• Basics of Cisco Defense Orchestrator
    • Create a CDO Tenant
    • Sign in to CDO
    • Migrate to Cisco Security Cloud Sign On Identity Provider
    • Launch a CDO Tenant
    • Manage Super Admins on Your Tenant
    • About CDO Licenses
    • Secure Device Connector
    • Software and Hardware Supported by CDO
    • Browsers Supported in CDO
    • CDO Platform Maintenance Schedule
    • CDO Tenant Management
    • Manage Users in CDO
    • Active Directory Groups in User Management
    • Create a New CDO User
    • User Roles in CDO
    • Add a User Account to CDO
    • Edit a User Record for a User Role
    • Delete a User Record for a User Role
    • CDO Services Page
    • CDO Device and Service Management
    • CDO Inventory Information
    • CDO Labels and Filtering
    • Use CDO Search Functionality
      • Page Level Search
      • Global Search
    • CDO Command Line Interface
    • Bulk Command Line Interface
    • Command Line Interface Macros
    • Compare ASA Configurations Using CDO
    • ASA Bulk CLI Use Cases
    • ASA Command Line Interface Documentation
    • Command Line Interface Documentation
    • Restore an ASA Configuration
    • Manage ASA and Cisco IOS Device Configuration Files
    • Objects
    • Reading, Discarding, Checking for, and Deploying Changes
    • Read All Device Configurations
    • Read Configuration Changes from an ASA to CDO
    • Read Configuration Changes from FDM-Managed Device to CDO
    • Read Changes from Cisco IOS or SSH to CDO
    • Preview and Deploy Configuration Changes for All Devices
    • Deploy Configuration Changes from CDO to ASA
    • Deploy Configuration Changes from CDO to FDM-Managed Device
    • Deploy Changes to a device
    • Bulk Deploy Device Configurations
    • Preview and Deploy On-Prem Firewall Management Center Configurations
    • Scheduled Automatic Deployments
    • Check for Configuration Changes
    • Discard Changes
    • Discard On-Prem Firewall Management Center Configuration Changes
    • Out-of-Band Changes on Devices
    • Synchronizing Configurations Between Defense Orchestrator and Device
    • Conflict Detection
    • Automatically Accept Out-of-Band Changes from your Device
    • Resolve Configuration Conflicts
    • Schedule Polling for Device Changes
    • Schedule a Security Database Update
    • Monitoring and Reporting
    • Change Logs
    • ASA Change Log Specifics
    • Change Log Entries after Deploying to an ASA
    • Change Log Entries after Reading Changes from an ASA
    • Change Log Entries after Deploying to FDM-Managed Device
    • Change Log Entries after Reading Changes from an FDM-Managed Device
    • Viewing Change Log Diffs
    • Exporting the Change Log to a CSV File
    • Change Request Management
    • FDM-Managed Device Executive Summary Report
    • Jobs Page
    • Workflows Page
    • Network Address Translation
    • Order of Processing NAT Rules
    • Network Address Translation Wizard
    • Common Use Cases for NAT
    • Onboard Devices and Services
  • Onboard Secure Firewall Threat Defense Devices
  • Onboard ASA Devices
  • Onboard an On-Prem Firewall Management Center
  • Migrate On-Prem Management Center Managed Secure Firewall Threat Defense to Cloud-delivered Firewall Management Center
  • Onboard an Umbrella Organization
  • Onboard Cisco Defense Orchestrator Integrations
  • Onboard Meraki MX Devices
  • Onboard AWS Devices
  • Onboard Duo Admin Panel
  • Upgrade Devices and Services
  • Managing On-Prem Firewall Management Center with Cisco Defense Orchestrator
  • Managing Cisco Secure Firewall Threat Defense Devices with Cloud-delivered Firewall Management Center
  • Managing FDM Devices with Cisco Defense Orchestrator
  • Managing ASA with Cisco Defense Orchestrator
  • Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator
  • Managing Umbrella with Cisco Defense Orchestrator
  • Managing Meraki with Cisco Defense Orchestrator
  • Managing IOS Devices with Cisco Defense Orchestrator
  • Managing AWS with Cisco Defense Orchestrator
  • Managing SSH Devices with Cisco Defense Orchestrator
  • Integrating CDO with Cisco Security Cloud Sign On
  • Virtual Private Network Management
  • Monitor Multi-Factor Authentication Events
  • Cisco Security Analytics and Logging
  • FTD Dashboard
  • Cisco Secure Dynamic Attributes Connector
  • Troubleshooting
  • FAQ and Support
  • Security and Internet Access
  • Open Source and 3rd Party License Attribution
  • Terraform

Page Level Search

The page-level search enables you to search specific items on the Inventory, Policies, Objects, VPN, Change Log, and Jobs pages.

  • In the Inventory space, you can simply start typing in the search bar, and devices that fit the search criteria will be displayed. You can type any partial part name of the device, IP address, or the serial number of the physical device to find the device.

  • In the Policies space, you can search policies by their name, components or objects used in them.

  • In the Objects space, you can search for an object by typing any partial part of the name of the object, or partial IP Address, port, or protocols.

  • In the VPN space, you can search by tunnel name, device name, and IP address used in the VPN policies.

  • In the Change log space, you can search logs based on events, device names, or actions.

Procedure


Step 1

Navigate to the search bar near the top of the interface.

Step 2

Type the search criteria into the Search Bar and the corresponding results will be displayed.


Copyright © 2024, Cisco Systems, Inc. All rights reserved.