Getting Started with LANGuardian

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

General Operation and Facts As of 3/24/2014. Virtual Desktop 1. What is a Virtual Desktop? 2. Why VDI? 3. Installing the Virtual Desktop 4. Accessing.
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
File sharing. Connect the two win 7 systems with LAN card Open the network.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to SysAid.
1 Box Overview Session Getting Started on Box. 2 Agenda What is Box? Box Basics Live Q&A.
Sharepoint Portal Server Basics. Introduction Sharepoint server belongs to Microsoft family of servers Integrated suite of server capabilities Hosted.
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
By Jeerarat Boonyanit. As you can see I have chosen Cpanel for my server management tool. cPanel is a Linux based web hosting control panel that provides.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
How to monitor Windows file share activity on your network Aisling Dillon.
NetFort Customer Webinar Getting back to basics – Using LANGuardian Aisling Brennan 26 th Feb 2015.
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
Session 10 Windows Platform Eng. Dina Alkhoudari.
Module 14: Configuring Print Resources and Printing Pools.
Copyright ®xSpring Pte Ltd, All rights reserved Versions DateVersionDescriptionAuthor May First version. Modified from Enterprise edition.NBL.
Hands-On Microsoft Windows Server 2003 Administration Chapter 2 Managing Windows Server 2003 Hardware and Software.
Honeypot and Intrusion Detection System
Vantage Report 3.0 Product Sales Guide
Troubleshooting Windows Vista Security Chapter 4.
Internet Engineering Course Network Design. Internet Engineering Course; Sharif University of Technology Contents Define and analyse an organization network.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Introduction With TimeCard users can tag SharePoint events with information that converts them into time sheets. This way they can report.
Time lag between discovering issue and resolving Difficult to find solutions and patches that can help resolve issue Service outages expensive and.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
National Center for Supercomputing Applications NCSA OPIE Presentation November 2000.
Phone: Mega AS Consulting Ltd © 2007  CAT – the problem & the solution  Using the CAT - Administrator  Mega.
Graphing and statistics with Cacti AfNOG 11, Kigali/Rwanda.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Copyright © 2012 Pearson Education, Inc. or its affiliate(s). All rights reserved
Secure Access and Mobility Jason Kunst, Technical Marketing Engineer March 2016 Location Based Services with Mobility Services Engine ISE Location Services.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Windows Server 2003 { First Steps and Administration} Benedikt Riedel MCSE + Messaging
ConfigMgr Discovering and Organizing Resources Mariusz Zarzycki, Phd, MCT, MCTS, MCITP, MCSE, MCSA.....
Presented by [Harshit Agrawal] 04/03/2017
Munix Healthcare Customer Profiling, Frequency Analysis, Location Mapping, Movement Analysis, Web Classification, Time Analysis, and much more …. Internet.
C IBM Security QRadar SIEM V7.2.6 Associate Analyst
Remote Access: Guide for Windows
Finding the top users of bandwidth on your network
Using Apps to Get and Share Information
Securing the Network Perimeter with ISA 2004
in All Office 365 Apps for Enterprise Companies
A Modern Intranet Integration that Extends the Value of Your Microsoft Office 365 Deployment, Boosts Productivity, and Enhances Collaboration OFFICE 365.
Introduction to Networking
Aisling Brennan 20th March 2014
1Y0-253 Exam Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
Bomgar Remote support software
Introduction With TimeCard users can tag SharePoint events with information that converts them into time sheets. This way they can report.
Security of a Local Area Network
Unit 27: Network Operating Systems
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
Configuring Internet-related services
[insert Module title here]
Training Module Introduction to the TB9100/P25 CG/P25 TAG Customer Service Software (CSS) Describes Release 3.95 for Trunked TB9100 and P25 TAG Release.
Radoslaw Jedynak, PhD Poland, Technical University of Radom
STC Meeting November 2009.
Features Overview.
Office 365 Performance Management
Power BI for the Consumer
Presentation transcript:

Getting Started with LANGuardian Aisling Brennan 14th November 2013

Agenda Live tour of LANGuardian Review of deployment options Review of common administrative tasks Working with NetFort Technical Support Q&A session

Live tour of LANGuardian Two live demo systems are available: Standalone LANGuardian system LANGuardian integrated with SolarWinds Network Performance Monitor http://www.netfort.com/downloads/live-demo You can go onto our website - where there is a version of our system available, that's got some data in it At the heart of LANGuardian is a DPI engine. You can use it for internal network and user activity. List of things you can do is endless, activity including security (bittorrent), bandwidth, file activity, internet and forensics. There are no agents or clients, and no negative impact on the network. The primary source of data is from a span or mirror port. Let me give you a quick run through the key features. once you install it, no of ways you can access the info use our web front end, can also get alerts, someone tries to scan your network, virus, can also get reports, come in the morning, top users, top applications, top sec events also use other tools to access our db, other nm tool, like excel api gain access to date today web front end most people use when you log on 4 options home page bw troubleshooting want to see what traffic is like between 2 sites what is happening on a server, what type of connections 192.168.0.0/16 cedar notation change time, it defaults last hour we do not age data, the level of details you get right now, go back a week ago and get same level of at most customers keep a couple of months live data user monitoring Let’s say your manager wants to know what a user did on the network. Type in the username on the forensics tab and press go. So what do we know about this user: Total amt of traffic, applications being used, events user is triggering internally within the network, we're inside the network, spam from a system, it’s running bittorrent, bypass attempt feature in lg, we provide an audit trail of what people are doing on file share (cifs, nas device, nfs) type in a file, who deleted a file off the network Also view report with usernames overlap with what you got we also do web activity monitoring, lets see who’s been accessing youtube. who's on a website/view with username not only website, drilldown see the video name stores uri, page / lot of bw consumption on internet gateways, lg great too to be able to drill down what users are consuming most amount of data, what websites, reporting included in lg. extensive reporting - too many reports maybe! mac addresses, ethernet reports, security report. IDS included in lg based around snort ids engine. Snort uses sigs to detect certain activity on your network. we also have dashboards, customizable, add /change elements, set up these, mobile devices, also have ad module lg can gather user logon from the ad infrastructure, not only see ip addresses also usernames 3

Review of deployment options Install it on a dedicated physical PC or server Install it as a Vmware virtual appliance http://www.netfort.com/software-download 4

Common administrative tasks Identity configuration Sensors Database Custom reports Email distribution lists Dashboards 5

Working with NetFort Technical Support Get instant online support Use the customer checklist Documentation Follow up on Twitter @NetFort Watch videos on YouTube at NetfortTechnologies 6

7