Finding the top users of bandwidth on your network Aisling Dillon, Darragh Delaney
Agenda Sources of user data on computer networks What you need to be logging in Active Directory Associating packet and flow data with usernames Finding out where user devices are plugged into your network
Where are the ‘pain’ points 4. Virtual Networks 5. Local Networks 1. Internet links 3. Remote Networks 2. Remote Links
Sources of user and network data (agentless) Packet capture Log files & syslog NetFlow SNMP
Customer Use Case Can Download and get it on your network in 30 minutes!!! Virtual or physical!! Free fully functional trial, 30 days
Where can you get user logon events? RADIUS
Customer Use Case
Customer Case study – Issue with WAN link Ottawa pitch Traffic....Xilinx story Good analogy is physical security, users are in your network in your office block, place cameras at strategic points, where the risk is, so you can monitor and, tape and go back..... Get alerts and/or investigate Report easily, answer requests for information Go to DEMO here!! Getting visibility at the right level – Tsol Just did a survey,,, and the main pains we address or how customers are using the system are More detail on bandwidth usage, usernames, who are hogging that valuable resource and maybe slowing critical business apps down We track files moving around the network, internally, if a folder has been moved, who touched it last??? More visibility and insight internally, so much data and networks so critical, users more techy, lots of mobile devices,lots of risk, ALERT me if something unusual happens, get me the data I need to report and investigate!! Data protection, an audit trail. TYCO tunnelling case. Internal activity, what is going on internally, what are users doing, contractors,
User & network forensics
Finding out where user devices are plugged into your network
Next steps Recording will be sent out later Download a free trial from www.netfort.com Online demos also available at www.netfort.com