Network Monitoring

Questionable Hosting Report

by David Schwalenberg
July 30, 2014

Questionable Hosting Report Screenshot
This report presents information on possible questionable web content hosted on the network, and can assist in finding malicious web sites installed on the network.

MAS TRM Guidelines Report

by David Schwalenberg
July 9, 2014

MAS TRM Guidelines Report Screenshot
The Monetary Authority of Singapore (MAS) published new Technology Risk Management (TRM) Guidelines in June 2013. The MAS TRM Guidelines report provides a high-level overview of information relevant to specific sections in the TRM Guidelines. The applicable sections of the TRM Guidelines are noted for each component in the report.

Incident Response Report

by Josef Weiss
July 3, 2014

This report displays incident response details on Systems that have been found in your environment to have active intrusion events. Intrusion events are events that are triggered by plugin 800125 - Long Term Intrusion Activity, or 800017 - Intrusion Statistics..

Passive OS Detection Report

by David Schwalenberg
June 5, 2014

Passive OS Detection Report Screenshot
This report presents passive detections of operating systems, using PVS plugin 1. Charts present the number of hosts with detected operating systems within major groups, as well as a 7-day trends of detections. A table presents all the operating systems detected on the network, with host counts.

Web Activity Report

by David Schwalenberg
May 21, 2014

Web Activity Report Screenshot
This report presents web activity detected in the last 72 hours, with some 7-day trending. This report can be used to monitor web accesses and look for suspicious or potentially unauthorized activity.

NetFlow Monitor Report

by Josef Weiss
April 9, 2014

Sample image from Chapter 4 of the report.

This report displays event statistics leveraging the capabilities of Tenable Netflow Normalized Events. This event data is correlated to produce a series of pie charts, tables, and trends lines to display statistical data. The report is based on the the components present in the NetFlow Monitor Dashboard.

Netflow data that is being forwarded to Tenable’s LCE includes ports, source and destination IP address. The chapters in this report include:

Top Talkers (All Traffic)

PVS Detections Executive Report

by David Schwalenberg
March 26, 2014

PVS Detections Executive Report Screenshot
This executive report presents indications of the network traffic passively detected by the Passive Vulnerability Scanner (PVS). This enables network awareness and may highlight network vulnerabilities.

TCP Metrics Report

by Cody Dumont
March 20, 2014

TCP Report Screen Shot
This report provides security professionals with detailed statistics for TCP port usage across all Tenable products. For each product (Nessus, PVS and LCE), a chapter is dedicated to port usage statistics.

Pages