CCNA CyberOps SECOPS – Objective 4.9

Photo by Oleksandr Pidvalnyi from Pexels
Reading Time: 1 minute

Identify a correlation rule to distinguish the most significant alert from a given set of events from multiple data sources using the firepower management console

Implementing Cisco Cybersecurity Operations (210-255)

The Cisco Firepower Management Center has the ability for custom correlation rules. These rules can be created to trigger based on many different attributes. Once triggered a correlation rule can then be used to perform an action. I would suggest reviewing the documentation, especially the examples.

The results of a correlation policy can provide alerts to events that are specific to an organization.