SlideShare a Scribd company logo
Standard Content Guide
NetFlow Monitoring
ArcSight ESM 6.5c
October 11, 2013
Copyright © 2013 Hewlett-Packard Development Company, L.P.
Confidential computer software. Valid license from HP required for possession, use or copying. Consistent
with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and
Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard
commercial license.
The information contained herein is subject to change without notice. The only warranties for HP products
and services are set forth in the express warranty statements accompanying such products and services.
Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for
technical or editorial errors or omissions contained herein.
Follow this link to see a complete statement of copyrights and acknowledgements:
http://www.hpenterprisesecurity.com/copyright
Contact Information
Revision History
Phone A list of phone numbers is available on the HP ArcSight Technical
Support page: http://www8.hp.com/us/en/software-
solutions/software.html?compURI=1345981#.URitMaVwpWI.
Support Web Site http://support.openview.hp.com
Protect 724 Community https://protect724.arcsight.com
Date Product Version Description
10/11/2013 NetFlow Monitoring content
for ArcSight ESM 6.5c
Final revision for release.
Confidential NetFlow Monitoring Standard Content Guide 3
Contents
Chapter 1: NetFlow Monitoring Overview ............................................................................ 5
What is Standard Content? ............................................................................................... 5
Standard Content Packages .............................................................................................. 7
NetFlow Monitoring Content .............................................................................................. 7
Chapter 2: Installation and Configuration ........................................................................... 9
Installing the NetFlow Monitoring Package .......................................................................... 9
Configuring NetFlow Monitoring Content ........................................................................... 10
Modeling the Network .............................................................................................. 10
Categorizing Assets ................................................................................................. 11
Ensuring Filters Capture Relevant Events .................................................................... 11
Scheduling Reports ................................................................................................. 12
Restricting Access to Vulnerability View Reports .......................................................... 12
Configuring Trends .................................................................................................. 12
Adjusting Trend Schedules ................................................................................. 13
Configuring the TotalBytes Variable ........................................................................... 13
Viewing a Use Case Resource ................................................................................... 14
Chapter 3: NetFlow Monitoring Content ............................................................................ 15
Devices ........................................................................................................................ 15
Resources .................................................................................................................... 16
Index ...................................................................................................................................................... 25
Contents
4 NetFlow Monitoring Standard Content Guide Confidential
Confidential NetFlow Monitoring Standard Content Guide 5
Chapter 1
NetFlow Monitoring Overview
This chapter discusses the following topics.
What is Standard Content?
Standard content is a series of coordinated resources (filters, rules, dashboards, reports,
and so on) that address common security and management tasks. Standard content is
designed to give you comprehensive correlation, monitoring, reporting, alerting, and case
management out-of-the box with minimal configuration. The content provides a full
spectrum of security, network, and configuration monitoring tasks, as well as a
comprehensive set of tasks that monitor the health of the system.
Standard content is installed using a series of packages, some of which are installed
automatically with the ArcSight Manager to provide essential system health and status
operations. The remaining packages are presented as install-time options organized by
category.
Standard content consists of the following:
 ArcSight Core Security content is installed automatically with the ArcSight Manager
and consists of key resources for monitoring Microsoft Windows, firewall, IPS and IDS,
NetFlow, and other essential security information.
 ArcSight Administration content contains several packages that provide statistics
about the health and performance of ArcSight products.
 ArcSight Administration is installed automatically with the ArcSight Manager and is
essential for managing and tuning the performance of content and components.
 ArcSight Admin DB CORR is installed automatically with the ArcSight Manager for
ArcSight ESM with CORR- (Correlation Optimized Retention and Retrieval) Engine
and provides information on the health of the CORR-Engine.
 ArcSight Content Management is an optional package that shows information
about content package synchronization with the ESM Content Management
feature. The information includes a history of content packages synchronized from
a primary ESM source to multiple ESM destinations, and any common issues or
errors encountered. You can install this package during ArcSight ESM installation
or from the ArcSight Console any time after installation.
“What is Standard Content?” on page 5
“Standard Content Packages” on page 7
“NetFlow Monitoring Content” on page 7
1 NetFlow Monitoring Overview
6 NetFlow Monitoring Standard Content Guide Confidential
 ArcSight Search Filters is installed automatically with the ArcSight Manager for use
in the ArcSight Command Center. You cannot edit or use these filters in the
ArcSight Console. For information about the search filters, refer to the ArcSight
Command Center User’s Guide.
 ArcSight System content is installed automatically with the ArcSight Manager and
consists of resources required for basic security processing functions, such as threat
escalation and priority calculations, as well as basic throughput channels required for
out-of-the-box functionality.
 ArcSight Foundation content (such as Cisco Monitoring, Configuration Monitoring,
Intrusion Monitoring, IPv6, NetFlow Monitoring, Network Monitoring, and Workflow)
provide a coordinated system of resources with real-time monitoring capabilities for a
specific area of focus, as well as after-the-fact analysis in the form of reports and
trends. You can extend these foundations with additional resources specific to your
needs or you can use them as a template for building your own resources and tasks.
You can install a Foundation during ArcSight ESM installation or from the ArcSight
Console any time after installation.
 Shared Libraries - ArcSight Administration and several of the ArcSight Foundations
rely on a series of common resources that provide core functionality for common
security scenarios. Dependencies between these resources and the packages they
support are managed by the Package resource.
 Anti Virus content is a set of filters, reports, and report queries used by ArcSight
Foundations, such as Configuration Monitoring and Intrusion Monitoring.
 Conditional Variable Filters content is a library of filters used by variables in
standard content report queries, filters, and rule definitions. The Conditional
Variable Filters are used by ArcSight Administration and certain ArcSight
Foundations, such as Configuration Monitoring, Intrusion Monitoring, Network
Monitoring, and Workflow.
 Global Variables content is a set of variables used to create other resources and to
provide event-based fields that cover common event information, asset, host, and
user information, and commonly used timestamp formats. The Global Variables
are used by ArcSight Administration and certain ArcSight Foundations.
 Monitoring Support Data content is a set of active lists that store mapping
information for HTTP return status code classes, Cisco firewall syslog message
types, and encoded logon types.
 Network filters content is a set of filters required by ArcSight Administration and
certain ArcSight Foundations, such as Intrusion Monitoring and Network
Monitoring.
The ArcSight Admin DB CORR and ArcSight Search Filters content
packages are installed automatically when you perform a new
ArcSight ESM installation. However, when you upgrade your ArcSight
ESM system, these content packages are not installed automatically.
You can install these packages from the ArcSight Console any time
after upgrade by right-clicking the package on the Packages tab in the
Navigator and selecting Install Package.
Refer to the ArcSight ESM Upgrade Guide for information about
upgrading ArcSight ESM.
The resources in the ArcSight Core Security, ArcSight Administration,
ArcSight DB CORR, Conditional Variable Filters, Global Variables, and
Network Filters content packages are not locked even though they
manage core functionality; HP recommends that you do not delete or
modify these resources unless you are an advanced user who
understands fully the resources and their dependencies.
1 NetFlow Monitoring Overview
Confidential NetFlow Monitoring Standard Content Guide 7
Standard Content Packages
Standard content comes in packages (.arb files) that are either installed automatically or
presented as an install-time option. The following graphic outlines the packages.
Figure 1-1 The ArcSight Core Security, ArcSight Administration, and ArcSight System
packages at the base provide content required for basic ArcSight functionality. The common
packages in the center contain shared resources that support multiple packages. The
packages shown on top are ArcSight Foundations that address common network security and
management scenarios.
Depending on the options you install, you will see the ArcSight Core Security, ArcSight
Administration, and ArcSight System resources and some or all of the other package
content.
NetFlow Monitoring Content
NetFlow is a network protocol developed by Cisco Systems to run on Cisco IOS-enabled
equipment for collecting IP traffic information. It is proprietary, but supported by platforms
other than Cisco IOS, such as Juniper routers and Linux.
NetFlow provides session-level data. Leveraging this information using ArcSight can help to
monitor network bandwidth usage and correlate it with other security logs (such as
firewall, IDS, authentication logs, and so on).
The NetFlow Monitoring content provides resources to monitor and report on top
bandwidth usage by source, destination and port.
This guide describes the NetFlow Monitoring content. For information about ArcSight Core
Security, ArcSight Administration, or ArcSight System content, refer to the ArcSight Core
When creating your own packages, you can explicitly include or exclude system
resources in the package. Exercise caution if you delete packages that might
have system resources; for example, zones. Make sure the system resources
either belong to a locked group or are themselves locked. For more information
about packages, refer to the ArcSight Console User’s Guide.
1 NetFlow Monitoring Overview
8 NetFlow Monitoring Standard Content Guide Confidential
Security, ArcSight Administration, and ArcSight System Standard Content Guide. For
information about an optional ArcSight Foundation, refer to the Standard Content Guide for
that Foundation. ESM documentation is available on Protect 724
(https://protect724.arcsight.com).
Confidential NetFlow Monitoring Standard Content Guide 9
Chapter 2
Installation and Configuration
This chapter discusses the following topics.
Installing the NetFlow Monitoring Package
The NetFlow Monitoring package is one of the standard content packages presented as
install-time options. If you selected all of the standard content packages to be installed at
installation time, the packages and their resources are installed in the ArcSight Database
and available in the Navigator panel resource tree. The package icons in the Navigator
panel package view appear blue.
If you opted to exclude a Foundation package during ESM installation, the package is
imported into the Packages tab in the Navigator panel automatically, but is not available in
the resource view. The package icon in the package view appears grey.
If you do not want the package to be available in any form, you can delete the package.
To install a package that is imported, but not installed:
1 On the Navigator panel Packages tab, navigate to the package you want to install.
2 Right-click the package and select Install Package.
3 In the Install Package dialog, click OK.
4 When the installation is complete, review the summary report and click OK.
The package resources are fully installed to the ArcSight Database, the resources are
fully enabled and operational, and available in the Navigator panel resource tree.
To uninstall a package that is installed:
1 On the Navigator Panel Packages tab, navigate to the package you want to uninstall.
2 Right-click the package and select Uninstall Package.
3 In the Uninstall Package dialog, click OK.
The progress of the uninstall displays in the Progress tab of the Uninstalling Packages
dialog. If a message displays indicating that there is a conflict, select an option in the
Resolution Options area and click OK.
4 When uninstall is complete, review the summary and click OK.
“Installing the NetFlow Monitoring Package” on page 9
“Configuring NetFlow Monitoring Content” on page 10
2 Installation and Configuration
10 NetFlow Monitoring Standard Content Guide Confidential
The package is removed from the ArcSight Database and the Navigator panel resource
tree, but remains available in the Navigator panel Packages tab, and can be
re-installed at another time.
To delete a package and remove it from the ArcSight Console and the ArcSight
Database:
1 On the Navigator Panel Packages tab, navigate to the package you want to delete.
2 Right-click the package and select Delete Package.
3 When prompted for confirmation, click Delete.
The package is removed from the Navigator panel Packages tab.
Configuring NetFlow Monitoring Content
The list below shows the general tasks you need to complete to configure NetFlow
Monitoring content with values specific to your environment.
 “Modeling the Network” on page 10
 “Categorizing Assets” on page 11
 “Ensuring Filters Capture Relevant Events” on page 11
 “Scheduling Reports” on page 12
 “Restricting Access to Vulnerability View Reports” on page 12
 “Configuring Trends” on page 12
Modeling the Network
Configuring NetFlow Monitoring content starts with installing SmartConnectors and
configuring zones and networks for devices that report to ESM. The NetFlow Monitoring
content is triggered by NetFlow events from the following SmartConnectors:
A network model keeps track of the network nodes participating in the event traffic.
Modeling your network and categorizing critical assets using the standard asset categories
is what activates some of the standard content and makes it effective.
There are several ways to model your network. For information about populating the
network model, refer to the ArcSight Console User’s Guide. To learn more about the
architecture of the ESM network modeling tools, refer to the ESM 101 guide.
SmartConnector Device Version Supported
ArcSight IP Flow
SmartConnector
• Cisco NetFlow versions 5 and 9
• Flexible NetFlow from IOS 15.0
• Cisco ASA 8.2, and Juniper Networks J-Flow
versions 5 and 9
ArcSight QoSient ARGUS
SmartConnector
• QoSient ARGUS versions 2 and 3
2 Installation and Configuration
Confidential NetFlow Monitoring Standard Content Guide 11
Categorizing Assets
After you have populated your network model with assets, apply the standard asset
categories to activate standard content that uses these categories.
You can assign asset categories to assets, zones, asset groups, or zone groups. If assigned
to a group, all resources under that group inherit the categories.
You can assign asset categories individually using the Asset editor or in a batch using the
Network Modeling wizard. For information about how to assign asset categories using the
ArcSight Console tools, refer to the ArcSight Console User’s Guide.
For more about the Priority Formula and how it leverages these asset categories to help
assign priorities to events, refer to the ArcSight Console User’s Guide or the ESM 101 guide.
Ensuring Filters Capture Relevant Events
Standard content relies on specific event field values to identify events of interest. Although
this method applies to most of the events and devices, be sure to test key filters to verify
that they actually capture the required events. For NetFlow Monitoring, follow the
procedure below to make sure that the NetFlow Traffic Reporting Devices filter captures
relevant events:
To ensure that a filter captures the relevant events:
1 Generate or identify the required events and verify that they are being processed by
ESM by viewing them in an active channel or query viewer.
Asset Category Description
/Site Asset Categories/
Address Spaces/Protected
Categorize all assets (or the zones to which the
assets belong) that are internal to the network
with this asset category.
Internal Assets are assets inside the company
network. Assets that are not categorized as
internal to the network are considered to be
external. Make sure that you also categorize
assets that have public addresses but are
controlled by the organization (such as web
servers) as Protected.
Note: Assets with a private IP address (such as
192.168.0.0) are considered Protected by the
system, even if they are not categorized as such.
/System Asset Categories/
Criticality/High
Categorize all assets that are considered critical
to protect (including assets that host proprietary
content, financial data, cardholder data, top
secret data, or perform functions critical to basic
operations) with this asset category.
The asset categories most essential to basic
event processing are those used by the Priority
Formula to calculate the criticality of an event.
Asset criticality is one of the four factors used by
the Priority Formula to generate an overall event
priority rating.
/System Asset Categories/
Criticality/Very High
Same as /System Asset Categories/
Criticality/High
2 Installation and Configuration
12 NetFlow Monitoring Standard Content Guide Confidential
2 Navigate to the NetFlow Traffic Reporting Devices filter, right-click the filter and
choose Create Channel with Filter. If you see the events of interest in the newly
created channel, the filter is functioning properly.
If you do not see the events of interest:
a Verify that the configuration of the active channel is suitable for the events in
question. For example, ensure that the event time is within the start and end time
of the channel.
b Modify the filter condition to capture the events of interest. After applying the
change, repeat Step 2 to verify that the modified filter captures the required
events.
Scheduling Reports
You can run reports on demand, automatically on a regular schedule, or both. By default,
NetFlow Monitoring reports are not scheduled to run automatically.
Evaluate the reports that come with NetFlow Monitoring, and schedule the reports that are
of interest to your organization and business objectives. For instructions about how to
schedule reports, refer to the ArcSight Console User’s Guide.
Restricting Access to Vulnerability View Reports
The Vulnerability View detail reports display a list of vulnerabilities generated by scanner
report events, and are therefore considered sensitive material. By default, the reports are
configured with read access for Administrators, Default User Groups, and Analyzer
Administrators. Administrators and Analyzer Administrators also have write access to this
group.
To eliminate these events from view, you have to create a special filter and apply it to the
appropriate users groups. When restricting access to the Vulnerability View reports, be
aware of the following:
 Because access is inherited, the parent group must have the same or more liberal
permissions than the vulnerability reports.
 If you need to move the reports to a group with tighter permissions, also move the
trends and queries that support them, in both the Detail and Operational Summaries
sections.
 To get a complete view of the resources attached to these reports, run a resource
graph on the individual filters or the parent group (right-click the resource or group
and select Graph View).
Configuring Trends
Trends are a type of resource that can gather data over longer periods of time, which can
be leveraged for reports. Trends streamline data gathering to the specific pieces of data
you want to track over a long range, and breaks the data gathering up into periodic
updates. For long-range queries, such as end-of-month summaries, trends greatly reduce
the burden on system resources. Trends can also provide a snapshot of which devices
report on the network over a series of days.
NetFlow Monitoring content includes several trends, which are all enabled by default.
2 Installation and Configuration
Confidential NetFlow Monitoring Standard Content Guide 13
To disable a trend, go to the Navigator panel, right-click the trend you want to disable and
select Disable Trend.
For more information about trends, refer to the the ArcSight Console User’s Guide.
Adjusting Trend Schedules
NetFlow Monitoring content contains five trends. Four of the trends are trend-on-trends,
which all collect data from a single base trend (Top Bandwidth Usage Events). Do not
schedule the four trend-on-trends to run before the base trend completes its daily query
run. By default, the trends are scheduled to run daily at the times indicated below:
By default, each trend uses midnight of the date the package was installed as the date and
time the trend will start collecting information. To adjust the schedule or start date/time for
the trend, edit the values in the Schedule tab of the Inspect/Edit panel for the trend.
Configuring the TotalBytes Variable
SmartConnectors can be configured to aggregate events and sum the counts in fields, such
as bytesIn and bytesOut. SmartConnectors also set the aggregated event count. By
default, ESM interprets the count in fields such as bytesIn and bytesOut as an average,
and if the SmartConnector is configured to sum certain fields, ESM multiplies those
summed fields by aggregated event count, which creates an inaccurate value. By default,
the NetFlow Monitoring content compensates for this by dividing the bytesIn and
bytesOut fields by aggregated event count using the TotalBytes variable.
The Connector Summation Fields property is an ESM configuration option that enables you
to indicate which fields are sums, so that ESM can report the correct value without
requiring that content compensate by adding a divide-by-aggregated-count function.
For example, the connector.summation.fields=bytesIn,bytesOut property
added to the server.properties file on the ArcSight Manager indicates that the
bytesIn and bytesOut fields coming from the SmartConnector are sums, and therefore
exempts those fields from being multiplied by aggregated event count. If this property is
set in your ESM installation, you must configure the NetFlow Monitoring content that uses
the TotalBytes variable to use a variable that will add the values, not multiply them.
To enable a disabled trend, you must first change the default start date in
the Trend editor.
If the start date is not changed, the trend takes the default start date
(derived from when the trend was first installed), and back fills the data from
that time. For example, if you enable the trend six months after the first
install, these trends try to get all the data for the last six months, which
might cause performance problems, overwhelm system resources, or cause
the trend to fail if that event data is not available.
Trend Name Scheduled run time
Top Bandwidth Usage by Destination 3:33:36 AM
Top Bandwidth Usage by Hour 2:40:34 AM
Top Bandwidth Usage by Port 3:15:50 AM
Top Bandwidth Usage by Source 3:07:08 AM
Top Bandwidth Usage Events (base trend) 1:15:09 AM
2 Installation and Configuration
14 NetFlow Monitoring Standard Content Guide Confidential
To configure the TotalBytes global variable:
1 From the Resources tab in the Navigator panel, go to Field Sets.
2 Click the Fields & Global Variables tab and navigate to ArcSight
Foundation/Variables Library/Bytes.
3 Right-click TotalBytes and select Edit Field.
The global variable displays in the Inspect/Edit panel.
4 Click the Parameters tab and change the arguments from BytesIn_2 and
BytesOut_2 to Bytes_In and Bytes_Out, as shown in the following figure.
5 Click Apply to confirm the change.
For information about the server.properties file on the ArcSight Manager, refer to the
ArcSight ESM Administrator’s Guide.
For instructions about how to configure a SmartConnector to aggregate and sum on fields,
such as bytesIn and bytesOut, and targetPort, refer to the ArcSight SmartConnector User’s
Guide.
Viewing a Use Case Resource
The NetFlow Monitoring resources are grouped together in the ArcSight Console in the
NetFlow Monitoring use case resource. A use case resource provides a way to see a set of
resources that help address a specific security issue or business requirement.
To view the resources associated with the NetFlow Monitoring use case resource:
1 In the Navigator panel, select the Use Cases tab.
2 Open the ArcSight Foundation/NetFlow Monitoring group.
3 Right-click the NetFlow Monitoring use case resource and select the Open Use Case
option, or double-click the use case resource.
The resources that make up the use case resource are displayed in the Viewer. The use
case resource tables listed in Chapter 3‚ NetFlow Monitoring Content‚ on page 15 contain all
the resources that have been explicitly assigned to the use case.
Confidential NetFlow Monitoring Standard Content Guide 15
Chapter 3
NetFlow Monitoring Content
NetFlow is a network protocol developed by Cisco Systems to run on Cisco IOS-enabled
equipment for collecting IP traffic information. It is proprietary, but supported by platforms
other than Cisco IOS, such as Juniper routers and Linux. NetFlow provides session-level
data. Leveraging this information using ArcSight can help to monitor network bandwidth
usage and correlate it with other security logs (such as firewall, IDS, authentication logs,
and so on).
NetFlow Monitoring content provides resources that:
 Monitor, investigate, and report on bandwidth usage by source, destination, and port.
 Monitor the bandwidth moving average and identify top bandwidth usage by source,
destination, and port.
 Report on bandwidth usage in daily or weekly increments using trends and by source,
destination, and port.
You can use this information to build correlation content; for example, you can build a rule
that correlates NetFlow events with other security logs, such as firewall or IDS logs.
Devices
Network devices with NetFlow enabled supply events that apply to the NetFlow Monitoring
resources.
3 NetFlow Monitoring Content
16 NetFlow Monitoring Standard Content Guide Confidential
Resources
The following table lists all the resources explicitly assigned to the NetFlow Monitoring use
case and includes dependent resources. Dependent resources are not listed in a use case
resource.
Table 3-1 Resources that Support the NetFlow Monitoring Use Case
Resource Description Type URI
Monitor Resources
NetFlow Bandwidth
Usage Overview
This dashboard shows the top
bandwidth usage as reported
by NetFlow events, showing
the top bandwidth usage by
source, destination,
well-known port, and non
well-known port.
Dashboard /All Dashboards/ArcSight
Core Security
NetFlow Bandwidth
Usage Monitoring
This dashboard shows an
overview of bandwidth usage
reported by NetFlow events.
The report displays the top
bandwidth usage events, and
the inbound and outbound
bandwidth moving average.
Dashboard ArcSight Foundation/
NetFlow Monitoring/
List of Top
Bandwidth Usage
Events
This query viewer displays the
top ten bandwidth usage
events and contains several
drilldowns for investigation.
Query
Viewer
ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by
Well-Known Port
This query viewer displays the
top ten bandwidth usage
events sorted by well-known
ports from NetFlow events and
contains several drilldowns for
investigation.
Query
Viewer
ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by
Source-Destination
Pairs and Port
This query viewer displays the
top ten bandwidth usage
events sorted by
source-destination address
pairs and destination port
from NetFlow events.
Query
Viewer
ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by
Destination
This query viewer displays the
top ten bandwidth usage
events sorted by destination
address from NetFlow events
and contains several
drilldowns for investigation.
Query
Viewer
ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by
Source-Destination
Pairs
This query viewer displays the
top ten bandwidth usage
events sorted by
source-destination address
pairs from NetFlow events.
Query
Viewer
ArcSight Foundation/
NetFlow Monitoring/
3 NetFlow Monitoring Content
Confidential NetFlow Monitoring Standard Content Guide 17
Top Bandwidth
Usage by
Non-Well-Known
Port
This query viewer displays the
top ten bandwidth usage
events sorted by
non-well-known ports from
NetFlow events and contains
several drilldowns for
investigation.
Query
Viewer
ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by Source
This query viewer displays the
top ten bandwidth usage
events sorted by source
address from NetFlow events
and contains several
drilldowns for investigation.
Query
Viewer
ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by Source
and Port
This query viewer displays the
top ten bandwidth usage
events sorted by source
address and destination port
from NetFlow events.
Query
Viewer
ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by
Destination and
Port
This query viewer displays the
top ten bandwidth usage
events sorted by destination
address and destination port
from NetFlow events.
Query
Viewer
ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage Weekly
Report
This report displays the
bandwidth usage, the top
bandwidth usage by source,
the top bandwidth usage by
destination, and the top
bandwidth usage by port. The
default time range for this
report is the past seven days.
Report ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by
Destination Port
This report displays top
bandwidth usage by
destination port. The default
time range for this report is
yesterday.
Report ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by Source
This report displays the top
bandwidth usage by source.
The default time range for this
report is yesterday.
Report ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by
Destination
This report displays the top
bandwidth usage by
destination. The default time
range for this report is
yesterday.
Report ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage Daily Report
This report displays several
charts that show the
bandwidth usage, the top
bandwidth usage by source,
the top bandwidth usage by
destination, and the top
bandwidth usage by port. The
default time range for this
report is yesterday.
Report ArcSight Foundation/
NetFlow Monitoring/
Resource Description Type URI
3 NetFlow Monitoring Content
18 NetFlow Monitoring Standard Content Guide Confidential
Library Resources
Protected This is a site asset category. Asset
Category
Site Asset Categories/
Address Spaces
Top Bandwidth
Usage (MB) by
Destination
This data monitor displays the
total bandwidth usage in
MegaBytes (MB) from NetFlow
events for top Destination IP
Addresses.
Data
Monitor
/All Data Monitors/
ArcSight Core
Security/NetFlow
Monitoring
Outbound
Bandwidth (Bytes
Per Second)
This data monitor shows the
average outbound bandwidth
(bytes/sec) for the last hour.
The values are updated every
five minutes.
Data
Monitor
ArcSight Foundation/
NetFlow Monitoring/
NetFlow Bandwidth Usage
Monitoring/
Top Bandwidth
Usage (MB) by
Well-Known Port
This data monitor displays the
total bandwidth usage in
MegaBytes (MB) from NetFlow
events for Well Known Ports.
Data
Monitor
/All Data
Monitors/ArcSight Core
Security/NetFlow
Monitoring
Top Bandwidth
Usage (MB) by
Non-Well-Known
Port
This data monitor displays the
total bandwidth usage in
MegaBytes (MB) from NetFlow
events for Non Well Known
Ports.
Data
Monitor
/All Data Monitors/
ArcSight Core
Security/NetFlow
Monitoring
Inbound Bandwidth
(Bytes Per Second)
This data monitor shows the
average inbound bandwidth
(bytes/sec) for the last hour.
The values are updated every
five minutes.
Data
Monitor
ArcSight Foundation/
NetFlow Monitoring/
NetFlow Bandwidth Usage
Monitoring/
Top Bandwidth
Usage (MB) by
Source
This data monitor displays the
total bandwidth usage in
MegaBytes (MB) from NetFlow
events for the top Source IP
Addresses.
Data
Monitor
/All Data Monitors/
ArcSight Core
Security/NetFlow
Monitoring
List of Top
Bandwidth Usage
(MB) Events
This data monitor displays the
top bandwidth usage events
Data
Monitor
ArcSight Foundation/
NetFlow Monitoring/
NetFlow Bandwidth Usage
Monitoring/
TotalBytes This variable sums the values
of Bytes In and Bytes Out for
each event.
Global
Variable
ArcSight Foundation/
Variables Library/Bytes
MBytesTotal This variable converts the
combination of the Bytes In
and Bytes Out fields to
MBytes, where a MByte is
defined as 1,000,000 bytes.
The value is set to have no
more than two digits past the
decimal point, so that 0.01 is
the smallest non-zero value
returned (for example, when
Bytes In + Bytes Out <
10,000, the result is 0).
Global
Variable
ArcSight Foundation/
Variables Library/Bytes
Resource Description Type URI
3 NetFlow Monitoring Content
Confidential NetFlow Monitoring Standard Content Guide 19
External Source This filter identifies events
originating from outside the
company network.
Filter ArcSight Foundation/
Common/Network Filters/
Boundary Filters
Inbound NetFlow
Traffic
This filter identifies NetFlow
events originating from
external sources targeting the
internal network.
Filter ArcSight Foundation/
NetFlow Monitoring/
Bytes Out is NULL This filter is designed for
conditional expression
variables. The filter identifies
events where the Bytes Out is
NULL.
Filter ArcSight Foundation/
Common/Conditional
Variable Filters/Bytes
Outbound NetFlow
Traffic
This filter identifies NetFlow
events originating from
internal sources targeting the
external network.
Filter ArcSight Foundation/
NetFlow Monitoring/
Outbound Events This filter identifies events
originating from inside the
company network, targeting
the outside network.
Filter ArcSight
Foundation/Common/
Network Filters/Location
Filters
Internal Source This filter identifies events
coming from inside the
company network.
Filter ArcSight Foundation/
Common/Network Filters/
Boundary Filters
Internal Target This filter identifies events
targeting inside the company
network.
Filter ArcSight Foundation/
Common/Network Filters/
Boundary Filters
QoSient Argus
Events
This filter identifies events
from Argus SmartConnectors.
Filter /All Filters/ArcSight
Core Security/NetFlow
Monitoring
Bytes In is NULL This filter is designed for
conditional expression
variables. The filter identifies
events in which the Bytes In is
NULL.
Filter ArcSight Foundation/
Common/Conditional
Variable Filters/Bytes
NetFlow Traffic
Reporting Devices
This filter identifies NetFlow
traffic reporting devices. By
default, the filter contains
QoSient Argus, NetFlow V5,
and NetFlow V9 events.
Filter /All Filters/ArcSight
Core Security/NetFlow
Monitoring
External Target This filter identifies events
targeting the outside network.
Filter ArcSight Foundation/
Common/Network Filters/
Boundary Filters
NetFlow V9 Events This filter identifies NetFlow
version 9 events.
Filter /All Filters/ArcSight
Core Security/NetFlow
Monitoring
Inbound Events This filter identifies events
coming from the outside
network targeting inside the
company network.
Filter ArcSight Foundation/
Common/Network Filters/
Location Filters
Resource Description Type URI
3 NetFlow Monitoring Content
20 NetFlow Monitoring Standard Content Guide Confidential
NetFlow Traffic for
Non-Well-Known
Ports
This filter identifies events
from NetFlow Traffic Reporting
Devices where the Target Port
is not NULL and is greater
than or equal to 1024.
Filter /All Filters/ArcSight
Core Security/NetFlow
Monitoring
NetFlow Traffic for
Well-Known Ports
This filter identifies events
from NetFlow Traffic Reporting
devices where the Target Port
is not NULL and is less than
1024.
Filter /All Filters/ArcSight
Core Security/NetFlow
Monitoring
NetFlow V5 Events This filter identifies NetFlow
version 5 events.
Filter /All Filters/ArcSight
Core Security/NetFlow
Monitoring
Top Bandwidth
Usage by
Source-Destination
Pairs
This query returns the
attacker address, target
address, flow counts, and total
bytes (Bytes In + Bytes Out)
from NetFlow events.
Query ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by
Destination - Trend
on Trend
This query identifies the
destination address,
destination zone, flow counts,
and total bytes from the Top
Bandwidth Usage by
Destination trend.
Query ArcSight Foundation/
NetFlow Monitoring/
Trend/
Top Bandwidth
Usage by Source
This query returns the
attacker address and total
bytes (Bytes In + Bytes Out)
from NetFlow events
Query ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by Hour -
Trend on Trend
This query returns bandwidth
usage information by hour
from the Top Bandwidth Usage
by Hour trend.
Query ArcSight Foundation/
NetFlow Monitoring/
Trend/
Top Bandwidth
Usage by Source
and Port
This query identifies the
attacker address, target port,
flow counts, and total bytes
(Bytes In + Bytes Out) from
NetFlow events.
Query ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage Events
This query identifies the
source address, destination
address, destination port, flow
counts, and total bytes (Bytes
In + Bytes Out) from NetFlow
events within the last hour.
This query is used by the Top
Bandwidth Usage Events
trend.
Query ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by Day -
Trend on Trend
This query identifies the
bandwidth usage information
by day from the Top
Bandwidth Usage by Hour
trend.
Query ArcSight Foundation/
NetFlow Monitoring/
Trend/
Resource Description Type URI
3 NetFlow Monitoring Content
Confidential NetFlow Monitoring Standard Content Guide 21
Top Bandwidth
Usage by
Destination
This query identifies the target
address and total bytes (Bytes
In + Bytes Out) from NetFlow
events.
Query ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by Port -
Trend
This query identifies the
destination port, flow counts,
and total bytes from the trend
Top Bandwidth Usage Events.
Query ArcSight Foundation/
NetFlow Monitoring/
Trend/
Top Bandwidth
Usage by
Well-Known Port
This query returns the target
port and total bytes (Bytes In
+ Bytes Out) from NetFlow
events from a well-known
target port.
Query ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by Hour -
Trend
This query returns bandwidth
usage information by hour
from the Top Bandwidth Usage
Events trend.
Query ArcSight Foundation/
NetFlow Monitoring/
Trend/
Top Bandwidth
Usage by Port -
Trend on Trend
This query identifies the target
Port, flow counts, and total
bytes from the Top Bandwidth
Usage by Port trend.
Query ArcSight Foundation/
NetFlow Monitoring/
Trend/
Top Bandwidth
Usage by
Destination and
Port
This query identifies the target
address, target port, flow
counts, and total bytes (Bytes
In + Bytes Out) from NetFlow
events.
Query ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by Source -
Trend
This query returns the source
address, source zone, and
total bytes from the Top
Bandwidth Usage Events
trend.
Query ArcSight Foundation/
NetFlow Monitoring/
Trend/
Top Bandwidth
Usage by
Non-Well-Known
Port
This query returns the target
port and total bytes (Bytes In
+ Bytes Out) from NetFlow
events for non-well-known
target ports.
Query ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by
Destination - Trend
This query identifies the
destination address,
destination zone, flow counts,
and total bytes from the Top
Bandwidth Usage Events
trend.
Query ArcSight Foundation/
NetFlow Monitoring/
Trend/
List of Top
Bandwidth Usage
Events
This query returns the source
address, destination address,
destination port, flow counts,
and total bytes (Bytes In +
Bytes Out) from NetFlow
events within the last hour.
Query ArcSight Foundation/
NetFlow Monitoring/
Resource Description Type URI
3 NetFlow Monitoring Content
22 NetFlow Monitoring Standard Content Guide Confidential
Top Bandwidth
Usage by
Source-Destination
Pairs and Port
This query identifies the
attacker address, target
address, target port, flow
counts, and total bytes (Bytes
In + Bytes Out) from NetFlow
events.
Query ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by Source -
Trend on Trend
This query returns the source
address, source zone, and
total bytes from the Top
Bandwidth Usage by Source
trend.
Query ArcSight Foundation/
NetFlow Monitoring/
Trend/
Chart and Table
Landscape
This template is designed to
show one chart and a table.
The orientation is landscape.
Report
Template
ArcSight System/1
Chart/With Table
Four Charts
Landscape
This template is designed to
show four charts. The
orientation is landscape.
Report
Template
ArcSight System/4
Charts/Without Table
Top Bandwidth
Usage by Hour
This trend stores hourly
information of top bandwidth
usage and includes the end
time hour, flow counts, and
total bytes. This trend
depends on the /All
Trends/ArcSight
Foundation/NetFlow
Monitoring/Top Bandwidth
Usage Events trend.
Trend ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage Events
This trend stores bandwidth
usage information reported by
NetFlow and contains the end
time hour, source address,
source zone, destination
address, destination zone,
destination port, flow counts,
and total bytes. This trend is
the base trend, collecting a
broad amount of aggregated
NetFlow data for a short
period of time, to be used by
several other trends to further
aggregate data and store for a
longer period of time. The
default retention period for
this trend is eight days.
Trend ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by Source
This trend stores the top
bandwidth usage information
by source and includes the
source address, source zone,
flow counts, and total bytes.
This trend depends on the /All
Trends/ArcSight
Foundation/NetFlow
Monitoring/Top Bandwidth
Usage Events trend.
Trend ArcSight Foundation/
NetFlow Monitoring/
Resource Description Type URI
3 NetFlow Monitoring Content
Confidential NetFlow Monitoring Standard Content Guide 23
Top Bandwidth
Usage by
Destination
This trend stores the top
bandwidth usage information
by destination and includes
the destination address,
destination zone, flow counts,
and total bytes. This trend
depends on the /All
Trends/ArcSight
Foundation/NetFlow
Monitoring/Top Bandwidth
Usage Events trend.
Trend ArcSight Foundation/
NetFlow Monitoring/
Top Bandwidth
Usage by Port
This trend stores top
bandwidth usage information
by port and includes the
destination port, flow counts,
and total bytes. This trend
depends on the /All
Trends/ArcSight
Foundation/NetFlow
Monitoring/Top Bandwidth
Usage Events trend.
Trend ArcSight Foundation/
NetFlow Monitoring/
Resource Description Type URI
3 NetFlow Monitoring Content
24 NetFlow Monitoring Standard Content Guide Confidential
Confidential NetFlow Monitoring Standard Content Guide 25
A
ArcSight Administration overview 5
ArcSight Core Security overview 5
ArcSight Foundations overview 6
ArcSight System overview 6
asset categories
Protected 18
B
Bytes In is NULL filter 19
Bytes Out is NULL filter 19
C
Chart and Table Landscape report template 22
content packages 7
D
dashboards
NetFlow Bandwidth Usage Monitoring 16
NetFlow Bandwidth Usage Overview 16
data monitors
Inbound Bandwidth (Bytes Per Second) 18
List of Top Bandwidth Usage (MB) Events 18
Outbound Bandwidth (Bytes Per Second) 18
Top Bandwidth Usage (MB) by Destination 18
Top Bandwidth Usage (MB) by Non-Well-Known
Port 18
Top Bandwidth Usage (MB) by Source 18
Top Bandwidth Usage (MB) by Well-Known Port 18
E
External Source filter 19
External Target filter 19
F
filters
Bytes In is NULL 19
Bytes Out is NULL 19
External Source 19
External Target 19
Inbound Events 19
Inbound NetFlow Traffic 19
Internal Source 19
Internal Target 19
NetFlow Traffic for Non-Well-Known Ports 20
NetFlow Traffic for Well-Known Ports 20
NetFlow Traffic Reporting Devices 19
NetFlow V5 Events 20
NetFlow V9 Events 19
Outbound Events 19
Outbound NetFlow Traffic 19
QoSient Argus Events 19
Four Charts Landscape report template 22
G
global variables
MBytesTotal 18
TotalBytes 18
I
Inbound Bandwidth (Bytes Per Second) data monitor 18
Inbound Events filter 19
Inbound NetFlow Traffic filter 19
Internal Source filter 19
Internal Target filter 19
L
List of Top Bandwidth Usage (MB) Events data monitor
18
List of Top Bandwidth Usage Events query 21
List of Top Bandwidth Usage Events query viewer 16
M
MBytesTotal global variable 18
N
NetFlow Bandwidth Usage Monitoring dashboard 16
NetFlow Bandwidth Usage Overview dashboard 16
NetFlow Traffic for Non-Well-Known Ports filter 20
NetFlow Traffic for Well-Known Ports filter 20
NetFlow Traffic Reporting Devices filter 19
NetFlow V5 Events filter 20
NetFlow V9 Events filter 19
O
Outbound Bandwidth (Bytes Per Second) data monitor
18
Outbound Events filter 19
Outbound NetFlow Traffic filter 19
P
packages
deleting 10
Index
26 NetFlow Monitoring Standard Content Guide Confidential
installing 9
uninstalling 9
Protected asset category 18
Q
QoSient Argus Events filter 19
queries
List of Top Bandwidth Usage Events 21
Top Bandwidth Usage by Day - Trend on Trend 20
Top Bandwidth Usage by Destination 21
Top Bandwidth Usage by Destination - Trend 21
Top Bandwidth Usage by Destination - Trend on
Trend 20
Top Bandwidth Usage by Destination and Port 21
Top Bandwidth Usage by Hour - Trend 21
Top Bandwidth Usage by Hour - Trend on Trend 20
Top Bandwidth Usage by Non-Well-Known Port 21
Top Bandwidth Usage by Port - Trend 21
Top Bandwidth Usage by Port - Trend on Trend 21
Top Bandwidth Usage by Source 20
Top Bandwidth Usage by Source - Trend 21
Top Bandwidth Usage by Source - Trend on Trend
22
Top Bandwidth Usage by Source and Port 20
Top Bandwidth Usage by Source-Destination Pairs
20
Top Bandwidth Usage by Source-Destination Pairs
and Port 22
Top Bandwidth Usage by Well-Known Port 21
Top Bandwidth Usage Events 20
query viewers
List of Top Bandwidth Usage Events 16
Top Bandwidth Usage by Destination 16
Top Bandwidth Usage by Destination and Port 17
Top Bandwidth Usage by Non-Well-Known Port 17
Top Bandwidth Usage by Source 17
Top Bandwidth Usage by Source and Port 17
Top Bandwidth Usage by Source-Destination Pairs
16
Top Bandwidth Usage by Source-Destination Pairs
and Port 16
Top Bandwidth Usage by Well-Known Port 16
R
report templates
Chart and Table Landscape 22
Four Charts Landscape 22
reports
Top Bandwidth Usage by Destination 17
Top Bandwidth Usage by Destination Port 17
Top Bandwidth Usage by Source 17
Top Bandwidth Usage Daily Report 17
Top Bandwidth Usage Weekly Report 17
S
shared libraries 6
T
Top Bandwidth Usage (MB) by Destination data monitor
18
Top Bandwidth Usage (MB) by Non-Well-Known Port
data monitor 18
Top Bandwidth Usage (MB) by Source data monitor 18
Top Bandwidth Usage (MB) by Well-Known Port data
monitor 18
Top Bandwidth Usage by Day - Trend on Trend query 20
Top Bandwidth Usage by Destination - Trend on Trend
query 20
Top Bandwidth Usage by Destination - Trend query 21
Top Bandwidth Usage by Destination and Port query 21
Top Bandwidth Usage by Destination and Port query
viewer 17
Top Bandwidth Usage by Destination Port report 17
Top Bandwidth Usage by Destination query 21
Top Bandwidth Usage by Destination query viewer 16
Top Bandwidth Usage by Destination report 17
Top Bandwidth Usage by Destination trend 23
Top Bandwidth Usage by Hour - Trend on Trend query
20
Top Bandwidth Usage by Hour - Trend query 21
Top Bandwidth Usage by Hour trend 22
Top Bandwidth Usage by Non-Well-Known Port query 21
Top Bandwidth Usage by Non-Well-Known Port query
viewer 17
Top Bandwidth Usage by Port - Trend on Trend query 21
Top Bandwidth Usage by Port - Trend query 21
Top Bandwidth Usage by Port trend 23
Top Bandwidth Usage by Source - Trend on Trend query
22
Top Bandwidth Usage by Source - Trend query 21
Top Bandwidth Usage by Source and Port query 20
Top Bandwidth Usage by Source and Port query viewer
17
Top Bandwidth Usage by Source query 20
Top Bandwidth Usage by Source query viewer 17
Top Bandwidth Usage by Source report 17
Top Bandwidth Usage by Source trend 22
Top Bandwidth Usage by Source-Destination Pairs and
Port query 22
Top Bandwidth Usage by Source-Destination Pairs and
Port query viewer 16
Top Bandwidth Usage by Source-Destination Pairs query
20
Top Bandwidth Usage by Source-Destination Pairs query
viewer 16
Top Bandwidth Usage by Well-Known Port query 21
Top Bandwidth Usage by Well-Known Port query viewer
16
Top Bandwidth Usage Daily Report report 17
Top Bandwidth Usage Events query 20
Top Bandwidth Usage Events trend 22
Top Bandwidth Usage Weekly Report report 17
TotalBytes global variable 18
TotalBytes variable 13
trends
Top Bandwidth Usage by Destination 23
Top Bandwidth Usage by Hour 22
Top Bandwidth Usage by Port 23
Top Bandwidth Usage by Source 22
Top Bandwidth Usage Events 22
V
variable, TotalBytes 13

More Related Content

What's hot

Configuration Monitoring Standard Content Guide for ESM 6.8c
Configuration Monitoring Standard Content Guide for ESM 6.8cConfiguration Monitoring Standard Content Guide for ESM 6.8c
Configuration Monitoring Standard Content Guide for ESM 6.8c
Protect724migration
 
Configuration Monitoring Standard Content Guide for ESM 6.5c
Configuration Monitoring Standard Content Guide for ESM 6.5c	Configuration Monitoring Standard Content Guide for ESM 6.5c
Configuration Monitoring Standard Content Guide for ESM 6.5c
Protect724migration
 
Network Monitoring Standard Content Guide for ESM 6.5c
Network Monitoring Standard Content Guide for ESM 6.5c	Network Monitoring Standard Content Guide for ESM 6.5c
Network Monitoring Standard Content Guide for ESM 6.5c
Protect724migration
 
ESM5.6_SCG_NetFlow.pdf
ESM5.6_SCG_NetFlow.pdfESM5.6_SCG_NetFlow.pdf
ESM5.6_SCG_NetFlow.pdf
Protect724v3
 
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdfPpt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
Melody Liu
 
ArcSight Administration and ArcSight System Standard Content Guide (ESM v6.9.1c)
ArcSight Administration and ArcSight System Standard Content Guide (ESM v6.9.1c)ArcSight Administration and ArcSight System Standard Content Guide (ESM v6.9.1c)
ArcSight Administration and ArcSight System Standard Content Guide (ESM v6.9.1c)
Protect724tk
 
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle TrainingsOracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
OracleTrainings
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and complianceFITSFSd
 
What's new in oracle trace file analyzer 18.2.0
What's new in oracle trace file analyzer 18.2.0What's new in oracle trace file analyzer 18.2.0
What's new in oracle trace file analyzer 18.2.0
Sandesh Rao
 
AV/DF Advanced Security Option
AV/DF Advanced Security OptionAV/DF Advanced Security Option
AV/DF Advanced Security Option
DLT Solutions
 
What's new in Oracle ORAchk & EXAchk 19.2
What's new in Oracle ORAchk & EXAchk 19.2What's new in Oracle ORAchk & EXAchk 19.2
What's new in Oracle ORAchk & EXAchk 19.2
Sandesh Rao
 
Esm scg configuration_6.0c
Esm scg configuration_6.0cEsm scg configuration_6.0c
Esm scg configuration_6.0c
Protect724
 
Esm rel notes_6.0c
Esm rel notes_6.0cEsm rel notes_6.0c
Esm rel notes_6.0c
Protect724
 
ESM5.6_SCG_Workflow.pdf
ESM5.6_SCG_Workflow.pdfESM5.6_SCG_Workflow.pdf
ESM5.6_SCG_Workflow.pdf
Protect724v3
 
Whats new in oracle trace file analyzer 18.3.0
Whats new in oracle trace file analyzer 18.3.0Whats new in oracle trace file analyzer 18.3.0
Whats new in oracle trace file analyzer 18.3.0
Gareth Chapman
 
Oracle Database Security: Top 10 Things You Could & Should Be Doing Differently
Oracle Database Security: Top 10 Things You Could & Should Be Doing DifferentlyOracle Database Security: Top 10 Things You Could & Should Be Doing Differently
Oracle Database Security: Top 10 Things You Could & Should Be Doing Differently
Pythian
 
Presentation database security audit vault & database firewall
Presentation   database security audit vault & database firewallPresentation   database security audit vault & database firewall
Presentation database security audit vault & database firewall
xKinAnx
 
AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...
AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...
AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...
Sandesh Rao
 
AIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should know
AIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should knowAIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should know
AIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should know
Sandesh Rao
 
What's new in Oracle and Exachk version 18.4.0
What's new in Oracle and Exachk version 18.4.0What's new in Oracle and Exachk version 18.4.0
What's new in Oracle and Exachk version 18.4.0
Sandesh Rao
 

What's hot (20)

Configuration Monitoring Standard Content Guide for ESM 6.8c
Configuration Monitoring Standard Content Guide for ESM 6.8cConfiguration Monitoring Standard Content Guide for ESM 6.8c
Configuration Monitoring Standard Content Guide for ESM 6.8c
 
Configuration Monitoring Standard Content Guide for ESM 6.5c
Configuration Monitoring Standard Content Guide for ESM 6.5c	Configuration Monitoring Standard Content Guide for ESM 6.5c
Configuration Monitoring Standard Content Guide for ESM 6.5c
 
Network Monitoring Standard Content Guide for ESM 6.5c
Network Monitoring Standard Content Guide for ESM 6.5c	Network Monitoring Standard Content Guide for ESM 6.5c
Network Monitoring Standard Content Guide for ESM 6.5c
 
ESM5.6_SCG_NetFlow.pdf
ESM5.6_SCG_NetFlow.pdfESM5.6_SCG_NetFlow.pdf
ESM5.6_SCG_NetFlow.pdf
 
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdfPpt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
 
ArcSight Administration and ArcSight System Standard Content Guide (ESM v6.9.1c)
ArcSight Administration and ArcSight System Standard Content Guide (ESM v6.9.1c)ArcSight Administration and ArcSight System Standard Content Guide (ESM v6.9.1c)
ArcSight Administration and ArcSight System Standard Content Guide (ESM v6.9.1c)
 
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle TrainingsOracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and compliance
 
What's new in oracle trace file analyzer 18.2.0
What's new in oracle trace file analyzer 18.2.0What's new in oracle trace file analyzer 18.2.0
What's new in oracle trace file analyzer 18.2.0
 
AV/DF Advanced Security Option
AV/DF Advanced Security OptionAV/DF Advanced Security Option
AV/DF Advanced Security Option
 
What's new in Oracle ORAchk & EXAchk 19.2
What's new in Oracle ORAchk & EXAchk 19.2What's new in Oracle ORAchk & EXAchk 19.2
What's new in Oracle ORAchk & EXAchk 19.2
 
Esm scg configuration_6.0c
Esm scg configuration_6.0cEsm scg configuration_6.0c
Esm scg configuration_6.0c
 
Esm rel notes_6.0c
Esm rel notes_6.0cEsm rel notes_6.0c
Esm rel notes_6.0c
 
ESM5.6_SCG_Workflow.pdf
ESM5.6_SCG_Workflow.pdfESM5.6_SCG_Workflow.pdf
ESM5.6_SCG_Workflow.pdf
 
Whats new in oracle trace file analyzer 18.3.0
Whats new in oracle trace file analyzer 18.3.0Whats new in oracle trace file analyzer 18.3.0
Whats new in oracle trace file analyzer 18.3.0
 
Oracle Database Security: Top 10 Things You Could & Should Be Doing Differently
Oracle Database Security: Top 10 Things You Could & Should Be Doing DifferentlyOracle Database Security: Top 10 Things You Could & Should Be Doing Differently
Oracle Database Security: Top 10 Things You Could & Should Be Doing Differently
 
Presentation database security audit vault & database firewall
Presentation   database security audit vault & database firewallPresentation   database security audit vault & database firewall
Presentation database security audit vault & database firewall
 
AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...
AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...
AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...
 
AIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should know
AIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should knowAIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should know
AIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should know
 
What's new in Oracle and Exachk version 18.4.0
What's new in Oracle and Exachk version 18.4.0What's new in Oracle and Exachk version 18.4.0
What's new in Oracle and Exachk version 18.4.0
 

Similar to NetFlow Monitoring Standard Content Guide for ESM 6.5c

ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
Protect724migration
 
Network Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8cNetwork Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8c
Protect724migration
 
Cisco Monitoring Standard Content Guide for ESM 6.8c
Cisco Monitoring Standard Content Guide for ESM 6.8cCisco Monitoring Standard Content Guide for ESM 6.8c
Cisco Monitoring Standard Content Guide for ESM 6.8c
Protect724migration
 
Esm5.5 scg workflow
Esm5.5 scg workflowEsm5.5 scg workflow
Esm5.5 scg workflow
Protect724
 
Esm5.5 scg workflow
Esm5.5 scg workflowEsm5.5 scg workflow
Esm5.5 scg workflow
Protect724
 
Esm5.5 scg net_flow
Esm5.5 scg net_flowEsm5.5 scg net_flow
Esm5.5 scg net_flow
Protect724
 
NetFlow Monitoring 1.1 Standard Content Guide
NetFlow Monitoring 1.1 Standard Content GuideNetFlow Monitoring 1.1 Standard Content Guide
NetFlow Monitoring 1.1 Standard Content Guide
Protect724
 
Workflow Standard Content Guide
Workflow Standard Content GuideWorkflow Standard Content Guide
Workflow Standard Content Guide
Protect724
 
Cisco Monitoring Standard Content Guide for ESM 6.5c
Cisco Monitoring Standard Content Guide for ESM 6.5c	Cisco Monitoring Standard Content Guide for ESM 6.5c
Cisco Monitoring Standard Content Guide for ESM 6.5c
Protect724migration
 
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Protect724
 
Esm5.5 scg configuration
Esm5.5 scg configurationEsm5.5 scg configuration
Esm5.5 scg configuration
Protect724v2
 
Esm scg workflow_6.0c
Esm scg workflow_6.0cEsm scg workflow_6.0c
Esm scg workflow_6.0c
Protect724v3
 
Esm5.5 scg network (1)
Esm5.5 scg network (1)Esm5.5 scg network (1)
Esm5.5 scg network (1)
Protect724
 
Configuration Monitoring Standard Content Guide
Configuration Monitoring Standard Content GuideConfiguration Monitoring Standard Content Guide
Configuration Monitoring Standard Content Guide
Protect724
 
Esm scg configuration
Esm scg configurationEsm scg configuration
Esm scg configuration
Protect724
 
Network Monitoring Standard Content Guide
Network Monitoring Standard Content GuideNetwork Monitoring Standard Content Guide
Network Monitoring Standard Content Guide
Protect724
 
ESM5.6_SCG_Network.pdf
ESM5.6_SCG_Network.pdfESM5.6_SCG_Network.pdf
ESM5.6_SCG_Network.pdf
Protect724v3
 
ArcMC 2.6 Release Notes
ArcMC 2.6 Release NotesArcMC 2.6 Release Notes
ArcMC 2.6 Release Notes
Protect724mouni
 
ESM5.6_SCG_Configuration.pdf
ESM5.6_SCG_Configuration.pdfESM5.6_SCG_Configuration.pdf
ESM5.6_SCG_Configuration.pdf
Protect724migration
 
ESM 6.9.1c Release Notes
ESM 6.9.1c Release NotesESM 6.9.1c Release Notes
ESM 6.9.1c Release Notes
Protect724tk
 

Similar to NetFlow Monitoring Standard Content Guide for ESM 6.5c (20)

ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
 
Network Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8cNetwork Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8c
 
Cisco Monitoring Standard Content Guide for ESM 6.8c
Cisco Monitoring Standard Content Guide for ESM 6.8cCisco Monitoring Standard Content Guide for ESM 6.8c
Cisco Monitoring Standard Content Guide for ESM 6.8c
 
Esm5.5 scg workflow
Esm5.5 scg workflowEsm5.5 scg workflow
Esm5.5 scg workflow
 
Esm5.5 scg workflow
Esm5.5 scg workflowEsm5.5 scg workflow
Esm5.5 scg workflow
 
Esm5.5 scg net_flow
Esm5.5 scg net_flowEsm5.5 scg net_flow
Esm5.5 scg net_flow
 
NetFlow Monitoring 1.1 Standard Content Guide
NetFlow Monitoring 1.1 Standard Content GuideNetFlow Monitoring 1.1 Standard Content Guide
NetFlow Monitoring 1.1 Standard Content Guide
 
Workflow Standard Content Guide
Workflow Standard Content GuideWorkflow Standard Content Guide
Workflow Standard Content Guide
 
Cisco Monitoring Standard Content Guide for ESM 6.5c
Cisco Monitoring Standard Content Guide for ESM 6.5c	Cisco Monitoring Standard Content Guide for ESM 6.5c
Cisco Monitoring Standard Content Guide for ESM 6.5c
 
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
 
Esm5.5 scg configuration
Esm5.5 scg configurationEsm5.5 scg configuration
Esm5.5 scg configuration
 
Esm scg workflow_6.0c
Esm scg workflow_6.0cEsm scg workflow_6.0c
Esm scg workflow_6.0c
 
Esm5.5 scg network (1)
Esm5.5 scg network (1)Esm5.5 scg network (1)
Esm5.5 scg network (1)
 
Configuration Monitoring Standard Content Guide
Configuration Monitoring Standard Content GuideConfiguration Monitoring Standard Content Guide
Configuration Monitoring Standard Content Guide
 
Esm scg configuration
Esm scg configurationEsm scg configuration
Esm scg configuration
 
Network Monitoring Standard Content Guide
Network Monitoring Standard Content GuideNetwork Monitoring Standard Content Guide
Network Monitoring Standard Content Guide
 
ESM5.6_SCG_Network.pdf
ESM5.6_SCG_Network.pdfESM5.6_SCG_Network.pdf
ESM5.6_SCG_Network.pdf
 
ArcMC 2.6 Release Notes
ArcMC 2.6 Release NotesArcMC 2.6 Release Notes
ArcMC 2.6 Release Notes
 
ESM5.6_SCG_Configuration.pdf
ESM5.6_SCG_Configuration.pdfESM5.6_SCG_Configuration.pdf
ESM5.6_SCG_Configuration.pdf
 
ESM 6.9.1c Release Notes
ESM 6.9.1c Release NotesESM 6.9.1c Release Notes
ESM 6.9.1c Release Notes
 

More from Protect724migration

Upgrade Guide for ESM 6.8c
Upgrade Guide for ESM 6.8cUpgrade Guide for ESM 6.8c
Upgrade Guide for ESM 6.8c
Protect724migration
 
Arcsight ESM Support Matrix
Arcsight ESM Support MatrixArcsight ESM Support Matrix
Arcsight ESM Support Matrix
Protect724migration
 
HPE ArcSight ESM Support Matrix
HPE ArcSight ESM Support MatrixHPE ArcSight ESM Support Matrix
HPE ArcSight ESM Support Matrix
Protect724migration
 
ESM 101 for ArcSight Express v4.0
ESM 101 for ArcSight Express v4.0ESM 101 for ArcSight Express v4.0
ESM 101 for ArcSight Express v4.0
Protect724migration
 
ArcSight Web User's Guide for ESM 6.5c
ArcSight Web User's Guide for ESM 6.5c	ArcSight Web User's Guide for ESM 6.5c
ArcSight Web User's Guide for ESM 6.5c
Protect724migration
 
Installation Guide for ESM 6.8c
Installation Guide for ESM 6.8cInstallation Guide for ESM 6.8c
Installation Guide for ESM 6.8c
Protect724migration
 
Administrator's Guide for ESM 6.5c
Administrator's Guide for ESM 6.5c	Administrator's Guide for ESM 6.5c
Administrator's Guide for ESM 6.5c
Protect724migration
 
Administrator's Guide for ArcSight Express v4.0
Administrator's Guide for ArcSight Express v4.0Administrator's Guide for ArcSight Express v4.0
Administrator's Guide for ArcSight Express v4.0
Protect724migration
 
ESM 101 for ESM 6.8c
ESM 101 for ESM 6.8cESM 101 for ESM 6.8c
ESM 101 for ESM 6.8c
Protect724migration
 
ESM 101 for ESM 6.5c
ESM 101 for ESM 6.5c	ESM 101 for ESM 6.5c
ESM 101 for ESM 6.5c
Protect724migration
 
Arcsight ESM Support Matrix
Arcsight ESM Support MatrixArcsight ESM Support Matrix
Arcsight ESM Support Matrix
Protect724migration
 
Upgrade Guide for ESM 6.5c
Upgrade Guide for ESM 6.5c	Upgrade Guide for ESM 6.5c
Upgrade Guide for ESM 6.5c
Protect724migration
 
Forwarding Connector Release Notes for version 6.0.4.6830.0
Forwarding Connector Release Notes for version 6.0.4.6830.0	Forwarding Connector Release Notes for version 6.0.4.6830.0
Forwarding Connector Release Notes for version 6.0.4.6830.0
Protect724migration
 
Forwarding Connector User's Guide for version 6.0.4.6830.0
Forwarding Connector User's Guide for version 6.0.4.6830.0	Forwarding Connector User's Guide for version 6.0.4.6830.0
Forwarding Connector User's Guide for version 6.0.4.6830.0
Protect724migration
 
ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...
ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...
ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...
Protect724migration
 
Intrusion Monitoring Standard Content Guide for ESM 6.5c
Intrusion Monitoring Standard Content Guide for ESM 6.5c	Intrusion Monitoring Standard Content Guide for ESM 6.5c
Intrusion Monitoring Standard Content Guide for ESM 6.5c
Protect724migration
 
HPE ArcSight ESM Support Matrix
HPE ArcSight ESM Support MatrixHPE ArcSight ESM Support Matrix
HPE ArcSight ESM Support Matrix
Protect724migration
 
Asset Model Import FlexConnector Developer's Guide
Asset Model Import FlexConnector Developer's GuideAsset Model Import FlexConnector Developer's Guide
Asset Model Import FlexConnector Developer's Guide
Protect724migration
 
Risk Insight High Availability Tech Note for ESM 6.8c
Risk Insight High Availability Tech Note for ESM 6.8cRisk Insight High Availability Tech Note for ESM 6.8c
Risk Insight High Availability Tech Note for ESM 6.8c
Protect724migration
 
ESM_101_5.6.pdf
ESM_101_5.6.pdfESM_101_5.6.pdf
ESM_101_5.6.pdf
Protect724migration
 

More from Protect724migration (20)

Upgrade Guide for ESM 6.8c
Upgrade Guide for ESM 6.8cUpgrade Guide for ESM 6.8c
Upgrade Guide for ESM 6.8c
 
Arcsight ESM Support Matrix
Arcsight ESM Support MatrixArcsight ESM Support Matrix
Arcsight ESM Support Matrix
 
HPE ArcSight ESM Support Matrix
HPE ArcSight ESM Support MatrixHPE ArcSight ESM Support Matrix
HPE ArcSight ESM Support Matrix
 
ESM 101 for ArcSight Express v4.0
ESM 101 for ArcSight Express v4.0ESM 101 for ArcSight Express v4.0
ESM 101 for ArcSight Express v4.0
 
ArcSight Web User's Guide for ESM 6.5c
ArcSight Web User's Guide for ESM 6.5c	ArcSight Web User's Guide for ESM 6.5c
ArcSight Web User's Guide for ESM 6.5c
 
Installation Guide for ESM 6.8c
Installation Guide for ESM 6.8cInstallation Guide for ESM 6.8c
Installation Guide for ESM 6.8c
 
Administrator's Guide for ESM 6.5c
Administrator's Guide for ESM 6.5c	Administrator's Guide for ESM 6.5c
Administrator's Guide for ESM 6.5c
 
Administrator's Guide for ArcSight Express v4.0
Administrator's Guide for ArcSight Express v4.0Administrator's Guide for ArcSight Express v4.0
Administrator's Guide for ArcSight Express v4.0
 
ESM 101 for ESM 6.8c
ESM 101 for ESM 6.8cESM 101 for ESM 6.8c
ESM 101 for ESM 6.8c
 
ESM 101 for ESM 6.5c
ESM 101 for ESM 6.5c	ESM 101 for ESM 6.5c
ESM 101 for ESM 6.5c
 
Arcsight ESM Support Matrix
Arcsight ESM Support MatrixArcsight ESM Support Matrix
Arcsight ESM Support Matrix
 
Upgrade Guide for ESM 6.5c
Upgrade Guide for ESM 6.5c	Upgrade Guide for ESM 6.5c
Upgrade Guide for ESM 6.5c
 
Forwarding Connector Release Notes for version 6.0.4.6830.0
Forwarding Connector Release Notes for version 6.0.4.6830.0	Forwarding Connector Release Notes for version 6.0.4.6830.0
Forwarding Connector Release Notes for version 6.0.4.6830.0
 
Forwarding Connector User's Guide for version 6.0.4.6830.0
Forwarding Connector User's Guide for version 6.0.4.6830.0	Forwarding Connector User's Guide for version 6.0.4.6830.0
Forwarding Connector User's Guide for version 6.0.4.6830.0
 
ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...
ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...
ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...
 
Intrusion Monitoring Standard Content Guide for ESM 6.5c
Intrusion Monitoring Standard Content Guide for ESM 6.5c	Intrusion Monitoring Standard Content Guide for ESM 6.5c
Intrusion Monitoring Standard Content Guide for ESM 6.5c
 
HPE ArcSight ESM Support Matrix
HPE ArcSight ESM Support MatrixHPE ArcSight ESM Support Matrix
HPE ArcSight ESM Support Matrix
 
Asset Model Import FlexConnector Developer's Guide
Asset Model Import FlexConnector Developer's GuideAsset Model Import FlexConnector Developer's Guide
Asset Model Import FlexConnector Developer's Guide
 
Risk Insight High Availability Tech Note for ESM 6.8c
Risk Insight High Availability Tech Note for ESM 6.8cRisk Insight High Availability Tech Note for ESM 6.8c
Risk Insight High Availability Tech Note for ESM 6.8c
 
ESM_101_5.6.pdf
ESM_101_5.6.pdfESM_101_5.6.pdf
ESM_101_5.6.pdf
 

Recently uploaded

WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 

Recently uploaded (20)

WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 

NetFlow Monitoring Standard Content Guide for ESM 6.5c

  • 1. Standard Content Guide NetFlow Monitoring ArcSight ESM 6.5c October 11, 2013
  • 2. Copyright © 2013 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Follow this link to see a complete statement of copyrights and acknowledgements: http://www.hpenterprisesecurity.com/copyright Contact Information Revision History Phone A list of phone numbers is available on the HP ArcSight Technical Support page: http://www8.hp.com/us/en/software- solutions/software.html?compURI=1345981#.URitMaVwpWI. Support Web Site http://support.openview.hp.com Protect 724 Community https://protect724.arcsight.com Date Product Version Description 10/11/2013 NetFlow Monitoring content for ArcSight ESM 6.5c Final revision for release.
  • 3. Confidential NetFlow Monitoring Standard Content Guide 3 Contents Chapter 1: NetFlow Monitoring Overview ............................................................................ 5 What is Standard Content? ............................................................................................... 5 Standard Content Packages .............................................................................................. 7 NetFlow Monitoring Content .............................................................................................. 7 Chapter 2: Installation and Configuration ........................................................................... 9 Installing the NetFlow Monitoring Package .......................................................................... 9 Configuring NetFlow Monitoring Content ........................................................................... 10 Modeling the Network .............................................................................................. 10 Categorizing Assets ................................................................................................. 11 Ensuring Filters Capture Relevant Events .................................................................... 11 Scheduling Reports ................................................................................................. 12 Restricting Access to Vulnerability View Reports .......................................................... 12 Configuring Trends .................................................................................................. 12 Adjusting Trend Schedules ................................................................................. 13 Configuring the TotalBytes Variable ........................................................................... 13 Viewing a Use Case Resource ................................................................................... 14 Chapter 3: NetFlow Monitoring Content ............................................................................ 15 Devices ........................................................................................................................ 15 Resources .................................................................................................................... 16 Index ...................................................................................................................................................... 25
  • 4. Contents 4 NetFlow Monitoring Standard Content Guide Confidential
  • 5. Confidential NetFlow Monitoring Standard Content Guide 5 Chapter 1 NetFlow Monitoring Overview This chapter discusses the following topics. What is Standard Content? Standard content is a series of coordinated resources (filters, rules, dashboards, reports, and so on) that address common security and management tasks. Standard content is designed to give you comprehensive correlation, monitoring, reporting, alerting, and case management out-of-the box with minimal configuration. The content provides a full spectrum of security, network, and configuration monitoring tasks, as well as a comprehensive set of tasks that monitor the health of the system. Standard content is installed using a series of packages, some of which are installed automatically with the ArcSight Manager to provide essential system health and status operations. The remaining packages are presented as install-time options organized by category. Standard content consists of the following:  ArcSight Core Security content is installed automatically with the ArcSight Manager and consists of key resources for monitoring Microsoft Windows, firewall, IPS and IDS, NetFlow, and other essential security information.  ArcSight Administration content contains several packages that provide statistics about the health and performance of ArcSight products.  ArcSight Administration is installed automatically with the ArcSight Manager and is essential for managing and tuning the performance of content and components.  ArcSight Admin DB CORR is installed automatically with the ArcSight Manager for ArcSight ESM with CORR- (Correlation Optimized Retention and Retrieval) Engine and provides information on the health of the CORR-Engine.  ArcSight Content Management is an optional package that shows information about content package synchronization with the ESM Content Management feature. The information includes a history of content packages synchronized from a primary ESM source to multiple ESM destinations, and any common issues or errors encountered. You can install this package during ArcSight ESM installation or from the ArcSight Console any time after installation. “What is Standard Content?” on page 5 “Standard Content Packages” on page 7 “NetFlow Monitoring Content” on page 7
  • 6. 1 NetFlow Monitoring Overview 6 NetFlow Monitoring Standard Content Guide Confidential  ArcSight Search Filters is installed automatically with the ArcSight Manager for use in the ArcSight Command Center. You cannot edit or use these filters in the ArcSight Console. For information about the search filters, refer to the ArcSight Command Center User’s Guide.  ArcSight System content is installed automatically with the ArcSight Manager and consists of resources required for basic security processing functions, such as threat escalation and priority calculations, as well as basic throughput channels required for out-of-the-box functionality.  ArcSight Foundation content (such as Cisco Monitoring, Configuration Monitoring, Intrusion Monitoring, IPv6, NetFlow Monitoring, Network Monitoring, and Workflow) provide a coordinated system of resources with real-time monitoring capabilities for a specific area of focus, as well as after-the-fact analysis in the form of reports and trends. You can extend these foundations with additional resources specific to your needs or you can use them as a template for building your own resources and tasks. You can install a Foundation during ArcSight ESM installation or from the ArcSight Console any time after installation.  Shared Libraries - ArcSight Administration and several of the ArcSight Foundations rely on a series of common resources that provide core functionality for common security scenarios. Dependencies between these resources and the packages they support are managed by the Package resource.  Anti Virus content is a set of filters, reports, and report queries used by ArcSight Foundations, such as Configuration Monitoring and Intrusion Monitoring.  Conditional Variable Filters content is a library of filters used by variables in standard content report queries, filters, and rule definitions. The Conditional Variable Filters are used by ArcSight Administration and certain ArcSight Foundations, such as Configuration Monitoring, Intrusion Monitoring, Network Monitoring, and Workflow.  Global Variables content is a set of variables used to create other resources and to provide event-based fields that cover common event information, asset, host, and user information, and commonly used timestamp formats. The Global Variables are used by ArcSight Administration and certain ArcSight Foundations.  Monitoring Support Data content is a set of active lists that store mapping information for HTTP return status code classes, Cisco firewall syslog message types, and encoded logon types.  Network filters content is a set of filters required by ArcSight Administration and certain ArcSight Foundations, such as Intrusion Monitoring and Network Monitoring. The ArcSight Admin DB CORR and ArcSight Search Filters content packages are installed automatically when you perform a new ArcSight ESM installation. However, when you upgrade your ArcSight ESM system, these content packages are not installed automatically. You can install these packages from the ArcSight Console any time after upgrade by right-clicking the package on the Packages tab in the Navigator and selecting Install Package. Refer to the ArcSight ESM Upgrade Guide for information about upgrading ArcSight ESM. The resources in the ArcSight Core Security, ArcSight Administration, ArcSight DB CORR, Conditional Variable Filters, Global Variables, and Network Filters content packages are not locked even though they manage core functionality; HP recommends that you do not delete or modify these resources unless you are an advanced user who understands fully the resources and their dependencies.
  • 7. 1 NetFlow Monitoring Overview Confidential NetFlow Monitoring Standard Content Guide 7 Standard Content Packages Standard content comes in packages (.arb files) that are either installed automatically or presented as an install-time option. The following graphic outlines the packages. Figure 1-1 The ArcSight Core Security, ArcSight Administration, and ArcSight System packages at the base provide content required for basic ArcSight functionality. The common packages in the center contain shared resources that support multiple packages. The packages shown on top are ArcSight Foundations that address common network security and management scenarios. Depending on the options you install, you will see the ArcSight Core Security, ArcSight Administration, and ArcSight System resources and some or all of the other package content. NetFlow Monitoring Content NetFlow is a network protocol developed by Cisco Systems to run on Cisco IOS-enabled equipment for collecting IP traffic information. It is proprietary, but supported by platforms other than Cisco IOS, such as Juniper routers and Linux. NetFlow provides session-level data. Leveraging this information using ArcSight can help to monitor network bandwidth usage and correlate it with other security logs (such as firewall, IDS, authentication logs, and so on). The NetFlow Monitoring content provides resources to monitor and report on top bandwidth usage by source, destination and port. This guide describes the NetFlow Monitoring content. For information about ArcSight Core Security, ArcSight Administration, or ArcSight System content, refer to the ArcSight Core When creating your own packages, you can explicitly include or exclude system resources in the package. Exercise caution if you delete packages that might have system resources; for example, zones. Make sure the system resources either belong to a locked group or are themselves locked. For more information about packages, refer to the ArcSight Console User’s Guide.
  • 8. 1 NetFlow Monitoring Overview 8 NetFlow Monitoring Standard Content Guide Confidential Security, ArcSight Administration, and ArcSight System Standard Content Guide. For information about an optional ArcSight Foundation, refer to the Standard Content Guide for that Foundation. ESM documentation is available on Protect 724 (https://protect724.arcsight.com).
  • 9. Confidential NetFlow Monitoring Standard Content Guide 9 Chapter 2 Installation and Configuration This chapter discusses the following topics. Installing the NetFlow Monitoring Package The NetFlow Monitoring package is one of the standard content packages presented as install-time options. If you selected all of the standard content packages to be installed at installation time, the packages and their resources are installed in the ArcSight Database and available in the Navigator panel resource tree. The package icons in the Navigator panel package view appear blue. If you opted to exclude a Foundation package during ESM installation, the package is imported into the Packages tab in the Navigator panel automatically, but is not available in the resource view. The package icon in the package view appears grey. If you do not want the package to be available in any form, you can delete the package. To install a package that is imported, but not installed: 1 On the Navigator panel Packages tab, navigate to the package you want to install. 2 Right-click the package and select Install Package. 3 In the Install Package dialog, click OK. 4 When the installation is complete, review the summary report and click OK. The package resources are fully installed to the ArcSight Database, the resources are fully enabled and operational, and available in the Navigator panel resource tree. To uninstall a package that is installed: 1 On the Navigator Panel Packages tab, navigate to the package you want to uninstall. 2 Right-click the package and select Uninstall Package. 3 In the Uninstall Package dialog, click OK. The progress of the uninstall displays in the Progress tab of the Uninstalling Packages dialog. If a message displays indicating that there is a conflict, select an option in the Resolution Options area and click OK. 4 When uninstall is complete, review the summary and click OK. “Installing the NetFlow Monitoring Package” on page 9 “Configuring NetFlow Monitoring Content” on page 10
  • 10. 2 Installation and Configuration 10 NetFlow Monitoring Standard Content Guide Confidential The package is removed from the ArcSight Database and the Navigator panel resource tree, but remains available in the Navigator panel Packages tab, and can be re-installed at another time. To delete a package and remove it from the ArcSight Console and the ArcSight Database: 1 On the Navigator Panel Packages tab, navigate to the package you want to delete. 2 Right-click the package and select Delete Package. 3 When prompted for confirmation, click Delete. The package is removed from the Navigator panel Packages tab. Configuring NetFlow Monitoring Content The list below shows the general tasks you need to complete to configure NetFlow Monitoring content with values specific to your environment.  “Modeling the Network” on page 10  “Categorizing Assets” on page 11  “Ensuring Filters Capture Relevant Events” on page 11  “Scheduling Reports” on page 12  “Restricting Access to Vulnerability View Reports” on page 12  “Configuring Trends” on page 12 Modeling the Network Configuring NetFlow Monitoring content starts with installing SmartConnectors and configuring zones and networks for devices that report to ESM. The NetFlow Monitoring content is triggered by NetFlow events from the following SmartConnectors: A network model keeps track of the network nodes participating in the event traffic. Modeling your network and categorizing critical assets using the standard asset categories is what activates some of the standard content and makes it effective. There are several ways to model your network. For information about populating the network model, refer to the ArcSight Console User’s Guide. To learn more about the architecture of the ESM network modeling tools, refer to the ESM 101 guide. SmartConnector Device Version Supported ArcSight IP Flow SmartConnector • Cisco NetFlow versions 5 and 9 • Flexible NetFlow from IOS 15.0 • Cisco ASA 8.2, and Juniper Networks J-Flow versions 5 and 9 ArcSight QoSient ARGUS SmartConnector • QoSient ARGUS versions 2 and 3
  • 11. 2 Installation and Configuration Confidential NetFlow Monitoring Standard Content Guide 11 Categorizing Assets After you have populated your network model with assets, apply the standard asset categories to activate standard content that uses these categories. You can assign asset categories to assets, zones, asset groups, or zone groups. If assigned to a group, all resources under that group inherit the categories. You can assign asset categories individually using the Asset editor or in a batch using the Network Modeling wizard. For information about how to assign asset categories using the ArcSight Console tools, refer to the ArcSight Console User’s Guide. For more about the Priority Formula and how it leverages these asset categories to help assign priorities to events, refer to the ArcSight Console User’s Guide or the ESM 101 guide. Ensuring Filters Capture Relevant Events Standard content relies on specific event field values to identify events of interest. Although this method applies to most of the events and devices, be sure to test key filters to verify that they actually capture the required events. For NetFlow Monitoring, follow the procedure below to make sure that the NetFlow Traffic Reporting Devices filter captures relevant events: To ensure that a filter captures the relevant events: 1 Generate or identify the required events and verify that they are being processed by ESM by viewing them in an active channel or query viewer. Asset Category Description /Site Asset Categories/ Address Spaces/Protected Categorize all assets (or the zones to which the assets belong) that are internal to the network with this asset category. Internal Assets are assets inside the company network. Assets that are not categorized as internal to the network are considered to be external. Make sure that you also categorize assets that have public addresses but are controlled by the organization (such as web servers) as Protected. Note: Assets with a private IP address (such as 192.168.0.0) are considered Protected by the system, even if they are not categorized as such. /System Asset Categories/ Criticality/High Categorize all assets that are considered critical to protect (including assets that host proprietary content, financial data, cardholder data, top secret data, or perform functions critical to basic operations) with this asset category. The asset categories most essential to basic event processing are those used by the Priority Formula to calculate the criticality of an event. Asset criticality is one of the four factors used by the Priority Formula to generate an overall event priority rating. /System Asset Categories/ Criticality/Very High Same as /System Asset Categories/ Criticality/High
  • 12. 2 Installation and Configuration 12 NetFlow Monitoring Standard Content Guide Confidential 2 Navigate to the NetFlow Traffic Reporting Devices filter, right-click the filter and choose Create Channel with Filter. If you see the events of interest in the newly created channel, the filter is functioning properly. If you do not see the events of interest: a Verify that the configuration of the active channel is suitable for the events in question. For example, ensure that the event time is within the start and end time of the channel. b Modify the filter condition to capture the events of interest. After applying the change, repeat Step 2 to verify that the modified filter captures the required events. Scheduling Reports You can run reports on demand, automatically on a regular schedule, or both. By default, NetFlow Monitoring reports are not scheduled to run automatically. Evaluate the reports that come with NetFlow Monitoring, and schedule the reports that are of interest to your organization and business objectives. For instructions about how to schedule reports, refer to the ArcSight Console User’s Guide. Restricting Access to Vulnerability View Reports The Vulnerability View detail reports display a list of vulnerabilities generated by scanner report events, and are therefore considered sensitive material. By default, the reports are configured with read access for Administrators, Default User Groups, and Analyzer Administrators. Administrators and Analyzer Administrators also have write access to this group. To eliminate these events from view, you have to create a special filter and apply it to the appropriate users groups. When restricting access to the Vulnerability View reports, be aware of the following:  Because access is inherited, the parent group must have the same or more liberal permissions than the vulnerability reports.  If you need to move the reports to a group with tighter permissions, also move the trends and queries that support them, in both the Detail and Operational Summaries sections.  To get a complete view of the resources attached to these reports, run a resource graph on the individual filters or the parent group (right-click the resource or group and select Graph View). Configuring Trends Trends are a type of resource that can gather data over longer periods of time, which can be leveraged for reports. Trends streamline data gathering to the specific pieces of data you want to track over a long range, and breaks the data gathering up into periodic updates. For long-range queries, such as end-of-month summaries, trends greatly reduce the burden on system resources. Trends can also provide a snapshot of which devices report on the network over a series of days. NetFlow Monitoring content includes several trends, which are all enabled by default.
  • 13. 2 Installation and Configuration Confidential NetFlow Monitoring Standard Content Guide 13 To disable a trend, go to the Navigator panel, right-click the trend you want to disable and select Disable Trend. For more information about trends, refer to the the ArcSight Console User’s Guide. Adjusting Trend Schedules NetFlow Monitoring content contains five trends. Four of the trends are trend-on-trends, which all collect data from a single base trend (Top Bandwidth Usage Events). Do not schedule the four trend-on-trends to run before the base trend completes its daily query run. By default, the trends are scheduled to run daily at the times indicated below: By default, each trend uses midnight of the date the package was installed as the date and time the trend will start collecting information. To adjust the schedule or start date/time for the trend, edit the values in the Schedule tab of the Inspect/Edit panel for the trend. Configuring the TotalBytes Variable SmartConnectors can be configured to aggregate events and sum the counts in fields, such as bytesIn and bytesOut. SmartConnectors also set the aggregated event count. By default, ESM interprets the count in fields such as bytesIn and bytesOut as an average, and if the SmartConnector is configured to sum certain fields, ESM multiplies those summed fields by aggregated event count, which creates an inaccurate value. By default, the NetFlow Monitoring content compensates for this by dividing the bytesIn and bytesOut fields by aggregated event count using the TotalBytes variable. The Connector Summation Fields property is an ESM configuration option that enables you to indicate which fields are sums, so that ESM can report the correct value without requiring that content compensate by adding a divide-by-aggregated-count function. For example, the connector.summation.fields=bytesIn,bytesOut property added to the server.properties file on the ArcSight Manager indicates that the bytesIn and bytesOut fields coming from the SmartConnector are sums, and therefore exempts those fields from being multiplied by aggregated event count. If this property is set in your ESM installation, you must configure the NetFlow Monitoring content that uses the TotalBytes variable to use a variable that will add the values, not multiply them. To enable a disabled trend, you must first change the default start date in the Trend editor. If the start date is not changed, the trend takes the default start date (derived from when the trend was first installed), and back fills the data from that time. For example, if you enable the trend six months after the first install, these trends try to get all the data for the last six months, which might cause performance problems, overwhelm system resources, or cause the trend to fail if that event data is not available. Trend Name Scheduled run time Top Bandwidth Usage by Destination 3:33:36 AM Top Bandwidth Usage by Hour 2:40:34 AM Top Bandwidth Usage by Port 3:15:50 AM Top Bandwidth Usage by Source 3:07:08 AM Top Bandwidth Usage Events (base trend) 1:15:09 AM
  • 14. 2 Installation and Configuration 14 NetFlow Monitoring Standard Content Guide Confidential To configure the TotalBytes global variable: 1 From the Resources tab in the Navigator panel, go to Field Sets. 2 Click the Fields & Global Variables tab and navigate to ArcSight Foundation/Variables Library/Bytes. 3 Right-click TotalBytes and select Edit Field. The global variable displays in the Inspect/Edit panel. 4 Click the Parameters tab and change the arguments from BytesIn_2 and BytesOut_2 to Bytes_In and Bytes_Out, as shown in the following figure. 5 Click Apply to confirm the change. For information about the server.properties file on the ArcSight Manager, refer to the ArcSight ESM Administrator’s Guide. For instructions about how to configure a SmartConnector to aggregate and sum on fields, such as bytesIn and bytesOut, and targetPort, refer to the ArcSight SmartConnector User’s Guide. Viewing a Use Case Resource The NetFlow Monitoring resources are grouped together in the ArcSight Console in the NetFlow Monitoring use case resource. A use case resource provides a way to see a set of resources that help address a specific security issue or business requirement. To view the resources associated with the NetFlow Monitoring use case resource: 1 In the Navigator panel, select the Use Cases tab. 2 Open the ArcSight Foundation/NetFlow Monitoring group. 3 Right-click the NetFlow Monitoring use case resource and select the Open Use Case option, or double-click the use case resource. The resources that make up the use case resource are displayed in the Viewer. The use case resource tables listed in Chapter 3‚ NetFlow Monitoring Content‚ on page 15 contain all the resources that have been explicitly assigned to the use case.
  • 15. Confidential NetFlow Monitoring Standard Content Guide 15 Chapter 3 NetFlow Monitoring Content NetFlow is a network protocol developed by Cisco Systems to run on Cisco IOS-enabled equipment for collecting IP traffic information. It is proprietary, but supported by platforms other than Cisco IOS, such as Juniper routers and Linux. NetFlow provides session-level data. Leveraging this information using ArcSight can help to monitor network bandwidth usage and correlate it with other security logs (such as firewall, IDS, authentication logs, and so on). NetFlow Monitoring content provides resources that:  Monitor, investigate, and report on bandwidth usage by source, destination, and port.  Monitor the bandwidth moving average and identify top bandwidth usage by source, destination, and port.  Report on bandwidth usage in daily or weekly increments using trends and by source, destination, and port. You can use this information to build correlation content; for example, you can build a rule that correlates NetFlow events with other security logs, such as firewall or IDS logs. Devices Network devices with NetFlow enabled supply events that apply to the NetFlow Monitoring resources.
  • 16. 3 NetFlow Monitoring Content 16 NetFlow Monitoring Standard Content Guide Confidential Resources The following table lists all the resources explicitly assigned to the NetFlow Monitoring use case and includes dependent resources. Dependent resources are not listed in a use case resource. Table 3-1 Resources that Support the NetFlow Monitoring Use Case Resource Description Type URI Monitor Resources NetFlow Bandwidth Usage Overview This dashboard shows the top bandwidth usage as reported by NetFlow events, showing the top bandwidth usage by source, destination, well-known port, and non well-known port. Dashboard /All Dashboards/ArcSight Core Security NetFlow Bandwidth Usage Monitoring This dashboard shows an overview of bandwidth usage reported by NetFlow events. The report displays the top bandwidth usage events, and the inbound and outbound bandwidth moving average. Dashboard ArcSight Foundation/ NetFlow Monitoring/ List of Top Bandwidth Usage Events This query viewer displays the top ten bandwidth usage events and contains several drilldowns for investigation. Query Viewer ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Well-Known Port This query viewer displays the top ten bandwidth usage events sorted by well-known ports from NetFlow events and contains several drilldowns for investigation. Query Viewer ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Source-Destination Pairs and Port This query viewer displays the top ten bandwidth usage events sorted by source-destination address pairs and destination port from NetFlow events. Query Viewer ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Destination This query viewer displays the top ten bandwidth usage events sorted by destination address from NetFlow events and contains several drilldowns for investigation. Query Viewer ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Source-Destination Pairs This query viewer displays the top ten bandwidth usage events sorted by source-destination address pairs from NetFlow events. Query Viewer ArcSight Foundation/ NetFlow Monitoring/
  • 17. 3 NetFlow Monitoring Content Confidential NetFlow Monitoring Standard Content Guide 17 Top Bandwidth Usage by Non-Well-Known Port This query viewer displays the top ten bandwidth usage events sorted by non-well-known ports from NetFlow events and contains several drilldowns for investigation. Query Viewer ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Source This query viewer displays the top ten bandwidth usage events sorted by source address from NetFlow events and contains several drilldowns for investigation. Query Viewer ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Source and Port This query viewer displays the top ten bandwidth usage events sorted by source address and destination port from NetFlow events. Query Viewer ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Destination and Port This query viewer displays the top ten bandwidth usage events sorted by destination address and destination port from NetFlow events. Query Viewer ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage Weekly Report This report displays the bandwidth usage, the top bandwidth usage by source, the top bandwidth usage by destination, and the top bandwidth usage by port. The default time range for this report is the past seven days. Report ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Destination Port This report displays top bandwidth usage by destination port. The default time range for this report is yesterday. Report ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Source This report displays the top bandwidth usage by source. The default time range for this report is yesterday. Report ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Destination This report displays the top bandwidth usage by destination. The default time range for this report is yesterday. Report ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage Daily Report This report displays several charts that show the bandwidth usage, the top bandwidth usage by source, the top bandwidth usage by destination, and the top bandwidth usage by port. The default time range for this report is yesterday. Report ArcSight Foundation/ NetFlow Monitoring/ Resource Description Type URI
  • 18. 3 NetFlow Monitoring Content 18 NetFlow Monitoring Standard Content Guide Confidential Library Resources Protected This is a site asset category. Asset Category Site Asset Categories/ Address Spaces Top Bandwidth Usage (MB) by Destination This data monitor displays the total bandwidth usage in MegaBytes (MB) from NetFlow events for top Destination IP Addresses. Data Monitor /All Data Monitors/ ArcSight Core Security/NetFlow Monitoring Outbound Bandwidth (Bytes Per Second) This data monitor shows the average outbound bandwidth (bytes/sec) for the last hour. The values are updated every five minutes. Data Monitor ArcSight Foundation/ NetFlow Monitoring/ NetFlow Bandwidth Usage Monitoring/ Top Bandwidth Usage (MB) by Well-Known Port This data monitor displays the total bandwidth usage in MegaBytes (MB) from NetFlow events for Well Known Ports. Data Monitor /All Data Monitors/ArcSight Core Security/NetFlow Monitoring Top Bandwidth Usage (MB) by Non-Well-Known Port This data monitor displays the total bandwidth usage in MegaBytes (MB) from NetFlow events for Non Well Known Ports. Data Monitor /All Data Monitors/ ArcSight Core Security/NetFlow Monitoring Inbound Bandwidth (Bytes Per Second) This data monitor shows the average inbound bandwidth (bytes/sec) for the last hour. The values are updated every five minutes. Data Monitor ArcSight Foundation/ NetFlow Monitoring/ NetFlow Bandwidth Usage Monitoring/ Top Bandwidth Usage (MB) by Source This data monitor displays the total bandwidth usage in MegaBytes (MB) from NetFlow events for the top Source IP Addresses. Data Monitor /All Data Monitors/ ArcSight Core Security/NetFlow Monitoring List of Top Bandwidth Usage (MB) Events This data monitor displays the top bandwidth usage events Data Monitor ArcSight Foundation/ NetFlow Monitoring/ NetFlow Bandwidth Usage Monitoring/ TotalBytes This variable sums the values of Bytes In and Bytes Out for each event. Global Variable ArcSight Foundation/ Variables Library/Bytes MBytesTotal This variable converts the combination of the Bytes In and Bytes Out fields to MBytes, where a MByte is defined as 1,000,000 bytes. The value is set to have no more than two digits past the decimal point, so that 0.01 is the smallest non-zero value returned (for example, when Bytes In + Bytes Out < 10,000, the result is 0). Global Variable ArcSight Foundation/ Variables Library/Bytes Resource Description Type URI
  • 19. 3 NetFlow Monitoring Content Confidential NetFlow Monitoring Standard Content Guide 19 External Source This filter identifies events originating from outside the company network. Filter ArcSight Foundation/ Common/Network Filters/ Boundary Filters Inbound NetFlow Traffic This filter identifies NetFlow events originating from external sources targeting the internal network. Filter ArcSight Foundation/ NetFlow Monitoring/ Bytes Out is NULL This filter is designed for conditional expression variables. The filter identifies events where the Bytes Out is NULL. Filter ArcSight Foundation/ Common/Conditional Variable Filters/Bytes Outbound NetFlow Traffic This filter identifies NetFlow events originating from internal sources targeting the external network. Filter ArcSight Foundation/ NetFlow Monitoring/ Outbound Events This filter identifies events originating from inside the company network, targeting the outside network. Filter ArcSight Foundation/Common/ Network Filters/Location Filters Internal Source This filter identifies events coming from inside the company network. Filter ArcSight Foundation/ Common/Network Filters/ Boundary Filters Internal Target This filter identifies events targeting inside the company network. Filter ArcSight Foundation/ Common/Network Filters/ Boundary Filters QoSient Argus Events This filter identifies events from Argus SmartConnectors. Filter /All Filters/ArcSight Core Security/NetFlow Monitoring Bytes In is NULL This filter is designed for conditional expression variables. The filter identifies events in which the Bytes In is NULL. Filter ArcSight Foundation/ Common/Conditional Variable Filters/Bytes NetFlow Traffic Reporting Devices This filter identifies NetFlow traffic reporting devices. By default, the filter contains QoSient Argus, NetFlow V5, and NetFlow V9 events. Filter /All Filters/ArcSight Core Security/NetFlow Monitoring External Target This filter identifies events targeting the outside network. Filter ArcSight Foundation/ Common/Network Filters/ Boundary Filters NetFlow V9 Events This filter identifies NetFlow version 9 events. Filter /All Filters/ArcSight Core Security/NetFlow Monitoring Inbound Events This filter identifies events coming from the outside network targeting inside the company network. Filter ArcSight Foundation/ Common/Network Filters/ Location Filters Resource Description Type URI
  • 20. 3 NetFlow Monitoring Content 20 NetFlow Monitoring Standard Content Guide Confidential NetFlow Traffic for Non-Well-Known Ports This filter identifies events from NetFlow Traffic Reporting Devices where the Target Port is not NULL and is greater than or equal to 1024. Filter /All Filters/ArcSight Core Security/NetFlow Monitoring NetFlow Traffic for Well-Known Ports This filter identifies events from NetFlow Traffic Reporting devices where the Target Port is not NULL and is less than 1024. Filter /All Filters/ArcSight Core Security/NetFlow Monitoring NetFlow V5 Events This filter identifies NetFlow version 5 events. Filter /All Filters/ArcSight Core Security/NetFlow Monitoring Top Bandwidth Usage by Source-Destination Pairs This query returns the attacker address, target address, flow counts, and total bytes (Bytes In + Bytes Out) from NetFlow events. Query ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Destination - Trend on Trend This query identifies the destination address, destination zone, flow counts, and total bytes from the Top Bandwidth Usage by Destination trend. Query ArcSight Foundation/ NetFlow Monitoring/ Trend/ Top Bandwidth Usage by Source This query returns the attacker address and total bytes (Bytes In + Bytes Out) from NetFlow events Query ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Hour - Trend on Trend This query returns bandwidth usage information by hour from the Top Bandwidth Usage by Hour trend. Query ArcSight Foundation/ NetFlow Monitoring/ Trend/ Top Bandwidth Usage by Source and Port This query identifies the attacker address, target port, flow counts, and total bytes (Bytes In + Bytes Out) from NetFlow events. Query ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage Events This query identifies the source address, destination address, destination port, flow counts, and total bytes (Bytes In + Bytes Out) from NetFlow events within the last hour. This query is used by the Top Bandwidth Usage Events trend. Query ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Day - Trend on Trend This query identifies the bandwidth usage information by day from the Top Bandwidth Usage by Hour trend. Query ArcSight Foundation/ NetFlow Monitoring/ Trend/ Resource Description Type URI
  • 21. 3 NetFlow Monitoring Content Confidential NetFlow Monitoring Standard Content Guide 21 Top Bandwidth Usage by Destination This query identifies the target address and total bytes (Bytes In + Bytes Out) from NetFlow events. Query ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Port - Trend This query identifies the destination port, flow counts, and total bytes from the trend Top Bandwidth Usage Events. Query ArcSight Foundation/ NetFlow Monitoring/ Trend/ Top Bandwidth Usage by Well-Known Port This query returns the target port and total bytes (Bytes In + Bytes Out) from NetFlow events from a well-known target port. Query ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Hour - Trend This query returns bandwidth usage information by hour from the Top Bandwidth Usage Events trend. Query ArcSight Foundation/ NetFlow Monitoring/ Trend/ Top Bandwidth Usage by Port - Trend on Trend This query identifies the target Port, flow counts, and total bytes from the Top Bandwidth Usage by Port trend. Query ArcSight Foundation/ NetFlow Monitoring/ Trend/ Top Bandwidth Usage by Destination and Port This query identifies the target address, target port, flow counts, and total bytes (Bytes In + Bytes Out) from NetFlow events. Query ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Source - Trend This query returns the source address, source zone, and total bytes from the Top Bandwidth Usage Events trend. Query ArcSight Foundation/ NetFlow Monitoring/ Trend/ Top Bandwidth Usage by Non-Well-Known Port This query returns the target port and total bytes (Bytes In + Bytes Out) from NetFlow events for non-well-known target ports. Query ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Destination - Trend This query identifies the destination address, destination zone, flow counts, and total bytes from the Top Bandwidth Usage Events trend. Query ArcSight Foundation/ NetFlow Monitoring/ Trend/ List of Top Bandwidth Usage Events This query returns the source address, destination address, destination port, flow counts, and total bytes (Bytes In + Bytes Out) from NetFlow events within the last hour. Query ArcSight Foundation/ NetFlow Monitoring/ Resource Description Type URI
  • 22. 3 NetFlow Monitoring Content 22 NetFlow Monitoring Standard Content Guide Confidential Top Bandwidth Usage by Source-Destination Pairs and Port This query identifies the attacker address, target address, target port, flow counts, and total bytes (Bytes In + Bytes Out) from NetFlow events. Query ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Source - Trend on Trend This query returns the source address, source zone, and total bytes from the Top Bandwidth Usage by Source trend. Query ArcSight Foundation/ NetFlow Monitoring/ Trend/ Chart and Table Landscape This template is designed to show one chart and a table. The orientation is landscape. Report Template ArcSight System/1 Chart/With Table Four Charts Landscape This template is designed to show four charts. The orientation is landscape. Report Template ArcSight System/4 Charts/Without Table Top Bandwidth Usage by Hour This trend stores hourly information of top bandwidth usage and includes the end time hour, flow counts, and total bytes. This trend depends on the /All Trends/ArcSight Foundation/NetFlow Monitoring/Top Bandwidth Usage Events trend. Trend ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage Events This trend stores bandwidth usage information reported by NetFlow and contains the end time hour, source address, source zone, destination address, destination zone, destination port, flow counts, and total bytes. This trend is the base trend, collecting a broad amount of aggregated NetFlow data for a short period of time, to be used by several other trends to further aggregate data and store for a longer period of time. The default retention period for this trend is eight days. Trend ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Source This trend stores the top bandwidth usage information by source and includes the source address, source zone, flow counts, and total bytes. This trend depends on the /All Trends/ArcSight Foundation/NetFlow Monitoring/Top Bandwidth Usage Events trend. Trend ArcSight Foundation/ NetFlow Monitoring/ Resource Description Type URI
  • 23. 3 NetFlow Monitoring Content Confidential NetFlow Monitoring Standard Content Guide 23 Top Bandwidth Usage by Destination This trend stores the top bandwidth usage information by destination and includes the destination address, destination zone, flow counts, and total bytes. This trend depends on the /All Trends/ArcSight Foundation/NetFlow Monitoring/Top Bandwidth Usage Events trend. Trend ArcSight Foundation/ NetFlow Monitoring/ Top Bandwidth Usage by Port This trend stores top bandwidth usage information by port and includes the destination port, flow counts, and total bytes. This trend depends on the /All Trends/ArcSight Foundation/NetFlow Monitoring/Top Bandwidth Usage Events trend. Trend ArcSight Foundation/ NetFlow Monitoring/ Resource Description Type URI
  • 24. 3 NetFlow Monitoring Content 24 NetFlow Monitoring Standard Content Guide Confidential
  • 25. Confidential NetFlow Monitoring Standard Content Guide 25 A ArcSight Administration overview 5 ArcSight Core Security overview 5 ArcSight Foundations overview 6 ArcSight System overview 6 asset categories Protected 18 B Bytes In is NULL filter 19 Bytes Out is NULL filter 19 C Chart and Table Landscape report template 22 content packages 7 D dashboards NetFlow Bandwidth Usage Monitoring 16 NetFlow Bandwidth Usage Overview 16 data monitors Inbound Bandwidth (Bytes Per Second) 18 List of Top Bandwidth Usage (MB) Events 18 Outbound Bandwidth (Bytes Per Second) 18 Top Bandwidth Usage (MB) by Destination 18 Top Bandwidth Usage (MB) by Non-Well-Known Port 18 Top Bandwidth Usage (MB) by Source 18 Top Bandwidth Usage (MB) by Well-Known Port 18 E External Source filter 19 External Target filter 19 F filters Bytes In is NULL 19 Bytes Out is NULL 19 External Source 19 External Target 19 Inbound Events 19 Inbound NetFlow Traffic 19 Internal Source 19 Internal Target 19 NetFlow Traffic for Non-Well-Known Ports 20 NetFlow Traffic for Well-Known Ports 20 NetFlow Traffic Reporting Devices 19 NetFlow V5 Events 20 NetFlow V9 Events 19 Outbound Events 19 Outbound NetFlow Traffic 19 QoSient Argus Events 19 Four Charts Landscape report template 22 G global variables MBytesTotal 18 TotalBytes 18 I Inbound Bandwidth (Bytes Per Second) data monitor 18 Inbound Events filter 19 Inbound NetFlow Traffic filter 19 Internal Source filter 19 Internal Target filter 19 L List of Top Bandwidth Usage (MB) Events data monitor 18 List of Top Bandwidth Usage Events query 21 List of Top Bandwidth Usage Events query viewer 16 M MBytesTotal global variable 18 N NetFlow Bandwidth Usage Monitoring dashboard 16 NetFlow Bandwidth Usage Overview dashboard 16 NetFlow Traffic for Non-Well-Known Ports filter 20 NetFlow Traffic for Well-Known Ports filter 20 NetFlow Traffic Reporting Devices filter 19 NetFlow V5 Events filter 20 NetFlow V9 Events filter 19 O Outbound Bandwidth (Bytes Per Second) data monitor 18 Outbound Events filter 19 Outbound NetFlow Traffic filter 19 P packages deleting 10 Index
  • 26. 26 NetFlow Monitoring Standard Content Guide Confidential installing 9 uninstalling 9 Protected asset category 18 Q QoSient Argus Events filter 19 queries List of Top Bandwidth Usage Events 21 Top Bandwidth Usage by Day - Trend on Trend 20 Top Bandwidth Usage by Destination 21 Top Bandwidth Usage by Destination - Trend 21 Top Bandwidth Usage by Destination - Trend on Trend 20 Top Bandwidth Usage by Destination and Port 21 Top Bandwidth Usage by Hour - Trend 21 Top Bandwidth Usage by Hour - Trend on Trend 20 Top Bandwidth Usage by Non-Well-Known Port 21 Top Bandwidth Usage by Port - Trend 21 Top Bandwidth Usage by Port - Trend on Trend 21 Top Bandwidth Usage by Source 20 Top Bandwidth Usage by Source - Trend 21 Top Bandwidth Usage by Source - Trend on Trend 22 Top Bandwidth Usage by Source and Port 20 Top Bandwidth Usage by Source-Destination Pairs 20 Top Bandwidth Usage by Source-Destination Pairs and Port 22 Top Bandwidth Usage by Well-Known Port 21 Top Bandwidth Usage Events 20 query viewers List of Top Bandwidth Usage Events 16 Top Bandwidth Usage by Destination 16 Top Bandwidth Usage by Destination and Port 17 Top Bandwidth Usage by Non-Well-Known Port 17 Top Bandwidth Usage by Source 17 Top Bandwidth Usage by Source and Port 17 Top Bandwidth Usage by Source-Destination Pairs 16 Top Bandwidth Usage by Source-Destination Pairs and Port 16 Top Bandwidth Usage by Well-Known Port 16 R report templates Chart and Table Landscape 22 Four Charts Landscape 22 reports Top Bandwidth Usage by Destination 17 Top Bandwidth Usage by Destination Port 17 Top Bandwidth Usage by Source 17 Top Bandwidth Usage Daily Report 17 Top Bandwidth Usage Weekly Report 17 S shared libraries 6 T Top Bandwidth Usage (MB) by Destination data monitor 18 Top Bandwidth Usage (MB) by Non-Well-Known Port data monitor 18 Top Bandwidth Usage (MB) by Source data monitor 18 Top Bandwidth Usage (MB) by Well-Known Port data monitor 18 Top Bandwidth Usage by Day - Trend on Trend query 20 Top Bandwidth Usage by Destination - Trend on Trend query 20 Top Bandwidth Usage by Destination - Trend query 21 Top Bandwidth Usage by Destination and Port query 21 Top Bandwidth Usage by Destination and Port query viewer 17 Top Bandwidth Usage by Destination Port report 17 Top Bandwidth Usage by Destination query 21 Top Bandwidth Usage by Destination query viewer 16 Top Bandwidth Usage by Destination report 17 Top Bandwidth Usage by Destination trend 23 Top Bandwidth Usage by Hour - Trend on Trend query 20 Top Bandwidth Usage by Hour - Trend query 21 Top Bandwidth Usage by Hour trend 22 Top Bandwidth Usage by Non-Well-Known Port query 21 Top Bandwidth Usage by Non-Well-Known Port query viewer 17 Top Bandwidth Usage by Port - Trend on Trend query 21 Top Bandwidth Usage by Port - Trend query 21 Top Bandwidth Usage by Port trend 23 Top Bandwidth Usage by Source - Trend on Trend query 22 Top Bandwidth Usage by Source - Trend query 21 Top Bandwidth Usage by Source and Port query 20 Top Bandwidth Usage by Source and Port query viewer 17 Top Bandwidth Usage by Source query 20 Top Bandwidth Usage by Source query viewer 17 Top Bandwidth Usage by Source report 17 Top Bandwidth Usage by Source trend 22 Top Bandwidth Usage by Source-Destination Pairs and Port query 22 Top Bandwidth Usage by Source-Destination Pairs and Port query viewer 16 Top Bandwidth Usage by Source-Destination Pairs query 20 Top Bandwidth Usage by Source-Destination Pairs query viewer 16 Top Bandwidth Usage by Well-Known Port query 21 Top Bandwidth Usage by Well-Known Port query viewer 16 Top Bandwidth Usage Daily Report report 17 Top Bandwidth Usage Events query 20 Top Bandwidth Usage Events trend 22 Top Bandwidth Usage Weekly Report report 17 TotalBytes global variable 18 TotalBytes variable 13 trends Top Bandwidth Usage by Destination 23 Top Bandwidth Usage by Hour 22 Top Bandwidth Usage by Port 23 Top Bandwidth Usage by Source 22 Top Bandwidth Usage Events 22 V variable, TotalBytes 13