One of the perks of working in technical support is learning something new every day. For instance, just earlier today I was on a call with a customer who wanted to make sure that Scrutinizer supports Viptela SD-WAN IPFIX exports. My colleague James Lawrence had previously touched upon Viptela IPFIX support, so I thought that I would take this opportunity to provide a configuration guide for you.Read more
As a technical support engineer, I have worked with hundreds of customers across the globe. I typically ask them why they choose Scrutinizer as their go-to solution for network monitoring and security needs. While their answers may vary based on the role and the industry, visibility into the network is the key. In this blog, I will list the 5 reasons why internet service providers choose Scrutinizer.
After you celebrate New Year’s Eve, it is time to get to work on those New Year’s resolutions! It is also a good time to reflect, prepare for new challenges, and brush up on security threats to watch out for. In 2019, we expect new technologies and channels to open up additional threat vectors for hackers. As businesses prepare for a new year, I did some research and compiled the list of the top 7 network security predictions.
As I was visiting customers onsite last week, a few of them asked me if we support Cisco TrustSec NetFlow exports. Of course, we do. In fact, Plixer was the first to announce Cisco TrustSec NetFlow Support.
In this blog, we will revisit the benefits and limitations of Cisco TrustSec NetFlow configuration, but let’s start with the basics.
Here at Plixer, we often handle confusion from new customers as to what 95th percentile billing is and how it works. Since it is such a prevalent method, I could not miss an opportunity to explain the math behind it and provide insight into 95th percentile usage in bandwidth billing and network capacity planning. I will also explain how you can use Scrutinizer Traffic Volume reports to figure out your 95th percentile.
During our incident response training conducted all over the world, we work with security professionals to identify various trends related to how malicious actors persist and move within a compromised organization. Once the patient zero has been compromised, the malware typically proceeds with credential harvesting, internal reconnaissance, and attacking other internal systems to spread further into the network. Lately, the so-called east-west, or lateral spread of malware has gained more interest. “Can I monitor lateral movement with NetFlow?” asked one of our customers the other day. “Not only that, but you can alert on it as well,” was my answer.
Earlier today, the newest Distributed Denial of Service attack vectors, such as memcached and CLDAP, came up during a customer’s training session. It sparked quite a few interesting discussions, and I was asked if we could monitor CLDAP traffic with NetFlow. In this blog, I will bring you up to speed on the CLDAP Reflective DDoS attack vector. Then we will dive into Scrutinizer and create a custom report to watch for the malicious activities.
Today, I will be talking about Cisco UCS NetFlow configuration via GUI, including its limitations and differences compared to the configuration via CLI. I will also walk you through the configuration steps, showing how to turn NetFlow on and start getting visibility into your UCS traffic!
You asked, and we listened. By taking advantage of proprietary APIs or even just passing URLs with key variables, Scrutinizer can now be integrated with nearly any authentication or network monitoring platform. Today, I am going to talk about how to set up PRTG NetFlow integration.