In this video, I'm going to walk through the installation of a Stealthwatch Cloud sensor in my LAN environment. Be aware that Stealthwatch Cloud is different than Stealthwatch Enterprise. Stealthwatch Cloud gives you visibility into private networks, public clouds and hybrid environments.
Integrating Firepower with Cisco Threat Response
Trustsec: Design, Scale, and Brownfield Considerations
Trustsec: Configuring the Trustsec Matrix and SGACLs
Trustsec: Configuring SXP
Trustsec: Configuring Network Device Admission Control (NDAC)
Trustsec: Digging into SGT bindings, priority, and SXP
Trustsec: Overview of Trustsec and Terminology
FTD Advanced Troubleshooting Menu
Configuring FQDN ACLs on Firepower 6.3
In this video, we’re going to walk through the configuring of FQDN ACLs on Firepower 6.3. This was a feature that was just added in this latest release. The goal of this configuration is the block source or destination based on FQDN. In this case, I’m blocking a single host FQDN from accessing another host (my proxy) based on it’s FQDN.
Copying, Backing Up, and Restoring FTD Device Configuration
External Lookups with Firepower 6.3
RADIUS External Authentication for FTD and FMC
ThreatCentric NAC with Qualys and ISE
Configuring pxGrid on Splunk for Rapid Threat Containment with ISE
In this video, we’re going to configure pxGrid on Splunk. Once that’s completed, you’ll be able to quarantine endpoints from Splunk using ISE. This requires a bit more setup that your usual pxGrid configuration so I’ll include the commands I used in this post so one may copy and paste for the Linux portion of this. Whether or not you’re using CA-signed certs for pxGrid or self-signed in your ISE environment, this configuration should work for both.
1.45 - Setting up and walkthrough of the Cisco Security Suite App in Splunk
In this video, we’re going to set up the Cisco Security Suite app within Splunk and walk through some of the cool things that we can do from the dashboard. One thing to note though is that this app was last updated in 2016 so there’s definitely some massaging that needs to be done to make it compatible with certain current add-ons.
Configuring FTD devices to send Syslog to Splunk
Configuring the Cisco Network App in Splunk
Configuring the Cisco eStreamer eNcore Add-on for Splunk and Firepower
In this video, we’ll be configuring the Cisco eStreamer eNcore app that allows Splunk to ingest data from Cisco Firepower Management Center. My previous blog post on this subject was based on the previous app. This video should be followed instead of the previous blog post since the new app makes it much easier.