patch a device to reduce the surface of attack

  • Remove vulnerabilities

  • Update firmware

  • Remove unsafe protocols whenever possible (e.g., FTP, TFTP, Telnet),

  • Install a firewall

  • Limit communications with the outside by removing external IPs

Cyber Vision allows you to define the importance of the devices in your system by grouping them and setting an industrial impact. This function increases or decreases the risk score, allowing you to focus on the most critical devices.

All these actions reduce the risk score which affect its variables, i.e., the impact and the likelihood of a risk. For example, removing unsafe protocols will affect the likelihood of the risk, but patching a device will act on the impact of the risk.

Risk score presents an opportunity to update usage and maintenance habits. However, it is NOT intended to replace a security audit.

In addition, risk scores are used in Cisco Cyber Vision to sort out information by ordering and filtering criteria in lists and to create presets.

Risk Score Computation

Risk score is computed as follows:

Risk = Impact x Likelihood​

Impact is the device “criticality”, that is, what is its impact on the network? Does the device control a small, non-significant part of the network, or does it control a large, critical part of the network? Impact depends on:

  • Device tags: Some device types are more critical. Each device type (or device tag) or device tag category is assigned an industrial impact score by Cisco Cyber Vision. For example, the device is a simple IO device that controls a limited portion of the system or it is a Scada that controls the entire factory. These will not have the same impact if they are compromised.

  • You effect the device impact by moving it into a group and setting the group's industrial impact (from very low to very high).

Likelihood is the probability of this device being compromised Likelihood of risk depends on the following:

  • Device activies and the activity tags. Some protocols are less secure than others. For example, Telnet is less secure than ssh.

  • The exposure of the device communicating with an external subnet.

  • Device vulnerabilities, taking into account their CVSS scoring.

For detailed information about a risk, see Details tab inside the technical sheet.

How to take action:

  1. From the main menu, choose Explore.

  2. Click the drop-down arrow in the top navigation bar and select All Data under Basics.

  3. Click the drop-down arrow in the third filter of the top navigation bar and select Device List.

  4. In the Risk score column, click the sort arrow to display the highest risk scores.

  5. Click a device name under the Device column.

    The right-side panel appears.

  6. In the Risk score, click See details.

    The technical sheet appears.

    In the Overview tab, the Current risk score and the Achievable risk are displayed.

    The achievable risk score is the best score you can reach if you patch all vulnerabilities on the device and remove all potential insecure network activities. The score cannot be zero because devices have intrinsic risks coming from their device type and, if applicable, their group industrial impact.

    The Details tab shows further information about the different risks impacting the device, the percentage of the risk they represent within a total risk score, and the solutions to reduce or even eliminate them.

    Device type and Group impact affect the risk impact variable. Activities and Vulnerabilities affect the risk likelihood.

This page shows the last time the risk score was computed by Cisco Cyber Vision. Risk score computation occurs once an hour. To force immediate computation, use the following command on the Center shell prompt:

sbs-device-engine

Below is an example of the information retrieved during the last computation.

  • Device type: Each device type corresponds to a device tag detected by Cisco Cyber Vision. No action is required at the device type level because each device tag is assigned a risk score by default.

  • Group impact: Action is possible if the device belongs to a group. Decrease the impact by lowering the industrial impact of the group that the device belongs to.

    For example, if you set the group industrial impact to very low (previously high), the overall risk score decreases from 80 to 54.


    Note


    The new industrial impact will factor into the next risk score computation (once an hour).
  • Activities: The most impactful activity tag displays. To lower the risk, remove all potential insecure network activities.

  • Vulnerabilities: Click the See details link for more information about how to patch the vulnerabilities and so reduce the device risk score.

By taking these actions, the risk score should decrease considerably.