Search
This chapter explains how to perform content updates. To upgrade threat defense software or chassis, see the Cisco Secure Firewall Threat Defense Upgrade Guide for Cloud-Delivered Firewall Management Center. This chapter explains how to perform content updates. To upgrade threat defense software or chassis, see the Cisco Secure Firewall Threat Defense Upgrade Guide for Cloud-Delivered Firewall Management Center.
- Jun 09, 2025
- Product Secure Firewall Threat Defense
- Version 7.6
Create a Cisco Security Cloud Control User for the Passive Identity Agent
Complete the tasks discussed in Create a Passive Identity Agent Identity Source.You cannot use external authentication with the Passive Identity Agent user. This task discusses how to create a Cloud-Delivered Firewall Management Center user with sufficient permissions to communicate with the passive identity agent. This user has limited privileges to perform other tasks; the user is expected only to enable communication with the passive identity agent.Use only the Passive Identity User role for the passive identity agent user. In particular, do not use the Administrator role for the passive identity agent because Administrator will be logged off at a regular basis as the passive identity agent communicates with the Cloud-Delivered Firewall Management Center. Log in to the Firewall in Security Cloud Control.Click Administration>Firewall Management Center >system gear icon> Users.Click Create User.Create the user as discussed in Add or Edit an Internal User in the Cisco Secure Firewall Management Center Administration Guide.Select the Passive Identity User role.The following figure shows an example.The passive identity agent user must be assigned the Passive Identity User role and no other role.Do not choose a role for the passive identity agent user other than Passive Identity User because the agent will not function properly.Click Save.About Passive Identity Agent Installation.
- Jul 29, 2025
- Product Secure Firewall Threat Defense
- Version 7.6
You can change the device hostname.In the Firewall Hostname field, enter a new hostname for the device.Click Save.Review and deploy the changes you made now, or wait and deploy multiple changes at once. You can change the device hostname. You can change the device hostname. In the Firewall Hostname field, enter a new hostname for the device.Click Save.Review and deploy the changes you made now, or wait and deploy multiple changes at once.
- Jul 29, 2025
Use the Cloud Services page to manage cloud-based services.Connecting to the Cisco Success Network and configuring which events are sent to the Cisco cloud are features that can be configured on FDM-managed devices running software versions 6.6 and higher. Use the Cloud Services page to manage cloud-based services. Connecting to the Cisco Success Network and configuring which events are sent to the Cisco cloud are features that can be configured on FDM-managed devices running software versions 6.6 and higher.
- Jul 29, 2025
Move FDM-Managed Access Control Rules
Use this feature to move access control rules by cutting it from their current position in a policy and pasting them to a new position in the same policy or to the policy of a different FDM-managed device. You can paste the rule before or after other rules in a policy, so the rule evaluates that network traffic in its proper order within the policy.
- Jul 29, 2025
Copy FDM-Managed Access Control Rules
Use this procedure to copy access control rules by copying it from their current position and pasting them to a new position in the same policy or by pasting them to the policy of a different FDM-managed device. You can paste the rule before or after other rules in the policy, so the rule evaluates that network traffic in its proper order within the policy.
- Jul 29, 2025
Create a Syslog Server Object for Secure Logging Analytics (SaaS)
Create a syslog server object with the IP address, TCP port, or UDP port of the Secure Event Connector (SEC) you want to send events to. You would create one syslog object for every SEC that you have onboarded to your tenant but you would only send events from one rule to one syslog object representing one SEC. PrerequisiteThis task is part of a larger workflow. See Implementing Secure Logging Analytics (SaaS) for FDM-Managed Devices before you begin.
- Jul 29, 2025
Configure Network Time Protocol (NTP) servers to set the time on the system.Select whether you want to use your own (manual) or Cisco's time servers.New NTP Server. Enter the fully qualified domain name or IP address of the NTP server you want to use. For example, ntp1.example.com or 10.100.10.10.Use Default.Click Save.Review and deploy the changes you made now, or wait and deploy multiple changes at once.
- Jul 29, 2025
Logging Settings in an FDM-Managed Access Control Rule
Logging Settings for Access Control RuleThe logging settings for an access rule determine whether connection events are issued for traffic that matches the rule. You should log connections according to the security and compliance needs of your organization. If your goal is to limit the number of events you generate and improve performance, only enable logging for the connections critical to your analysis. However, if you want a broad view of your network traffic for profiling purposes, you can enable logging for additional connections.Logging blocked TCP connections during a Denial of Service (DoS) attack can affect system performance and overwhelm the database with multiple similar events. Before you enable logging for a Block rule, consider whether the rule is for an Internet-facing interface or other interface vulnerable to DoS attack.
- Jul 29, 2025
Enabling or Disabling Web Analytics
Enabling web analytics provides anonymous product usage information to Cisco based on page hits. The information includes pages viewed, the time spent on a page, browser versions, product version, device hostname, and so forth. This information can help Cisco determine feature usage patterns and help Cisco improve the product. All usage data is anonymous and no sensitive data is transmitted. You can use Security Cloud Control to configure this feature on all versions of FDM-managed device.Web analytics is enabled by default.Click the Web Analytics tab.Click the Enable slider for the Web Analytics feature to change the setting as appropriate.Click Save. Review and deploy the changes you made now, or wait and deploy multiple changes at once.
- Jul 29, 2025
Results 1-10 out of 172
- https://secure.cisco.com
- https://secure.cisco.com/secure-workload
Cisco Multicloud Defense White Paper
Abstract Applications and workloads are no longer limited to the data center. Today, organizations also deploy workloads and applications to public and private cloud environments, oftentimes more than one cloud, for greater agility, flexibility, and scale. As organizations continue to expand their m...
- https://secure.cisco.com/ciscosecure-multicloud-defense/docs/cisco-multicloud-defense-white-paper
- https://secure.cisco.com/secure-firewall
Cisco Secure Multicloud Defense
- https://secure.cisco.com/ciscosecure-multicloud-defense
Create beautiful product and API documentation with our developer friendly platform.
- https://secure.cisco.com/login?redirect_uri=
Cisco Multicloud Defense Architecture Guide
Overview The Cisco Multicloud Defense Architecture Guide provides Reference Architecture diagrams of how the Cisco Multicloud Defense solution is deployed within each Cloud Provider and for each security use-case. These diagrams describe the architectural deployment scenarios available to address di...
- https://secure.cisco.com/ciscosecure-multicloud-defense/docs/cisco-multicloud-defense-architecture-guide
Highlight overview of the top deliverables in the release. NOTE: Some highlights will not have associated documentation. To see the full list of 7.6 Release Deliverables, visit New Features in Management Center Version 7.6
- https://secure.cisco.com/secure-firewall/docs/whats-new-in-74
Secure Workload and Secure Firewall - Overview
The recipe for a robust zero trust cybersecurity strategy
- https://secure.cisco.com/secure-workload/docs/secure-workload-and-secure-firewall
- https://secure.cisco.com/secure-workload/changelog