Network Operations Posts

scottr sd wan
Network Operations

Monitoring SD-WAN Traffic with NetFlow

Many businesses have, or are thinking about replacing their MPLS network infrastructure with Software-Defined Wide Area Networks (SD-WAN). They

Read More
adam
Network Operations

How to Prevent NetFlow Export Storms

When measuring NetFlow volume, we typically speak in thousands of flows per second. That data is exported over UDP

Read More
endpoint protection FI
Network Operations

Endpoint protection isn’t enough: you need network traffic analytics

The recent SANs 2018 Survey on Endpoint Protection and Response makes clear that point-security solutions are not enough to

Read More
mikelp feature
Network Operations

Clearing the Mine Field: Scrutinizer & Lansweeper for Network Monitoring

Greetings fellow sysadmins. Either you’re reading this because you’ve just installed Lansweeper too, or else you’re wondering “What is

Read More
jeff
Network Operations

Scrutinizer SaaS Deployment

Let’s talk about the cloud for a minute. A majority of IT infrastructure has been moving to the cloud

Read More
traci
Network Operations

Extreme Networks: Enabling and Disabling SNMPv1, SNMPv2, and SNMPv3

Why am I seeing SNMPv1 and SNMPv2 attempts when I’ve only got SNMPv3 enabled? It appears some of Extreme’s

Read More
context
Network Operations

Network Traffic Analytics with Gigamon

Quite some time ago, my colleague wrote about our Gigamon NetFlow support. That article will help you understand how

Read More
jake
Network Operations

Best Practices in Network Forensics, Part II: Insider Threats

In part 1 of our Best Practices in Network Forensics we discussed different integrations and how you can tie

Read More
scottr
Network Operations

Username Reporting – NetFlow Integration with Cisco ISE

Traditionally in networking, we track down end systems by searching on IP addresses. Although this is a great way

Read More
Network Operations

How to detect SSH credential misuse with network traffic analytics

According to a recent article on BleepingComputer, a backdoor Python library can steal SSH credentials. This can lead to ssh credential

Read More