Viewing Correlation Events
When a correlation rule within an active correlation policy triggers, the system generates a correlation event and logs it to the database.
Note |
When a compliance white list within an active correlation policy triggers, the system generates a white list event. |
You can view a table of correlation events, then manipulate the event view depending on the information you are looking for.
In a multidomain deployment, you can view data for the current domain and for any descendant domains. You cannot view data from higher level or sibling domains.
The page you see when you access correlation events differs depending on the workflow you use. You can use the predefined workflow, which includes the table view of correlation events. You can also create a custom workflow that displays only the information that matches your specific needs.
Before you begin
You must be an Admin or Security Analyst user to perform this task.
Procedure
Step 1 |
Choose . Optionally, to use a different workflow, including a custom workflow, click (switch workflow) by the workflow title.
|
||
Step 2 |
Optionally, adjust the time range as described in Changing the Time Window. |
||
Step 3 |
Perform any of the following actions:
|
Correlation Event Fields
When a correlation rule triggers, the system generates a correlation event. The fields in the correlation events table that can be viewed and searched are described in the following table.
Field |
Description |
---|---|
Description |
The description of the correlation event. The information in the description depends on how the rule was triggered. For example, if the rule was triggered by an operating system information update event, the new operating system name and confidence level appears. |
Device |
The name of the device that generated the event that triggered the policy violation. |
Domain |
The domain of the device whose monitored traffic triggered the policy violation. This field is only present if you have ever configured the Firepower Management Center for multitenancy. |
Impact |
The impact level assigned to the correlation event based on the correlation between intrusion data, discovery data, and vulnerability information. When searching this field, valid case-insensitive values are
|
Ingress Interface or Egress Interface |
The ingress or egress interface in the intrusion or connection event that triggered the policy violation. |
Ingress Security Zone or Egress Security Zone |
The ingress or egress security zone in the intrusion or connection event that triggered the policy violation. |
Inline Result |
One of:
When using this field to search for policy violations triggered by intrusion events, type either:
Note that the system does not drop packets in a passive deployment, including when an inline set is in tap mode, regardless of the rule state or the drop behavior of the intrusion policy. |
Policy |
The name of the policy that was violated. |
Priority |
The priority of the correlation event, which is determined by
the priority of either the triggered rule or the violated correlation policy.
When searching this field, enter
|
Rule |
The name of the rule that triggered the policy violation. |
Security Intelligence Category |
The name of the object that represents or contains the blocked IP address in the event that triggered the policy violation. When searching this field, specify the Security Intelligence category associated with the correlation event that triggered the policy violation. The Security Intelligence category can be the name of a Security Intelligence object, the global Block list, a custom Security Intelligence list or feed, or one of the categories in the Intelligence Feed. |
Source Continent or Destination Continent |
The continent associated with the source or destination host IP addresses in the event that triggered the policy violation. |
Source Country or Destination Country |
The country associated with the source or destination IP address in the event that triggered the policy violation. |
Source Host Criticality or Destination Host Criticality |
The user-assigned host criticality of the source or destination
host involved in the correlation event:
Note that only correlation events generated by rules based on discovery events, host input events, or connection events contain a source host criticality. |
Source IP or Destination IP |
The IP address of the source or destination host in the event that triggered the policy violation. |
Source Port/ICMP Type or Destination Port/ICMP Code |
The source port or ICMP type for the source traffic or the destination port or ICMP code for destination traffic associated with the event that triggered the policy violation. |
Source User or Destination User |
The name of the user logged in to the source or destination host in the event that triggered the policy violation. |
Time |
The date and time that the correlation event was generated. This field is not searchable. |
Count |
The number of events that match the information that appears in each row. Note that the Count field appears only after you apply a constraint that creates two or more identical rows. This field is not searchable |