Network Monitoring

Questionable Hosting

by David Schwalenberg
July 23, 2014

Questionable Hosting Dashboard Screenshot
This dashboard presents information on possible questionable web content hosted on the network, and can assist in finding malicious web sites installed on the network.

Remote Access Detection

by Michael Willison
July 11, 2014

Remote Access Detection screenshot
This dashboard provides information on remote access vulnerabilities. These include vulnerabilities associated with the standard protocols of SSH, VNC, and RDP, along with the proprietary protocols of pcAnywhere, Apple Remote Desktop, WebEx, Google Desktop, and GoToMyPC.

Tenable Admin

by Josef Weiss
July 10, 2014

This dashboard provides an administrative overview of Tenable Applications, and highlights potential problems. These eight components provide indications to common problems, and allow the administrator to quickly take action to resolve concerns, and to minimize the potential loss of vulnerability or event data.

MAS TRM Guidelines

by David Schwalenberg
July 2, 2014

The Monetary Authority of Singapore (MAS) published new Technology Risk Management (TRM) Guidelines in June 2013. The MAS TRM Guidelines dashboard provides a high level overview of information relevant to specific sections in the TRM Guidelines.

SEC Risk Alert

by David Schwalenberg
June 11, 2014

SEC Risk Alert Dashboard Screenshot
On April 15, 2014, the U.S. Securities and Exchange Commission’s Office of Compliance Inspections and Examinations (OCIE) issued a Risk Alert describing its Cybersecurity Initiative "to assess cybersecurity preparedness in the securities industry." This dashboard presents network information that can assist organizations in evaluating and improving their cybersecurity preparedness.

Web Activity

by David Schwalenberg
May 14, 2014

Web Activity Dashboard Screenshot
This dashboard presents web activity detected in the last 72 hours, with some 7-day trending. This dashboard can be used to monitor web accesses and look for suspicious or potentially unauthorized activity.

Cloud Storage

by David Schwalenberg
May 7, 2014

Cloud Storage Dashboard Screenshot
This dashboard presents interactions with cloud file storage services, such as Dropbox, OneDrive, and iCloud, detected over the last 7 days.

Passive Network Forensics

by David Schwalenberg
April 30, 2014

Passive Network Forensics Dashboard Screenshot
This dashboard presents information passively detected over the last 72 hours, such as summaries of domains accessed and indicators of suspicious network activity. This information can be helpful for network monitoring and forensics.

NetFlow Monitor Dashboard

by Josef Weiss
April 8, 2014

This dashboard displays event statistics leveraging the capabilities of Tenable Netflow Normalized Events. This event data is correlated to produce a series of pie charts, tables, and trends lines to display statistical data.

Netflow data that is being forwarded to Tenable’s LCE includes ports, source and destination IP address. The components in this dashboard include:

Top Talkers Class B (All Traffic)