Upload
logrhythm
View
87.020
Download
0
Embed Size (px)
Citation preview
Rule Your Network
6 ways you can use
NetMon Freemium to secure your network
What is NetMon Freemium?
NetMon Freemium provides enterprise-wide visibility to your network:
• Network-based threat detection
• Network-based incident response
• Completely free and feature rich
Read on to find 6 ways you
can use this free tool for
better network security!
1. Surface potential insider threats
Worried that threat actors might be exfiltrating data on your network?
Use NetMon Freemium to identify the following indicators and more:• Long-running sessions
• “Low and slow” sessions hidden in normal traffic
• Anomalous outbound network sessions
• Outbound traffic to cloud file shares (e.g., Box)
2. Discover operational anomalies
Are you sure your security controls are working?
• Verify absence of blocked traffic (e.g., outbound ICMP)
• Identify tunneling holes such as RDP or TOR traffic over non-standard ports
• Compare application profiles pre- and post-security change
3. Find hidden security threats
Security threats hiding on your network?
Use NetMon Freemium to catch cyberthreats sneaking around in low-level chatty protocols like DNS, ICMP, or Kerberos.
4. Detect botnets and beaconing
• Identify traffic using anomalous ports.
• View malformed packet headers.
• Recognize command and control callbacks.
• See time-based activity trends to/from specific addresses.
5. Expose nuisance apps and bandwidth hogs
Discover when people are using apps that are against your corporate policy.
Or, find out who or what is taking up the most bandwidth.
NetMon Freemium has over 3,100 classified applications without the need to write rules, open PCAPs, or configure application IDs.
6. See where your network traffic is going
With NetMon Freemium, you can identify outbound IP and URL destinations and classify traffic by ingress, egress, or lateral motion in your network.
NetMon enables us to detect lateral movement, command-and-control activity, and other telltale actions of cyber-adversaries with speed and precision.
Darek Dabbs
CISO, Sera-Brynn
Find threats on your network in real with our free tool.
Get started at:
logrhythm.com/freemium