Suspicious Outbound Traffic Monitoring

181340

Micro Focus Micro Focus Community

Micro Focus | Micro Focus Community

Suspicious Outbound Traffic Monitoring use case helps you catch bad guys quickly by monitoring activity within the network and looking for suspicious traffic leaving your perimeter.
797 downloads

Description

Suspicious Outbound Traffic Monitoring use case helps you catch bad guys quickly by monitoring activity within the network and looking for suspicious traffic leaving your perimeter. Typically, compromised systems often call home to command-and-control servers. So this use case helps you monitor the network traffic to identify such activity. Benefits of Suspicious Outbound Traffic Monitoring use case:

  • Active channel to monitor real-time traffic with unsual traffic outbound traffic patterns.
  • Visualize suspcious traffic such as suspicuous servers, ports, or services.
  • Monitor traffic to dark address space.
  • Focus on security events that need action.
  • Reduced false positives and noise.

ArcSight Connectors supported:

  • ArcSight Reputation Security Monitoring (RepSM),
  • Check Point FW-1,
  • Cisco PIX Firewall,
  • Cisco PIX/ASA Syslog, version 8.5, 8.6,
  • F5 BIG-IP Application Security Manager,
  • Juniper Networks (Altor Networks Virtual Firewall),
  • Juniper Network Security Manager (NetScreen),
  • Juniper Network Security Manager Syslog, version 2011.4,
  • Juniper Networks Firewall and VPN,
  • Lucent Managed Firewall,
  • McAfee Desktop Firewall,
  • Secure Computing Gauntlet Firewall/ VPN.

Releases

Release
Size
Date
Suspicious_Outbound_Traffic_Monitoring_1.0.0.1 1.0.0.1
491.5 KB
  |  
Aug 17, 2018
More info Less info
Product compatibility
ESM
Version 6.8 · 6.9.1 · 6.11.0
Version 7.0
Release notes

  Micro Focus rebranding changes  

Languages
English
Suspicious Outbound Traffic Monitoring 1.0
491.8 KB
  |  
Jul 17, 2015
More info Less info
Product compatibility
ArcSight
Version 6.0 · 6.50
Release notes

Suspicious Outbound Traffic Monitoring use case helps you catch bad guys quickly by monitoring activity within the network and looking for suspicious traffic leaving your perimeter. Typically, compromised systems often call home to command-and-control servers. so this use case helps you monitor the network traffic to identify such activity. 

Benefits of Suspicious Outbound Traffic Monitoring use case: 

  • Active channel to monitor real-time traffic with unusual traffic outbound traffic patterns 
  • Visualize suspicious traffic such as suspicious servers, ports, or services 
  • Monitor traffic to dark address space 
  • Focus on security events that need action

Reduced false positives and noise ArcSight Connectors supported: 

  • ArcSight Reputation Security Monitoring (RepSM)
  • Check Point FW-1 
  • Cisco PIX Firewall
  • Cisco PIX/ASA Syslog, version 8.5, 8.6 
  • F5 BIG-IP Application Security Manager 
  • Juniper Networks (Altor Networks Virtual Firewall)
  • Juniper Network Security Manager (NetScreen)
  • Juniper Network Security Manager Syslog, version 2011.4 
  • Juniper Networks Firewall and VPN • Lucent Managed Firewall
  • McAfee Desktop Firewall • Secure Computing Gauntlet Firewall/ VPN
Languages
English

Resources

Unsubscribe from notifications

You are receiving release updates for this item because you have subscribed to the following products:
If you unsubscribe, you will no longer receive any notifications for these products.
Tip: to update your subscription preferences, go to Manage Subscriptions from your Dashboard, uncheck the products you no longer want to receive notifications for, and click 'Save'.
Your browser is not supported!

Please upgrade to one of the following broswers: Internet Explorer 11 (or greater) or the latest version of Chrome or Firefox