![]() In SecureX, click the Administration tab and choose API Clients > Generate API Client.Note: You generate API credentials in Cisco SecureX, using the credentials when you configure it. The module displays on the My Integration Modules page and shows whether it is integrated or if there are errors with the configuration. When it finishes, a message displays indicating that there were no issues with the configuration or that errors were found. A message displays in the upper portion of the form (the form changes to Edit Module since it’s been saved) indicating that the health check is running. Fill in the fields, following the instructions under Quick Start.Ī health check is performed to determine if the module was properly configured.On the Available Integration Modules page, navigate to the Cisco Secure Endpoint module and click Enable.On the SecureX menu bar, click the Integration Modules tab.Choose one of the following regions (based on the location of your organization):.Log into Cisco SecureX with your username and password.You must have a username and password that has admin privileges for SecureX. If you don't have a SecureX account, contact your Cisco sales representative to get one. If you haven’t already, enable your SecureX account as explained in Getting Started before performing the following steps. In the panel on the left, click Advanced Settings > Orbital.Ĭheck the Enable Orbital checkbox, and then click Save.Ĭonfiguring the Cisco Secure Endpoint module in SecureX Click the policy you want to deploy for all the assets to be ingested.Log into the Cisco Secure Endpoint console.The asset where you deploy Orbital must comply with the Orbital System Requirements. The Orbital endpoint agent (node) is automatically downloaded and installed when you enable Orbital in your CSE policy. You must enable the Orbital endpoint agent in an existing CSE policy for your assets. For more information, see Deploying Connectors. Install the Cisco Secure Endpoint agent on all the assets to be ingested into Cisco Vulnerability Management. Configure the CSE in Cisco Vulnerability Management.ĭeploying the Cisco Secure Endpoint Agent.Configure the Cisco Secure Endpoint module in SecureX.Deploy the Cisco Secure Endpoint agent on the assets that you want to integrate.The following list shows the high-level steps required to configure Orbital and Cisco Vulnerability Management: For information about licenses, see License comparison. Microsoft Internet Explorer (Windows Only)Ĭonfiguration of Orbital and Cisco Vulnerability Managementīefore you can configure Orbital and Cisco Vulnerability Management, you must have a Cisco Secure Endpoint Advantage or Premier account.The following applications have data quality that is supported: Supported Applications with Supported Data Quality ![]() Windows 10 (1803 or later IOT enterprise also supported).The following operating systems have data quality that is supported: Operating Systems with Supported Data Quality However, their data quality is unverified and may not be supported by Service Level Agreements. ![]() Important! Inference returns vulnerabilities for many other operating systems and applications that are not listed. Supported Operating Systems and Applicationsįor the following lists of operating systems and applications, the Cisco Secure Endpoint returns verified data for vulnerabilities, and if there are issues, the data quality may be investigated and fixed, based on your Service Level Agreement Vulnerability and asset data is then collated to create risk scores, and you see the vulnerabilities and risk scores in Cisco Vulnerability Management. The CSE retrieves and processe s the data every hour from the Orbital server. The Orbital Se rv er consolidates the data within a six - hour window. The Orbital endpoint agent sends asset data to the Orbital Server. The following diagram show s how data flows between C SE assets and Cisco Vulnerability Management and how they are processed during a run. Note: This article refers to the integration of Cisco Secure Endpoint with Cisco Vulnerability Management and not the Cisco Secure Endpoint agent installed on the assets in your environment. Use it to access all the capability and functionality of your CSE assets. The Cisco Secure Endpoint (CSE) is integrated with Cisco Vulnerability Management. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |