Description

Suspicious Outbound Traffic Monitoring use case helps you catch bad guys quickly by monitoring activity within the network and looking for suspicious traffic leaving your perimeter. Typically, compromised systems often call home to command-and-control servers. So this use case helps you monitor the network traffic to identify such activity. Benefits of Suspicious Outbound Traffic Monitoring use case:

  • Active channel to monitor real-time traffic with unusual traffic outbound traffic patterns.
  • Visualize suspicious traffic such as suspicious servers, ports, or services.
  • Monitor traffic to dark address space.
  • Focus on security events that need action.
  • Reduced false positives and noise.

ArcSight Connectors supported:

  • ArcSight Reputation Security Monitoring (RepSM),
  • Check Point FW-1,
  • Cisco PIX Firewall,
  • Cisco PIX/ASA Syslog, version 8.5, 8.6,
  • F5 BIG-IP Application Security Manager,
  • Juniper Networks (Altor Networks Virtual Firewall),
  • Juniper Network Security Manager (NetScreen),
  • Juniper Network Security Manager Syslog, version 2011.4,
  • Juniper Networks Firewall and VPN,
  • Lucent Managed Firewall,
  • McAfee Desktop Firewall,
  • Secure Computing Gauntlet Firewall/ VPN.

Suggested apps

Suggested for you are based on app category, product compatibility, popularity, rating and newness. Some apps may not show based on entitlements. Learn more about entitlements.

Releases

Release
Size
Date
Suspicious_Outbound_Traffic_Monitoring_1.0.0.1 1.0.0.1
491.5 KB
  |  
Aug 17, 2018
More info Less info
Product compatibility
Version 6.8 · 6.11.0 · 6.9.1
Version 7.0
Release notes

  Micro Focus rebranding changes  

Languages
English
Suspicious Outbound Traffic Monitoring 1.0
491.8 KB
  |  
Jul 17, 2015
More info Less info
Product compatibility
Version 7.0 · 7.2
Version 6.11
Release notes

Suspicious Outbound Traffic Monitoring use case helps you catch bad guys quickly by monitoring activity within the network and looking for suspicious traffic leaving your perimeter. Typically, compromised systems often call home to command-and-control servers. so this use case helps you monitor the network traffic to identify such activity.

Benefits of Suspicious Outbound Traffic Monitoring use case:

  • Active channel to monitor real-time traffic with unusual traffic outbound traffic patterns
  • Visualize suspicious traffic such as suspicious servers, ports, or services
  • Monitor traffic to dark address space
  • Focus on security events that need action

Reduced false positives and noise ArcSight Connectors supported:

  • ArcSight Reputation Security Monitoring (RepSM)
  • Check Point FW-1
  • Cisco PIX Firewall
  • Cisco PIX/ASA Syslog, version 8.5, 8.6
  • F5 BIG-IP Application Security Manager
  • Juniper Networks (Altor Networks Virtual Firewall)
  • Juniper Network Security Manager (NetScreen)
  • Juniper Network Security Manager Syslog, version 2011.4
  • Juniper Networks Firewall and VPN • Lucent Managed Firewall
  • McAfee Desktop Firewall • Secure Computing Gauntlet Firewall/ VPN
Languages
English

Resources

Unsubscribe from notifications

You are receiving release updates for this item because you have subscribed to the following products:
If you unsubscribe, you will no longer receive any notifications for these products.
Tip: to update your subscription preferences, go to Manage Subscriptions from your Dashboard, uncheck the products you no longer want to receive notifications for, and click 'Save'.

Marketplace Terms of Service

In order to continue, you must accept the updated Marketplace Terms of Service
Since you are downloading an app from the OpenText Marketplace, you need to accept the updated Marketplace Terms of Service before you can continue. Use the link to review the Marketplace Terms of Service. Once complete check the, "I accept the Marketplace Terms of Service" box below and click accept to continue your download.


Your download has begun...

Your download has begun

Related content and resources

Your browser is not supported!

Please upgrade to one of the following broswers: Internet Explorer 11 (or greater) or the latest version of Chrome or Firefox

release-rel-2024-4-1-6117 | Wed Apr 10 01:16:06 PDT 2024