All
traci

Extreme Networks: Enabling and Disabling SNMPv1, SNMPv2, and SNMPv3

Why am I seeing SNMPv1 and SNMPv2 attempts when I’ve only got SNMPv3 enabled? It appears some of Extreme’s switches handle their SNMP configurations...

context

Network Traffic Analytics with Gigamon

Quite some time ago, my colleague wrote about our Gigamon NetFlow support. That article will help you understand how to configure your Gigamon appliances...

joanna

Splunk NetFlow Support: Viewing Your NetFlow in Splunk

The last time we showed you how to seamlessly integrate Splunk with Scrutinizer was all the way back in 2015. Since then, we have...

everythings okay

This WannaCry Phishing Email is an Empty Threat

One of last year’s biggest threats is rearing its ugly head again in the form of a WannaCry phishing email scam. Early on June...

jake

Best Practices in Network Forensics, Part II: Insider Threats

In part 1 of our Best Practices in Network Forensics we discussed different integrations and how you can tie in your existing tools with...

briand

Username Reporting – NetFlow Integration with ForeScout CounterACT

User attribution is one of the things I’m asked for most frequently by customers who are looking at network traffic analytics. The use case...

annam

How to Monitor Lateral Movement with NetFlow

During our incident response training conducted all over the world, we work with security professionals to identify various trends related to how malicious actors...

scottr

Username Reporting – NetFlow Integration with Cisco ISE

Traditionally in networking, we track down end systems by searching on IP addresses. Although this is a great way to narrow in on an...

GDPR phishing scams

Watch Out for GDPR Phishing Scams

The EU’s General Data Protection Regulation (GDPR) goes into effect starting today. Even if you don’t follow news related to data privacy, you’ve probably...