Botnets

Web Activity

by David Schwalenberg
May 14, 2014

Web Activity Dashboard Screenshot
This dashboard presents web activity detected in the last 72 hours, with some 7-day trending. This dashboard can be used to monitor web accesses and look for suspicious or potentially unauthorized activity.

Passive Network Forensics

by David Schwalenberg
April 30, 2014

Passive Network Forensics Dashboard Screenshot
This dashboard presents information passively detected over the last 72 hours, such as summaries of domains accessed and indicators of suspicious network activity. This information can be helpful for network monitoring and forensics.

Council on CyberSecurity 20 Critical Security Controls Dashboard

by Cody Dumont
March 14, 2014

CSC Top 20 Dashboard
This dashboard displays many indicators of the Council on CyberSecurity 20 Critical Security Controls. As published by Council on CyberSecurity, the goal of the 20 Critical Security Controls is to protect assets, infrastructure, and information by strengthening your organization’s defensive posture through continuous automated protection and monitoring. This SecurityCenter Dashboard is comprised of one dashboard with 15 individual components that provide insight to nearly 50 items that directly correlate to the Council on CyberSecurity 20 Critical Security Controls.

PVS Detections

by David Schwalenberg
February 12, 2014

PVS Detections Dashboard Screenshot
This dashboard highlights network vulnerabilities and promotes network awareness by displaying indications of the network traffic detected by the Passive Vulnerability Scanner (PVS).

Passive Bitcoin Detection Indicator

by Josef Weiss
December 9, 2013

This component indicates on triggers from the recently released passive PVS plugins below, over the last 7 days. If indicator is present, the remote host is a Bitcoin client.

Threatlist Trending

by David Schwalenberg
November 6, 2013

Threatlist Trending Screenshot
This dashboard presents events and network connections that are associated with IP addresses on a known threatlist, and shows trending.

Indicators

by Ron Gula
March 19, 2013

This dashboard displays close to 100 different indicators of compromise and suspicious activity based on malicious file hashes, anomalies in network traffic, correlated attacks and much more.

Pages