Aisling Brennan 20th March 2014

Slides:



Advertisements
Similar presentations
© 2005 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Course Overview Module 1 H3065S F.00.
Advertisements

Powered by SPS Strategic Products and Services spscom.com.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
QoS Solutions Confidential 2010 NetQuality Analyzer and QPerf.
CLIENT / SERVER ARCHITECTURE AYRİS UYGUR & NİLÜFER ÇANGA.
IIS Configuration © N. Ganesan, Ph.D.. Renaming the Default Web.
Windows Network Policy Server Fundamentals Ranjana Jain MCSE, MCT, RHCE, CISSP, CIW Security Analyst IT Pro Evangelist Microsoft India
1 Enabling Secure Internet Access with ISA Server.
Collaborate with IT to Maximize Plant Network Uptime Learn How to View & Manage Your Network Health at the Plant Floor Presenter: Boyce Baine, Sr. Applications.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Nelson Androes Online Achievement Level Setting Software.
How to monitor Windows file share activity on your network Aisling Dillon.
NetFort Customer Webinar Getting back to basics – Using LANGuardian Aisling Brennan 26 th Feb 2015.
Session 10 Windows Platform Eng. Dina Alkhoudari.
Chapter 22 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Applying Forensic Science to Networks.
Windows 7 Firewall.
IT:Network:Microsoft Server Instructor: Michael J. Teske.
Using the Internet at City Hall FAST Internet Connections! Employee computers connected to T3 line Employee computers connected to T3 line Most Web pages.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
DTCC Confidential DTCC Social Networking Policy Task Force January, 2008.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
TCP – Tips and Case Studies. Presenter – Chris Greer Packet Pioneer LLC Network Analyst - WCNA Training and Professional Services Network and application.
Accessing Evitech network via FTP by Susan Jansson.
Module 10: Windows Firewall and Caching Fundamentals.
Footprinting and Scanning
What’s new in LANGuardian 12? By Aisling Brennan.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Spring Engineering Computer Committee filename University of Portland School of Engineering Network Upgrade The big picture.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Computer Networks & FirewallsUniversity IT Security Office - Tom Davis, CISSP University IT Security Officer Office of the Vice.
Troubleshooting a Network Understanding the Problem Troubleshooting Tools Where to Find Help 1.
Introduction to the Mac Introduction to the Mac Using Apple’s OS X with Jim Mollé Learn iT! Computer Software Training.
Network Services. Domain Controllers: – Used for Account management (e.g. user accounts, group accounts Register Hardware like Printers and PC Authentication.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Uniform Resource Locator URL protocol URL host Path to file Every single website on the Internet has its own unique.
F REE VPN SOFTWARE F REE VPN SOFTWARE Free vpn service.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
1 Web Search What are easy ways to create a website? 2 Web Search What is a blog? What type of content does this type of website provide? 3 Web.
Windows Vista Configuration MCTS : Network Security.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
BUS 670 Complete Class To purchase this material link 670/BUS-670-Complete-Class. For more courses visit our website.
IT 242 Week 3 DQ 1 To purchase this material link 242-Week-3-DQ-1 For more courses visit our website
IT 244 Complete Class To purchase this material link 244/IT-244-Complete-Class. For more courses visit our website
IT 244 Week 2 DQ 2 To purchase this material link 244-Week-2-DQ-2 For more courses visit our website
IT 244 Week 6 DQ 1 To purchase this material link Week-6-DQ-1 For more courses visit our website
IT 244 Week 6 DQ 3 To purchase this material link 244-Week-6-DQ-3 For more courses visit our website
IT 244 Week 8 DQ 1 To purchase this material link Week-8-DQ-1 For more courses visit our website
IT 244 Week 8 DQ 2 To purchase this material link 244-Week-8-DQ-2 For more courses visit our website
LAW 421 Complete Class To purchase this material link 421/LAW-421-Complete-Class For more courses visit our website.
Nicholas Hsiao Critical Log Review Checklist for Security Incidents – By ArcSight Logger For template guidelines or applying this.
Lecture 5 Blocking practices
Enabling Secure Internet Access with TMG
Backdoor Attacks.
Firewalls.
Securing the Network Perimeter with ISA 2004
Implementing TMG Server Publishing
Footprinting and Scanning
Acutelearn Azure Administration Training in Hyderabad Classroom Training Instructor led trainings at Acutelearn premises Corporate Training Custom tailored.
الوحدة 5 مقدمة في شبكة الانترنت.
Welcome To : Group 1 VC Presentation
Getting Started with LANGuardian
Computer courses in Chandigarh. What is Computer Forensics.
SEC 340 Education for Service/tutorialrank.com
Ewan MacKellar & Mario Tevanian
Firewalls Purpose of a Firewall Characteristic of a firewall
IS 4506 Server Configuration (HTTP Server)
Game Mark Shtern.
Presentation transcript:

Aisling Brennan 20th March 2014 Top 10 reports: For investigating and monitoring activity on your network – fast. Aisling Brennan 20th March 2014

Agenda System Architecture/How reports work What reports are used for Explanation of our Top 10 Q&A session

System Architecture

Reports 4

Reports 5

What reports are used for Application recognition Bandwidth Troubleshooting Network forensics File activity Web activity User activity Security 6

Top 10 reports Report Name 1. IP : Top Applications 2. IP :: Top Users 3. IP :: Outbound Connections :: TCP 4. IP :: Inbound Connections :: TCP 5. Security :: by Signature 7

Top 10 reports Report Name 6. Web :: Top Website Domains 7. Top Proxy Users 8. Web :: Top Website Domains and resources 9. Windows File Shares :: Top Fileservers 10. Windows File Shares :: Search by Filename 8

9

NetFort at Networkshop 2014 For more information visit http://networkshop.ja.net

Training course reminder – places left