SlideShare a Scribd company logo
1 of 54
WHAT’S NEW 
IN VERSION 3.2? 
© SecurActive 2014
PERFORMANCE VISION VERSION 3.2 
CIFS Transaction Analysis 
New Features & Improvements 
© SecurActive 2014
Performance 
Vision 3.2 
CIFS/SMB 
TRANSACTION ANALYSIS 
© SecurActive 2014
CIFS TRANSACTION ANALYSIS: USER BENEFITS 
Monitor CIFS/SMB Performance 
Troubleshoot File Sharing Issues 
Access Rights Deleted or Corrupted Files Insufficient Resources All Errors and Warnings 
© SecurActive 2014 
Identify Slow Transactions 
Correlate File Sharing Problems with Network Performance Issues
IN-DEPTH CIFS/SMB PERFORMANCE ANALYSIS 
© SecurActive 2014 
CIFS/SMB in APS 
Supported CIFS/SMB versions 
 SMB 1.0 
 SMB 2.0 
 SMB 3.0 (no encryption)
CIFS OVERVIEW 
Overview of CIFS Commands 
© SecurActive 2014 6
OVERVIEW OF CIFS COMMANDS 
Display CIFS Overview per Command type: 
 Number of Queries 
 Number of Errors and Warnings 
 Performance Metrics (SRT, DTT) 
 Payload and Number of Packets (PDUs) 
One-click drill down to more details 
© SecurActive 2014
CIFS PERFORMANCE 
Performance of CIFS Queries over Time 
© SecurActive 2014 8
PERFORMANCE OF CIFS QUERIES OVER TIME 
Display CIFS Performance metrics over time: 
 Data Transfer Time and Server Response Time 
 Number of OKs, Warnings and Errors 
 Payload for Queries, Responses and Metadata 
One-click drill down to more details 
© SecurActive 2014
CIFS CLIENTS 
CIFS Most Active Clients 
© SecurActive 2014 10
CIFS MOST ACTIVE CLIENTS 
Display CIFS metrics for the most active clients: 
 Client IP 
 Number of Queries, Errors and Warnings 
 Performance Metrics (SRT, DTT) 
 Payloads and Number of Packets (PDUs) 
One-click drill down to queries and errors 
© SecurActive 2014
CIFS SERVERS 
CIFS Most Active Servers 
© SecurActive 2014 12
CIFS MOST ACTIVE SERVERS 
Display CIFS metrics for the most active servers: 
 Server IP 
 Number of Queries, Errors and Warnings 
 Performance Metrics (SRT, DTT) 
 Payloads and Number of Packets (PDUs) 
One-click drill down to queries and errors 
© SecurActive 2014
CIFS FILES 
CIFS Most Active Files 
© SecurActive 2014 14
CIFS TOP FILES 
Display queries aggregated by Files: 
 File Path 
 Number of Queries, Errors and Warnings 
 Performance Metrics (SRT, DTT) 
 Payloads and Number of Packets (PDUs) 
One-click drill down to queries and errors 
© SecurActive 2014
CIFS TREES 
CIFS Most Active Trees 
© SecurActive 2014 16
CIFS TOP TREES 
Display queries aggregated by Trees: 
 Tree Path 
 Number of Queries, Errors and Warnings 
 Performance Metrics (SRT, DTT) 
 Payloads and Number of Packets (PDUs) 
One-click drill down to queries and errors 
© SecurActive 2014
DIFFERENCE BETWEEN TREE AND FILE 
© SecurActive 2014 
Tree (Mount 
Point) 
 WINSHARE  
DATA 
 WINSHARE  USR 
File 
 Private  Users  UC576  mailbox.pst
CIFS USERS 
CIFS Most Active Users 
© SecurActive 2014 19
CIFS TOP USERS 
Display queries aggregated by Users: 
 Username 
 Number of Queries, Errors and Warnings 
 Performance Metrics (SRT, DTT) 
 Payloads and Number of Packets (PDUs) 
One-click drill down to queries and errors 
© SecurActive 2014
USER NOT ALWAYS AVAILABLE? 
© SecurActive 2014 
Why is the User not always available? 
 Secured authentication (Kerberos) 
 Potentially unsupported authentication 
mechanism 
 Session initialization has not been captured
CIFS QUERIES 
List of CIFS Queries 
© SecurActive 2014 22
CIFS QUERIES 
Available CIFS Data 
© SecurActive 2014 
 Command, Subcommand and Status 
 File ID and Path 
 Number of Queries, Errors & Warnings 
 Performance Metrics (SRT, DTT) 
 Username 
 Domain name 
 Tree ID and Tree name 
 Data Payload: Reads, Writes 
 Metadata Payload: Reads, Writes 
 Number of Packets (PDUs)
CIFS RAW DATA 
Details of all CIFS Transactions 
© SecurActive 2014 24
CIFS RAW DATA: TRUE ROOT CAUSE ANALYSIS 
© SecurActive 2014 
CIFS transactions without any grouping 
 Useful for advanced troubleshooting 
 Application behavior auditing 
Queries 
Raw Data
USER FRIENDLY ROOT CAUSE ANALYSIS 
© SecurActive 2014 
User-friendly interface 
 Color highlighting for readability 
 One-click filtering facility 
 Inline CIFS protocol help 
 Resizable textboxes
CIFS DEDICATED FILTERS 
© SecurActive 2014 
Dedicated CIFS filters: 
Refine search for specific issues 
Search results by: 
 Port number 
 Command type 
 Status name 
 Path name and File ID 
 Subcommand type 
 Tree name and Tree ID 
 User and Domain
SEARCH FOR SPECIFIC CIFS ELEMENTS 
CIFS Commands, Statuses and Subcommands organized into Categories 
Type text to automatically refine the list of available 
options 
© SecurActive 2014
EASY DRILL-DOWN 
 One click to see Performance over time for these CIFS Transactions 
 One click drill-down to CIFS Queries or Raw data 
 One click drill-down to Flow Details associated to these Transactions 
One click drill-down to CIFS Errors or Warnings 
© SecurActive 2014
FOR POWER USERS: CUSTOM FILTERS FOR CIFS 
© SecurActive 2014 
Custom Filters for CIFS 
 Used to build advanced queries 
 See Custom Filters reference in 
Guide
FAST ANALYSIS: CIFS COMMON STATUSES 
© SecurActive 2014 
Common Statuses for CIFS: 
 STATUS_NO_SUCH_FILE, 
 STATUS_NO_SUCH_DEVICE, 
 STATUS_OBJECT_NAME_NOT_FOUND, 
 STATUS_OBJECT_PATH_INVALID, 
 STATUS_OBJECT_PATH_NOT_FOUND, 
 STATUS_OBJECT_PATH_SYNTAX_BAD, 
 STATUS_DFS_EXIT_PATH_FOUND, 
 STATUS_REDIRECTOR_NOT_STARTED, 
 STATUS_TOO_MANY_OPENED_FILES, 
 STATUS_ACCESS_DENIED, 
 STATUS_PORT_CONNECTION_REFUSED, 
 STATUS_FILE_DELETED, 
 STATUS_INSUFF_SERVER_RESOURCES, 
 STATUS_MORE_PROCESSING_REQUIRED, 
 STATUS_BUFFER_OVERFLOW, 
 STATUS_WRONG_PASSWORD, 
 STATUS_NETWORK_ACCESS_DENIED, 
 STATUS_TOO_MANY_SESSIONS. 
Common statuses category contains 
the most common CIFS errors and warnings. 
cifs.status = "common" 
Note: We do not consider 
SMB_STATUS_NO_MORE_FILES as a 
Warning
ACTIVATION: CONFIGURE CIFS ANALYSIS 
Configuration > Zones 
 Activate CIFS transaction analysis 
© SecurActive 2014 
for the zone and its subzones 
If not needed, do not add print 
servers to the scope of CIFS analysis.
IMPACT: CIFS ANALYSIS WORKLOAD 
© SecurActive 2014 
Configuration > Database Workload 
 Check impact of CIFS analysis on 
workload
PERFORMANCE SAVING: CIFS DATA MERGING 
Datatype Zone Merging level Degraded metrics 
© SecurActive 2014 
Configuration > Data Merging 
 Adjust merging levels for more performance 
or for more details 
 By default: maximum performance
CORRELATION BETWEEN 
NETWORK ISSUES AND CIFS TRANSACTIONS 
© SecurActive 2014 
CIFS
ONE CLICK SWITCH: 
FROM TCP FLOWS TO CIFS TRANSACTIONS 
© SecurActive 2014 
DNS 
HTTP 
SQL 
ICMP 
Flows 
CIFS 
Already in 3.0 
Switch from TCP Flows to CIFS Transactions 
 From TCP Details to CIFS Queries 
 From TCP Raw Data to CIFS Queries
ONE CLICK SWITCH: 
FROM CIFS TRANSACTIONS TO TCP FLOWS 
Switch from CIFS Transactions to TCP Flows 
 From CIFS Queries to TCP Flow Details 
 From CIFS Raw Data to TCP Flow Details 
© SecurActive 2014 
CIFS 
HTTP 
SQL 
Flows 
DNS 
Already in 3.0
CIFS DOCUMENTATION 
User Guide update 
 CIFS Analysis 
 CIFS Status Categories (appendix) 
© SecurActive 2014
Performance 
Vision 3.2 
NEW FEATURES 
& IMPROVEMENTS 
© SecurActive 2014
LDAP INTEGRATION 
© SecurActive 2014 
LDAP Integration 
 Requires anonymous 
authorization
SORT BCN BY CRITICALITY 
BCN can be sorted by criticality level 
 BCN with most alerting events are shown first 
 One Red > Any oranges 
 One Orange > Any greens 
Note: For Business Critical Networks only (not yet for BCA) 
© SecurActive 2014
#REQUESTS FOR DNS PAGES 
© SecurActive 2014 
For all DNS pages: 
 Add #Requests: Number of DRT 
 DRT: DNS Response Time
DNS TROUBLESHOOTING 
© SecurActive 2014 
For DNS Troubleshooting: 
 Add new Custom Filters 
 Bandwidth, Packets, IPs 
3.0 
3.2
ONE CLICK @ SWITCHING 
New button to switch client/server values: 
 Zones, IP Addresses and MAC Addresses 
© SecurActive 2014
HINTS FOR « NO RESULTS » 
Hints added: 
 When search requests return “No results” 
 Data could be merged 
 Metric could be disabled at sniffer level 
 Metric might not be active on any zone 
© SecurActive 2014 
Examples:
HTTP DATA MERGING 
© SecurActive 2014 
3.0 
3.2 
For HTTP Transactions: 
 Added a new data merging level
DATABASE PERFORMANCE IMPROVEMENTS 
Better usage of query multithreading: 
 Response times up to 20% faster 
 Example: BCN computations 
© SecurActive 2014
BETTER HANDLING OF BUFFERED TCP PACKETS 
Better handling of buffered TCP packets 
 Potential impact on DTT / EURT metrics 
© SecurActive 2014 
Note: already included in 3.0.17
SHELLSHOCK SECURITY UPDATE 
© SecurActive 2014 
Bash security update for 
 Shellshock vulnerability 
http://en.wikipedia.org/wiki/Shellshock_(software_bug)
VERSION 3.2: IMPACTS SUMMARY 
Migration time is low 
 Update should take few minutes depending on 
database size 
 Check impact of CIFS performance analysis on 
 Major impacts compared to 3.0: 
 Database migration time: low 
 CIFS performance analysis 
 Potentially on DTT/EURT 
© SecurActive 2014 
workload & license limits 
 Potential impact on DTT/EURT metrics
SOMETHING BIG IS COMING 
© SecurActive 2014 
 Q1 2015 Technical Update 
 TBD 2015 Something BIG is coming
REBOOT AFTER UPDATE 
After the upgrade is completed 
© SecurActive 2014
YOU'RE READY TO GO, ENJOY VERSION 3.2! 
© SecurActive 2014
What’s New 
in Version 
3.2? 
For any Question 
sales@securactive.net 
support@securactive.net 
THANK YOU! 
Follow Us on 
@SecurActivePV 
www.securactive.net 
blog.securactive.net 
© SecurActive 2014

More Related Content

What's hot

F5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructureF5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructureDSorensenCPR
 
F5 link controller
F5  link controllerF5  link controller
F5 link controllerJimmy Saigon
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshowpatmisasi
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowCisco DevNet
 
Nginx app protect-for-meetup-v1.0-202006_lk
Nginx app protect-for-meetup-v1.0-202006_lkNginx app protect-for-meetup-v1.0-202006_lk
Nginx app protect-for-meetup-v1.0-202006_lkJuraj Hantak
 
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 TorontoF5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Torontopatmisasi
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS ScalePeter Silva
 
Fully Automate Application Delivery with Puppet and F5 - PuppetConf 2014
Fully Automate Application Delivery with Puppet and F5 - PuppetConf 2014Fully Automate Application Delivery with Puppet and F5 - PuppetConf 2014
Fully Automate Application Delivery with Puppet and F5 - PuppetConf 2014Puppet
 
Get more versatile and scalable protection with F5 BIG-IP
Get more versatile and scalable protection with F5 BIG-IPGet more versatile and scalable protection with F5 BIG-IP
Get more versatile and scalable protection with F5 BIG-IPF5NetworksAPJ
 
F5 GTM HEALTH CHECKS
F5 GTM HEALTH CHECKSF5 GTM HEALTH CHECKS
F5 GTM HEALTH CHECKSMarco Essomba
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks
 
F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.Kapil Sabharwal
 

What's hot (18)

F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
F5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructureF5 and Infoblox deliver complete secured DNS infrastructure
F5 and Infoblox deliver complete secured DNS infrastructure
 
F5 link controller
F5  link controllerF5  link controller
F5 link controller
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
F5 Cloud Story
F5 Cloud StoryF5 Cloud Story
F5 Cloud Story
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible Netflow
 
Nginx app protect-for-meetup-v1.0-202006_lk
Nginx app protect-for-meetup-v1.0-202006_lkNginx app protect-for-meetup-v1.0-202006_lk
Nginx app protect-for-meetup-v1.0-202006_lk
 
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 TorontoF5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS Scale
 
Fully Automate Application Delivery with Puppet and F5 - PuppetConf 2014
Fully Automate Application Delivery with Puppet and F5 - PuppetConf 2014Fully Automate Application Delivery with Puppet and F5 - PuppetConf 2014
Fully Automate Application Delivery with Puppet and F5 - PuppetConf 2014
 
Get more versatile and scalable protection with F5 BIG-IP
Get more versatile and scalable protection with F5 BIG-IPGet more versatile and scalable protection with F5 BIG-IP
Get more versatile and scalable protection with F5 BIG-IP
 
IETF 79 - Diameter Over SCTP
IETF 79 - Diameter Over SCTPIETF 79 - Diameter Over SCTP
IETF 79 - Diameter Over SCTP
 
DDoS Protection System DPS
DDoS Protection System DPSDDoS Protection System DPS
DDoS Protection System DPS
 
F5 GTM HEALTH CHECKS
F5 GTM HEALTH CHECKSF5 GTM HEALTH CHECKS
F5 GTM HEALTH CHECKS
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
 
F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.
 
ClearPass Guest 6.4 User Guide
ClearPass Guest 6.4 User GuideClearPass Guest 6.4 User Guide
ClearPass Guest 6.4 User Guide
 

Similar to What's new in Performance vision version 3.2

Part 2: Architecture and the Operator Experience (Pivotal Cloud Platform Road...
Part 2: Architecture and the Operator Experience (Pivotal Cloud Platform Road...Part 2: Architecture and the Operator Experience (Pivotal Cloud Platform Road...
Part 2: Architecture and the Operator Experience (Pivotal Cloud Platform Road...VMware Tanzu
 
SolarWinds Federal SE Webinar November 2014
SolarWinds Federal SE Webinar November 2014SolarWinds Federal SE Webinar November 2014
SolarWinds Federal SE Webinar November 2014SolarWinds
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...CA Technologies
 
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25Real-Time Innovations (RTI)
 
How Enterprises will Benefit from SDN
How Enterprises will Benefit from SDN How Enterprises will Benefit from SDN
How Enterprises will Benefit from SDN Shashi Kiran
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
 
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to AvoidChoosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to AvoideG Innovations
 
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdfGrigoryShkolnik1
 
Cisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s RealityCisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s RealityCisco Canada
 
Next Generation DDoS Services – can we do this with NFV? - CF Chui
Next Generation DDoS Services – can we do this with NFV? - CF ChuiNext Generation DDoS Services – can we do this with NFV? - CF Chui
Next Generation DDoS Services – can we do this with NFV? - CF ChuiMyNOG
 
Cilium:: Application-Aware Microservices via BPF
Cilium:: Application-Aware Microservices via BPFCilium:: Application-Aware Microservices via BPF
Cilium:: Application-Aware Microservices via BPFCynthia Thomas
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 Networks
 
Webinar deploying software defined networks with confidence
Webinar deploying software defined networks with confidenceWebinar deploying software defined networks with confidence
Webinar deploying software defined networks with confidenceVeryx Technologies
 

Similar to What's new in Performance vision version 3.2 (20)

Workshop on CIFS / SMB Protocol Performance Analysis
Workshop on CIFS / SMB Protocol Performance AnalysisWorkshop on CIFS / SMB Protocol Performance Analysis
Workshop on CIFS / SMB Protocol Performance Analysis
 
Performance vision Version 3.0 - What's New
Performance vision Version 3.0 - What's NewPerformance vision Version 3.0 - What's New
Performance vision Version 3.0 - What's New
 
Part 2: Architecture and the Operator Experience (Pivotal Cloud Platform Road...
Part 2: Architecture and the Operator Experience (Pivotal Cloud Platform Road...Part 2: Architecture and the Operator Experience (Pivotal Cloud Platform Road...
Part 2: Architecture and the Operator Experience (Pivotal Cloud Platform Road...
 
SolarWinds Federal SE Webinar November 2014
SolarWinds Federal SE Webinar November 2014SolarWinds Federal SE Webinar November 2014
SolarWinds Federal SE Webinar November 2014
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
 
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
 
How Enterprises will Benefit from SDN
How Enterprises will Benefit from SDN How Enterprises will Benefit from SDN
How Enterprises will Benefit from SDN
 
F5 TMOS v13.0
F5 TMOS v13.0F5 TMOS v13.0
F5 TMOS v13.0
 
Concrete use cases of SQL Performance Analysis
Concrete use cases of SQL Performance Analysis Concrete use cases of SQL Performance Analysis
Concrete use cases of SQL Performance Analysis
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to AvoidChoosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
 
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
Performance vision Version 2.15 news
Performance vision Version 2.15 newsPerformance vision Version 2.15 news
Performance vision Version 2.15 news
 
Cisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s RealityCisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s Reality
 
Pivotal CF 소개
Pivotal CF 소개 Pivotal CF 소개
Pivotal CF 소개
 
Next Generation DDoS Services – can we do this with NFV? - CF Chui
Next Generation DDoS Services – can we do this with NFV? - CF ChuiNext Generation DDoS Services – can we do this with NFV? - CF Chui
Next Generation DDoS Services – can we do this with NFV? - CF Chui
 
Cilium:: Application-Aware Microservices via BPF
Cilium:: Application-Aware Microservices via BPFCilium:: Application-Aware Microservices via BPF
Cilium:: Application-Aware Microservices via BPF
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer Presentation
 
Webinar deploying software defined networks with confidence
Webinar deploying software defined networks with confidenceWebinar deploying software defined networks with confidence
Webinar deploying software defined networks with confidence
 

More from PerformanceVision (previously SecurActive)

How to create custom dashboards in Elastic Search / Kibana with Performance V...
How to create custom dashboards in Elastic Search / Kibana with Performance V...How to create custom dashboards in Elastic Search / Kibana with Performance V...
How to create custom dashboards in Elastic Search / Kibana with Performance V...PerformanceVision (previously SecurActive)
 
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...PerformanceVision (previously SecurActive)
 
Gestion des performances applicatives en environnement Cloud et Virtualisation
Gestion des performances applicatives en environnement Cloud et VirtualisationGestion des performances applicatives en environnement Cloud et Virtualisation
Gestion des performances applicatives en environnement Cloud et VirtualisationPerformanceVision (previously SecurActive)
 

More from PerformanceVision (previously SecurActive) (12)

How to create custom dashboards in Elastic Search / Kibana with Performance V...
How to create custom dashboards in Elastic Search / Kibana with Performance V...How to create custom dashboards in Elastic Search / Kibana with Performance V...
How to create custom dashboards in Elastic Search / Kibana with Performance V...
 
Presentation of Performance Vision Version 3.3
Presentation of Performance Vision Version 3.3Presentation of Performance Vision Version 3.3
Presentation of Performance Vision Version 3.3
 
HTTP Application Performance Analysis
HTTP Application Performance AnalysisHTTP Application Performance Analysis
HTTP Application Performance Analysis
 
What's new in Performance Vision version 2.18
What's new in Performance Vision version 2.18What's new in Performance Vision version 2.18
What's new in Performance Vision version 2.18
 
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
 
HTTP Application Performance Analysis
HTTP Application Performance AnalysisHTTP Application Performance Analysis
HTTP Application Performance Analysis
 
Présentation N&APM en environnement hospitalier (CH Laborit)
Présentation N&APM en environnement hospitalier (CH Laborit)Présentation N&APM en environnement hospitalier (CH Laborit)
Présentation N&APM en environnement hospitalier (CH Laborit)
 
Performance Vision - What's new in version 2.9
Performance Vision - What's new in version 2.9Performance Vision - What's new in version 2.9
Performance Vision - What's new in version 2.9
 
Gestion des performances applicatives en environnement Cloud et Virtualisation
Gestion des performances applicatives en environnement Cloud et VirtualisationGestion des performances applicatives en environnement Cloud et Virtualisation
Gestion des performances applicatives en environnement Cloud et Virtualisation
 
Workshop APM in a Cloud & Virtualized environment
Workshop APM in a Cloud & Virtualized environmentWorkshop APM in a Cloud & Virtualized environment
Workshop APM in a Cloud & Virtualized environment
 
Présentation de Performance Vision en 2 minutes
Présentation de Performance Vision en 2 minutesPrésentation de Performance Vision en 2 minutes
Présentation de Performance Vision en 2 minutes
 
2 minute presentation of Performance Vision
2 minute presentation of Performance Vision2 minute presentation of Performance Vision
2 minute presentation of Performance Vision
 

Recently uploaded

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 

Recently uploaded (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 

What's new in Performance vision version 3.2

  • 1. WHAT’S NEW IN VERSION 3.2? © SecurActive 2014
  • 2. PERFORMANCE VISION VERSION 3.2 CIFS Transaction Analysis New Features & Improvements © SecurActive 2014
  • 3. Performance Vision 3.2 CIFS/SMB TRANSACTION ANALYSIS © SecurActive 2014
  • 4. CIFS TRANSACTION ANALYSIS: USER BENEFITS Monitor CIFS/SMB Performance Troubleshoot File Sharing Issues Access Rights Deleted or Corrupted Files Insufficient Resources All Errors and Warnings © SecurActive 2014 Identify Slow Transactions Correlate File Sharing Problems with Network Performance Issues
  • 5. IN-DEPTH CIFS/SMB PERFORMANCE ANALYSIS © SecurActive 2014 CIFS/SMB in APS Supported CIFS/SMB versions  SMB 1.0  SMB 2.0  SMB 3.0 (no encryption)
  • 6. CIFS OVERVIEW Overview of CIFS Commands © SecurActive 2014 6
  • 7. OVERVIEW OF CIFS COMMANDS Display CIFS Overview per Command type:  Number of Queries  Number of Errors and Warnings  Performance Metrics (SRT, DTT)  Payload and Number of Packets (PDUs) One-click drill down to more details © SecurActive 2014
  • 8. CIFS PERFORMANCE Performance of CIFS Queries over Time © SecurActive 2014 8
  • 9. PERFORMANCE OF CIFS QUERIES OVER TIME Display CIFS Performance metrics over time:  Data Transfer Time and Server Response Time  Number of OKs, Warnings and Errors  Payload for Queries, Responses and Metadata One-click drill down to more details © SecurActive 2014
  • 10. CIFS CLIENTS CIFS Most Active Clients © SecurActive 2014 10
  • 11. CIFS MOST ACTIVE CLIENTS Display CIFS metrics for the most active clients:  Client IP  Number of Queries, Errors and Warnings  Performance Metrics (SRT, DTT)  Payloads and Number of Packets (PDUs) One-click drill down to queries and errors © SecurActive 2014
  • 12. CIFS SERVERS CIFS Most Active Servers © SecurActive 2014 12
  • 13. CIFS MOST ACTIVE SERVERS Display CIFS metrics for the most active servers:  Server IP  Number of Queries, Errors and Warnings  Performance Metrics (SRT, DTT)  Payloads and Number of Packets (PDUs) One-click drill down to queries and errors © SecurActive 2014
  • 14. CIFS FILES CIFS Most Active Files © SecurActive 2014 14
  • 15. CIFS TOP FILES Display queries aggregated by Files:  File Path  Number of Queries, Errors and Warnings  Performance Metrics (SRT, DTT)  Payloads and Number of Packets (PDUs) One-click drill down to queries and errors © SecurActive 2014
  • 16. CIFS TREES CIFS Most Active Trees © SecurActive 2014 16
  • 17. CIFS TOP TREES Display queries aggregated by Trees:  Tree Path  Number of Queries, Errors and Warnings  Performance Metrics (SRT, DTT)  Payloads and Number of Packets (PDUs) One-click drill down to queries and errors © SecurActive 2014
  • 18. DIFFERENCE BETWEEN TREE AND FILE © SecurActive 2014 Tree (Mount Point) WINSHARE DATA WINSHARE USR File Private Users UC576 mailbox.pst
  • 19. CIFS USERS CIFS Most Active Users © SecurActive 2014 19
  • 20. CIFS TOP USERS Display queries aggregated by Users:  Username  Number of Queries, Errors and Warnings  Performance Metrics (SRT, DTT)  Payloads and Number of Packets (PDUs) One-click drill down to queries and errors © SecurActive 2014
  • 21. USER NOT ALWAYS AVAILABLE? © SecurActive 2014 Why is the User not always available?  Secured authentication (Kerberos)  Potentially unsupported authentication mechanism  Session initialization has not been captured
  • 22. CIFS QUERIES List of CIFS Queries © SecurActive 2014 22
  • 23. CIFS QUERIES Available CIFS Data © SecurActive 2014  Command, Subcommand and Status  File ID and Path  Number of Queries, Errors & Warnings  Performance Metrics (SRT, DTT)  Username  Domain name  Tree ID and Tree name  Data Payload: Reads, Writes  Metadata Payload: Reads, Writes  Number of Packets (PDUs)
  • 24. CIFS RAW DATA Details of all CIFS Transactions © SecurActive 2014 24
  • 25. CIFS RAW DATA: TRUE ROOT CAUSE ANALYSIS © SecurActive 2014 CIFS transactions without any grouping  Useful for advanced troubleshooting  Application behavior auditing Queries Raw Data
  • 26. USER FRIENDLY ROOT CAUSE ANALYSIS © SecurActive 2014 User-friendly interface  Color highlighting for readability  One-click filtering facility  Inline CIFS protocol help  Resizable textboxes
  • 27. CIFS DEDICATED FILTERS © SecurActive 2014 Dedicated CIFS filters: Refine search for specific issues Search results by:  Port number  Command type  Status name  Path name and File ID  Subcommand type  Tree name and Tree ID  User and Domain
  • 28. SEARCH FOR SPECIFIC CIFS ELEMENTS CIFS Commands, Statuses and Subcommands organized into Categories Type text to automatically refine the list of available options © SecurActive 2014
  • 29. EASY DRILL-DOWN  One click to see Performance over time for these CIFS Transactions  One click drill-down to CIFS Queries or Raw data  One click drill-down to Flow Details associated to these Transactions One click drill-down to CIFS Errors or Warnings © SecurActive 2014
  • 30. FOR POWER USERS: CUSTOM FILTERS FOR CIFS © SecurActive 2014 Custom Filters for CIFS  Used to build advanced queries  See Custom Filters reference in Guide
  • 31. FAST ANALYSIS: CIFS COMMON STATUSES © SecurActive 2014 Common Statuses for CIFS:  STATUS_NO_SUCH_FILE,  STATUS_NO_SUCH_DEVICE,  STATUS_OBJECT_NAME_NOT_FOUND,  STATUS_OBJECT_PATH_INVALID,  STATUS_OBJECT_PATH_NOT_FOUND,  STATUS_OBJECT_PATH_SYNTAX_BAD,  STATUS_DFS_EXIT_PATH_FOUND,  STATUS_REDIRECTOR_NOT_STARTED,  STATUS_TOO_MANY_OPENED_FILES,  STATUS_ACCESS_DENIED,  STATUS_PORT_CONNECTION_REFUSED,  STATUS_FILE_DELETED,  STATUS_INSUFF_SERVER_RESOURCES,  STATUS_MORE_PROCESSING_REQUIRED,  STATUS_BUFFER_OVERFLOW,  STATUS_WRONG_PASSWORD,  STATUS_NETWORK_ACCESS_DENIED,  STATUS_TOO_MANY_SESSIONS. Common statuses category contains the most common CIFS errors and warnings. cifs.status = "common" Note: We do not consider SMB_STATUS_NO_MORE_FILES as a Warning
  • 32. ACTIVATION: CONFIGURE CIFS ANALYSIS Configuration > Zones  Activate CIFS transaction analysis © SecurActive 2014 for the zone and its subzones If not needed, do not add print servers to the scope of CIFS analysis.
  • 33. IMPACT: CIFS ANALYSIS WORKLOAD © SecurActive 2014 Configuration > Database Workload  Check impact of CIFS analysis on workload
  • 34. PERFORMANCE SAVING: CIFS DATA MERGING Datatype Zone Merging level Degraded metrics © SecurActive 2014 Configuration > Data Merging  Adjust merging levels for more performance or for more details  By default: maximum performance
  • 35. CORRELATION BETWEEN NETWORK ISSUES AND CIFS TRANSACTIONS © SecurActive 2014 CIFS
  • 36. ONE CLICK SWITCH: FROM TCP FLOWS TO CIFS TRANSACTIONS © SecurActive 2014 DNS HTTP SQL ICMP Flows CIFS Already in 3.0 Switch from TCP Flows to CIFS Transactions  From TCP Details to CIFS Queries  From TCP Raw Data to CIFS Queries
  • 37. ONE CLICK SWITCH: FROM CIFS TRANSACTIONS TO TCP FLOWS Switch from CIFS Transactions to TCP Flows  From CIFS Queries to TCP Flow Details  From CIFS Raw Data to TCP Flow Details © SecurActive 2014 CIFS HTTP SQL Flows DNS Already in 3.0
  • 38. CIFS DOCUMENTATION User Guide update  CIFS Analysis  CIFS Status Categories (appendix) © SecurActive 2014
  • 39. Performance Vision 3.2 NEW FEATURES & IMPROVEMENTS © SecurActive 2014
  • 40. LDAP INTEGRATION © SecurActive 2014 LDAP Integration  Requires anonymous authorization
  • 41. SORT BCN BY CRITICALITY BCN can be sorted by criticality level  BCN with most alerting events are shown first  One Red > Any oranges  One Orange > Any greens Note: For Business Critical Networks only (not yet for BCA) © SecurActive 2014
  • 42. #REQUESTS FOR DNS PAGES © SecurActive 2014 For all DNS pages:  Add #Requests: Number of DRT  DRT: DNS Response Time
  • 43. DNS TROUBLESHOOTING © SecurActive 2014 For DNS Troubleshooting:  Add new Custom Filters  Bandwidth, Packets, IPs 3.0 3.2
  • 44. ONE CLICK @ SWITCHING New button to switch client/server values:  Zones, IP Addresses and MAC Addresses © SecurActive 2014
  • 45. HINTS FOR « NO RESULTS » Hints added:  When search requests return “No results”  Data could be merged  Metric could be disabled at sniffer level  Metric might not be active on any zone © SecurActive 2014 Examples:
  • 46. HTTP DATA MERGING © SecurActive 2014 3.0 3.2 For HTTP Transactions:  Added a new data merging level
  • 47. DATABASE PERFORMANCE IMPROVEMENTS Better usage of query multithreading:  Response times up to 20% faster  Example: BCN computations © SecurActive 2014
  • 48. BETTER HANDLING OF BUFFERED TCP PACKETS Better handling of buffered TCP packets  Potential impact on DTT / EURT metrics © SecurActive 2014 Note: already included in 3.0.17
  • 49. SHELLSHOCK SECURITY UPDATE © SecurActive 2014 Bash security update for  Shellshock vulnerability http://en.wikipedia.org/wiki/Shellshock_(software_bug)
  • 50. VERSION 3.2: IMPACTS SUMMARY Migration time is low  Update should take few minutes depending on database size  Check impact of CIFS performance analysis on  Major impacts compared to 3.0:  Database migration time: low  CIFS performance analysis  Potentially on DTT/EURT © SecurActive 2014 workload & license limits  Potential impact on DTT/EURT metrics
  • 51. SOMETHING BIG IS COMING © SecurActive 2014  Q1 2015 Technical Update  TBD 2015 Something BIG is coming
  • 52. REBOOT AFTER UPDATE After the upgrade is completed © SecurActive 2014
  • 53. YOU'RE READY TO GO, ENJOY VERSION 3.2! © SecurActive 2014
  • 54. What’s New in Version 3.2? For any Question sales@securactive.net support@securactive.net THANK YOU! Follow Us on @SecurActivePV www.securactive.net blog.securactive.net © SecurActive 2014