| Scan Which Address(es) From Event? 
                                             				  
                                           | When you use an Nmap scan as a response to a correlation rule,
                                             					 select one of the following options to control which address in the event is
                                             					 scanned, that of the source host, the destination host, or both: 
                                             				  
                                           
                                              
                                                						
                                                Scan Source and Destination
                                                      							 Addresses scans the hosts represented by the source IP address and
                                                   						  the destination IP address in the event. 
                                                   						
                                                 
                                                						
                                                Scan Source Address
                                                      							 Only scans the host represented by the event’s source IP address. 
                                                   						
                                                 
                                                						
                                                Scan Destination Address
                                                      							 Only scans the host represented by the event’s destination IP
                                                   						  address. 
                                                   						
                                                 | N/A 
                                             				  
                                           | 
                                    
                                       | Scan Types 
                                             				  
                                           | Select how Nmap scans ports: 
                                             				  
                                           
                                              
                                                						
                                                The 
                                                   						  TCP Syn 
                                                      						  scan connects quickly to thousand of ports
                                                   						  without using a complete TCP handshake. This options allows you to scan quickly
                                                   						  in stealth mode on hosts where the 
                                                   						  adminaccount has
                                                   						  raw packet access or where IPv6 is not running, by initiating TCP connections
                                                   						  but not completing them. If a host acknowledges the Syn packet sent in a TCP
                                                   						  Syn scan, Nmap resets the connection. 
                                                						
                                                The 
                                                   						  TCP Connect scan
                                                   						  uses the 
                                                   						  connect()system
                                                   						  call to open connections through the operating system on the host. You can use
                                                   						  the TCP Connect scan if theadminuser on the 
                                                   						  Firepower Management Center
                                                   						  or managed device does not have raw packet privileges on a host or you are
                                                   						  scanning IPv6 networks. In other words, use this option in situations where the
                                                   						  TCP Syn scan cannot be used. 
                                                						
                                                The 
                                                   						  TCP ACK scan
                                                   						  sends an ACK packet to check whether ports are filtered or unfiltered. 
                                                   						
                                                 
                                                						
                                                The 
                                                   						  TCP Window scan
                                                   						  works in the same way as a TCP ACK scan but can also determine whether a port
                                                   						  is open or closed. 
                                                   						
                                                 
                                                						
                                                The 
                                                   						  TCP Maimon scan
                                                   						  identifies BSD-derived systems using a FIN/ACK probe. 
                                                   						
                                                 | TCP Syn: 
                                             					 -sS TCP Connect: 
                                             					 -sT TCP ACK: 
                                             					 -sA TCP Window: 
                                             					 -sW TCP Maimon: 
                                             					 -sM | 
                                    
                                       | Scan for UDP ports 
                                             				  
                                           | Enable to scan UDP ports in addition to TCP ports. Note that
                                             					 scanning UDP ports may be time-consuming, so avoid using this option if you
                                             					 want to scan quickly. 
                                             				  
                                           | -sU
 | 
                                    
                                       | Use Port From Event 
                                             				  
                                           | If you plan to use the remediation as a response in a
                                             					 correlation policy, enable to cause the remediation to scan only the port
                                             					 specified in the event that triggers the correlation response. 
                                             				  
                                           
                                              
                                                						
                                                Select 
                                                   						  On to scan the
                                                   						  port in the correlation event, rather than the ports you specify during Nmap
                                                   						  remediation configuration. If you scan the port in the correlation event, note
                                                   						  that the remediation scans the port on the IP addresses that you specify during
                                                   						  Nmap remediation configuration. These ports are also added to the remediation’s
                                                   						  dynamic scan target. 
                                                   						
                                                 
                                                						
                                                Select 
                                                   						  Off to scan only
                                                   						  the ports you specify Nmap remediation configuration. 
                                                   						
                                                 You can also control whether Nmap collects information about
                                             					 operating system and server information. Enable the 
                                             					 Use Port From
                                                						Event option to scan the port associated with the new server. 
                                             				  
                                           | N/A 
                                             				  
                                           | 
                                    
                                       | Scan from reporting detection engine 
                                             				  
                                           | Enable to scan a host from the appliance where the detection
                                             					 engine that reported the host resides. 
                                             				  
                                           
                                              
                                                						
                                                To scan from the appliance running the reporting detection
                                                   						  engine, select 
                                                   						  On. 
                                                   						
                                                 
                                                						
                                                To scan from the appliance configured in the remediation, select
                                                   						  
                                                   						  Off. 
                                                   						
                                                 | N/A 
                                             				  
                                           | 
                                    
                                       | Fast Port Scan 
                                             				  
                                           | Enable to scan only the TCP ports listed in the 
                                             					 nmap-servicesfile
                                             					 located in the/var/sf/nmap/share/nmap/nmap-servicesdirectory on the
                                             					 device that does the scanning, ignoring other port settings. Note that you
                                             					 cannot use this option with the 
                                             					 Port Ranges and Scan
                                                						Order option. 
                                              
                                                						
                                                To scan only the ports listed in the 
                                                   						  nmap-servicesfile
                                                   						  located in the/var/sf/nmap/share/nmap/nmap-servicesdirectory on the
                                                   						  device that does the scanning, ignoring other port settings, select 
                                                   						  On. 
                                                						
                                                To scan all TCP ports, select 
                                                   						  Off. 
                                                   						
                                                 | -F
 | 
                                    
                                       | Port Ranges and Scan Order 
                                             				  
                                           | Set the specific ports you want to scan, using Nmap port
                                             					 specification syntax, and the order you want to scan them. Note that you cannot
                                             					 use this option with the 
                                             					 Fast Port Scan
                                             					 option. 
                                             				  
                                           | -p
 | 
                                    
                                       | Probe open ports for vendor and version information 
                                             				  
                                           | Enable to detect server vendor and version information. If you
                                             					 probe open ports for server vendor and version information, Nmap obtains server
                                             					 data that it uses to identify servers. It then replaces the Cisco server data
                                             					 for that server. 
                                             				  
                                           | -sV
 | 
                                    
                                       | Service Version Intensity 
                                             				  
                                           | Select the intensity of Nmap probes for service versions. 
                                             				  
                                           
                                              
                                                						
                                                To use more probes for higher accuracy with a longer scan,
                                                   						  select a higher number. 
                                                   						
                                                 
                                                						
                                                To use fewer probes for less accuracy with a faster scan, select
                                                   						  a lower number. 
                                                   						
                                                 | --version-intensity<intensity>
 | 
                                    
                                       | Detect Operating System 
                                             				  
                                           | Enable to detect operating system information for the host. 
                                             				  
                                           If you configure detection of the operating system for a host,
                                             					 Nmap scans the host and uses the results to create a rating for each operating
                                             					 system that reflects the likelihood that the operating system is running on the
                                             					 host. 
                                             				  
                                           | -o
 | 
                                    
                                       | Treat All Hosts As Online 
                                             				  
                                           | Enable to skip the host discovery process and run a port scan on
                                             					 every host in the target range. Note that when you enable this option, Nmap
                                             					 ignores settings for 
                                             					 Host Discovery
                                                						Method and 
                                             					 Host Discovery Port
                                                						List. 
                                             				  
                                           
                                              
                                                						
                                                To skip the host discovery process and run a port scan on every
                                                   						  host in the target range, select 
                                                   						  On. 
                                                   						
                                                 
                                                						
                                                To perform host discovery using the settings for 
                                                   						  Host Discovery
                                                      							 Method and 
                                                   						  Host Discovery Port
                                                      							 List and skip the port scan on any host that is not available,
                                                   						  select 
                                                   						  Off. 
                                                   						
                                                 | -PN
 | 
                                    
                                       | Host Discovery Method 
                                             				  
                                           | Select to perform host discovery for all hosts in the target
                                             					 range, over the ports listed in the 
                                             					 Host Discovery Port
                                                						List, or if no ports are listed, over the default ports for that
                                             					 host discovery method. 
                                             				  
                                           Note that if you also enabled 
                                             					 Treat All Hosts As
                                                						Online, however, the 
                                             					 Host Discovery
                                                						Method option has no effect and host discovery is not performed. 
                                             				  
                                           Select the method to be used when Nmap tests to see if a host is
                                             					 present and available: 
                                             				  
                                           
                                              
                                                						
                                                The 
                                                   						  TCP SYN option
                                                   						  sends an empty TCP packet with the SYN flag set and recognizes the host as
                                                   						  available if a response is received. TCP SYN scans port 80 by default. Note
                                                   						  that TCP SYN scans are less likely to be blocked by a firewall with stateful
                                                   						  firewall rules. 
                                                   						
                                                 
                                                						
                                                The 
                                                   						  TCP ACK option
                                                   						  sends an empty TCP packet with the ACK flag set and recognizes the host as
                                                   						  available if a response is received. TCP ACK also scans port 80 by default.
                                                   						  Note that TCP ACK scans are less likely to be blocked by a firewall with
                                                   						  stateless firewall rules. 
                                                   						
                                                 
                                                						
                                                The 
                                                   						  UDP option
                                                   						  sends a UDP packet and assumes host availability if a port unreachable response
                                                   						  comes back from a closed port. UDP scans port 40125 by default. 
                                                   						
                                                 | TCP SYN: 
                                             					 -PS TCP ACK: 
                                             					 -PA UDP: 
                                             					 -PU | 
                                    
                                       | Host Discovery Port List 
                                             				  
                                           | Specify a customized list of ports, separated by commas, that
                                             					 you want to scan when doing host discovery. 
                                             				  
                                           | port list for host discovery method 
                                             				  
                                           | 
                                    
                                       | Default NSE Scripts 
                                             				  
                                           | Enable to run the default set of Nmap scripts for host discovery
                                             					 and server and operating system and vulnerability detection. See 
                                             					 https://nmap.org/nsedoc/categories/default.html
                                             					 for the list of default scripts. 
                                             				  
                                           
                                              
                                                						
                                                To run the default set of Nmap scripts, select 
                                                   						  On. 
                                                   						
                                                 
                                                						
                                                To skip the default set of Nmap scripts, select 
                                                   						  Off. 
                                                   						
                                                 | -sC
 | 
                                    
                                       | Timing Template 
                                             				  
                                           | Select the timing of the scan process; the higher the number you
                                             					 select, the faster and less comprehensive the scan. 
                                             				  
                                           | 0: 
                                             					 T0(paranoid) 1: 
                                             					 T1(sneaky) 2: 
                                             					 T2(polite) 3: 
                                             					 T3(normal) 4: 
                                             					 T4(aggressive) 5: 
                                             					 T5(insane) |