All

Data Exfiltration over DNS

How many companies out there are monitoring DNS traffic? Are you concerned about data exfiltration over DNS? How many people even know that is...

Detect Suspicious Network Activity

Security is a top concern for most network administrators and engineers today.  Those that want to detect suspicious network activity within their environment can use...

Detecting Targeted Attacks

Targeted Attacks are well-thought-out efforts combined with tuned pieces of software specifically engineered to penetrate your best security efforts. Detecting targeted attacks often requires...

How to Set the Interface Utilization Threshold

Thresholds are an advanced feature available to all Scrutinizer users. When applied correctly, they can be used to automatically send notification of potential problems on...

Monitoring DNS Traffic

It seems as if monitoring DNS traffic has become pretty popular lately. Our security team just utilized DNS traffic records shown in NetFlow in...

Configure Cisco ISE NetFlow

EDIT 5/30/18: There is a newer version of this article available. In order to configure Cisco ISE NetFlow, we’re going to take advantage of...

DNS Command and Control Detection

This morning our malware incident response system triggered an event for suspected DNS “Command and Control” activities. Our security team jumped on it and...

Detecting DDoS With Netflow

In the past few months, I’ve noticed that the number of support calls we’re taking for help using our NetFlow Analyzer for detecting DDOS...

Cisco DMVPN Configuration

In my previous blog, I discussed what Cisco IWAN is, and the benefits it brings to multi-branch offices connected to an MPLS WAN. Today’s...