Detection of host, application, and user data
Detection of host, application, and user data is a network monitoring capability that
-
collects host and application data using host identity sources and application detectors according to network discovery policy settings,
-
gathers user data through user identity sources according to network discovery and identity policy configurations, and
-
enables comprehensive network asset mapping, forensic analysis, behavioral profiling, access control, and vulnerability mitigation.
Host, application, and user data collection
The system uses network discovery and identity policies to collect host, application, and user data for traffic on your network. The system analyzes discovery and identity data to create a detailed map of network assets, perform forensic analysis, behavioral profiling, access control, and respond to potentials vulnerabilities and hazards to your organization.
The system collect various types of data to enhance network security and performace analytics:
-
Host and Application Data: Collected by host identity sources and application detectors according to the settings in your network discovery policy. Managed devices observe traffic on the network segments you specify.
For more information about fundamentals of host and application data, see Host and application detection fundamentals
-
User Data: Collected by user identity sources according to the settings in your network discovery and identity policies. Use the data for user awareness and user control.
For more information about user identity, see About user identity.
Logging discovery and identity data allows you to take advantage of many features in the system, including:
-
Viewing the network map, which is a detailed representation of your network assets and topology that you can view by grouping hosts and network devices, host attributes, application protocols, or vulnerabilities.
-
Performing application and user controls using access control rules with application conditions, realm conditions, user conditions, user group conditions, and ISE attribute conditions.
-
Viewing complete profiles for detected hosts.
-
Monitoring network assets and user activity through dashboards.
-
Viewing detailed information on the discovery events and user activity.
Logging and using NetFlow connections, if applicable.
-
Associate hosts, servers, and clients with susceptible exploits to identify and mitigate vulnerabilities.
Evaluate the impact that intrusion events have on your network, and tune intrusion rule states so that they provide maximum protection for your network assets.
-
Receiving alerts by email, SNMP trap, or syslog when the system generates either an intrusion event with a specific impact flag, or a specific type of discovery event.
-
Monitoring your organization's compliance with an allow list of allowed operating systems, clients, application protocols, and protocols.
-
Creating correlation policies with rules that trigger and generate correlation events when the system generates discovery events or detects user activity.

Feedback