Checklist for Provisioning Phase
Task
Populate vulnerability assessment information for supporting devices and network assets.
6.
Vulnerability assessment information describes specific hosts on your network. You can detail this information
for any host, whether it is a host representing a reporting device, a mitigation device, or an important asset on
your network.
This information identifies the operating system, patch levels, and the network services that run on the host.
After you define the hosts, you must activate them by clicking Activate on any page in the web interface.
Result: MARS understands more about the hosts on your network and the services that they run.
For more information, see:
Host and Device Identification and Detail Strategies, page 2-36
•
Device Inventory Worksheet, page 1-18
•
IP Management, page 23-3
•
Service Management, page 23-7
•
User Guide for Cisco Security MARS Local Controller
1-8
Chapter 1
STM Task Flow Overview
78-17020-01